{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:17:17Z","timestamp":1773235037270,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/cason.2011.6085953","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T16:00:31Z","timestamp":1323187231000},"page":"249-254","source":"Crossref","is-referenced-by-count":4,"title":["Social networking for anonymous communication systems: A survey"],"prefix":"10.1109","author":[{"given":"Rodolphe","family":"Marques","sequence":"first","affiliation":[]},{"given":"Andre","family":"Zuquete","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314347"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654998"},{"key":"17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2008.13","article-title":"Sybillimit: A near-optimal social network defense against sybil attacks","author":"yu","year":"2008","journal-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy (Washington DC USA)"},{"key":"18","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-540-70630-4_4","article-title":"On the impact of social network profiling on anonymity","volume":"5134","author":"diaz","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.27"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2008.4664875"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_12"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"},{"key":"12","first-page":"96","article-title":"Towards an analysis of onion routing security","volume":"2009","author":"syverson","year":"2000","journal-title":"LNCS"},{"key":"21","first-page":"15","article-title":"Ostra: Leveraging trust to thwart unwanted communication","author":"mislove","year":"2008","journal-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation NSDI'08 (Berkeley CA USA)"},{"key":"3","first-page":"251","article-title":"Timing attacks in low-latency mix-based systems","volume":"3110","author":"levine","year":"2004","journal-title":"LNCS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2190\/W3BX-9CUJ-9PGL-HW43"},{"key":"2","article-title":"Statistical disclosure or intersection attacks on anonymity systems","author":"danezis","year":"2004","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"7","first-page":"303","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium (San Diego CA USA)"},{"key":"6","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Proceedings of the First International Workshop on Information Hiding (London UK)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"4","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems (London UK)"},{"key":"9","year":"0","journal-title":"Anonymous Web Surfing and Online Anonymity Solutions -Anonymizer"},{"key":"8","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2001","journal-title":"International Workshop on Designing Privacy Enhancing Technologies (New York NY USA)"}],"event":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN 2011)","location":"Salamanca, Spain","start":{"date-parts":[[2011,10,19]]},"end":{"date-parts":[[2011,10,21]]}},"container-title":["2011 International Conference on Computational Aspects of Social Networks (CASoN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6082090\/6085907\/06085953.pdf?arnumber=6085953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:53:16Z","timestamp":1497941596000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6085953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cason.2011.6085953","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}