{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:39:39Z","timestamp":1775295579110,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2003.1199323","type":"proceedings-article","created":{"date-parts":[[2004,5,13]],"date-time":"2004-05-13T10:43:37Z","timestamp":1084445017000},"page":"2-15","source":"Crossref","is-referenced-by-count":285,"title":["Mixminion: design of a type III anonymous remailer protocol"],"prefix":"10.1109","author":[{"given":"G.","family":"Danezis","sequence":"first","affiliation":[]},{"given":"R.","family":"Dingledine","sequence":"additional","affiliation":[]},{"given":"N.","family":"Mathewson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"96","article-title":"Towards an analysis of onion routing security","author":"syverson","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Workshop on Design Issue in Anonymity and Unobservability"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824941"},{"key":"ref33","article-title":"Simple Mail Transfer Protocol","author":"postel","year":"2001","journal-title":"IETF RFC 2821 (also STD0010)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_37"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v1i2.476"},{"key":"ref30","author":"palfrader","year":"0","journal-title":"Echolot a pinger for anonymous remailers"},{"key":"ref37","article-title":"Freedom version 2 white papers","author":"systems","year":"0"},{"key":"ref36","article-title":"From a trickle to a flood: Active attacks on several mix types","author":"serjantov","year":"2002","journal-title":"Information Hiding (IH 2002)"},{"key":"ref35","first-page":"10","article-title":"Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems","author":"raymond","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Workshop on Design Issue in Anonymity and Unobservability"},{"key":"ref34","first-page":"85","author":"rao","year":"2000","journal-title":"Can pseudonymity really guarantee privacy? In Proceedings of the Ninth USENIX Security Symposium"},{"key":"ref10","author":"dierks","year":"1999","journal-title":"The TLS protocol version 1 0 IETF RFC 2246"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_10"},{"key":"ref12","article-title":"Reliable MIX Cascade Networks through Reputation","author":"dingledine","year":"2002","journal-title":"Proc Financial Cryptography (FC'02)"},{"key":"ref13","article-title":"An efficient scheme for proving a shuffle","author":"furukawa","year":"2001","journal-title":"Crypto"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492350"},{"key":"ref15","author":"helsingius","year":"0","journal-title":"anon penet fi press release"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/301308.301333"},{"key":"ref17","article-title":"An optimally robust hybrid mix network (extended abstract)","author":"jakobsson","year":"2001","journal-title":"Principles of Distributed Computing - PODC'01"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/49.668973"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49380-8_7","article-title":"Stop-and-go MIXes providing probabilistic anonymity in an open system","author":"kesdogan","year":"1998","journal-title":"Information Hiding (IH 1998)"},{"key":"ref28","first-page":"116","article-title":"A verifiable secret shuffle and its application to e-voting","author":"neff","year":"2001","journal-title":"Computer Communications of the ACM"},{"key":"ref4","first-page":"115","article-title":"Web MIXes: A system for anonymous and unobservable Internet access","author":"berthold","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Workshop on Design Issue in Anonymity and Unobservability"},{"key":"ref27","article-title":"Post Office Protocol - Version 3","author":"myers","year":"1996","journal-title":"IETF RFC 1939 (also STD0053)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","article-title":"Traffic analysis attacks and trade-offs in anonymity providing systems","author":"back","year":"2001","journal-title":"Information Hiding IH"},{"key":"ref6","first-page":"30","article-title":"The disadvantages of free MIX routes and how to overcome them","author":"berthold","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Workshop on Design Issue in Anonymity and Unobservability"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_14"},{"key":"ref5","article-title":"Dummy traffic against long term intersection attacks","author":"berthold","year":"2002","journal-title":"Privacy Enhancing Technologies (PET 2002)"},{"key":"ref8","author":"cottrell","year":"0","journal-title":"Mixmaster and Remailer Attacks"},{"key":"ref7","article-title":"Untraceable electronic mail, return addresses, and digital pseudo-nyms","volume":"4","author":"chaum","year":"1982","journal-title":"Communications of the ACM"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-60865-6_48","article-title":"Two practical and provably secure block ciphers: BEAR and LION","author":"anderson","year":"1996","journal-title":"Fast Software Encryption Third International Workshop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_39"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054144"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288098"},{"key":"ref21","article-title":"Private Information Retrieval","author":"malkin","year":"2000"},{"key":"ref24","year":"0","journal-title":"Mixminion Type III (Mixminion) mix protocol specifications"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_15"},{"key":"ref26","article-title":"Mixmaster Protocol - Version 2. Unfinished draft","author":"m\u00f6ller","year":"2000"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_17"}],"event":{"name":"2003 Symposium on Security and Privacy","location":"Berkeley, CA, USA","acronym":"SECPRI-03"},"container-title":["Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8543\/27002\/01199323.pdf?arnumber=1199323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:24:39Z","timestamp":1585787079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1199323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/secpri.2003.1199323","relation":{},"subject":[]}}