{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T18:11:59Z","timestamp":1648923119325},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T00:00:00Z","timestamp":1275696000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10922-010-9170-0","type":"journal-article","created":{"date-parts":[[2010,6,4]],"date-time":"2010-06-04T09:01:05Z","timestamp":1275642065000},"page":"244-264","source":"Crossref","is-referenced-by-count":0,"title":["Low-latency Mix Using Split and Merge Operations"],"prefix":"10.1007","volume":"18","author":[{"given":"Dijiang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Vinayak","family":"Kandiah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,5]]},"reference":[{"issue":"2","key":"9170_CR1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"key":"9170_CR2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume":"1174","author":"D Goldschlag","year":"1996","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. Lect. Notes Comput. Sci. 1174, 137\u2013150 (1996)","journal-title":"Lect. Notes Comput. Sci."},{"key":"9170_CR3","unstructured":"Diaz, C.: Anonymity and privacy in electronic services, Ph.D. thesis, Katholieke Universiteit Leuven, Leuven, Belgium (2005)"},{"key":"9170_CR4","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Proceedings of 6th information hiding workshop (IH), pp. 326\u2013339, Springer (2004)","DOI":"10.1007\/978-3-540-30114-1_23"},{"key":"9170_CR5","doi-asserted-by":"crossref","unstructured":"Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Proceedings of 6th information hiding workshop (IH), pp. 293\u2013308, Springer (2004)","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"9170_CR6","doi-asserted-by":"crossref","unstructured":"Raymond, J.: Traffic analysis: protocols, attacks, design issues, and open problems, Lecture Notes in Computer Science (2001) 10\u201329","DOI":"10.1007\/3-540-44702-4_2"},{"key":"9170_CR7","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Dingledine, R., Syverson, P., et al.: From a trickle to a flood: active attacks on several mix types. In: Proceedings of information hiding workshop (IH) (2003) 36\u201352","DOI":"10.1007\/3-540-36415-3_3"},{"key":"9170_CR8","doi-asserted-by":"crossref","unstructured":"Danezis, G.: Statistical disclosure attacks: traffic confirmation in open environments. In: Proceedings of security and privacy in the age of uncertainty, (SEC2003), Citeseer, pp. 421\u2013426 (2003)","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"9170_CR9","doi-asserted-by":"crossref","unstructured":"Back, A., Moller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Proceedings of information hiding workshop (IH) (2001) 245\u2013257","DOI":"10.1007\/3-540-45496-9_18"},{"key":"9170_CR10","doi-asserted-by":"crossref","unstructured":"Levine, B., Reiter, M., Wang, C., Wright, M.: Timing attacks in low-latency mix systems. In: Proceedings of financial cryptography: 8th international conference (FC 2004): LNCS 3110","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"9170_CR11","unstructured":"Zhu, Y., Fu, X., Graham, B., Bettati, R., Zhao, W.: On flow correlation attacks and countermeasures in mix networks. In: Proceedings of privacy enhancing technologies workshop (PET 2004), LNCS, May (2004) 207\u2013225"},{"key":"9170_CR12","doi-asserted-by":"crossref","unstructured":"Gogolewski, M., Klonowski, M., Kutylowski, M.: Local view attack on anonymous communication. Lecture notes in computer science (book chapter) 3679 (2005) 475\u2013488","DOI":"10.1007\/11555827_27"},{"key":"9170_CR13","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Agrawal, D., Pham, V., Rautenbach, D.: Fundamental limits on the anonymity provided by the MIX technique. In: Proceedings of the 2006 IEEE symposium on security and privacy (S&P\u201906)-Volume 00 (2006) 86\u201399","DOI":"10.1109\/SP.2006.17"},{"key":"9170_CR14","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: Proceedings of the 2007 IEEE symposium on security and privacy, pp. 116\u2013130 (2007)","DOI":"10.1109\/SP.2007.30"},{"key":"9170_CR15","doi-asserted-by":"crossref","unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proceedings of the 14th ACM conference on computer and communications security, ACM, pp. 92\u2013102 (2007)","DOI":"10.1145\/1315245.1315258"},{"key":"9170_CR16","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-540-70630-4_10","volume":"5134","author":"G Danezis","year":"2008","unstructured":"Danezis, G., Syverson, P.: Bridging and fingerprinting: epistemic attacks on route selection. Lect. Notes Comput. Sci. 5134, 151\u2013166 (2008)","journal-title":"Lect. Notes Comput. Sci."},{"key":"9170_CR17","doi-asserted-by":"crossref","unstructured":"Hopper, N., Vasserman, E., Chan-Tin, E.: How much anonymity does network latency leak? In: Proceedings of the 14th ACM conference on computer and communications security, ACM, pp. 82\u201391 (2007)","DOI":"10.1145\/1315245.1315257"},{"key":"9170_CR18","unstructured":"Freedman, M.: Design and analysis of an anonymous communication channel for the free haven project. Online: http:\/\/www.freehaven.net\/doc\/comm.ps"},{"key":"9170_CR19","unstructured":"Ethereal: A network protocol analyzer, http:\/\/www.ethereal.com"},{"key":"9170_CR20","unstructured":"SoftPerfect\u2122 Network protocol analyzer\u2014network sniffer for windows\u2014 http:\/\/www.softperfect.com\/products\/networksniffer\/"},{"key":"9170_CR21","unstructured":"Houmansadr, A., Coleman, T., Kiyavash, N., Borisov, N.: On the channel capacity of network flow watermarking"},{"key":"9170_CR22","unstructured":"I2P Design Documents: Garlic Routing\u2014 http:\/\/www.i2p.net\/how_garlicrouting"},{"key":"9170_CR23","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX security symposium 2 (2004) 303\u2013320"},{"key":"9170_CR24","unstructured":"Dingledine, R., Freedman, M., Hopwood, D., Molnar, D.: A reputation system to increase MIX-net reliability, information hiding (IH) (2001) 126\u2013141"},{"key":"9170_CR25","doi-asserted-by":"crossref","unstructured":"Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the workshop on privacy in the electronic society (WPES) (2003) 89\u201393","DOI":"10.1145\/1005140.1005154"},{"key":"9170_CR26","unstructured":"McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with Torsk"},{"key":"9170_CR27","doi-asserted-by":"crossref","unstructured":"Shmatikov, V., Wang, M.: Measuring relationship anonymity in mix networks. In: Proceedings of the 5th ACM workshop on privacy in electronic society, ACM, pp. 59\u201362 (2006)","DOI":"10.1145\/1179601.1179611"},{"key":"9170_CR28","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Johnson, A., Syverson, P.: Probabilistic analysis of onion routing in a black-box model. In: Proceedings of the 2007 ACM workshop on privacy in electronic society, ACM (2007)","DOI":"10.1145\/1314333.1314335"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9170-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-010-9170-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9170-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:55:34Z","timestamp":1559465734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-010-9170-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,5]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9170"],"URL":"https:\/\/doi.org\/10.1007\/s10922-010-9170-0","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,5]]}}}