{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T05:22:48Z","timestamp":1648876968583},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T00:00:00Z","timestamp":1339718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11623-012-0170-y","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T05:04:15Z","timestamp":1348635855000},"page":"515-519","source":"Crossref","is-referenced-by-count":0,"title":["Anonymisierungsprotokolle"],"prefix":"10.1007","volume":"36","author":[{"given":"Raphael","family":"Wigoutschnigg","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"170_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. L. Chaum","year":"1981","unstructured":"D. L. Chaum, \u201cUntraceable electronic mail, return addresses, and digital pseudonyms\u201d, Comm. of the ACM, vol. 24, pp. 84\u201390, 1981.","journal-title":"Comm. of the ACM"},{"key":"170_CR2","unstructured":"E. Hughes, \u201cA cypherpunk\u2019s manifesto\u201d, 1993, http:\/\/www.activism.net\/cypherpunk\/manifesto.html."},{"key":"170_CR3","unstructured":"L. Sassaman, U. Moller, C. Tuckley, E. Arneson, A. Kirk, P. Palfrader und L. M. Cottrell, \u201cMixmaster\u201d, 2008, http:\/\/mixmaster.sourceforge.net\/ ."},{"key":"170_CR4","first-page":"2","volume-title":"Proc. of the 1996 Symp. on Network and Distributed System Security (SNDSS\u2019 96)","author":"C. G. und","year":"1996","unstructured":"C. G\u00fclc\u00fc und G. Tsudik, \u201cMixing email with babel\u201d, in Proc. of the 1996 Symp. on Network and Distributed System Security (SNDSS\u2019 96). Washington, DC, USA: IEEE CS Press, 1996, pp. 2\u201316."},{"key":"170_CR5","doi-asserted-by":"crossref","unstructured":"G. Danezis, R. Dingledine, und N. Mathewson, \u201cMixminion: design of a type III anonymous remailer protocol\u201d, in Proc. of the Symp. on Security and Privacy, 2003, pp. 2\u201315.","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"170_CR6","doi-asserted-by":"crossref","unstructured":"D. M. Goldschlag, M. G. Reed, und P. F. Syverson, \u201cHiding routing information\u201d, in Information Hiding. Springer, 1996, pp. 137\u2013150.","DOI":"10.1007\/3-540-61996-8_37"},{"key":"170_CR7","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M. G. Reed","year":"1998","unstructured":"M. G. Reed, P. F. Syverson, und D. M. Goldschlag, \u201cAnonymous connections and onion routing\u201d, IEEE Journal on Selected Areas in Communications, vol. 16, pp. 482\u2013494, 1998.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"170_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"D. Goldschlag, M. Reed, und P. Syverson, \u201cOnion routing for anonymous and private internet connections\u201d, Communicaitons of the ACM, vol. 42, pp. 39\u201341, 1999.","journal-title":"Communicaitons of the ACM"},{"key":"170_CR9","doi-asserted-by":"crossref","unstructured":"R. Dingledine, N. Mathewson, und P. Syverson, \u201cTor: The second-generation onion router\u201d, in Proc. of the 13th USENIX Security Symposium, 2004, pp. 303\u2013320.","DOI":"10.21236\/ADA465464"},{"key":"170_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. K. Reiter","year":"1998","unstructured":"M. K. Reiter und A. D. Rubin, \u201cCrowds: Anonymity for web transactions\u201d, ACM Trans. on Information and System Security, vol. 1, pp. 66\u201392, 1998.","journal-title":"ACM Trans. on Information and System Security"},{"key":"170_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, \u201cThe dining cryptographers problem: Unconditional sender and recipient untraceability\u201d, J. of Cryptology, vol. 1, pp. 65\u201375, 1988.","journal-title":"J. of Cryptology"},{"key":"170_CR12","volume-title":"Herbivore: A Scalable and Efficient Protocol for Anonymous Communication","author":"S. Goel","year":"2003","unstructured":"S. Goel, M. Robson, M. Polte, und E. G. Sirer, \u201cHerbivore: A Scalable and Efficient Protocol for Anonymous Communication\u201d, Cornell University, Ithaca, NY, Tech. Rep. 2003-1890, 2003."},{"key":"170_CR13","unstructured":"R. Sherwood, B. Bhattacharjee, und A. Srinivasan, \u201cP5: A protocol for scalable anonymous communication\u201d in Proc. of the IEEE Symposium on Security and Privacy, 2002."},{"key":"170_CR14","doi-asserted-by":"crossref","unstructured":"http:\/\/w3techs.com\/technologies\/overview\/traffic_analysis\/all , Stand 25.03.2012, 11:25","DOI":"10.1088\/2058-7058\/25\/03\/20"},{"key":"170_CR15","unstructured":"http:\/\/www.google.com\/intl\/de\/analytics\/ , Stand 25.03.2012, 12:00"},{"key":"170_CR16","doi-asserted-by":"crossref","unstructured":"https:\/\/www.torproject.org\/ , Stand 25.03.2012, 12:15","DOI":"10.1088\/2058-7058\/25\/12\/25"},{"key":"170_CR17","unstructured":"http:\/\/anon.inf.tu-dresden.de\/"},{"key":"170_CR18","first-page":"139","volume":"3","author":"S. K\u00f6psell","year":"2003","unstructured":"S. K\u00f6psell, H. Federrath, M. Hansen: Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes. DuD 3\/2003, S. 139\u2013142.","journal-title":"DuD"},{"key":"170_CR19","first-page":"628","volume":"11","author":"H. Federrath","year":"1998","unstructured":"H. Federrath, A. Pfitzmann: \u201eNeue\u201c Anonymisierungstechniken, DuD 11\/1998, S. 628\u2013632.","journal-title":"DuD"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0170-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0170-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0170-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0170-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T05:26:36Z","timestamp":1594704396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0170-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":19,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["170"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0170-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,15]]}}}