{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:15Z","timestamp":1725494235774},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540758525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75853-2_3","type":"book-chapter","created":{"date-parts":[[2007,11,3]],"date-time":"2007-11-03T07:18:16Z","timestamp":1194074296000},"page":"25-36","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient and Reliable Anonymous Solution for a Self-organized P2P Network"],"prefix":"10.1007","author":[{"given":"J. P.","family":"Mu\u00f1oz-Gea","sequence":"first","affiliation":[]},{"given":"J.","family":"Malgosa-Sanahuja","sequence":"additional","affiliation":[]},{"given":"P.","family":"Manzanares-Lopez","sequence":"additional","affiliation":[]},{"given":"J. C.","family":"Sanchez-Aarnoutse","sequence":"additional","affiliation":[]},{"given":"J.","family":"Garcia-Haro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldshlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. Communications of the ACM\u00a042(2), 32\u201348 (1999)","journal-title":"Communications of the ACM"},{"key":"3_CR3","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: NDSS 2002. Proceedings of the Network and Distributed Security Symposium, San Diego, CA, USA (2002)"},{"key":"3_CR4","volume-title":"ISCC 2003","author":"H. Sui","year":"2003","unstructured":"Sui, H., Chen, J., Chen, S., Wang, J.: Payload analysis of anonymous communication system with host-based rerouting mechanism. In: ISCC 2003. Proceedings of the Eighth IEEE International Symposium on Computers and Communications, Kemer-Antalya, Tuerkey, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-540-71661-7_35","volume-title":"DBISP2P 2006\/2005","author":"J.P. Mu\u00f1oz-Gea","year":"2007","unstructured":"Mu\u00f1oz-Gea, J.P., Malgosa-Sanahuja, J., Manzanares-Lopez, P., Sanchez-Aarnoutse, J.C., Garcia-Haro, J.: A self-organized p2p network for an efficient and secure content location & download. In: Moro, G., Bergamaschi, S., Joseph, S., Morin, J.-H., Ouksel, A.M. (eds.) DBISP2P 2006\/2005. LNCS, vol.\u00a04125, pp. 368\u2013375. Springer, Heidelberg (2007)"},{"key":"3_CR6","unstructured":"Pfitzmann, A., Kohntopp, M., Showtack, A.: Anonymity, unlinkability, unobservability, pseudonymity and identity management - A consolidated proposal for terminology. Manuscript (May 2006)"},{"key":"3_CR7","unstructured":"Li, J., Stribling, J., Morris, R., and Kaashoek, M. F.: Bandwidth-efficient management of dht routing tables. In: NSDI 2005. Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA (2005)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, Springer, Heidelberg (2003)"},{"key":"3_CR9","unstructured":"Borisov, N: Anonymous routing in structured peer-to-peer overlays, Ph.D. Thesis, UC Berkeley (May 2005)"}],"container-title":["Lecture Notes in Computer Science","IP Operations and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75853-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:34:54Z","timestamp":1619519694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75853-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540758525"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75853-2_3","relation":{},"subject":[]}}