{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:15:13Z","timestamp":1755998113442,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517846","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"49-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["You cannot hide for long"],"prefix":"10.1145","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"Gradiant, Vigo, Spain"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253565"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","first-page":"30","volume-title":"Workshop on Design Issues in Anonymity and Unobservability","author":"Berthold Oliver","year":"2000","unstructured":"Oliver Berthold , Andreas Pfitzmann , and Ronny Standtke . The disadvantages of free mix routes and how to overcome them . In Hannes Federrath, editor, Workshop on Design Issues in Anonymity and Unobservability , volume 2009 of Lecture Notes in Computer Science , pages 30 -- 45 . Springer , 2000 . Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvantages of free mix routes and how to overcome them. In Hannes Federrath, editor, Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 30--45. Springer, 2000."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1428259"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_5_1","volume-title":"Privately calculating location statistics. On-line at http:\/\/crypto. stanford.edu\/locpriv\/privstats\/index.php","author":"Chien Peter","year":"2011","unstructured":"Peter Chien and Dan Boneh . Privately calculating location statistics. On-line at http:\/\/crypto. stanford.edu\/locpriv\/privstats\/index.php , 2011 . Peter Chien and Dan Boneh. Privately calculating location statistics. On-line at http:\/\/crypto. stanford.edu\/locpriv\/privstats\/index.php, 2011."},{"key":"e_1_3_2_1_6_1","series-title":"IFIP Conference Proceedings","first-page":"421","volume-title":"Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, and Sokratis K","author":"Danezis George","year":"2003","unstructured":"George Danezis . Statistical disclosure attacks . In Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, and Sokratis K . Katsikas, editors, SEC, volume 250 of IFIP Conference Proceedings , pages 421 -- 426 . Kluwer , 2003 . George Danezis. Statistical disclosure attacks. In Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, and Sokratis K. Katsikas, editors, SEC, volume 250 of IFIP Conference Proceedings, pages 421--426. Kluwer, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_11_1","volume-title":"IBM Research","author":"Dworkin Morris","year":"2010","unstructured":"Morris Dworkin . Cryptographic protocols of the identity mixer library, v. 2.3.0. IBM research report RZ3730 , IBM Research , 2010 . http:\/\/domino.research.ibm.com\/library\/cyberdig.nsf\/index.html. Morris Dworkin. Cryptographic protocols of the identity mixer library, v. 2.3.0. IBM research report RZ3730, IBM Research, 2010. http:\/\/domino.research.ibm.com\/library\/cyberdig.nsf\/index.html."},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"Goldschlag David M.","year":"1996","unstructured":"David M. Goldschlag , Michael G. Reed , and Paul F. Syverson . Hiding routing information . In Ross J. Anderson, editor, Information Hiding , volume 1174 of Lecture Notes in Computer Science , pages 137 -- 150 . Springer , 1996 . David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Hiding routing information. In Ross J. Anderson, editor, Information Hiding, volume 1174 of Lecture Notes in Computer Science, pages 137--150. Springer, 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179615"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","volume-title":"Guillou and Jean-Jacques Quisquater","author":"Louis","year":"1995","unstructured":"Louis C. Guillou and Jean-Jacques Quisquater , editors. Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21--25, 1995 , Proceeding, volume 921 of Lecture Notes in Computer Science . Springer , 1995. Louis C. Guillou and Jean-Jacques Quisquater, editors. Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21--25, 1995, Proceeding, volume 921 of Lecture Notes in Computer Science. Springer, 1995."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_23"},{"key":"e_1_3_2_1_17_1","first-page":"2","volume-title":"IEE","author":"Maskell Simon","year":"2001","unstructured":"Simon Maskell and Neil Gordon . A tutorial on particle filters for on-line nonlinear\/non-gaussian bayesian tracking. In Target Tracking: Algorithms and Applications (Ref. No. 2001\/174) , IEE , pages 2 -- 1 . IET, 2001 . Simon Maskell and Neil Gordon. A tutorial on particle filters for on-line nonlinear\/non-gaussian bayesian tracking. In Target Tracking: Algorithms and Applications (Ref. No. 2001\/174), IEE, pages 2--1. IET, 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Dang Vinh\n      Pham Joss\n      Wright and \n      Dogan\n      Kesdogan\n    .\n  A practical complexity-theoretic analysis of mix systems\n  . In Vijay Atluri and Claudia Diaz editors ESORICS volume \n  6879\n   of \n  Lecture Notes in Computer Science pages 508{\n  527\n  . Springer 2011.   Dang Vinh Pham Joss Wright and Dogan Kesdogan. A practical complexity-theoretic analysis of mix systems. In Vijay Atluri and Claudia Diaz editors ESORICS volume 6879 of Lecture Notes in Computer Science pages 508{527. Springer 2011.","DOI":"10.1007\/978-3-642-23822-2_28"},{"key":"e_1_3_2_1_23_1","volume-title":"Beyond the Kalman filter: Particle filters for tracking applications","author":"Ristic Branko","year":"2004","unstructured":"Branko Ristic , Sanjeev Arulampalam , and Neil Gordon . Beyond the Kalman filter: Particle filters for tracking applications . Artech House Publishers , 2004 . Branko Ristic, Sanjeev Arulampalam, and Neil Gordon. Beyond the Kalman filter: Particle filters for tracking applications. Artech House Publishers, 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Health","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney . Simple demographics often identify people uniquely . Health ( San Francisco), pages 1--34 , 2000 . Latanya Sweeney. Simple demographics often identify people uniquely. Health (San Francisco), pages 1--34, 2000."},{"key":"e_1_3_2_1_25_1","volume-title":"September 28","author":"Raccoon The","year":"2008","unstructured":"The 23rd Raccoon . How i learned to stop ph34ring nsa and love the base rate fallacy. The Tor project email archive. URL: http:\/\/archives.seul.org\/or\/dev\/Sep-2008\/msg00016.html , September 28 2008 . The 23rd Raccoon. How i learned to stop ph34ring nsa and love the base rate fallacy. The Tor project email archive. URL: http:\/\/archives.seul.org\/or\/dev\/Sep-2008\/msg00016.html, September 28 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517846"}},"subtitle":["de-anonymization of real-world dynamic behaviour"],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":27,"alternative-id":["10.1145\/2517840.2517846","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517846","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}