{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:40:07Z","timestamp":1725486007772},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441373"},{"type":"electronic","value":"9783540457053"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45705-4_33","type":"book-chapter","created":{"date-parts":[[2007,6,12]],"date-time":"2007-06-12T20:28:50Z","timestamp":1181680130000},"page":"314-323","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Enzmann","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,20]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter. Privacypreserving global customization (extended abstract). In Proceedings of the 2nd ACM conference on Electronic Commerce (EC\u201900), October 2000.","DOI":"10.1145\/352871.352891"},{"key":"33_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45600-7_23","volume-title":"Information and Communications Security (ICICS 2001)","author":"F. Bao","year":"2001","unstructured":"Feng Bao, Robert Deng. Privacy protection for transactions of digital goods. In Information and Communications Security (ICICS 2001), LNCS 2229. SpringerVerlag, November 2001."},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Roger Clarke. Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), February 1999.","DOI":"10.1145\/293411.293475"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Donna L. Hoffman, Thomas P. Novak, Marcos Peralta. Building consumer trust online. Communications of the ACM, 42(4), April 1999.","DOI":"10.1145\/299157.299175"},{"key":"33_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Targeted advertising... and privacy too","author":"A. Juels","year":"2001","unstructured":"Ari Juels. Targeted advertising... and privacy too. In Progress in Cryptology\u2014CT-RSA 2001, RSA Conference 2001, Proceedings, LNCS 2020. Springer Verlag, 2001."},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"D. Kristol, L. Montulli. HTTP State Management Mechanism. RFC 2109, February 1997.","DOI":"10.17487\/rfc2109"},{"key":"33_CR7","unstructured":"Danny B. Lange, Mitsuru Oshima. Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, 1998."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Michael G. Reed, Paul F. Syverson, David M. Goldschlag. Proxies for anonymous routing. In Proceedings of 12th Annual Computer Security Applications Conference (ACSAC\u201996). IEEE Press, December 1996.","DOI":"10.1109\/CSAC.1996.569678"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Michael K. Reiter, Aviel D. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security, 1(1), 1998.","DOI":"10.1145\/290163.290168"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Ron L. Rivest, Adi Shamir, Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), February 1978.","DOI":"10.1145\/359340.359342"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag. Unlinkable serial transactions: Protocols and applications. ACM Transactions on Information and System Security, 2(4), 1999.","DOI":"10.1145\/330382.330384"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Paul F. Syverson, Michael G. Reed, David M. Goldschlag. Private web browsing. Journal of Computer Security\u2014Special Issue on Web Security, 5(3), 1997.","DOI":"10.3233\/JCS-1997-5305"},{"key":"33_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Protecting a mobile agent\u2019s route against collusions","author":"D. Westhoff","year":"2000","unstructured":"Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali. Protecting a mobile agent\u2019s route against collusions. In Selected Areas in Cryptography, 6th Annual InternationalWorkshop (SAC\u201999), LNCS 1758. Springer Verlag, 2000."}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45705-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T22:10:03Z","timestamp":1556489403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45705-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441373","9783540457053"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45705-4_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}