{ "labelLang" : "hun", "responseDate" : "2024-03-28 17:53", "content" : { "otype" : "PublicationOther", "mtid" : 2663707, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "oldTimestamp" : "2014-06-23T17:04:30.000+0000", "deleted" : false, "oldId" : 2663707, "lastRefresh" : "2023-08-07T13:49:25.279+0000", "lastModified" : "2022-08-17T14:36:07.986+0000", "created" : "2011-06-07T15:01:00.000+0000", "creator" : { "otype" : "Author", "mtid" : 10041199, "link" : "/api/author/10041199", "label" : "Király Csaba (Számítógép-hálózatok)", "familyName" : "Király", "givenName" : "Csaba", "published" : true, "oldId" : 10041199, "snippet" : true }, "lastDuplumOK" : "2022-08-17T14:36:08.175+0000", "lastDuplumSearch" : "2022-08-17T14:36:08.175+0000", "core" : true, "citation" : false, "type" : { "otype" : "PublicationType", "mtid" : 29, "link" : "/api/publicationtype/29", "label" : "Egyéb", "code" : 29, "otypeName" : "PublicationOther", "listPosition" : 15, "published" : true, "oldId" : 29, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000056, "link" : "/api/subtype/10000056", "label" : "Kutatási jelentés (közzétett) (Egyéb)", "name" : "Kutatási jelentés (közzétett)", "nameEng" : "Technical report (published)", "docType" : { "otype" : "PublicationType", "mtid" : 29, "link" : "/api/publicationtype/29", "label" : "Egyéb", "code" : 29, "otypeName" : "PublicationOther", "listPosition" : 15, "published" : true, "oldId" : 29, "snippet" : true }, "listPosition" : 1575, "published" : true, "oldId" : 10000056, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Kiraly, Csaba", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 5304686, "link" : "/api/authorship/5304686", "label" : "Kiraly, Csaba [Király, Csaba (Számítógép-hálózatok), szerző]", "listPosition" : 1, "share" : 0.333, "first" : true, "last" : false, "author" : { "otype" : "Author", "mtid" : 10041199, "link" : "/api/author/10041199", "label" : "Király Csaba (Számítógép-hálózatok)", "familyName" : "Király", "givenName" : "Csaba", "published" : true, "oldId" : 10041199, "snippet" : true }, "familyName" : "Kiraly", "givenName" : "Csaba", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 19964198, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 5304687, "link" : "/api/authorship/5304687", "label" : "Bianchi, Giuseppe", "listPosition" : 2, "share" : 0.33333334, "first" : false, "last" : false, "familyName" : "Bianchi", "givenName" : "Giuseppe", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 19964197, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 5304688, "link" : "/api/authorship/5304688", "label" : "Lo, Cigno Renato", "listPosition" : 3, "share" : 0.33333334, "first" : false, "last" : true, "familyName" : "Lo", "givenName" : "Cigno Renato", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 19964196, "snippet" : true } ], "title" : "Solving Performance Issues in Anonymization Overlays with a L3 approach", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 849717, "link" : "/api/publicationidentifier/849717", "label" : "Teljes dokumentum: http://eprints.biblio.unitn.it/1629/1/TR-DISI-08-041_V1.1.pdf", "source" : { "otype" : "PlainSource", "mtid" : 39, "link" : "/api/publicationsource/39", "label" : "Teljes dokumentum", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Teljes dokumentum", "linkPattern" : "@@@", "publiclyVisible" : true, "published" : true, "oldId" : 39, "snippet" : true }, "oaFree" : false, "validState" : "NO", "idValue" : "http://eprints.biblio.unitn.it/1629/1/TR-DISI-08-041_V1.1.pdf", "realUrl" : "http://eprints.biblio.unitn.it/1629/1/TR-DISI-08-041_V1.1.pdf", "published" : false, "oldId" : 828809, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 849719, "link" : "/api/publicationidentifier/849719", "label" : "Handle: 10890/4304", "source" : { "otype" : "PlainSource", "mtid" : 152, "link" : "/api/publicationsource/152", "label" : "Handle", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Handle", "linkPattern" : "http://hdl.handle.net/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 152, "snippet" : true }, "oaFree" : false, "validState" : "NO", "idValue" : "10890/4304", "realUrl" : "http://hdl.handle.net/10890/4304", "published" : false, "oldId" : 1448943, "snippet" : true } ], "firstPage" : "1", "lastPage" : "35", "firstPageOrInternalIdForSort" : "1", "pageLength" : 35, "publishedYear" : 2008, "abstractText" : "Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hops devised to avoid end-to-end linkage of the information, thus protecting users’ identities (when needed) and privacy. Most Mix networks are based on hops built either on TLS or directly built by proprietary protocols. In the first part of this paper we analyze the methodology chosen so far to build Mix networks and Tor in particular and show, through experiments supported by a theoretical explanation, that overlays based on congestion-controlled transport level tunnels may incur in devastating performance degradation. The second part of the paper is devoted to the discussion of anonymous networks based on layer-3 standard solutions, like IPsec and NATs, and to the description of a Linux-based implementation that is scalable, performing and fulfills all anonymity requirements.", "digital" : null, "printed" : null, "sourceYear" : 2011, "packet" : "bme-pa-migracio-20014-06-20-v01", "foreignEdition" : null, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : false, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2023-08-07", "oaFree" : false, "citationCount" : 4, "citationCountUnpublished" : 0, "citationCountWoOther" : 4, "independentCitCountWoOther" : 3, "nationalOriginCitationCount" : 0, "foreignEditionCitationCount" : 1, "doiCitationCount" : 1, "wosCitationCount" : 1, "scopusCitationCount" : 0, "wosScopusCitationCount" : 1, "wosScopusCitationCountWoOther" : 1, "wosScopusIndependentCitationCount" : 0, "wosScopusIndependentCitationCountWoOther" : 0, "independentCitationCount" : 3, "selfCitationCount" : 1, "unhandledCitationCount" : 0, "citingPubCount" : 4, "independentCitingPubCount" : 3, "citingPubCountWoOther" : 4, "independentCitingPubCountWoOther" : 3, "unhandledCitingPubCount" : 0, "citedPubCount" : 0, "citedCount" : 0, "pubStats" : { "types" : [ { "type" : "Folyóiratcikk", "typeEng" : "Journal Article", "code" : 24, "count" : 3 }, { "type" : "Könyvrészlet", "typeEng" : "Chapter in Book", "code" : 25, "count" : 1 }, { "type" : "Könyv", "typeEng" : "Book", "code" : 23, "count" : 0 }, { "type" : "Egyéb konferenciaközlemény", "typeEng" : "Conference paper", "code" : 31, "count" : 0 }, { "type" : "Egyéb konferenciakötet", "typeEng" : "Conference proceedings", "code" : 32, "count" : 0 }, { "type" : "Oltalmi formák", "typeEng" : "Protection forms", "code" : 26, "count" : 0 }, { "type" : "Disszertáció", "typeEng" : "Thesis", "code" : 28, "count" : 0 }, { "type" : "Egyéb", "typeEng" : "Miscellaneous", "code" : 29, "count" : 0 }, { "type" : "Alkotás", "typeEng" : "Achievement", "code" : 22, "count" : 0 }, { "type" : "Kutatási adat", "typeEng" : "Research data", "code" : 33, "count" : 0 } ], "citationTypes" : [ { "type" : "Folyóiratcikk", "typeEng" : "Journal Article", "code" : 24, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Könyvrészlet", "typeEng" : "Chapter in Book", "code" : 25, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Könyv", "typeEng" : "Book", "code" : 23, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Egyéb konferenciaközlemény", "typeEng" : "Conference paper", "code" : 31, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Egyéb konferenciakötet", "typeEng" : "Conference proceedings", "code" : 32, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Oltalmi formák", "typeEng" : "Protection forms", "code" : 26, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Disszertáció", "typeEng" : "Thesis", "code" : 28, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Egyéb", "typeEng" : "Miscellaneous", "code" : 29, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Alkotás", "typeEng" : "Achievement", "code" : 22, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 }, { "type" : "Kutatási adat", "typeEng" : "Research data", "code" : 33, "countUnknown" : 0, "countIndependent" : 0, "countSelfCitation" : 0 } ], "years" : [ { "year" : 2009, "publicationCount" : 0, "citationCount" : 1, "independentCitationCount" : 0, "citingPubCount" : 1, "independentCitingPubCount" : 0, "oaStats" : null, "oaStats2" : null }, { "year" : 2010, "publicationCount" : 0, "citationCount" : 1, "independentCitationCount" : 1, "citingPubCount" : 1, "independentCitingPubCount" : 1, "oaStats" : null, "oaStats2" : null }, { "year" : 2011, "publicationCount" : 0, "citationCount" : 2, "independentCitationCount" : 2, "citingPubCount" : 2, "independentCitingPubCount" : 2, "oaStats" : null, "oaStats2" : null } ] }, "hasCitationDuplums" : false, "userChangeableUntil" : "2014-04-10T10:22:43.000+0000", "publishDate" : "2014-06-23T17:04:30.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 1, "ownerInstituteCount" : 3, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "description1" : "Technical Report DISI-08-041, Ver. 1.1", "hasQualityFactor" : false, "link" : "/api/publication/2663707", "label" : "Kiraly Csaba et al. Solving Performance Issues in Anonymization Overlays with a L3 approach. (2008)", "template" : "