{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:11:19Z","timestamp":1743048679882,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296147"},{"type":"electronic","value":"9783642296154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_3","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T11:30:30Z","timestamp":1335180630000},"page":"13-30","source":"Crossref","is-referenced-by-count":0,"title":["A Ring Based Onion Circuit for Hidden Services"],"prefix":"10.1007","author":[{"given":"Hakem","family":"Beitollahi","sequence":"first","affiliation":[]},{"given":"Geert","family":"Deconinck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","volume-title":"Information Hiding","author":"A. Back","year":"2001","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 245\u2013257. Springer, Heidelberg (2001)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-Resource Routing Attacks against Tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007), Virginia, USA (2007)","DOI":"10.1145\/1314333.1314336"},{"key":"3_CR3","unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom Systems 2.0 Architecture. White paper, Zero Knowledge Systems, Inc. (December 2000)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, USA (November 2002)","DOI":"10.1145\/586135.586137"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Misra, V., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE Journal on Selected Areas in Communications 22(1) (2004)","DOI":"10.1109\/JSAC.2003.818807"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Danezis, G.: Low-Cost Traffic Analysis Of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183\u2013195 (May 2005)","DOI":"10.1109\/SP.2005.12"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, CA, USA, pp. 100\u2013114 (May 2006)","DOI":"10.1109\/SP.2006.24"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.-F. Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"issue":"4","key":"3_CR11","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA (2002)","DOI":"10.1145\/644527.644537"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Waldman, M., Mazieres, D.: Tangler: A Censorship-Resistant Publishing System Based on Document Entangnlements. In: Proceedings of the 8th ACM Conference on Computer and Communication Security, pp. 126\u2013135 (November 2001)","DOI":"10.1145\/501983.502002"},{"key":"3_CR14","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, California, USA, pp. 28\u201343 (May 2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:56:08Z","timestamp":1742982968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}