| CARVIEW |
Select Language
HTTP/2 200
date: Wed, 04 Feb 2026 08:01:50 GMT
content-type: application/json
content-length: 2885
access-control-expose-headers: Link
access-control-allow-headers: X-Requested-With, Accept, Accept-Encoding, Accept-Charset, Accept-Language, Accept-Ranges, Cache-Control
access-control-allow-origin: *
vary: Accept-Encoding
content-encoding: gzip
server: Jetty(9.4.40.v20210413)
x-rate-limit: 5
x-rate-limit-interval: 1s
x-concurrency-limit: 1
x-api-pool: public
permissions-policy: interest-cohort=()
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T02:32:50Z","timestamp":1654828370837},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Inf Secur"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s10207-004-0059-3","type":"journal-article","created":{"date-parts":[[2005,2,2]],"date-time":"2005-02-02T12:26:42Z","timestamp":1107347202000},"page":"172-180","source":"Crossref","is-referenced-by-count":2,"title":["Passive-attack analysis for connection-based anonymity systems"],"prefix":"10.1007","volume":"4","author":[{"given":"Andrei","family":"Serjantov","sequence":"first","affiliation":[]},{"given":"Peter","family":"Sewell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,1]]},"reference":[{"key":"59_CR1","unstructured":"Boucher P, Goldberg I, Shostack A (2000) Freedom system 2.0 architecture. Zero-Knowledge Sytems. http:\/\/www.freedom.net\/info\/whitepapers\/"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Back A, M\u00f6ller U, Stiglic A (2001) Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information hiding workshop. Lecture notes in computer science, vol 2137. Springer, Berlin Heidelberg New York, pp\u2009245\u2013257","DOI":"10.1007\/3-540-45496-9_18"},{"key":"59_CR3","unstructured":"Berthold O, Pfitzmann A, Standtke R (2000) The disadvantages of free MIX routes and how to overcome them. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp\u200910\u201329"},{"key":"59_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"Chaum","year":"1981","unstructured":"Chaum D (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84\u201388","journal-title":"Commun ACM"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Danezis G (2003) Mix-networks with restricted routes. In: Workshop on privacy enhancing technologies, Dresden, Germany. Lecture notes in computer science, vol 2760. Springer, Berlin Heidelberg New York","DOI":"10.1007\/978-3-540-40956-4_1"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"[DDM03] Danezis G, Dingledine R, Mathewson N (2003) Mixminion: design of a type III anonymous remailer protocol. In: IEEE security and privacy","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: The second-generation onion router. In: Proceedings of the 13th USENIX security symposium","DOI":"10.21236\/ADA465464"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Freedman MJ, Morris R (2002) Tarzan: A peer-to-peer anonymizing network layer. In: ACM conference on computer and communications security (CCS)","DOI":"10.1145\/586110.586137"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"G\u00fclc\u00fc C, Tsudik G (1996) Mixing email with Babel. In: Internet Society symposium on network and distributed sytem security, pp\u00a02\u201316","DOI":"10.1109\/NDSS.1996.492350"},{"key":"59_CR10","unstructured":"Hodara H (1991) Secure fiberoptic communications. In: Symposium on electromagnetic security for information protection, Rome, Italy"},{"key":"59_CR11","unstructured":"The JAP project. http:\/\/anon.inf.tu-dresden.de\/index_en.html"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Kesdogan D, Egner J, B\u00fcschkes R (1998) Stop-and-go MIXes: providing probabilistic anonymity in an open system. In: Information hiding workshop. Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-49380-8_7"},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Pfitzmann A, Pfitzmann B, Waidner M (1991) ISDN-mixes: untraceable communication with very small bandwidth overhead. In: Proceedings of the GI\/ITG conference on communication in distributed systems, pp\u00a0451\u2013463","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"59_CR14","unstructured":"Raymond J (2000) Traffic analysis: protocols, attacks, design issues, and open problems. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp\u00a010\u201329"},{"key":"59_CR15","unstructured":"Rennhard M (2003) Practical anonymity for the masses with mix-networks. Technical Report 157, ETH Zurich, Switzerland"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Rennhard M, Plattner B (2002) Introducing morphmix: peer-to-peer based anonymous internet usage with collusion detection. In: Workshop on privacy in the electronic society (WPES), Washington DC","DOI":"10.1145\/644527.644537"},{"key":"59_CR17","unstructured":"Sherwood R, Bhattacharjee B, Srinivasan A (2002) P5: A protocol for scalable anonymous communication. In: IEEE symposium on security and privacy"},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Workshop on privacy enhancing technologies, San Francisco. Lecture notes in computer science, vol 2482. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-36467-6_4"},{"key":"59_CR19","doi-asserted-by":"crossref","unstructured":"Serjantov A, Dingledine R, Syverson P (2002) From a trickle to a flood: active attacks on several mix types. In: Information hiding workshop. Lecture notes in computer science, vol 2578. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-36415-3_3"},{"key":"59_CR20","doi-asserted-by":"crossref","unstructured":"Shmatikov V (2002) Probabilistic analysis of anonymity. In: 15th IEEE workshop on computer security foundations, pp\u00a0119\u2013128","DOI":"10.1109\/CSFW.2002.1021811"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Syverson PF, Tsudik G, Reed MG, Landwehr CE (2000) Towards an analysis of Onion Routing security. In: Workshop on design issues in anonymity and unobservability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York","DOI":"10.21236\/ADA465255"},{"key":"59_CR22","unstructured":"Wright M, Adler M, Levine B, Shields C (2002) An analysis of the degradation of anonymous protocols. In: ISOC symposium on network and distributed system security"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0059-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-004-0059-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0059-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T15:10:20Z","timestamp":1586099420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-004-0059-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["59"],"URL":"https:\/\/doi.org\/10.1007\/s10207-004-0059-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}