{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T06:46:18Z","timestamp":1763016378092},"reference-count":20,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0920-5489(03)00003-5","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T13:19:33Z","timestamp":1049721573000},"page":"147-158","source":"Crossref","is-referenced-by-count":52,"title":["Privacy-Enhancing Technologies\u2014approaches and development"],"prefix":"10.1016","volume":"25","author":[{"given":"Vanja","family":"Seni\u010dar","sequence":"first","affiliation":[]},{"given":"Borka","family":"Jerman-Bla\u017ei\u010d","sequence":"additional","affiliation":[]},{"given":"Toma\u017e","family":"Klobu\u010dar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0920-5489(03)00003-5_BIB1","series-title":"Security Engineering: A Guide to Building Dependable Distributed System","author":"Anderson","year":"2001"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB2","series-title":"Advanced Security Technologies in Networking","year":"2001"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB3","unstructured":"J. Borking, et al., Privacy-Enhancing Technologies: The Path to Anonymity, Information and Privacy Commissioner\/Ontario Canada and Registratiekamer, The Netherlands, 1995."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB4","series-title":"Privacy On the Internet\u2014Threats, Department of Computer Science","author":"Clarke","year":"1997"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB5","series-title":"Developing Trust: Online Privacy and Security","year":"2002"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB6","unstructured":"J.-M. Dinant, ESPRIT Project 27028, Electronic Commerce Legal Issues Platform, 1999."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB7","unstructured":"Directive 2002\/58\/EC of the European Parliament and of the Council (Directive on privacy and electronic communications), Brussels, 2002."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB8","series-title":"A Pseudonymous Communications Infrastructure for the Internet","author":"Avrum Goldberg","year":"2000"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB9","unstructured":"GUIDES Project, Final Report: Deliverable D5.2, 2002."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB10","series-title":"Cybercrime","article-title":"D. Thomas, Privacy and security at risk in the Global Information Society","author":"Fischer-H\u00fcbner","year":"2000"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB11","series-title":"Privacy-Enhancing Technologies (PET), Course Description","author":"Fischer-H\u00fcbner","year":"2001"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB12","unstructured":"A. Escudero Pascual, Anonymous Untraceable Communications\u2014Location privacy in mobile internetworking, Licentiate Thesis, Royal Institute of Technology, June 2001."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB13","series-title":"Privacy in the Next Generation Internet","author":"Escudero Pascual","year":"2001"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB14","author":"Privacy Incorporate Software Agent (PISA)"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB15","first-page":"66","article-title":"Crowds: Anonymity for Web Transaction","author":"Reiter","year":"1998"},{"issue":"2","key":"10.1016\/S0920-5489(03)00003-5_BIB16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5153\/sro.718","article-title":"The voiding of privacy","volume":"7","author":"Stalder","year":"2002","journal-title":"Sociological Research Online"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB17","series-title":"An Introduction to Steganography","author":"Sellars","year":"1999"},{"key":"10.1016\/S0920-5489(03)00003-5_BIB18","unstructured":"W3C, Platform for Privacy Preferences, P3P 1.0, 2002."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB19","unstructured":"Working Group on \u201cPrivacy Enhancing Technologies\u201d of the Committee on \u201cTechnical and organizational aspects of data protection\u201d of the German Federal and State Data Protection Commissioners, Privacy Enhancing Technologies, 1997."},{"key":"10.1016\/S0920-5489(03)00003-5_BIB20","unstructured":"Working Group on \u201cData Protection in Telecommunications\u201d of the Committee on \u201cTechnical and organizational aspects of data protection\u201d of the German Federal and State Data Protection Commissioners, Privacy Enhancing Technologies in Telecommunications, 1997."}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000035?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000035?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T22:57:14Z","timestamp":1553900234000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548903000035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0920548903000035"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(03)00003-5","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}