{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:43:50Z","timestamp":1725727430342},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386305"},{"type":"electronic","value":"9783642386312"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38631-2_57","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T04:37:49Z","timestamp":1369629469000},"page":"685-691","source":"Crossref","is-referenced-by-count":4,"title":["Distributed and Anonymous Publish-Subscribe"],"prefix":"10.1007","author":[{"given":"J\u00f6rg","family":"Daubert","sequence":"first","affiliation":[]},{"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schiffner","sequence":"additional","affiliation":[]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Barazzutti, R., Felber, P., et al.: Thrifty Privacy: Efficient Support for Privacy-Preserving Publish \/ Subscribe. In: DEBS, pp. 225\u2013236. ACM (2012)","DOI":"10.1145\/2335484.2335509"},{"key":"57_CR2","unstructured":"Chen, W., Jiangt, J., Skocik, N.: On the privacy protection in publish\/subscribe systems. In: WCNIS, pp. 597\u2013601. IEEE (2010)"},{"key":"57_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-642-15364-8_32","volume-title":"Database and Expert Systems Applications","author":"S. Choi","year":"2010","unstructured":"Choi, S., Ghinita, G., Bertino, E.: A Privacy-Enhancing Content-Based Publish\/Subscribe System Using Scalar Product Preserving Transformations. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. LNCS, vol.\u00a06261, pp. 368\u2013384. Springer, Heidelberg (2010)"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). RFC 4601 (Proposed Standard) (2006)","DOI":"10.17487\/rfc4601"},{"issue":"2","key":"57_CR5","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T.. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.: The many faces of publish\/subscribe. ACM Computing Surveys (CSUR)\u00a035(2), 114\u2013131 (2003)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"2","key":"57_CR6","first-page":"139","volume":"52","author":"A.J. Ganesh","year":"2003","unstructured":"Ganesh, A.J., Kermarrec, A., Massouli\u00e9, L.: Peer-to-Peer Membership Management for Gossip-Based Protocols. IEEE (TC)\u00a052(2), 139\u2013149 (2003)","journal-title":"IEEE (TC)"},{"key":"57_CR7","series-title":"LNICS","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-16161-2_16","volume-title":"Security and Privacy in Communication Networks","author":"M. Ion","year":"2010","unstructured":"Ion, M., Russello, G., Crispo, B.: Supporting Publication and Subscription Confidentiality in Pub\/Sub Networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICS, vol.\u00a050, pp. 272\u2013289. Springer, Heidelberg (2010)"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Nabeel, M., Shang, N., Elisa, B.: Efficient privacy preserving content based publish subscribe systems. In: SACMAT, pp. 133\u2013144. ACM (2012)","DOI":"10.1145\/2295136.2295164"},{"key":"57_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"Raiciu, C., Rosenblum, D.S.: Enabling Confidentiality in Content-Based Publish\/Subscribe Infrastructures. In: SecureComm, pp. 1\u201311. IEEE (August 2006)","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"57_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-03168-7_6","volume-title":"Privacy Enhancing Technologies","author":"S. Schiffner","year":"2009","unstructured":"Schiffner, S., Clau\u00df, S.: Using linkability information to attack mix-based anonymity services. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol.\u00a05672, pp. 94\u2013107. Springer, Heidelberg (2009)"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy in context-based and epidemic forwarding. In: WoWMoM, pp. 1\u20137. IEEE (June 2009)","DOI":"10.1109\/WOWMOM.2009.5282445"},{"key":"57_CR13","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-01244-0_24","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"A. Shikfa","year":"2009","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy-Preserving Content-Based Publish\/Subscribe Networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 270\u2013282. Springer, Heidelberg (2009)"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L.: Securing publish-subscribe overlay services with EventGuard. In: CCS, p. 289. ACM (2005)","DOI":"10.1145\/1102120.1102158"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Tariq, M.A., Koldehofe, B., Altaweel, A., Rothermel, K.: Providing basic security mechanisms in broker-less publish \/ subscribe systems. In: DEBS, pp. 38\u201349. ACM (July 2010)","DOI":"10.1145\/1827418.1827425"},{"key":"57_CR16","unstructured":"Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security Issues and Requirements for Internet-Scale Publish-Subscribe Systems. In: HICSS, pp. 3940\u20133947. IEEE (2002)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38631-2_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:28:47Z","timestamp":1557732527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38631-2_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386305","9783642386312"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38631-2_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}