{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:08:27Z","timestamp":1725613707917},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1179601.1179604","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"9-18","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On the effectiveness of\n            <i>k<\/i>\n            ;-anonymity against traffic analysis and surveillance"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Hopper","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0128-6"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Privacy Enhancing Technologies workshop (PET 2002","author":"Berthold O.","year":"2002","unstructured":"O. Berthold and H. Langos . Dummy traffic against long term intersection attacks. In R. Dingledine and P. Syverson, editors , Proceedings of Privacy Enhancing Technologies workshop (PET 2002 ). Springer-Verlag, LNCS 2482, April 2002 .]] O. Berthold and H. Langos. Dummy traffic against long term intersection attacks. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.]]"},{"key":"e_1_3_2_1_3_1","first-page":"30","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability","author":"Berthold O.","year":"2009","unstructured":"O. Berthold , A. Pfitzmann , and R. Standtke . The disadvantages of free MIX routes and how to overcome them. In H. Federrath, editor , Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 30 -- 45 . Springer-Verlag, LNCS 2009 , July 2000.]] O. Berthold, A. Pfitzmann, and R. Standtke. The disadvantages of free MIX routes and how to overcome them. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30--45. Springer-Verlag, LNCS 2009, July 2000.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_5_1","volume-title":"August","author":"Dai W.","year":"1996","unstructured":"W. Dai . Pipenet 1.1. Usenet post , August 1996 .]] W. Dai. Pipenet 1.1. Usenet post, August 1996.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779333"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 5th Workshop on The Economics of Information Security (WEIS 2006)","author":"Danezis G.","year":"2006","unstructured":"G. Danezis and B. Wittneben . The economics of mass surveillance and the questionable value of anonymous communications . In Proceedings of the 5th Workshop on The Economics of Information Security (WEIS 2006) , June 2006 .]] G. Danezis and B. Wittneben. The economics of mass surveillance and the questionable value of anonymous communications. In Proceedings of the 5th Workshop on The Economics of Information Security (WEIS 2006), June 2006.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354877"},{"key":"e_1_3_2_1_9_1","volume-title":"Foundations of Cryptography: Basic Tools","author":"Goldreich O.","year":"2000","unstructured":"O. Goldreich . Foundations of Cryptography: Basic Tools . Cambridge University Press , New York, NY, USA , 2000 .]] O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, New York, NY, USA, 2000.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of Information Hiding Workshop (IH 2002","author":"Kesdogan D.","year":"2002","unstructured":"D. Kesdogan , D. Agrawal , and S. Penz . Limits of anonymity in open environments. In F. Petitcolas, editor , Proceedings of Information Hiding Workshop (IH 2002 ). Springer-Verlag, LNCS 2578, October 2002 .]] D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.]]"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","volume-title":"Proceedings of Privacy Enhancing Technologies (PET","author":"Mathewson N.","year":"2004","unstructured":"N. Mathewson and R. Dingledine . Practical traffic analysis: Extending and resisting statistical disclosure . In Proceedings of Privacy Enhancing Technologies (PET 2004 ), volume 3424 of LNCS , May 2004.]] N. Mathewson and R. Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of Privacy Enhancing Technologies (PET 2004), volume 3424 of LNCS, May 2004.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of EUROCRYPT 1985","author":"Pfitzmann A.","year":"1985","unstructured":"A. Pfitzmann and M. Waidner . Networks without user observability -- design options . In Proceedings of EUROCRYPT 1985 . Springer-Verlag, LNCS 219 , 1985 .]] A. Pfitzmann and M. Waidner. Networks without user observability -- design options. In Proceedings of EUROCRYPT 1985. Springer-Verlag, LNCS 219, 1985.]]"},{"key":"e_1_3_2_1_14_1","first-page":"10","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability","author":"Raymond J.-F.","year":"2009","unstructured":"J.-F. Raymond . Traffic Analysis : Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor , Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 10 -- 29 . Springer-Verlag, LNCS 2009 , July 2000.]] J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10--29. Springer-Verlag, LNCS 2009, July 2000.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830524"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948128"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/111563.111630"},{"key":"e_1_3_2_1_19_1","volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman S.","year":"1995","unstructured":"S. Wasserman , K. Faust , D. Iacobucci , and M. Granovetter . Social Network Analysis: Methods and Applications . Cambridge University Press , 1995 .]] S. Wasserman, K. Faust, D. Iacobucci, and M. Granovetter. Social Network Analysis: Methods and Applications. Cambridge University Press, 1995.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the 5th ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179601.1179604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T07:19:28Z","timestamp":1672989568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179601.1179604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":20,"alternative-id":["10.1145\/1179601.1179604","10.1145\/1179601"],"URL":"https:\/\/doi.org\/10.1145\/1179601.1179604","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}