{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:54:01Z","timestamp":1775145241633,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":61,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642390760","type":"print"},{"value":"9783642390777","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39077-7_8","type":"book-chapter","created":{"date-parts":[[2013,6,4]],"date-time":"2013-06-04T01:39:59Z","timestamp":1370309999000},"page":"143-163","source":"Crossref","is-referenced-by-count":35,"title":["The Path Less Travelled: Overcoming Tor\u2019s Bottlenecks with Traffic Splitting"],"prefix":"10.1007","author":[{"given":"Mashael","family":"AlSabah","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Tariq","family":"Elahi","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The Path Less Travelled: Overcoming Tor\u2019s Bottlenecks with Traffic Splitting. Tech. Rep. CACR 2013-16 (2013), http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2013\/cacr2013-16.pdf"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-22263-4_8","volume-title":"Privacy Enhancing Technologies","author":"M. AlSabah","year":"2011","unstructured":"AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G.M.: DefenestraTor: Throwing out Windows in Tor. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 134\u2013154. Springer, Heidelberg (2011)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-Resource Routing Attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), pp. 11\u201320 (October 2007)","DOI":"10.1145\/1314333.1314336"},{"key":"8_CR4","unstructured":"Bauer, K., Sherr, M., McCoy, D., Grunwald, D.: ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In: Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET), pp. 51\u201359 (August 2011)"},{"key":"8_CR5","unstructured":"Blond, S.L., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011. USENIX Association (2011)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In: Proceedings of CCS 2007, pp. 92\u2013102 (October 2007)","DOI":"10.1145\/1315245.1315258"},{"key":"8_CR7","unstructured":"Das, A., Borisov, N.: Securing Tor Tunnels under the Selective-DoS Attack. In: Proceedings of Financial Cryptography and Data Security (February 2013)"},{"key":"8_CR8","unstructured":"Dingledine, R., Mathewson, N.: Tor protocol specification, https:\/\/gitweb.torproject.org\/torspec.git\/blob\/HEAD:\/tor-spec.txt"},{"key":"8_CR9","unstructured":"Dingledine, R., Mathewson, N.: Anonymity Loves Company: Usability and the Network Effect. In: Workshop on the Economics of Information Security, pp. 547\u2013559 (June 2006)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"8_CR11","unstructured":"Dingledine, R., Murdoch, S.: Performance Improvements on Tor or, Why Tor is Slow and What We\u2019re Going to Do about It (March 2009), http:\/\/www.torproject.org\/press\/presskit\/2009-03-11-performance.pdf"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Edman, M., Syverson, P.F.: AS-awareness in Tor path selection. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS), pp. 380\u2013389 (2009)","DOI":"10.1145\/1653662.1653708"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Elahi, T., Bauer, K., AlSabah, M., Dingledine, R., Goldberg, I.: Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012). ACM (October 2012)","DOI":"10.1145\/2381966.2381973"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-14527-8_10","volume-title":"Privacy Enhancing Technologies","author":"J. Feigenbaum","year":"2010","unstructured":"Feigenbaum, J., Johnson, A., Syverson, P.: Preventing Active Timing Attacks in Low-Latency Anonymous Communication. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 166\u2013183. Springer, Heidelberg (2010), http:\/\/portal.acm.org\/citation.cfm?id=1881151.1881161"},{"key":"8_CR15","unstructured":"Gil, T.M., Kaashoek, F., Li, J., Morris, R., Stribling, J.: King Data Set, http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata (accessed August 2011)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2381966.2381972","volume-title":"Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, WPES 2012","author":"D. Gopal","year":"2012","unstructured":"Gopal, D., Heninger, N.: Torchestra: Reducing Interactive Traffic Delays over Tor. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, WPES 2012, pp. 31\u201342. ACM, New York (2012)"},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1109\/TNET.2006.886738","volume":"14","author":"H. Han","year":"2006","unstructured":"Han, H., Shakkottai, S., Hollot, C.V., Srikant, R., Towsley, D.: Multi-path TCP: A Joint Congestion Control and Routing Scheme to Exploit Path Diversity in the Internet. IEEE\/ACM Trans. Netw.\u00a014(6), 1260\u20131271 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"8_CR18","unstructured":"Hern\u00e1ndez-Campos, F., Jeffay, K., Smith, F.D.: Tracking the Evolution of Web Traffic: 1995-2003. In: Proceedings of the 11th IEEE\/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS), pp. 16\u201325 (2003)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Jansen, R., Syverson, P., Hopper, N.: Throttling Tor Bandwidth Parasites. In: Proceedings of the 21st USENIX Security Symposium (August 2012)","DOI":"10.21236\/ADA559183"},{"key":"8_CR20","unstructured":"Jansen, R., Bauer, K., Hopper, N., Dingledine, R.: Methodically Modeling the Tor Network. In: USENIX Workshop on Cyber Security Experimentation and Test (CSET) (August 2012)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N., Kim, Y.: Recruiting New Tor Relays with BRAIDS. In: Proceedings of ACM CCS, pp. 319\u2013328 (October 2010)","DOI":"10.1145\/1866307.1866344"},{"key":"8_CR22","unstructured":"King, A.: Average Web Page Size Septuples Since 2003. Website Optimization, LLC, http:\/\/www.websiteoptimization.com\/speed\/tweak\/average-web-page (accessed February 14, 2012)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Landsiedel, O., Pimenidis, A., Wehrle, K., Niedermayer, H., Carle, G.: Dynamic Multipath Onion Routing in Anonymous Peer-to-Peer Overlay Networks. In: IEEE Global Telecommunications Conference, pp. 64\u201369 (November 2007)","DOI":"10.1109\/GLOCOM.2007.20"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-27809-2_25","volume-title":"Financial Cryptography","author":"B.N. Levine","year":"2004","unstructured":"Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix-Based Systems. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"8_CR25","unstructured":"Lewman, A.: China Blocking Tor: Round Two (March 2010), https:\/\/blog.torproject.org\/blog\/china-blocking-tor-round-two (accessed August 2011)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Yu, W., Yang, M., Fu, X.: Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery. In: Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM) (March 2012)","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, pp. 90\u2013102 (November 2009)","DOI":"10.1145\/1644893.1644904"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-70630-4_5","volume-title":"Privacy Enhancing Technologies","author":"D. McCoy","year":"2008","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 63\u201376. Springer, Heidelberg (2008)"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1145\/1653662.1653733","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"J. McLachlan","year":"2009","unstructured":"McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable Onion Routing with Torsk. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 590\u2013599. ACM, New York (2009)"},{"key":"8_CR30","unstructured":"Mittal, P., Olumofin, F., Troncoso, C., Borisov, N., Goldberg, I.: PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In: Proceedings of the 20th USENIX Security Symposium (August 2011)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Moore, W.B., Wacek, C., Sherr, M.: Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race with Tortoise. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 207\u2013216 (2011)","DOI":"10.1145\/2076732.2076762"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-14577-3_19","volume-title":"Financial Cryptography and Data Security","author":"T.-W. \u201cJohnny\" Ngan","year":"2010","unstructured":"\u201cJohnny\u201d Ngan, T.-W., Dingledine, R., Wallach, D.S.: Building Incentives into Tor. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 238\u2013256. Springer, Heidelberg (2010)"},{"key":"8_CR33","unstructured":"Ookla: Net Index by Ookla \u2014 Source Data, http:\/\/www.netindex.com\/source-data (accessed on January 27, 2012)"},{"key":"8_CR34","unstructured":"The OpenNet Initiative: YouTube Censored: A Recent History, http:\/\/opennet.net\/youtube-censored-a-recent-history (accessed February 6, 2012)"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 100\u2013114 (May 2006)","DOI":"10.1109\/SP.2006.24"},{"key":"8_CR36","unstructured":"Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and Directions for Monitoring P2P File Sharing Networks-or: Why My Printer Received a DMCA Takedown Notice. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 12:1\u201312:7 (July 2008)"},{"key":"8_CR37","unstructured":"Ramachandran, S.: Web Metrics: Size and Number of Resources, https:\/\/code.google.com\/speed\/articles\/web-metrics.html (accessed August 2011)"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Rao, A., Legout, A., Lim, Y.S., Towsley, D., Barakat, C., Dabbous, W.: Network Characteristics of Video Streaming Traffic. In: Proceedings of the Seventh Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2011, pp. 25:1\u201325:12. ACM, New York (2011)","DOI":"10.1145\/2079296.2079321"},{"key":"8_CR39","unstructured":"Reardon, J., Goldberg, I.: Improving Tor Using a TCP-over-DTLS Tunnel. In: Proceedings of the 18th USENIX Security Symposium (August 2009)"},{"issue":"4","key":"8_CR40","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"8_CR41","unstructured":"Sandvine: Sandvine Global Internet Phenomena Report \u2014 Fall 2011 (October 2011), http:\/\/www.sandvine.com\/downloads\/documents\/10-26-2011_phenomena\/Sandvine%20Global%20Internet%20Phenomena%20Report%20-%20Fall%202011.pdf"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/11767831_3","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2006","unstructured":"Serjantov, A., Murdoch, S.J.: Message Splitting Against the Partial Adversary. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 26\u201339. Springer, Heidelberg (2006)"},{"key":"8_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39650-5_7","volume-title":"Computer Security \u2013 ESORICS 2003","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Sewell, P.: Passive Attack Analysis for Connection-Based Anonymity Systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 116\u2013131. Springer, Heidelberg (2003)"},{"key":"8_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-03168-7_5","volume-title":"Privacy Enhancing Technologies","author":"M. Sherr","year":"2009","unstructured":"Sherr, M., Blaze, M., Loo, B.T.: Scalable Link-Based Relay Selection for Anonymous Routing. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol.\u00a05672, pp. 73\u201393. Springer, Heidelberg (2009)"},{"key":"8_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security \u2013 ESORICS 2006","author":"V. Shmatikov","year":"2006","unstructured":"Shmatikov, V., Wang, M.H.: Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 18\u201333. Springer, Heidelberg (2006)"},{"key":"8_CR46","unstructured":"Snader, R.: Path Selection for Performance- and Security-Improved Onion Routing. Ph.D. thesis, University of Illinois at Urbana-Champaign (2010)"},{"key":"8_CR47","unstructured":"Snader, R., Borisov, N.: A Tune-up for Tor: Improving Security and Performance in the Tor Network. In: Proceedings of the Network and Distributed Security Symposium (NDSS) (February 2008)"},{"key":"8_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing Privacy Enhancing Technologies","author":"P. Syverson","year":"2001","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 96\u2013114. Springer, Heidelberg (2001)"},{"key":"8_CR49","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/1866307.1866345","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security","author":"C. Tang","year":"2010","unstructured":"Tang, C., Goldberg, I.: An Improved Algorithm for Tor Circuit Scheduling. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 329\u2013339. ACM, New York (2010)"},{"key":"8_CR50","unstructured":"The Tor Project: Codename: Torouter, https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/TorouterAssignedTicketstothisproject (accessed August 2011)"},{"key":"8_CR51","unstructured":"The Tor Project: Tor Metrics Portal: Bandwidth History by Relay Flags, https:\/\/metrics.torproject.org\/network.html?graph=bwhist-flags&start=2012-07-01&end=2012-07-02&dpi=72#bwhist-flags (accessed July 2012)"},{"key":"8_CR52","unstructured":"The Tor Project: Tor Metrics Portal: Data, https:\/\/metrics.torproject.org\/data.html#performance (accessed November 2012)"},{"key":"8_CR53","unstructured":"The Tor Project: Tor Metrics Portal: Network, http:\/\/metrics.torproject.org\/network.html?graph=networksize&start=2012-01-01&end=2012-01-31&dpi=72#networksize (accessed November 2012)"},{"key":"8_CR54","unstructured":"The Tor Project: Tor Metrics Portal: Users, http:\/\/metrics.torproject.org\/users.html (accessed November 2012)"},{"key":"8_CR55","unstructured":"The Tor Project: Tor Bridges Specification (May 2009), https:\/\/gitweb.torproject.org\/torspec.git\/blob_plain\/HEAD:\/bridges-spec.txt (accessed August 2011)"},{"key":"8_CR56","doi-asserted-by":"crossref","unstructured":"Tran, A., Hopper, N., Kim, Y.: Hashing It out in Public: Common Failure Modes of DHT-based Anonymity Schemes. In: ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380 (November 2009)","DOI":"10.1145\/1655188.1655199"},{"key":"8_CR57","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/844128.844154","volume":"36","author":"A. Vahdat","year":"2002","unstructured":"Vahdat, A., Yocum, K., Walsh, K., Mahadevan, P., Kosti\u0107, D., Chase, J., Becker, D.: Scalability and Accuracy in a Large-Scale Network Emulator. SIGOPS Oper. Syst. Rev.\u00a036, 271\u2013284 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"8_CR58","unstructured":"Wacek, C., Tan, H., Bauer, K., Sherr, M.: An Empirical Evaluation of Relay Selection in Tor. In: Proceedings of the Network and Distributed Security Symposium (NDSS) (February 2013)"},{"key":"8_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-32946-3_9","volume-title":"Financial Cryptography and Data Security","author":"T. Wang","year":"2012","unstructured":"Wang, T., Bauer, K., Forero, C., Goldberg, I.: Congestion-aware Path Selection for Tor. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 98\u2013113. Springer, Heidelberg (2012)"},{"issue":"4","key":"8_CR60","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"M.K. Wright","year":"2004","unstructured":"Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur.\u00a07(4), 489\u2013522 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-19260-9_14","volume-title":"Passive and Active Measurement","author":"X. Xu","year":"2011","unstructured":"Xu, X., Mao, Z.M., Halderman, J.A.: Internet Censorship in China: Where Does the Filtering Occur? In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol.\u00a06579, pp. 133\u2013142. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39077-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T13:51:19Z","timestamp":1563112279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39077-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390760","9783642390777"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39077-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}