{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:54:40Z","timestamp":1771520080908,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642412837","type":"print"},{"value":"9783642412844","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41284-4_22","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:35:11Z","timestamp":1382448911000},"page":"432-451","source":"Crossref","is-referenced-by-count":26,"title":["Practical Attacks against the I2P Network"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Egger","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Schlumberger","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","first-page":"21","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, p. 21. USENIX Association, Berkeley (2004)"},{"key":"22_CR2","unstructured":"Dingledine, R., Mathewson, N., Murdoch, S., Syverson, P.: Tor: the second-generation onion router 2012 draft (2012)"},{"key":"22_CR3","first-page":"71","volume-title":"Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES 2009","author":"A. Tran","year":"2009","unstructured":"Tran, A., Hopper, N., Kim, Y.: Hashing it out in public: common failure modes of DHT-based anonymity schemes. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES 2009, pp. 71\u201380. ACM, New York (2009)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2133375.2133380","volume":"15","author":"P. Mittal","year":"2012","unstructured":"Mittal, P., Borisov, N.: Information leaks in structured peer-to-peer anonymous communication systems. ACM Trans. Inf. Syst. Secur. 15(1), 5:1\u20135:28 (March 2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-22263-4_9","volume-title":"Privacy Enhancing Technologies","author":"M. Herrmann","year":"2011","unstructured":"Herrmann, M., Grothoff, C.: Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using I2P. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 155\u2013174. Springer, Heidelberg (2011)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.. Douceur","year":"2002","unstructured":"Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"issue":"SI","key":"22_CR7","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/844128.844156","volume":"36","author":"M. Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev.\u00a036(SI), 299\u2013314 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Singh, A., Ngan, T.-W., Druschel, P., Wallach, D.S.: Eclipse attacks on overlay networks: Threats and defenses. In: IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"22_CR9","unstructured":"Timpanaro, J.P., Chrisment, I., Festor, O.: Monitoring the I2P network"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 53. Springer, Heidelberg (2002)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Evans, N., Grothoff, C.: R5n: Randomized recursive routing for restricted-route networks. In: 2011 5th International Conference on Network and System Security (NSS), pp. 316\u2013321 (September 2011)","DOI":"10.1109\/ICNSS.2011.6060022"},{"key":"22_CR12","unstructured":"Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Halderman, J.A., Rossbach, C.J., Waters, B., Witchel, E.: Defeating Vanish with low-cost Sybil attacks against large DHTs. In: Proc. of NDSS (2010)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41284-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:36:27Z","timestamp":1558636587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41284-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412837","9783642412844"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41284-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}