{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:06:17Z","timestamp":1725534377253},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024566"},{"type":"electronic","value":"9783642024573"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02457-3_52","type":"book-chapter","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T09:54:56Z","timestamp":1246960496000},"page":"605-620","source":"Crossref","is-referenced-by-count":0,"title":["Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus"],"prefix":"10.1007","author":[{"given":"Xiaojuan","family":"Cai","sequence":"first","affiliation":[]},{"given":"Yonggen","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-642-00843-6_17","volume-title":"ISPEC 2009","author":"X. Cai","year":"2009","unstructured":"Cai, X., Gu, Y.: Measuring Anonymity. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol.\u00a05451, pp. 183\u2013194. Springer, Heidelberg (2009)"},{"key":"52_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"52_CR3","first-page":"319","volume-title":"Proceedings on Advances in cryptology table of contents","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Proceedings on Advances in cryptology table of contents, pp. 319\u2013327. Springer, New York (1990)"},{"key":"52_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11888116_9","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2006","author":"T. Chothia","year":"2006","unstructured":"Chothia, T.: Analysing the Mute Anonymous File-sharing System Using the Pi Calculus. In: Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol.\u00a04229, pp. 115\u2013130. Springer, Heidelberg (2006)"},{"issue":"1","key":"52_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"52_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.entcs.2005.05.047","volume":"180","author":"Y. Deng","year":"2007","unstructured":"Deng, Y., Palamidessi, C., Pang, J.: Weak Probabilistic Anonymity. Electronic Notes in Theoretical Computer Science\u00a0180(1), 55\u201376 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Desharnais, J., Jagadeesan, R., Gupta, V., Panangaden, P.: The Metric Analogue of Weak Bisimulation for Probabilistic Processes. In: Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science, pp. 413\u2013422 (2002)","DOI":"10.1109\/LICS.2002.1029849"},{"key":"52_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-76637-7_12","volume-title":"Programming Languages and Systems","author":"J. Goubault-Larrecq","year":"2007","unstructured":"Goubault-Larrecq, J., Palamidessi, C., Troina, A.: A Probabilistic Applied Pi-Calculus. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol.\u00a04807, pp. 175\u2013190. Springer, Heidelberg (2007)"},{"issue":"2","key":"52_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"52_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.entcs.2005.11.050","volume":"155","author":"C. Palamidessi","year":"2006","unstructured":"Palamidessi, C.: Probabilistic and Nondeterministic Aspects of Anonymity. Electronic Notes in Theoretical Computer Science\u00a0155, 33\u201342 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"1","key":"52_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology\u00a01(1), 65\u201375 (1988)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02457-3_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T06:29:40Z","timestamp":1538807380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02457-3_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024566","9783642024573"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02457-3_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}