{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:25:27Z","timestamp":1729653927581,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icycs.2008.476","type":"proceedings-article","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T20:14:35Z","timestamp":1229544875000},"page":"2120-2124","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis of the HLLACF"],"prefix":"10.1109","author":[{"given":"Xin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Huaping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fengtao","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Zunguo","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"the sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"journal-title":"Timing analysis in low-latency mix systems ln Proc Financial Cryptography Key West","year":"2004","author":"levine","key":"11"},{"key":"12","article-title":"local view attack on anonymous communication, esor1cs2005","volume":"3679","author":"marcing","year":"2005","journal-title":"LNCS"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","article-title":"the traffic analysis of continuous-time mixes[a]","author":"danezis","year":"2004","journal-title":"Proc Workshop on Privacy Enhancing Technologies"},{"key":"7","article-title":"tarzama:peer-to-peer anonymizing network layer","author":"michael","year":"2002","journal-title":"Proc of CCS '02"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004362"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"8","article-title":"salsa:a structured approach to large-scale anonymity","author":"arjun","year":"2006","journal-title":"Proceedings of the CCS'06"}],"event":{"name":"2008 9th International Conference for Young Computer Scientists (ICYCS)","start":{"date-parts":[[2008,11,18]]},"location":"Hunan, China","end":{"date-parts":[[2008,11,21]]}},"container-title":["2008 The 9th International Conference for Young Computer Scientists"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4708920\/4708921\/04709301.pdf?arnumber=4709301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T14:53:17Z","timestamp":1497797597000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4709301\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icycs.2008.476","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}