{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:41:41Z","timestamp":1725500501347},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_15","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"220-236","source":"Crossref","is-referenced-by-count":3,"title":["Traffic Analysis Attacks on a Continuously-Observable Steganographic File System"],"prefix":"10.1007","author":[{"given":"Carmela","family":"Troncoso","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-49380-8_6","volume-title":"Information Hiding","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Needham, R.M., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 73\u201382. Springer, Heidelberg (1998)"},{"key":"15_CR2","unstructured":"Giefer, C., Letchner, J.: Mojitos: A distributed steganographic file system. Technical report, University of Washington (2004)"},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-45748-8_13","volume-title":"Peer-to-Peer Systems","author":"S. Hand","year":"2002","unstructured":"Hand, S., Roscoe, T.: Mnemosyne: Peer-to-peer steganographic storage. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 130\u2013140. Springer, Heidelberg (2002)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/10719724_32","volume-title":"Information Hiding","author":"A..D. McDonald","year":"2000","unstructured":"McDonald, A.D., Kuhn, M.G.: StegFS: A steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 462\u2013477. Springer, Heidelberg (2000)"},{"key":"15_CR6","first-page":"657","volume-title":"Proceedings of the 19th International Conference on Data Engineering","author":"H. Pang","year":"2003","unstructured":"Pang, H., Tan, K.-L., Zhou, X.: StegFS: A steganographic file system. In: Proceedings of the 19th International Conference on Data Engineering, pp. 657\u2013667. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/ICDE.2004.1320028","volume-title":"Proceedings of the 20th International Conference on Data Engineering","author":"X. Zhou","year":"2004","unstructured":"Zhou, X., Pang, H., Tan, K.-L.: Hiding data accesses in steganographic file system. In: Proceedings of the 20th International Conference on Data Engineering, pp. 572\u2013583. IEEE Computer Society Press, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T11:48:26Z","timestamp":1551354506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}