{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:43:35Z","timestamp":1746297815793},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642031670"},{"type":"electronic","value":"9783642031687"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03168-7_4","type":"book-chapter","created":{"date-parts":[[2009,7,27]],"date-time":"2009-07-27T13:57:46Z","timestamp":1248703066000},"page":"56-72","source":"Crossref","is-referenced-by-count":28,"title":["Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications"],"prefix":"10.1007","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 16\u201327 (2003)","DOI":"10.1109\/SECPRI.2003.1199324"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20) (2007)","DOI":"10.1109\/CSF.2007.27"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (February 1981)","DOI":"10.1145\/358549.358563"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"327","DOI":"10.2307\/2684568","volume":"49","author":"S. Chib","year":"1995","unstructured":"Chib, S., Greenberg, E.: Understanding the metropolis-hastings algorithm. The American Statistician\u00a049(4), 327\u2013335 (1995)","journal-title":"The American Statistician"},{"key":"4_CR5","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-0-387-35691-4_40","volume-title":"Proceedings of Security and Privacy in the Age of Uncertainty, (SEC 2003)","author":"G. Danezis","year":"2003","unstructured":"Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), Athens, IFIP TC11, May 2003, pp. 421\u2013426. Kluwer, Dordrecht (2003)"},{"key":"4_CR6","unstructured":"Danezis, G., Diaz, C.: A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research (January 2008)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-540-75551-7_3","volume-title":"Privacy Enhancing Technologies","author":"G. Danezis","year":"2007","unstructured":"Danezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 30\u201344. Springer, Heidelberg (2007)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-30114-1_21","volume-title":"Information Hiding","author":"G. Danezis","year":"2004","unstructured":"Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-70630-4_4","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2008","unstructured":"Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 44\u201362. Springer, Heidelberg (2008)"},{"key":"4_CR11","doi-asserted-by":"crossref","DOI":"10.1201\/9780429258480","volume-title":"Bayesian Data Analysis","author":"A. Gelman","year":"2003","unstructured":"Gelman, A., Carlin, J.B., Stern, H.S., Rubin, D.B.: Bayesian Data Analysis, 2nd edn. Chapman and Hall, Boca Raton (2003)","edition":"2"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-36415-3_4","volume-title":"Information Hiding","author":"D. Kesdogan","year":"2003","unstructured":"Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 53\u201369. Springer, Heidelberg (2003)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-540-30114-1_23","volume-title":"Information Hiding","author":"D. Kesdogan","year":"2004","unstructured":"Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 326\u2013339. Springer, Heidelberg (2004)"},{"key":"4_CR14","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"D.J.C. Mackay","year":"2003","unstructured":"Mackay, D.J.C.: Information Theory, Inference, and Learning Algorithms. Cambridge University Press, Cambridge (2003)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/11423409_2","volume-title":"Privacy Enhancing Technologies","author":"N. Mathewson","year":"2005","unstructured":"Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 17\u201334. Springer, Heidelberg (2005)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/SP.2008.33","volume-title":"IEEE Symposium on Security and Privacy","author":"A. Narayanan","year":"2008","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.-F. Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"key":"4_CR18","unstructured":"R\u00e9gin, J.-C.: A filtering algorithm for constraints of difference in csps. In: AAAI, pp. 362\u2013367 (1994)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"issue":"3-4","key":"4_CR20","doi-asserted-by":"crossref","first-page":"355","DOI":"10.3233\/JCS-2004-123-403","volume":"12","author":"V. Shmatikov","year":"2004","unstructured":"Shmatikov, V.: Probabilistic analysis of an anonymity system. Journal of Computer Security\u00a012(3-4), 355\u2013377 (2004)","journal-title":"Journal of Computer Security"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-70630-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. Troncoso","year":"2008","unstructured":"Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 2\u201323. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03168-7_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T03:15:41Z","timestamp":1633749341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03168-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642031670","9783642031687"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03168-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}