{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:33:53Z","timestamp":1760783633233,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362125"},{"type":"electronic","value":"9783642362132"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36213-2_25","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T02:26:17Z","timestamp":1357871177000},"page":"213-230","source":"Crossref","is-referenced-by-count":5,"title":["Why I\u2019m Not an Entropist"],"prefix":"10.1007","author":[{"given":"Paul","family":"Syverson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A. Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 84\u2013102. Springer, Heidelberg (2003)"},{"key":"25_CR2","unstructured":"The Anonymizer (2009), http:\/\/www.anonymizer.com\/ ; Homepage of the company that offers the Anonymizer Proxy Service. Original Anonymizer first described in [5]"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: De Capitani di Vimercati, S., Syverson, P., Evans, D. (eds.) CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92\u2013102. ACM Press (2007)","DOI":"10.1145\/1315245.1315258"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"4","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"4","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Clau\u00df, S., Schiffner, S.: Structuring anonymity networks. In: Goto, A. (ed.) DIM 2006: Proceedings of the 2006 ACM Workshop on Digital Identity Management, Alexandria, VA, USA, pp. 55\u201362. ACM Press (2006)","DOI":"10.1145\/1179529.1179539"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Danezis, G., Clayton, R.: Route fingerprinting in anonymous communications. In: Sixth IEEE International Conference on Peer-to-Peer Computing, P2P 2006, pp. 69\u201372. IEEE Computer Society Press (2006)","DOI":"10.1109\/P2P.2006.33"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 2\u201315. IEEE Computer Society (May 2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30114-1_21","volume-title":"Information Hiding","author":"G. Danezis","year":"2004","unstructured":"Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-540-70630-4_10","volume-title":"Privacy Enhancing Technologies","author":"G. Danezis","year":"2008","unstructured":"Danezis, G., Syverson, P.: Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 151\u2013166. Springer, Heidelberg (2008)"},{"key":"25_CR12","unstructured":"Danezis, G., Wittneben, B.: The economics of mass surveillance and the questionable value of anonymous communications. In: Anderson, R. (ed.) Fifth Workshop on the Economics of Information Security, WEIS 2006 (June 2006)"},{"key":"25_CR13","unstructured":"Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Anderson, R. (ed.) Fifth Workshop on the Economics of Information Security, WEIS 2006 (June 2006)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, pp. 303\u2013319. USENIX Association (August 2004)","DOI":"10.21236\/ADA465464"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSP.2007.108","volume":"5","author":"R. Dingledine","year":"2007","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Deploying low-latency anonymity: Design challenges and social factors. IEEE Security & Privacy\u00a05(5), 83\u201387 (2007)","journal-title":"IEEE Security & Privacy"},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11423409_12","volume-title":"Privacy Enhancing Technologies","author":"R. Dingledine","year":"2005","unstructured":"Dingledine, R., Syverson, P.: Synchronous Batching: From Cascades to Free Routes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 186\u2013206. Springer, Heidelberg (2005)"},{"issue":"29","key":"25_CR17","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public-key protocols. IEEE Transactions on Information Theory\u00a02(29), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR18","unstructured":"Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, pp. 33\u201350. USENIX Association (August 2009)"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"issue":"1","key":"25_CR20","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10207-009-0094-1","volume":"9","author":"D.M. Goldschlag","year":"2010","unstructured":"Goldschlag, D.M., Stubblebine, S.G., Syverson, P.F.: Temporarily hidden bit commitment and lottery applications. International Journal of Information Security\u00a09(1), 33\u201350 (2010)","journal-title":"International Journal of Information Security"},{"key":"25_CR21","unstructured":"Helmers, S.: A brief history of anon.penet.fi - the legendary anonymous remailer. CMC Magazine (September 1997)"},{"key":"25_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A. Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 171\u2013178. Springer, Heidelberg (2003)"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: De Capitani di Vimercati, S., Syverson, P., Evans, D. (eds.) CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 82\u201391. ACM Press (2007); Expanded and revised version in [24]","DOI":"10.1145\/1315245.1315257"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Johnson, A., Syverson, P., Dingledine, R., Mathewson, N.: Trustbased anonymous communication: Adversary models and routing algorithms. In: CCS 2011: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM Press (October 2011)","DOI":"10.1145\/2046707.2046729"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Johnson, A., Syverson, P.: More anonymous onion routing through trust. In: 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, pp. 3\u201312. IEEE Computer Society (July 2009)","DOI":"10.1109\/CSF.2009.27"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Johnson, A., Syverson, P., Dingledine, R., Mathewson, N.: Trust-based anonymous communication: Adversary models and routing algorithms. In: CCS 2011: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM Press (October 2011)","DOI":"10.1145\/2046707.2046729"},{"key":"25_CR27","unstructured":"JonDonym \u2013 the internet anonymisation service (2008), https:\/\/www.jondos.de\/en\/ ; Commercial version of the Java Anon Proxy (JAP). Initially published description in [3]"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 255\u2013263. ACM Press (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"25_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11423409_2","volume-title":"Privacy Enhancing Technologies","author":"N. Mathewson","year":"2005","unstructured":"Mathewson, N., Dingledine, R.: Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 17\u201334. Springer, Heidelberg (2005)"},{"key":"25_CR30","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol - version 3. IETF Internet Draft (2003)"},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27\u201336. ACM Press (2006)","DOI":"10.1145\/1180405.1180410"},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE S&P 2005, pp. 183\u2013195. IEEE CS (May 2005)","DOI":"10.1109\/SP.2005.12"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, PODC 1991, pp. 51\u201359. ACM Press (1991)","DOI":"10.1145\/112600.112605"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, S&P 2006, pp. 100\u2013114. IEEE CS (May 2006)","DOI":"10.1109\/SP.2006.24"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Parekh, S.: Prospects for remailers: where is anonymity heading on the internet? First Monday\u00a01(2) (August 5, 1996), http:\/\/www.firstmonday.dk\/issues\/issue2\/remailers\/","DOI":"10.5210\/fm.v1i2.476"},{"key":"25_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"25_CR37","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, version v0.32 (December 2009), http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml , Regularly revised and updated version of [36]"},{"issue":"4","key":"25_CR38","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"25_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"issue":"4","key":"25_CR40","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/49.668969","volume":"16","author":"G.J. Simmons","year":"1998","unstructured":"Simmons, G.J.: The history of subliminal channels. IEEE Journal on Selected Areas in Communications\u00a016(4), 452\u2013462 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"25_CR41","doi-asserted-by":"crossref","unstructured":"Syverson, P., Reed, M., Goldschlag, D.: Onion Routing access configurations. In: Proceedings DARPA Information Survivability Conference & Exposition, DISCEX 2000, vol.\u00a01, pp. 34\u201340. IEEE CS Press (1999)","DOI":"10.21236\/ADA465234"},{"key":"25_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing Privacy Enhancing Technologies","author":"P. Syverson","year":"2001","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 96\u2013114. Springer, Heidelberg (2001)"},{"key":"25_CR43","unstructured":"Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. Technical Report CACR 2010-06, University of Waterloo, Center for Applied Cryptography Research (2010), http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2010\/cacr2010-06.pdf"},{"key":"25_CR44","unstructured":"The Tor Project (2009), https:\/\/www.torproject.org\/ ; Homepage of the non-profit organization that maintains and develops the Tor network. Original Tor design first published in [14]"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36213-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:51:07Z","timestamp":1745945467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-36213-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362125","9783642362132"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36213-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}