{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:41Z","timestamp":1750307921106,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229296","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"45-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A\n            <i>k<\/i>\n            -anonymous communication protocol for overlay networks"],"prefix":"10.1145","author":[{"given":"Pan","family":"Wang","sequence":"first","affiliation":[{"name":"NC State University, Raleigh, NC"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"NC State University, Raleigh, NC"}]},{"given":"Douglas S.","family":"Reeves","sequence":"additional","affiliation":[{"name":"NC State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Openssl. http:\/\/www.openssl.org.]]  Openssl. http:\/\/www.openssl.org.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"Planetlab. http:\/\/www.planet-lab.org.]]  Planetlab. http:\/\/www.planet-lab.org.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"The homepage of Gnutella. http:\/\/gnutella.wego.com.]]  The homepage of Gnutella. http:\/\/gnutella.wego.com.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"The homepage of KaZaa. http:\/\/www.kazza.com.]]  The homepage of KaZaa. http:\/\/www.kazza.com.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948128"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731866"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0128-6"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Web MIXes: A System for Anonymous and Unobservable Internet Access","author":"Berthold O.","year":"2001","unstructured":"O. Berthold , H. Federrath , and S. K\u00f6psell . Web MIXes: A System for Anonymous and Unobservable Internet Access . Lecture Notes in Computer Science , pages 115 -- 129 , 2001 .]] O. Berthold, H. Federrath, and S. K\u00f6psell. Web MIXes: A System for Anonymous and Unobservable Internet Access. Lecture Notes in Computer Science, pages 115--129, 2001.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Inc.","author":"Boucher P.","year":"2000","unstructured":"P. Boucher , A. Shostack , and I. Goldberg . Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems , Inc. , December 2000 .]] P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/54235.54239"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of International Conference on Financial Cryptography","author":"Coppersmith D.","year":"2002","unstructured":"D. Coppersmith and M. Jakobsson . Almost Optimal Hash Sequence Traversal . In Proceedings of International Conference on Financial Cryptography , Southampton, Bermuda , 2002 .]] D. Coppersmith and M. Jakobsson. Almost Optimal Hash Sequence Traversal. In Proceedings of International Conference on Financial Cryptography, Southampton, Bermuda, 2002.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030113"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security","author":"G\u00fclc\u00fc C.","year":"1996","unstructured":"C. G\u00fclc\u00fc and G. Tsudik . Mixing email with babel . In Proceedings of the Symposium on Network and Distributed System Security , San Diego, CA , 1996 .]] C. G\u00fclc\u00fc and G. Tsudik. Mixing email with babel. In Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, 1996.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023709"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2402"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2406"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2401"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOT-P2P.2005.17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_17"},{"key":"e_1_3_2_1_27_1","volume-title":"Mixmaster Protocol --- Version","author":"M\u00f6ller U.","year":"2003","unstructured":"U. M\u00f6ller , L. Cottrell , P. Palfrader , and L. Sassaman . Mixmaster Protocol --- Version 2, July 2003 .]] U. M\u00f6ller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol --- Version 2, July 2003.]]"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Proceedings of Workshop on Design Issues in Anonymity and Unobservability","author":"Pfitzmann A.","year":"2000","unstructured":"A. Pfitzmann and M. K\u00f6hntopp . Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology . In Proceedings of Workshop on Design Issues in Anonymity and Unobservability , pages 1 -- 9 , Berkeley, CA , 2000 .]] A. Pfitzmann and M. K\u00f6hntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In Proceedings of Workshop on Design Issues in Anonymity and Unobservability, pages 1--9, Berkeley, CA, 2000.]]"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/645662.664536"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90087-3"},{"key":"e_1_3_2_1_31_1","first-page":"10","volume-title":"Design Issues and Open Problems. In Proceedings of Privacy Enhancing Technologies Workshop","author":"Raymond J.","year":"2000","unstructured":"J. Raymond . Traffic Analysis : Protocols, Attacks , Design Issues and Open Problems. In Proceedings of Privacy Enhancing Technologies Workshop , pages 10 -- 29 , Berkeley, CA , 2000 .]] J. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems. In Proceedings of Privacy Enhancing Technologies Workshop, pages 10--29, Berkeley, CA, 2000.]]"},{"issue":"4","key":"e_1_3_2_1_32_1","first-page":"482","article-title":"Anonymous Connections and Onion Routing. IEEE J. on Selected Areas in Coomunications","volume":"16","author":"Reed M.","year":"1998","unstructured":"M. Reed , P. Syverson , and D. Goldschlag . Anonymous Connections and Onion Routing. IEEE J. on Selected Areas in Coomunications , Special Issue on Copyright and Privacy Protection , 16 ( 4 ): 482 -- 494 , 1998 .]] M. Reed, P. Syverson, and D. Goldschlag. Anonymous Connections and Onion Routing. IEEE J. on Selected Areas in Coomunications, Special Issue on Copyright and Privacy Protection, 16(4):482--494, 1998.]]","journal-title":"Special Issue on Copyright and Privacy Protection"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133396"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352607"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_37_1","first-page":"302","article-title":"Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Advances in Cryptology: EUROCRYPT'89","volume":"434","author":"Waidner M.","year":"1989","unstructured":"M. Waidner . Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Advances in Cryptology: EUROCRYPT'89 , LNCS 434 : 302 -- 319 , 1989 .]] M. Waidner. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Advances in Cryptology: EUROCRYPT'89, LNCS 434:302--319, 1989.]]","journal-title":"LNCS"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Network and Distributed Security Symposium","author":"Wright M.","year":"2002","unstructured":"M. Wright , M. Adler , B. Levine , and C. Shields . An Analysis of the Degradation of Anonymous Protocols . In Proceedings of the Network and Distributed Security Symposium , San Diego, CA , 2002 .]] M. Wright, M. Adler, B. Levine, and C. Shields. An Analysis of the Degradation of Anonymous Protocols. In Proceedings of the Network and Distributed Security Symposium, San Diego, CA, 2002.]]"}],"event":{"name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore","acronym":"Asia CCS07"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:36Z","timestamp":1750258296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":37,"alternative-id":["10.1145\/1229285.1229296","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229296","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}