{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:43:52Z","timestamp":1746297832936},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11227-015-1524-7","type":"journal-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:45:12Z","timestamp":1449596712000},"page":"3787-3800","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Disclosing user relationships in email networks"],"prefix":"10.1007","volume":"72","author":[{"given":"Javier","family":"Portela","sequence":"first","affiliation":[]},{"given":"Luis Javier","family":"Garc\u00eda Villalba","sequence":"additional","affiliation":[]},{"given":"Alejandra Guadalupe","family":"Silva Trujillo","sequence":"additional","affiliation":[]},{"given":"Ana Lucila","family":"Sandoval Orozco","sequence":"additional","affiliation":[]},{"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"1524_CR1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24:84\u201388","journal-title":"Commun ACM"},{"key":"1524_CR2","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second generation onion router. In: Proceedings of the 13th USENIX security symposium, pp 303\u2013320. San Diego, 9\u201313 Aug 2004","DOI":"10.21236\/ADA465464"},{"key":"1524_CR3","doi-asserted-by":"crossref","unstructured":"Pfitzmann A, Pfitzmann B, Waidner M (1991) ISDN-Mixes: untraceable communication with small bandwidth overhead. In: GI\/ITG conference: communication in distributed systems, pp 451\u2013463. Springer, Berlin","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"1524_CR4","doi-asserted-by":"crossref","unstructured":"Gulcu C, Tsudik G (1996) Mixing e-mail with Babel. In: Proceedings of the symposium on network and distributed system security, San Diego, 22\u201323 Feb 1996, pp 2\u201316","DOI":"10.1109\/NDSS.1996.492350"},{"key":"1524_CR5","unstructured":"Moller U, Cottrell L, Palfrader P, Sassaman L (2015) Mixmaster protocol version 2. Internet draft draft-sassaman-mixmaster-03, internet engineering task force. http:\/\/tools.ietf.org\/html\/draft-sassaman-mixmaster-03 . Accessed 9 Feb 2015"},{"key":"1524_CR6","doi-asserted-by":"crossref","unstructured":"Danezis G, Dingledine R, Mathewson N (2003) Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the 2003 symposium on security and privacy, pp 2\u20135. Oakland, 11\u201314 May 2003","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"1524_CR7","doi-asserted-by":"crossref","unstructured":"Serjantov A, Sewell P (2003) Passive attack analysis for connection-based anonymity systems. In: Proceedings of European symposium on research in computer security, pp 116\u2013131. Gjovik, 13\u201315 October 2003","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"1524_CR8","unstructured":"Raymond JF (2000) Traffic analysis: protocols, attacks, design issues, and open problems. In: Proceedings of the international workshop on designing privacy enhancing technologies: design issues in anonymity and unobservability, pp 10\u201329. Berkeley, 25\u201326 July 2000"},{"key":"1524_CR9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MSECP.2003.1253565","volume":"1","author":"D Agrawal","year":"2003","unstructured":"Agrawal D, Kesdogan D (2003) Measuring anonymity: the disclosure attack. IEEE Secur Priv 1:27\u201334","journal-title":"IEEE Secur Priv"},{"key":"1524_CR10","doi-asserted-by":"crossref","unstructured":"Danezis G (2003) Statistical disclosure attacks: traffic confirmation in open environments. In: Proceedings of security and privacy in the age of uncertainty, IFIP TC11, pp 421\u2013426. Kluwer, Athens","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"1524_CR11","doi-asserted-by":"crossref","unstructured":"Danezis G, Serjantov A (2004) Statistical disclosure or intersection attacks on anonymity systems. In: Proceedings of the 6th international conference on information hiding, pp 293\u2013308. Toronto, 23\u201325 May 2004","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"1524_CR12","unstructured":"Mathewson N, Dingledine R (2004) Practical traffic analysis: extending and resisting statistical disclosure. In: Proceedings of privacy enhancing technologies workshop, pp 17\u201334. Toronto, 26\u201328 May 2004"},{"key":"1524_CR13","doi-asserted-by":"crossref","unstructured":"Danezis G, Diaz C, Troncoso C (2007) Two-sided statistical disclosure attack. In: Proceedings of the 7th international conference on privacy enhancing technologies, pp 30\u201344. Ottawa, 20\u201322 June 2007","DOI":"10.1007\/978-3-540-75551-7_3"},{"key":"1524_CR14","doi-asserted-by":"crossref","unstructured":"Troncoso C, Gierlichs B, Preneel B, Verbauwhede I (2008) Perfect matching disclosure attacks. In: Proceedings of the 8th international symposium on privacy enhancing technologies, pp 2\u201323. Leuven, 23\u201325 July","DOI":"10.1007\/978-3-540-70630-4_2"},{"key":"1524_CR15","doi-asserted-by":"crossref","unstructured":"Danezis G, Troncoso C (2009) Vida: how to use bayesian inference to de-anonymize persistent communications. In: Proceedings of the 9th international symposium on privacy enhancing technologies, pp 56\u201372. Seattle, 5\u20137 August 2009","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"1524_CR16","doi-asserted-by":"crossref","unstructured":"Kesdogan D, Pimenidis L (2004) The hitting set attack on anonymity protocols. In: Proceedings of the 6th international conference on information hiding, pp 326\u2013339. Toronto, 23\u201325 May 2004","DOI":"10.1007\/978-3-540-30114-1_23"},{"key":"1524_CR17","doi-asserted-by":"crossref","unstructured":"Bagai R, Lu H, Tang B (2010) On the sender cover traffic countermeasure against an improved statistical disclosure attack. In: Proceedings of the IEEE\/IFIP 8th international conference on embedded and ubiquitous computing, pp 555\u2013560. Hong Kong, 11\u201313 December 2010","DOI":"10.1109\/EUC.2010.90"},{"key":"1524_CR18","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1109\/TIFS.2014.2330696","volume":"9","author":"F Perez-Gonzalez","year":"2014","unstructured":"Perez-Gonzalez F, Troncoso C, Oya S (2014) A least squares approach to the static traffic analysis of high-latency anonymous communication systems. IEEE Trans Inf Forensics Secur 9:1341\u20131355","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1524_CR19","unstructured":"Oya S, Troncoso C, P\u00e9rez-Gonz\u00e1lez F (2015) Do dummies pay off? limits of dummy traffic protection in anonymous communications. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-08506-7_11 . Accessed 3 Feb 2015"},{"key":"1524_CR20","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.cose.2011.08.011","volume":"30","author":"N Mallesh","year":"2011","unstructured":"Mallesh N, Wright M (2011) An analysis of the statistical disclosure attack and receiver-bound. Comput Secur 30:597\u2013612","journal-title":"Comput Secur"},{"key":"1524_CR21","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1198\/016214504000001303","volume":"100","author":"Y Chen","year":"2005","unstructured":"Chen Y, Diaconis P, Holmes SP, Liu JS (2005) Sequential Monte Carlo methods for statistical analysis of tables. J Am Stat Assoc 100:109\u2013120","journal-title":"J Am Stat Assoc"},{"key":"1524_CR22","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.3390\/s150204052","volume":"15","author":"J Portela","year":"2015","unstructured":"Portela J, Garc\u00eda Villalba LJ, Silva A, Sandoval AL, Kim T (2015) Extracting association patterns in network communications. Sensors 15:4052\u20134071","journal-title":"Sensors"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1524-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-015-1524-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1524-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1524-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T07:27:08Z","timestamp":1567409228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-015-1524-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":22,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["1524"],"URL":"https:\/\/doi.org\/10.1007\/s11227-015-1524-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,7]]}}}