{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:05:05Z","timestamp":1761156305358,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_23","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"385-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Footprint Scheduling for Dining-Cryptographer Networks"],"prefix":"10.1007","author":[{"given":"Anna","family":"Krasnova","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Neikes","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-46885-4_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"J Bos","year":"1990","unstructured":"Bos, J., Boer, B.: Detection of disrupters in the DC protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 320\u2013327. Springer, Heidelberg (1990). doi:10.1007\/3-540-46885-4_33"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TIT.1979.1056093","volume":"IT\u201325","author":"JI Capetanakis","year":"1979","unstructured":"Capetanakis, J.I.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory IT\u201325(5), 505\u2013515 (1979)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"23_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65\u201375 (1988). http:\/\/www.cs.ucsb.edu\/~ravenben\/classes\/595n-s07\/papers\/dcnet-jcrypt88.pdf","journal-title":"J. Cryptol."},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981). www.freehaven.net\/anonbib\/cache\/chaum-mix.pdf","journal-title":"Commun. ACM"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Corrigan-Gibbs, H., Ford, B.: Dissent: accountable anonymous group messaging. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 340\u2013350. ACM (2010). http:\/\/dedis.cs.yale.edu\/dissent\/papers\/ccs10\/dissent.pdf","DOI":"10.1145\/1866307.1866346"},{"key":"23_CR6","unstructured":"Corrigan-Gibbs, H., Wolinsky, D.I., Ford, B.: Proactively accountable anonymous messaging in verdict. In: Proceedings of the 22nd USENIX Conference on Security, pp. 147\u2013162. USENIX Association (2013). http:\/\/dedis.cs.yale.edu\/dissent\/papers\/verdict.pdf"},{"key":"23_CR7","unstructured":"Franck, C.: New directions for dining cryptographers. Master\u2019s thesis, University of Luxembourg (2008). http:\/\/secan-lab.uni.lu\/images\/stories\/christian_franck\/FRANCK_Christian_Master_Thesis.pdf"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Franck, C.: Dining cryptographers with 0.924 verifiable collision resolution (2014). http:\/\/arxiv.org\/abs\/1402.1732","DOI":"10.2478\/umcsinfo-2014-0007"},{"key":"23_CR9","unstructured":"Goel, S., Robson, M., Polte, M., Sirer, E.G.: Herbivore: a scalable and efficient protocol for anonymous communication. Technical report 2003-1890, Cornell University (2003). http:\/\/www.cs.cornell.edu\/People\/egs\/papers\/herbivore-tr.pdf"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-540-24676-3_27","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"P Golle","year":"2004","unstructured":"Golle, P., Juels, A.: Dining cryptographers revisited. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 456\u2013473. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24676-3_27"},{"key":"23_CR11","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: 2005 IEEE Symposium on Security and Privacy, pp. 183\u2013195. IEEE (2005). https:\/\/www.cl.cam.ac.uk\/~sjm217\/papers\/oakland05torta.pdf"},{"key":"23_CR12","unstructured":"Pfitzmann, A.: How to implement ISDNs without user observability - Some remarks. Technical report, Department of Computer Science, University of Karlsruhe. Internal report 14\/85 (1985)"},{"key":"23_CR13","unstructured":"Pfitzmann, A.: Diensteintegrierende Kommunikationsnetze mit teilnehmer\u00fcberpr\u00fcfbarem Datenschutz. Ph.D. thesis, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe (1990). http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_0.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_1.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_2.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_3.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_4.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_5.pdf, http:\/\/dud.inf.tu-dresden.de\/sirene\/publ\/Pfit_88_6.pdf"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1024916.1024920","volume":"5","author":"LG Roberts","year":"1975","unstructured":"Roberts, L.G.: Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28\u201342 (1975). www.freehaven.net\/anonbib\/cache\/chaum-mix.pdf","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"23_CR15","unstructured":"Studholme, C., Blake, I.: Multiparty computation to generate secret permutations. IACR Cryptology ePrint Archive: Report 2007\/353 (2007). http:\/\/eprint.iacr.org\/2007\/353"},{"key":"23_CR16","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: 1997 IEEE Symposium on Security and Privacy, pp. 44\u201354. IEEE (1997). www.onion-router.net\/Publications\/SSP-1997.pdf"},{"key":"23_CR17","unstructured":"Tor project: Anonymity online. https:\/\/www.torproject.org\/. Accessed 17 Mar 2015"},{"key":"23_CR18","unstructured":"Tsybakov, B.S., Mikhailov, V.A.: Free synchronous packet access in a broadcast channel with feedback. Probl. Peredachi Informatsii 14(4), 32\u201359 (1978). http:\/\/www.mathnet.ru\/php\/getFT.phtml?jrnid=ppi&paperid=1558&what=fullt&option_lang=eng. (in Russian)"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-46885-4_32","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"M Waidner","year":"1990","unstructured":"Waidner, M.: Unconditional sender and recipient untraceability in spite of active attacks. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 302\u2013319. Springer, Heidelberg (1990). doi:10.1007\/3-540-46885-4_32"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1007\/3-540-46885-4_69","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"M Waidner","year":"1990","unstructured":"Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 690\u2013690. Springer, Heidelberg (1990). doi:10.1007\/3-540-46885-4_69"},{"key":"23_CR21","unstructured":"Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. Technical report, Universit\u00e4t Karlsruhe (1998). See also abstract\u00a0[20]. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.74.218&rep=rep1&type=pdf"},{"key":"23_CR22","unstructured":"Wolinsky, D.I., Corrigan-Gibbs, H., Ford, B., Johnson, A.: Dissent in numbers: making strong anonymity scale. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pp. 179\u2013192. USENIX Association (2012). http:\/\/dedis.cs.yale.edu\/dissent\/papers\/osdi12.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:47:38Z","timestamp":1712076458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}