{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:55:56Z","timestamp":1760424956317,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642012433"},{"type":"electronic","value":"9783642012440"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01244-0_36","type":"book-chapter","created":{"date-parts":[[2009,5,23]],"date-time":"2009-05-23T08:53:02Z","timestamp":1243068782000},"page":"410-420","source":"Crossref","is-referenced-by-count":4,"title":["Persona: Network Layer Anonymity and Accountability for Next Generation Internet"],"prefix":"10.1007","author":[{"given":"Yannis","family":"Mallios","sequence":"first","affiliation":[]},{"given":"Sudeep","family":"Modi","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Agarwala","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Johns","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Danezis, G., Diaz, C.: A Survey of Anonymous Communication Channels. Microsoft Research technical report MSR-TR-2008-35 (January 2008)"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: The Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (May 2005)","DOI":"10.1109\/SP.2005.12"},{"key":"36_CR4","unstructured":"Murdoch, S.J.: Covert channel vulnerabilities in anonymity systems. Technical report, University of Cambridge (August 2007)"},{"key":"36_CR5","unstructured":"Bellovin, S.M., Clark, D.D., Perrig, A., Song, D.: A Clean-Slate Design for the Next-Generation Secure Internet. In: NSF Workshop on a clean-slate design for the next-generation secure Internet (2005)"},{"issue":"4","key":"36_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1145\/1402946.1402997","volume":"38","author":"D.G. Andersen","year":"2008","unstructured":"Andersen, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable Internet Protocol (AIP). SIGCOMM Comput. Commun. Rev. Journal\u00a038(4), 339\u2013350 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev. Journal"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"36_CR8","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology, Version v0.31 (2008)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Seshadri, A.: Minimal TCB code execution (Extended abstract). In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (May 2007)","DOI":"10.1109\/SP.2007.27"},{"key":"36_CR10","unstructured":"Diaz, C.: Anonymity Metrics Revisited. In: Dolev, S., Ostrovsky, R., Pfitzmann, A. (eds.) Anonymous Communication and its Applications (2006)"},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.F. Raymond","year":"2001","unstructured":"Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"issue":"2","key":"36_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Association for Computing Machinery\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the Association for Computing Machinery"},{"key":"36_CR13","volume-title":"Network and Distributed Security Symposium - NDSS 1996","author":"C. Gulcu","year":"1996","unstructured":"Gulcu, C., Tsudik, G.: Mixing E-mail with Babel. In: Network and Distributed Security Symposium - NDSS 1996. IEEE, Los Alamitos (1996)"},{"key":"36_CR14","unstructured":"Mller, U., Cottrell, L.: Mixmaster Protocol - Version 2, Unfinished draft (January 2000)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: The Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 2\u201315 (May 2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"36_CR17","unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom Systems 2.0 Architecture, Zero Knowledge Systems, Inc. White Paper (December 2000)"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: The Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC (November 2002)","DOI":"10.1145\/586110.586137"}],"container-title":["IFIP Advances in Information and Communication Technology","Emerging Challenges for Security, Privacy and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01244-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T17:39:53Z","timestamp":1739122793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01244-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642012433","9783642012440"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01244-0_36","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}