{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:19:24Z","timestamp":1753885164043},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028156","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T01:50:22Z","timestamp":1132624222000},"page":"13-23","source":"Crossref","is-referenced-by-count":17,"title":["Protocols using anonymous connections: Mobile applications"],"prefix":"10.1007","author":[{"given":"Michael G.","family":"Reed","sequence":"first","affiliation":[]},{"given":"Paul F.","family":"Syverson","sequence":"additional","affiliation":[]},{"given":"David M.","family":"Goldschlag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, v. 24, n. 2, Feb. 1981, pages 84\u201388.","journal-title":"Communications of the ACM"},{"key":"2_CR2","first-page":"105","volume-title":"Proceedings of the IFIP TC 6 International Workshop on Personal Wireless Communications","author":"H. Federrath","year":"1995","unstructured":"H. Federrath, A. Jerichow, D. Kesdogan,and A. Pfitzmann. Security in Public Mobile Communication Networks, Proceedings of the IFIP TC 6 International Workshop on Personal Wireless Communications, Verlag der Augustinus Buchhandlung Aachen, 1995, pages 105\u2013116."},{"key":"2_CR3","unstructured":"H. Federrath, A. Jerichow, and A. Pfitzmann. MIXes in Mobile Communication Systems: Location Management with Privacy, in Information Hiding, Ross Anderson ed., Springer-Verlag, LNCS vol. 1174, June 1996, pages 121\u2013135."},{"key":"2_CR4","unstructured":"D. Goldschlag, M. Reed, and P. Syverson. Privacy on the Internet, INET '97, Kuala Lumpur, Malaysia, June, 1997."},{"key":"2_CR5","unstructured":"D. Goldschlag, M. Reed, and P. Syverson. Hiding Routing Information, in Information Hiding, Ross Anderson ed., Springer-Verlag, LNCS vol. 1174, June 1996, pages 137\u2013150."},{"key":"2_CR6","unstructured":"C. G:ulc\u00fc and G. Tsudik. Mixing Email with Babel, 1996 Symposium on Network and Distributed System Security, San Diego, February 1996."},{"key":"2_CR7","unstructured":"I. Jackson. Anonymous Addresses and Confidentiality of Location, in Information Hiding, Ross Anderson ed., Springer-Verlag, LNCS vol. 1174, June 1996, pages 115\u2013120."},{"key":"2_CR8","unstructured":"P. Karger and Y. Frankel. Security and Privacy Threats to ITS, The Second World Congress on Intelligent Transportation Systems, Yokohama, Japan, November 1995, pages 2452\u20132458."},{"key":"2_CR9","series-title":"Informatik-Fachberichte","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/978-3-642-76462-2_32","volume-title":"ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead","author":"A. Pfitzmann","year":"1991","unstructured":"A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, GI\/ITG Conference: Communication in Distributed Systems, Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg 1991, pages 451\u2013463."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"M. Reed, P. Syverson, D. Goldschlag. Proxies for Anonymous Routing, Proceedings of the 12\nth\nAnnual Computer Security Applications Conference, IEEE CS Press, December, 1996, pages 95\u2013104.","DOI":"10.1109\/CSAC.1996.569678"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"P. Syverson, D. Goldschlag, and M. Reed. Anonymous Connections and Onion Routing, Proceedings of the Symposium on Security and Privacy, Oakland, CA, May 1997, pages 44\u201354.","DOI":"10.1109\/SECPRI.1997.601314"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:21:26Z","timestamp":1549326086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0028156","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}