{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:34:36Z","timestamp":1729654476543,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/iscit.2011.6089954","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T16:00:30Z","timestamp":1323187230000},"page":"366-371","source":"Crossref","is-referenced-by-count":2,"title":["Measuring anonymity using network coordinate systems"],"prefix":"10.1109","author":[{"given":"Thorsten","family":"Ries","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Towards an information theoretic metric for anonymity","volume":"2482","author":"serjantov","year":"2002","journal-title":"LNCS"},{"key":"17","article-title":"Comparison of low-latency anonymous communication systems - Practical usage and performance","author":"ries","year":"0","journal-title":"Proceedings of the Australasian International Security Conference (AISC 2011) 2011"},{"key":"18","first-page":"21","article-title":"Tor: The secondgeneration onion router","volume":"13","author":"mathewson","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"journal-title":"A terminology for talking about privacy by data minimization Anonymity unlinkability undetectability unobservability pseudonymity and identity management","year":"2010","author":"pfitzmann","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"13","article-title":"Mixmaster Protocol - Version 2","author":"mo?ller","year":"2003","journal-title":"IETF Internet Draft"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505206"},{"journal-title":"A Taxonomy for and Analysis of Anonymous Communications Networks","year":"2009","author":"kelly","key":"11"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.85"},{"key":"20","article-title":"Octant: A comprehensive framework for the geolocalization of internet hosts","author":"wong","year":"2007","journal-title":"NSDI"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866389"},{"key":"1","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","article-title":"Traffic analysis attacks and trade-offs in anonymity providing systems","author":"back","year":"2001","journal-title":"Proc 4th Int Workshop Information Hiding"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"7","article-title":"Towards measuring anonymity","volume":"2482","author":"diaz","year":"2002","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"4","first-page":"46","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2000","journal-title":"Proceedings of Designing Privacy Enhancing Technologies Workshop on Design Issues in Anonymity and Unobservability"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"journal-title":"Tor and Censorship Lessons Learned","year":"0","author":"dingledine","key":"8"}],"event":{"name":"2011 11th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2011,10,12]]},"location":"Hangzhou, China","end":{"date-parts":[[2011,10,14]]}},"container-title":["2011 11th International Symposium on Communications &amp; Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6082086\/6089698\/06089954.pdf?arnumber=6089954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:53:17Z","timestamp":1497941597000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6089954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iscit.2011.6089954","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}