{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:39Z","timestamp":1725558819284},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142819"},{"type":"electronic","value":"9783642142826"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14282-6_24","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T10:29:39Z","timestamp":1277720979000},"page":"284-298","source":"Crossref","is-referenced-by-count":2,"title":["Secure Logging of Retained Data for an Anonymity Service"],"prefix":"10.1007","author":[{"given":"Stefan","family":"K\u00f6psell","sequence":"first","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Accorsi, R.: Towards a secure logging mechanism for dynamic systems. In: Proc. of the 7th IT Security Symposium, S\u00e3o Jos\u00e9 dos Campos, Brasilien (November 2005)"},{"key":"24_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-642-03315-5_7","volume-title":"Proc. The Future of Identity in the Information Society - Challenges for Privacy and Security, FIDIS\/IFIP Internet Security & Privacy Fourth International Summer School","author":"S. Berthold","year":"2009","unstructured":"Berthold, S., B\u00f6hme, R., K\u00f6psell, S.: Data Retention and Anonymity Services. In: Proc. The Future of Identity in the Information Society - Challenges for Privacy and Security, FIDIS\/IFIP Internet Security & Privacy Fourth International Summer School. IFIP Advances in Information and Communication Technology, vol.\u00a0298, pp. 92\u2013106. Springer, Boston (2009)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"24_CR4","unstructured":"Bellare, M., Yee, B.S.: Forward integrity for secure audit logs; Technical Report, University of California at San Diego, Dept. of Computer Science & Engineering (1997)"},{"issue":"2","key":"24_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I. Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 46\u201366. Springer, Heidelberg (2001)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Designing Privacy Enhancing Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven Project: Distributed Anonymous Storage Service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 67. Springer, Heidelberg (2001)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium, August 2004, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"D.A. McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The Security and Performance of the Galois\/Counter Mode (GCM) of Operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 343\u2013355. Springer, Heidelberg (2004)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-03317-9_4","volume-title":"Fast Software Encryption","author":"S. Gueron","year":"2009","unstructured":"Gueron, S.: Intel\u2019s New AES Instructions for Enhanced Performance and Security. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 51\u201366. Springer, Heidelberg (2009)"},{"key":"24_CR11","unstructured":"Holt, J.E.: Logcrypt: forward security and public verification for secure audit logs. In: Proc. of the 2006 Australasian Workshops on Grid Computing and E-Research, January 2006, pp. 203\u2013211 (2006)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Ma, D., Tsudik, G.: A new approach to secure logging. ACM Transactions on Storage (TOS)\u00a05(1) (2009)","DOI":"10.1145\/1502777.1502779"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP), Proposed Standard (August 2001), http:\/\/www.rfc-editor.org\/rfc\/rfc3161.txt","DOI":"10.17487\/rfc3161"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B. Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J.: Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security (TISSEC)\u00a02(2), 159\u2013176 (1999)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"24_CR15","unstructured":"Shoup, V.: A proposal for an ISO standard for public key encryption; Version 2.1 (December 20, 2001), http:\/\/www.shoup.net\/papers\/iso-2_1.pdf (last accessed Juli 28, 2009)"},{"key":"24_CR16","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC; U.S. Department of Commerce, National Institute of Standards and Technology (NIST), Information Technology Laboratory (ITL) (November 2007), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38D\/SP-800-38D.pdf (last access on December 1, 2008)"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/ARES.2008.41","volume-title":"Proc. of the 2008 Third International Conference on Availability, Reliability and Security","author":"K. Wouters","year":"2008","unstructured":"Wouters, K., Simoens, K., Lathouwers, D., Preneel, B.: Secure and Privacy-Friendly Logging for eGovernment Services. In: Proc. of the 2008 Third International Conference on Availability, Reliability and Security, pp. 1091\u20131096. IEEE Computer Society, Los Alamitos (2008)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14282-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:19Z","timestamp":1606186219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14282-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142819","9783642142826"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14282-6_24","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}