{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:11:24Z","timestamp":1760202684635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T00:00:00Z","timestamp":1452729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,14]]},"DOI":"10.1145\/2840728.2840743","type":"proceedings-article","created":{"date-parts":[[2016,1,5]],"date-time":"2016-01-05T14:26:11Z","timestamp":1452003971000},"page":"333-344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["How To Bootstrap Anonymous Communication"],"prefix":"10.1145","author":[{"given":"Sune K.","family":"Jakobsen","sequence":"first","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]},{"given":"Claudio","family":"Orlandi","sequence":"additional","affiliation":[{"name":"Aarhus University, Aarhus, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"323","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"von Ahn Luis","year":"2004","unstructured":"Luis von Ahn and Nicholas J. Hopper . Public-key steganography. In Advances in Cryptology - EUROCRYPT 2004 , International Conference on the Theory and Applications of Cryptographic Techniques , Interlaken, Switzerland , May 2-6, 2004 , Proceedings, pages 323 -- 341 , 2004. Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pages 323--341, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554800"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_5_1","volume-title":"USA","author":"Fazio Nelly","year":"2014","unstructured":"Nelly Fazio , Antonio Nicolosi , and Irippuge Milinda Perera . Broadcast steganography. In Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA , USA , February 25-28, 2014 . Proceedings, pages 64--84 , 2014. Nelly Fazio, Antonio Nicolosi, and Irippuge Milinda Perera. Broadcast steganography. In Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings, pages 64--84, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"Fridrich Jessica","year":"2009","unstructured":"Jessica Fridrich . Steganography in Digital Media: Principles, Algorithms, and Applications . Cambridge University Press , New York, NY, USA , 1 st edition, 2009 . Jessica Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York, NY, USA, 1st edition, 2009.","edition":"1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.199"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704303"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688073.2688105"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523654"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2010.32"},{"key":"e_1_3_2_1_14_1","first-page":"676","volume-title":"ICALP (1)","author":"Jakobsen Sune K.","year":"2014","unstructured":"Sune K. Jakobsen . Information theoretical cryptogenography . In ICALP (1) , pages 676 -- 688 , 2014 . Sune K. Jakobsen. Information theoretical cryptogenography. In ICALP (1), pages 676--688, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746614"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)","author":"Winter Philipp","year":"2012","unstructured":"Philipp Winter and Stefan Lindskog . How the Great Firewall of China is blocking Tor . In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012) , August 2012 . Philipp Winter and Stefan Lindskog. How the Great Firewall of China is blocking Tor. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), August 2012."}],"event":{"name":"ITCS'16: Innovations in Theoretical Computer Science","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Cambridge Massachusetts USA","acronym":"ITCS'16"},"container-title":["Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2840728.2840743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2840728.2840743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2840728.2840743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,14]]},"references-count":16,"alternative-id":["10.1145\/2840728.2840743","10.1145\/2840728"],"URL":"https:\/\/doi.org\/10.1145\/2840728.2840743","relation":{},"subject":[],"published":{"date-parts":[[2016,1,14]]},"assertion":[{"value":"2016-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}