{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T10:55:02Z","timestamp":1648983302972},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,5,26]],"date-time":"2010-05-26T00:00:00Z","timestamp":1274832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s11227-010-0445-8","type":"journal-article","created":{"date-parts":[[2010,5,25]],"date-time":"2010-05-25T14:26:34Z","timestamp":1274797594000},"page":"246-268","source":"Crossref","is-referenced-by-count":0,"title":["Pool-based anonymous communication framework for\u00a0high-performance computing"],"prefix":"10.1007","volume":"55","author":[{"given":"Minh-Triet","family":"Tran","sequence":"first","affiliation":[]},{"given":"Thanh-Trung","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Anh-Duc","family":"Duong","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,26]]},"reference":[{"key":"445_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information hiding","author":"D Kesdogan","year":"1998","unstructured":"Kesdogan D, Egner J, B\u00fcschkes R (1998) Stop-and-go mixes: providing probabilistic anonymity in an open system. In: Information hiding (IH, 1998). LNCS, vol\u00a01525. Springer, Berlin, pp 83\u201398"},{"issue":"4","key":"445_CR2","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/49.668973","volume":"16","author":"A Jerichow","year":"1998","unstructured":"Jerichow A, M\u00fculler J, Pfizmann A, Pfitzmann B, Waidner M (1998) Real-time mixes: a bandwidth-efficient anonymity protocol. IEEE J Sel Areas Commun 16(4):495\u2013509","journal-title":"IEEE J Sel Areas Commun"},{"key":"445_CR3","unstructured":"Danezis G (2002) Forward secure mixes. In: 7th Nordic workshop on secure IT systems, pp 195\u2013207"},{"key":"445_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/978-3-540-30114-1_22","volume-title":"Information hiding","author":"C Diaz","year":"2004","unstructured":"Diaz C, Preneel B (2004) Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Information hiding (IH, 2004). LNCS, vol 3200. Springer, Berlin, pp 309\u2013325"},{"key":"445_CR5","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, USENIX Association, pp 303\u2013320","DOI":"10.21236\/ADA465464"},{"key":"445_CR6","series-title":"LNCS","first-page":"96","volume-title":"Designing privacy enhancing technologies","author":"P Syverson","year":"2009","unstructured":"Syverson P, Tsudik G, Reed M, Landwehr C (2009) Towards an analysis of onion routing security. In: Designing privacy enhancing technologies. LNCS, vol 2009. Springer, Berlin, pp 96\u2013114"},{"key":"445_CR7","unstructured":"Moeller U, Cottrell L, Palfrader P, Sassaman L (2002) Mixmaster protocol"},{"key":"445_CR8","series-title":"International federation for information processing","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/0-387-33406-8_45","volume-title":"Security and privacy in dynamic environments, IFIP","author":"G T\u00f3th","year":"2006","unstructured":"T\u00f3th G, Horn\u00e1k Z (2006) The APROB channel: adaptive semi-real-time anonymous communication. In: Security and privacy in dynamic environments, IFIP. International federation for information processing, vol 201. Springer, Boston, pp 483\u2013492"},{"key":"445_CR9","first-page":"257","volume-title":"2008 IEEE\/IFIP international symposium on trust, security and privacy for pervasive applications (TSP-08)","author":"MT Tran","year":"2008","unstructured":"Tran MT, Nguyen TT, Echizen I (2008) Pool-based APROB channel to provide resistance against global active adversary under probabilistic real-time condition. In: 2008 IEEE\/IFIP international symposium on trust, security and privacy for pervasive applications (TSP-08). IEEE Computer Society, Los Alamitos, pp 257\u2013263"},{"key":"445_CR10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/IIH-MSP.2009.197","volume-title":"The fifth international conference on intelligent information hiding and multimedia signal processing (IIHMSP2009)","author":"MT Tran","year":"2009","unstructured":"Tran MT, Duong AD, Echizen I (2009) XPROB\u2014a generalized pool-based anonymous communication framework. In: The fifth international conference on intelligent information hiding and multimedia signal processing (IIHMSP2009). IEEE Computer Society, Los Alamitos, pp 52\u201355"},{"issue":"2","key":"445_CR11","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"4","author":"D Chaum","year":"1981","unstructured":"Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 4(2):84\u201388","journal-title":"Commun ACM"},{"key":"445_CR12","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/NDSS.1996.492350","volume-title":"Proceedings of the network and distributed security symposium","author":"C G\u00fclc\u00fc","year":"1996","unstructured":"G\u00fclc\u00fc C, Tsudik G (1996) Mixing e-mail with Babel. In: Proceedings of the network and distributed security symposium (NDSS \u201996). IEEE Computer Society, New York, pp 2\u201316"},{"key":"445_CR13","first-page":"2","volume-title":"Proceedings of the 2003 IEEE symposium on security and privacy","author":"G Danezis","year":"2003","unstructured":"Danezis G, Dingledine R, Mathewson N (2003) Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Los Alamitos, pp 2\u201315"},{"key":"445_CR14","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-540-40956-4_2","volume-title":"Privacy enhancing technologies","author":"C Diaz","year":"2003","unstructured":"Diaz C, Serjantov A (2003) Generalising mixes. In: Privacy enhancing technologies (PET, 2003). LNCS, vol 2760. Springer, Berlin, pp 18\u201331"},{"key":"445_CR15","series-title":"LNCS","first-page":"226","volume-title":"Privacy enhancing technologies","author":"G T\u00f3th","year":"2004","unstructured":"T\u00f3th G, Horn\u00e1k Z (2004) Measuring anonymity in a non-adaptive real-time system. In: Privacy enhancing technologies (PET, 2004). LNCS, vol 3424. Springer, Berlin, pp 226\u2013241"},{"key":"445_CR16","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-540-75551-7_2","volume-title":"Privacy enhancing technologies","author":"A Serjantov","year":"2007","unstructured":"Serjantov A (2007) A fresh look at the generalised mix framework. In: Privacy enhancing technologies (PET, 2007). LNCS, vol 4776. Springer, Berlin, pp 17\u201329"},{"key":"445_CR17","series-title":"LNCS","first-page":"36","volume-title":"Information hiding","author":"A Serjantov","year":"2002","unstructured":"Serjantov A, Dingledine R, Syverson P (2002) From a trickle to a flood: active attacks on several mix types. In: Information hiding (IH, 2002). LNCS, vol 2578. Springer, Berlin, pp 36\u201352"},{"key":"445_CR18","unstructured":"Diaz C (2004) Anonymity and privacy in electronic services. PhD thesis, KU Leuven"},{"key":"445_CR19","series-title":"LNCS","first-page":"259","volume-title":"Privacy enhancing technologies","author":"A Serjantov","year":"2002","unstructured":"Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Privacy enhancing technologies (PET, 2002). LNCS, vol 2482. Springer, Berlin, pp 259\u2013263"},{"key":"445_CR20","series-title":"LNCS","first-page":"184","volume-title":"Privacy enhancing technologies","author":"C Diaz","year":"2002","unstructured":"Diaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Privacy enhancing technologies (PET, 2002). LNCS, vol 2482. Springer, Berlin, pp 184\u2013188"},{"key":"445_CR21","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"445_CR22","unstructured":"Serjantov A (2004) On the anonymity of anonymity systems. PhD thesis, University of Cambridge"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0445-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0445-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0445-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:01Z","timestamp":1559384641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0445-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,26]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["445"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0445-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5,26]]}}}