{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T05:24:58Z","timestamp":1747977898702,"version":"3.41.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/netsys.2015.7089062","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T20:32:28Z","timestamp":1429734748000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Inferring obfuscated values in Freenet"],"prefix":"10.1109","author":[{"given":"Stefanie","family":"Roos","sequence":"first","affiliation":[]},{"given":"Florian","family":"Platzer","sequence":"additional","affiliation":[]},{"given":"Jan-Michael","family":"Heller","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61996-8_37","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Information Hiding"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.21236\/ADA465464","author":"dingledine","year":"2004","journal-title":"Tor The second-generation onion router"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851198"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046731"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653681"},{"journal-title":"Bayes' Rule A Tutorial Introduction to Bayesian Analysis","year":"2013","author":"stone","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1080\/00031305.1995.10476177","article-title":"Understanding the metropolis-hastings algorithm","author":"chib","year":"1995","journal-title":"The American Statistician"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240060204"},{"journal-title":"Bayesian Statistics An Introduction","year":"2012","author":"lee","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566978"},{"key":"ref7","article-title":"Measuring freenet in the wild: Censorship-resilience under observation","author":"roos","year":"2014","journal-title":"PETS"},{"journal-title":"Private Communication Through a Network of Trusted Connections The Dark Freenet","year":"2010","author":"clarke","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978368"},{"key":"ref9","article-title":"Adnostic: Privacy preserving targeted advertising","author":"toubiana","year":"2010","journal-title":"NDSS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"ref21","article-title":"Gnunet-a truly anonymous networking infrastructure","author":"bennett","year":"2002","journal-title":"PETS"}],"event":{"name":"2015 International Conference and Workshops on Networked Systems (NetSys)","start":{"date-parts":[[2015,3,9]]},"location":"Cottbus, Germany","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 International Conference and Workshops on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083793\/7089054\/07089062.pdf?arnumber=7089062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T21:20:18Z","timestamp":1747948818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7089062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/netsys.2015.7089062","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}