{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:48:01Z","timestamp":1725706081948},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_11","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"135-148","source":"Crossref","is-referenced-by-count":7,"title":["A Bird\u2019s Eye View on the I2P Anonymous File-Sharing Environment"],"prefix":"10.1007","author":[{"given":"Juan Pablo","family":"Timpanaro","sequence":"first","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-00975-4_18","volume-title":"Passive and Active Network Measurement","author":"G. Siganos","year":"2009","unstructured":"Siganos, G., Pujol, J.M., Rodriguez, P.: Monitoring the Bittorrent Monitors: A Bird\u2019s Eye View. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 175\u2013184. Springer, Heidelberg (2009)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Steiner, M., En-Najjary, T., Biersack, E.W.: A global view of Kad. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, San Diego, California, USA. ACM (October 2007)","DOI":"10.1145\/1298306.1298323"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1007\/978-3-540-72606-7_94","volume-title":"NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet","author":"A. Banerjee","year":"2007","unstructured":"Banerjee, A., Faloutsos, M., Bhuyan, L.N.: The P2P War: Someone Is Monitoring Your Activities! In: Akyildiz, I.F., Sivakumar, R., Ekici, E., de Oliveira, J.C., McNair, J. (eds.) NETWORKING 2007. LNCS, vol.\u00a04479, pp. 1096\u20131107. Springer, Heidelberg (2007)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Chaabane, A., Manils, P., Ali Kaafar, M.: Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. In: Proceedings of the 2010 4th International Conference on Network and System Security. IEEE Computer Society, Washington, DC (2010)","DOI":"10.1109\/NSS.2010.47"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-70630-4_5","volume-title":"Privacy Enhancing Technologies","author":"D. McCoy","year":"2008","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 63\u201376. Springer, Heidelberg (2008)"},{"key":"11_CR6","unstructured":"I2P. The I2P network, \n                    \n                      http:\/\/www.i2p2.de\/"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D. Goldschlag","year":"1996","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 53\u201365. Springer, Heidelberg (2002)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Timpanaro, J.P., Cholez, T., Chrisment, I., Festor, O.: When KAD meets BitTorrent - Building a Stronger P2P Network. In: Proceedings of the 8th International Workshop on Hot Topics in Peer-to-Peer Systems, HotP2P 2011, Anchorage, Alaska, USA. IEEE Computer Society (May 2011)","DOI":"10.1109\/IPDPS.2011.318"},{"key":"11_CR10","unstructured":"Blond, S.L., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011, Boston, MA. USENIX Association (March 2011)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-642-14992-4_19","volume-title":"FC 2010 Workshops","author":"K. Loesing","year":"2010","unstructured":"Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 203\u2013215. Springer, Heidelberg (2010)"},{"key":"11_CR12","unstructured":"Loesing, K.: Measuring the Tor network from public directory information. In: Proceedings of the 4th Hot Topics in Privacy Enhancing Technologies, HotPETS 2011, Seattle, WA, USA. Springer (August 2009)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-28534-9_5","volume-title":"Traffic Monitoring and Analysis","author":"J.P. Timpanaro","year":"2012","unstructured":"Timpanaro, J.P., Chrisment, I., Festor, O.: I2P\u2019s Usage Characterization. In: Pescap\u00e8, A., Salgarelli, L., Dimitropoulos, X. (eds.) TMA 2012. LNCS, vol.\u00a07189, pp. 48\u201351. Springer, Heidelberg (2012)"},{"key":"11_CR14","unstructured":"Crenshaw, A.: Darknets and hidden servers: Identifying the true IP\/network identity of I2P service hosts. In: Black Hat 2011, Washington, DC, USA (March 2011)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-22263-4_9","volume-title":"Privacy Enhancing Technologies","author":"M. Herrmann","year":"2011","unstructured":"Herrmann, M., Grothoff, C.: Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 155\u2013174. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:00:16Z","timestamp":1620133216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}