{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:29:20Z","timestamp":1756312160548},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275753"},{"type":"electronic","value":"9783642275760"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27576-0_22","type":"book-chapter","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T08:45:35Z","timestamp":1328172335000},"page":"268-275","source":"Crossref","is-referenced-by-count":9,"title":["BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)"],"prefix":"10.1007","author":[{"given":"Peter","family":"Lofgren","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00145-002-0120-1","volume":"16","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-rsa-inversion problems and the security of chaum\u2019s blind signature scheme. J. Cryptology\u00a016(3), 185\u2013215 (2003)","journal-title":"J. Cryptology"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1314333.1314337","volume-title":"WPES 2007: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society","author":"E. Brickell","year":"2007","unstructured":"Brickell, E., Li, J.: Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. In: WPES 2007: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 21\u201330. ACM, New York (2007)"},{"issue":"10","key":"22_CR3","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"22_CR4","first-page":"21","volume-title":"SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium, pp. 21\u201321. USENIX Association, Berkeley (2004)"},{"key":"22_CR5","unstructured":"GmbH, J.: Jondonym: Private and secure web surfing (September 2010), \n                    \n                      http:\/\/anonymous-proxy-servers.net\/"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Henry, R., Goldberg, I.: Extending nymble-like systems. Tech. Rep. Technical Report CACR 2010-23, Unviersity of Waterloo (2010)","DOI":"10.1109\/SP.2011.17"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Henry, R., Henry, K., Goldberg, I.: Making a nymbler nymble using verbs. Tech. rep., University of Waterloo Technical Report CACR 2010-05 (2010)","DOI":"10.1007\/978-3-642-14527-8_7"},{"key":"22_CR8","unstructured":"Holt, J.E., Seamons, K.E.: Nym: Practical pseudonymity for anonymous networks. Tech. Rep.\u00a04, BYU Internet Security Research Lab (2006)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-540-75551-7_8","volume-title":"Privacy Enhancing Technologies","author":"P.C. Johnson","year":"2007","unstructured":"Johnson, P.C., Kapadia, A., Tsang, P.P., Smith, S.W.: Nymble: Anonymous IP-Address Blocking. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 113\u2013133. Springer, Heidelberg (2007)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Lin, Z., Hopper, N.: Jack: Scalable accumulator-based nymble system. In: WPES 2010: Proceedings of the 9th ACM Workshop on Privacy in the Electronic Society. ACM (2010)","DOI":"10.1145\/1866919.1866927"},{"key":"22_CR11","first-page":"72","volume-title":"CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"P.P. Tsang","year":"2007","unstructured":"Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable anonymous credentials: blocking misbehaving users without ttps. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 72\u201381. ACM, New York (2007)"},{"key":"22_CR12","unstructured":"Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs. Tech. rep., Dartmouth Computer Science TR2008-635 (2008)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Perea: Towards practical ttp-free revocation in anonymous authentication. In: CCS 2008: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 333\u2013344. ACM (2008)","DOI":"10.1145\/1455770.1455813"},{"key":"22_CR14","unstructured":"Tsang, P.P., Kapadia, A., Cornelius, C., Smith, S.W.: Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing (TDSC) (September 2009)"},{"key":"22_CR15","unstructured":"Tsang, P.P., Kapadia, A., Cornelius, C., Smith, S.W.: Nymble: Blocking misbehaving users in anonymizing networks. Tech. rep., Dartmouth Computer Science TR2008-637 (2008)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27576-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T04:14:01Z","timestamp":1556252041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27576-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275753","9783642275760"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27576-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}