{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:13:09Z","timestamp":1729631589361,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745079","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T16:04:49Z","timestamp":1232121889000},"page":"524-531","source":"Crossref","is-referenced-by-count":2,"title":["Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary"],"prefix":"10.1109","author":[{"given":"Douglas","family":"Kelly","sequence":"first","affiliation":[]},{"given":"Richard","family":"Raines","sequence":"additional","affiliation":[]},{"given":"Rusty","family":"Baldwin","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Mullins","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Grimaila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Communicating Sequential Processes","year":"2004","author":"hoare","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1995.518560"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/828.833"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1103576.1103585"},{"key":"16","article-title":"group principals and the formalization of anonymity","author":"syverson","year":"1999","journal-title":"World Congress on Formal Methods in the Development of Computing Systems (FM)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212706"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.026"},{"key":"11","article-title":"csp and anonymity","author":"schneider","year":"1996","journal-title":"Fourth European Symposium on Research in Computer Security (ESORICS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00364-X"},{"key":"21","first-page":"16","article-title":"a framework for analyzing probabilistic procotols and its application to partial secrets exchange","author":"chatzikokolakis","year":"2005","journal-title":"Ecole Polytechnique"},{"journal-title":"Communication and Concurrency","year":"1989","author":"milner","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2006.04.004"},{"key":"23","article-title":"new architectures, algorithms and designs that lead to implemented machine reasoning over knowledge in epistemic and deontic formats, in the service of advanced wargaming","author":"bringsjord","year":"2006","journal-title":"Rensselaer Polytechnic Institute Rome New York AFRL-IF-RS-TR-2006-264"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1525\/9780520398252","author":"lewis","year":"1918","journal-title":"A Survey of Symbolic Logic"},{"journal-title":"Equivalence Relation http \/\/en wikipedia org\/wiki\/ Equivalence-relation","year":"2007","author":"wikipeida","key":"25"},{"journal-title":"Wikipedia","article-title":"possible world, http:\/\/en.wikipedia.org\/wiki\/possible world","year":"2007","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810275"},{"journal-title":"Handbook of Modal Logic","year":"2006","author":"blackburn","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/malq.19630090502"},{"journal-title":"Mostly-Static Decentralized Information Flow Control","year":"1999","author":"myers","key":"3"},{"key":"2","first-page":"1977","volume":"tr 3153","author":"biba","year":"0","journal-title":"Integrity Considerations for Secure Computer Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISUMA.2003.1236173"},{"journal-title":"Secure computer systems Mathematical foundations and model","year":"1975","author":"bell","key":"1"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1109\/LICS.2005.27","article-title":"modal characterisation theorems over special classes of frames","author":"dawar","year":"2005","journal-title":"20th Annual IEEE Symposium on Logic in Computer Science"},{"key":"7","article-title":"measuring anonymity with relative entropy","author":"deng","year":"2006","journal-title":"4th International Workshop on Formal Aspects in Security and Trust"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2006.252396"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_32"},{"key":"9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2004-12102","article-title":"information hiding, anonymity and privacy: a modular approach","volume":"12","author":"hughes","year":"2004","journal-title":"Computers & Security"},{"key":"8","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/11539452_16","article-title":"probabilistic anonymity","volume":"2653","author":"bhargava","year":"2005","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745079.pdf?arnumber=4745079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,9]],"date-time":"2024-03-09T06:12:53Z","timestamp":1709964773000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745079","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}