iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3182658
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:55:29Z","timestamp":1728176129596},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Microsoft Research through its Ph.D. Scholarship Programme"},{"name":"German Federal Ministry of Education and Research"},{"name":"European Research Council Synergy Grant imPACT","award":["n. 610150"]},{"name":"Research Council KU Leuven","award":["C16\/15\/058"]},{"name":"European Commission project","award":["H2020-DS-2014-653497 PANORAMIX"]},{"name":"KU Leuven BOF","award":["OT\/13\/070"]},{"name":"Center for IT-Security, Privacy and Accountability","award":["FKZ: 16KIS0345"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"The Internet has undergone dramatic changes in the past 2 decades and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, such as omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. In this work, we survey previous research on designing, developing, and deploying systems for anonymous communication. Our taxonomy and comparative assessment provide important insights about the differences between the existing classes of anonymous communication protocols.<\/jats:p>","DOI":"10.1145\/3182658","type":"journal-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T18:12:29Z","timestamp":1528827149000},"page":"1-39","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["A Survey on Routing in Anonymous Communication Protocols"],"prefix":"10.1145","volume":"51","author":[{"given":"Fatemeh","family":"Shirazi","sequence":"first","affiliation":[{"name":"KU Leuven, ESAT\/COSIC and imec, Leuven-Heverlee, Belgium"}]},{"given":"Milivoj","family":"Simeonovski","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarland Informatics Campus, Saarbruecken, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9607-376X","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[{"name":"Cyber Security Foundry, The University of Auckland, Auckland, New Zealand"}]},{"given":"Michael","family":"Backes","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center i.G., Saarland Informatics Campus, Saarbruecken, Germany"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT\/COSIC and imec, Leuven-Heverlee, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2291242"},{"key":"e_1_2_1_2_1","volume-title":"Voelker","author":"AlSabah Mashael","year":"2011","unstructured":"Mashael AlSabah , Kevin Bauer , Ian Goldberg , Dirk Grunwald , Damon McCoy , Stefan Savage , and Geoffrey M . Voelker . 2011 . DefenestraTor: Throwing out windows in Tor. In Privacy Enhancing Technologies, Simone Fischer-H\u00fcbner and Nicholas Hopper (Eds.). Lecture Notes in Computer Science, Vol. 6794 . Springer , Berlin, 134--154. Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker. 2011. DefenestraTor: Throwing out windows in Tor. In Privacy Enhancing Technologies, Simone Fischer-H\u00fcbner and Nicholas Hopper (Eds.). Lecture Notes in Computer Science, Vol. 6794. Springer, Berlin, 134--154."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_8"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516715"},{"key":"e_1_2_1_6_1","unstructured":"Mashael AlSabah and Ian Goldberg. 2015. Performance and Security Improvements for Tor: A Survey. Cryptology ePrint Archive Report No. 2015\/235. Mashael AlSabah and Ian Goldberg. 2015. Performance and Security Improvements for Tor: A Survey. Cryptology ePrint Archive Report No. 2015\/235."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.18"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660371"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0044"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1986.1092937"},{"key":"e_1_2_1_12_1","volume-title":"Gap\u2014Practical anonymous networking","author":"Bennett Krista","unstructured":"Krista Bennett and Christian Grothoff . 2003. Gap\u2014Practical anonymous networking . In Privacy Enhancing Technologies, Roger Dingledine (Ed.). Springer , Berlin , 141--160. Krista Bennett and Christian Grothoff. 2003. Gap\u2014Practical anonymous networking. In Privacy Enhancing Technologies, Roger Dingledine (Ed.). Springer, Berlin, 141--160."},{"key":"e_1_2_1_13_1","volume-title":"The GNet whitepaper. Technical report","author":"Bennett Krista","unstructured":"Krista Bennett , Tiberius Stef , Christian Grothoff , Tzvetan Horozov , and Ioana Patrascu . 2002. The GNet whitepaper. Technical report , Purdue University , 21 pages. Krista Bennett, Tiberius Stef, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu. 2002. The GNet whitepaper. Technical report, Purdue University, 21 pages."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/332186.332211"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 115--129","author":"Berthold Oliver","year":"2000","unstructured":"Oliver Berthold , Hannes Federrath , and Stefan K\u00f6psell . 2000 b. Web MIXes: A system for anonymous and unobservable internet access . In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 115--129 . Oliver Berthold, Hannes Federrath, and Stefan K\u00f6psell. 2000b. Web MIXes: A system for anonymous and unobservable internet access. In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 115--129."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_16"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/111563.111595"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/piko.2009.0013"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_16"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_2_1_24_1","volume-title":"Private communication through a network of trusted connections: The dark freenet. Network","author":"Clarke Ian","year":"2010","unstructured":"Ian Clarke , Oskar Sandberg , Matthew Toseland , and Vilhelm Verendel . 2010. Private communication through a network of trusted connections: The dark freenet. Network ( 2010 ). Ian Clarke, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel. 2010. Private communication through a network of trusted connections: The dark freenet. Network (2010)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371977"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP\u201914)","author":"Conrad Bernd","year":"2014","unstructured":"Bernd Conrad and Fatemeh Shirazi . 2014 . A survey on Tor and I2P . In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP\u201914) . 22--28. Bernd Conrad and Fatemeh Shirazi. 2014. A survey on Tor and I2P. In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP\u201914). 22--28."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.33"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813118"},{"key":"e_1_2_1_33_1","volume-title":"Syverson","author":"Danezis George","year":"2010","unstructured":"George Danezis , Claudia Diaz , and Paul F . Syverson . 2010 . Systems for anonymous communication. In CRC Handbook of Financial Cryptography and Security, B. Rosenberg and D. Stinson (Eds.). Chapman 8 Hall, 341--390. George Danezis, Claudia Diaz, and Paul F. Syverson. 2010. Systems for anonymous communication. In CRC Handbook of Financial Cryptography and Security, B. Rosenberg and D. Stinson (Eds.). Chapman 8 Hall, 341--390."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_10"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881162"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8145-6_18"},{"key":"e_1_2_1_38_1","series-title":"Lecture Notes in Computer Science","volume-title":"Generalising mixes","author":"D\u00edaz Claudia","unstructured":"Claudia D\u00edaz and Andrei Serjantov . 2003. Generalising mixes . In Privacy Enhancing Technologies, Roger Dingledine (Ed.). Lecture Notes in Computer Science , Vol. 2760 . Springer , Berlin , 18--31. Claudia D\u00edaz and Andrei Serjantov. 2003. Generalising mixes. In Privacy Enhancing Technologies, Roger Dingledine (Ed.). Lecture Notes in Computer Science, Vol. 2760. Springer, Berlin, 18--31."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731862"},{"key":"e_1_2_1_40_1","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability","author":"Dingledine Roger","year":"2000","unstructured":"Roger Dingledine , Michael J. Freedman , and David Molnar . 2000 . The free haven project: Distributed anonymous storage service. In Designing Privacy Enhancing Technologies , International Workshop on Design Issues in Anonymity and Unobservability , Berkeley, CA , July 25-26, 2000. 67--95. Roger Dingledine, Michael J. Freedman, and David Molnar. 2000. The free haven project: Distributed anonymous storage service. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 25-26, 2000. 67--95."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs\u201914)","author":"Dingledine Roger","year":"2014","unstructured":"Roger Dingledine , Nicholas Hopper , George Kadianakis , and Nick Mathewson . 2014 . One fast guard for life (or 9 months) . Proceedings of the 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs\u201914) . Roger Dingledine, Nicholas Hopper, George Kadianakis, and Nick Mathewson. 2014. One fast guard for life (or 9 months). Proceedings of the 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs\u201914)."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 5th Workshop on the Economics of Information Security (WEIS\u201906)","author":"Dingledine Roger","year":"2006","unstructured":"Roger Dingledine and Nick Mathewson . 2006 . Anonymity loves company: Usability and the network effect . In Proceedings of the 5th Workshop on the Economics of Information Security (WEIS\u201906) , Ross Anderson (Ed.). Cambridge, UK. Roger Dingledine and Nick Mathewson. 2006. Anonymity loves company: Usability and the network effect. In Proceedings of the 5th Workshop on the Economics of Information Security (WEIS\u201906), Ross Anderson (Ed.). Cambridge, UK."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_2_1_44_1","volume-title":"Murdoch","author":"Dingledine Roger","year":"2009","unstructured":"Roger Dingledine and Steven J . Murdoch . 2009 . Performance Improvements on Tor or, Why Tor is slow and what we\u2019re going to do about it. Technical Report. The Tor Project. Retrieved from https:\/\/research.torproject.org\/techreports\/performance-2009-11-09.pdf. Roger Dingledine and Steven J. Murdoch. 2009. Performance Improvements on Tor or, Why Tor is slow and what we\u2019re going to do about it. Technical Report. The Tor Project. Retrieved from https:\/\/research.torproject.org\/techreports\/performance-2009-11-09.pdf."},{"key":"e_1_2_1_45_1","series-title":"Lecture Notes in Computer Science","volume-title":"Reliable MIX cascade networks through reputation","author":"Dingledine Roger","unstructured":"Roger Dingledine and Paul Syverson . 2002. Reliable MIX cascade networks through reputation . In Financial Cryptography, Matt Blaze (Ed.). Lecture Notes in Computer Science , Vol. 2357 . Springer , Berlin , 253--268. Roger Dingledine and Paul Syverson. 2002. Reliable MIX cascade networks through reputation. In Financial Cryptography, Matt Blaze (Ed.). Lecture Notes in Computer Science, Vol. 2357. Springer, Berlin, 253--268."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354877"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_22"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453434"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687802"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665948"},{"key":"e_1_2_1_57_1","volume-title":"Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report","author":"Goel Sharad","year":"2003","unstructured":"Sharad Goel , Mark Robson , Milo Polte , and Emin Sirer . 2003 . Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report . Cornell University . Sharad Goel, Mark Robson, Milo Polte, and Emin Sirer. 2003. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report. Cornell University."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_37"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381972"},{"key":"e_1_2_1_61_1","first-page":"3","article-title":"An excess-based economic model for resource allocation in peer-to-peer networks","author":"Grothoff Christian","year":"2003","unstructured":"Christian Grothoff . 2003 . An excess-based economic model for resource allocation in peer-to-peer networks . Wirtschaftsinformatik 3 - 2003 . Retrieved from http:\/\/grothoff.org\/christian\/ebe.pdf. Christian Grothoff. 2003. An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik 3-2003. Retrieved from http:\/\/grothoff.org\/christian\/ebe.pdf.","journal-title":"Wirtschaftsinformatik"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/525423.830456"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0141"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.876186"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/301308.301362"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.37"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 11th USENIX Security Symposium. 339--353","author":"Jakobsson Markus","unstructured":"Markus Jakobsson , Ari Juels , and Ronald L. Rivest . 2002. Making mix nets robust for electronic voting by randomized partial checking . In Proceedings of the 11th USENIX Security Symposium. 339--353 . Markus Jakobsson, Ari Juels, and Ronald L. Rivest. 2002. Making mix nets robust for electronic voting by randomized partial checking. In Proceedings of the 11th USENIX Security Symposium. 339--353."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668973"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIXSecurity\u201915)","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon , Mashael AlSabah , David Lazar , Marc Dacier , and Srinivas Devadas . 2015 . Circuit fingerprinting attacks: Passive deanonymization of Tor hidden services . In Proceedings of the 24th USENIX Security Symposium (USENIXSecurity\u201915) . USENIX Association, Washington, D.C., 287--302. Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit fingerprinting attacks: Passive deanonymization of Tor hidden services. In Proceedings of the 24th USENIX Security Symposium (USENIXSecurity\u201915). USENIX Association, Washington, D.C., 287--302."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich . 2016 . Alpenhorn: Bootstrapping secure communication without leaking metadata . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916) . USENIX Association, GA, 571--586. David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping secure communication without leaking metadata. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916). USENIX Association, GA, 571--586."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0003"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133578"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046732"},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC\u201911)","author":"Mittal Prateek","year":"2011","unstructured":"Prateek Mittal , Femi Olumofin , Carmela Troncoso , Nikita Borisov , and Ian Goldberg . 2011 b. PIR-Tor: Scalable anonymous communication using private information retrieval . In Proceedings of the 20th USENIX Conference on Security (SEC\u201911) . USENIX Association, Berkeley, CA, 31--31. Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg. 2011b. PIR-Tor: Scalable anonymous communication using private information retrieval. In Proceedings of the 20th USENIX Conference on Security (SEC\u201911). USENIX Association, Berkeley, CA, 31--31."},{"key":"e_1_2_1_81_1","unstructured":"Ulf M\u00f6ller Lance Cottrell Peter Palfrader and Len Sassaman. 2003. Mixmaster protocol - version 3. IETF Internet Draft. Ulf M\u00f6ller Lance Cottrell Peter Palfrader and Len Sassaman. 2003. Mixmaster protocol - version 3. IETF Internet Draft."},{"key":"e_1_2_1_82_1","volume-title":"OSPF: Anatomy of an Internet Routing Protocol","author":"Moy John","year":"1998","unstructured":"John Moy . 1998 . OSPF: Anatomy of an Internet Routing Protocol . Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA . John Moy. 1998. OSPF: Anatomy of an Internet Routing Protocol. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the 18th USENIX Security Symposium (USENIXSecurity\u201909)","author":"Grothoff Christian","year":"2009","unstructured":"Christian Grothoff , Nathan S. Evans , and Roger Dingledine . 2009 . A practical congestion attack on Tor using long paths . In Proceedings of the 18th USENIX Security Symposium (USENIXSecurity\u201909) . USENIX, Montreal, Canada. Christian Grothoff, Nathan S. Evans, and Roger Dingledine. 2009. A practical congestion attack on Tor using long paths. In Proceedings of the 18th USENIX Security Symposium (USENIXSecurity\u201909). USENIX, Montreal, Canada."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529732"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653681"},{"key":"e_1_2_1_90_1","volume-title":"Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. 90--100","author":"Charles","unstructured":"Charles E. Perkins and Elizabeth M. Royer. 1997. Ad hoc on-demand distance vector routing . In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. 90--100 . Charles E. Perkins and Elizabeth M. Royer. 1997. Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. 90--100."},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 1--9.","author":"Pfitzmann Andreas","year":"2000","unstructured":"Andreas Pfitzmann and Marit K\u00f6hntopp . 2000 . Anonymity, unobservability, and pseudonymity\u2014A proposal for terminology . In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 1--9. Andreas Pfitzmann and Marit K\u00f6hntopp. 2000. Anonymity, unobservability, and pseudonymity\u2014A proposal for terminology. In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 1--9."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/645662.664536"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.5555\/20110.20139"},{"key":"e_1_2_1_94_1","unstructured":"I2P Project. 2016a. I2P Peer Profiling and Selection. Retrieved from https:\/\/geti2p.net\/en\/docs\/how\/peer-selection. I2P Project. 2016a. I2P Peer Profiling and Selection. Retrieved from https:\/\/geti2p.net\/en\/docs\/how\/peer-selection."},{"key":"e_1_2_1_95_1","unstructured":"I2P Project. 2016b. I2P Statistics. Retrieved from http:\/\/stats.i2p.re\/. I2P Project. 2016b. I2P Statistics. Retrieved from http:\/\/stats.i2p.re\/."},{"key":"e_1_2_1_96_1","unstructured":"I2P Project. 2016c. I2P Transport Overview. Retrieved from https:\/\/geti2p.net\/en\/docs\/transport. I2P Project. 2016c. I2P Transport Overview. Retrieved from https:\/\/geti2p.net\/en\/docs\/transport."},{"key":"e_1_2_1_97_1","volume-title":"Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 10--29","author":"Raymond Jean-Fran\u00e7ois","year":"2000","unstructured":"Jean-Fran\u00e7ois Raymond . 2000 . Traffic analysis: Protocols, attacks, design issues, and open problems . In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 10--29 . Jean-Fran\u00e7ois Raymond. 2000. Traffic analysis: Protocols, attacks, design issues, and open problems. In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability: Designing Privacy Enhancing Technologies. 10--29."},{"key":"e_1_2_1_98_1","series-title":"Lecture Notes in Computer Science","volume-title":"Traffic analysis: Protocols, attacks, design issues, and open problems","author":"Raymond Jean-Fran\u00e7ois","unstructured":"Jean-Fran\u00e7ois Raymond . 2001. Traffic analysis: Protocols, attacks, design issues, and open problems . In Designing Privacy Enhancing Technologies, Hannes Federrath (Ed.). Lecture Notes in Computer Science , Vol. 2009 . Springer , Berlin , 10--29. Jean-Fran\u00e7ois Raymond. 2001. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies, Hannes Federrath (Ed.). Lecture Notes in Computer Science, Vol. 2009. Springer, Berlin, 10--29."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.009"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_24"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_14"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218394"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware\u201901)","author":"Antony I.","unstructured":"Antony I. T. Rowstron and Peter Druschel. 2001. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems . In Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware\u201901) . Springer-Verlag, London, 329--350. Antony I. T. Rowstron and Peter Druschel. 2001. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware\u201901). Springer-Verlag, London, 329--350."},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT\u201995","author":"Sako Kazue","year":"1995","unstructured":"Kazue Sako and Joe Kilian . 1995 . Receipt-free mix-type voting scheme\u2014A practical solution to the implementation of a voting booth . In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT\u201995 . 393--403. Kazue Sako and Joe Kilian. 1995. Receipt-free mix-type voting scheme\u2014A practical solution to the implementation of a voting booth. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT\u201995. 393--403."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.889687"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_15"},{"key":"e_1_2_1_111_1","volume-title":"Proceedings of the Privacy Enhancing Techniques Convention (PET-CON\u201909)","author":"Schimmer Lars","year":"2009","unstructured":"Lars Schimmer . 2009 . Peer profiling and selection in the I2P anonymous network . In Proceedings of the Privacy Enhancing Techniques Convention (PET-CON\u201909) . 59--70. Lars Schimmer. 2009. Peer profiling and selection in the I2P anonymous network. In Proceedings of the Privacy Enhancing Techniques Convention (PET-CON\u201909). 59--70."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.5555\/647598.731898"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2005-13602"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808152"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2007.65"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.40"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371981"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866345"},{"key":"e_1_2_1_122_1","unstructured":"The Tor\n Project\n . 2017. \n Tor\n Metrics\n .\n (\n 2017\n ). Retrieved from https:\/\/metrics.torproject.org\/. The Tor Project. 2017. Tor Metrics. (2017). Retrieved from https:\/\/metrics.torproject.org\/."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28534-9_5"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.5555\/111563.111594"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.5555\/111563.111630"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502002"},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the 9th USENIX Security Symposium.","author":"Waldman Marc","year":"2000","unstructured":"Marc Waldman , Aviel D. Rubin , and Lorrie Faith Cranor . 2000 . Publius: A robust, tamper-evident, censorship-resistant, and source-anonymous web publishing system . In Proceedings of the 9th USENIX Security Symposium. Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. 2000. Publius: A robust, tamper-evident, censorship-resistant, and source-anonymous web publishing system. In Proceedings of the 9th USENIX Security Symposium."},{"key":"e_1_2_1_129_1","volume-title":"Myrmic: Provably Secure and Efficient DHT Routing. Technical Report. DTC.","author":"Wang Peng","year":"2006","unstructured":"Peng Wang , Ivan Osipkov , Nicholas Hopper , and Yongdae Kim . 2006 . Myrmic: Provably Secure and Efficient DHT Routing. Technical Report. DTC. Peng Wang, Ivan Osipkov, Nicholas Hopper, and Yongdae Kim. 2006. Myrmic: Provably Secure and Efficient DHT Routing. Technical Report. DTC."},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.78"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_9"},{"key":"e_1_2_1_132_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912)","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . 2012 a. Dissent in numbers: Making strong anonymity scale . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912) . USENIX Association, 179--192. David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012a. Dissent in numbers: Making strong anonymity scale. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912). USENIX Association, 179--192."},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the European Workshop on System Security (EuroSec\u201912)","volume":"4","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . 2012 b. Scalable anonymous group communication in the anytrust model . In Proceedings of the European Workshop on System Security (EuroSec\u201912) , Vol. 4 . David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012b. Scalable anonymous group communication in the anytrust model. In Proceedings of the European Workshop on System Security (EuroSec\u201912), Vol. 4."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830556"},{"key":"e_1_2_1_135_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902)","author":"Wright Matthew","year":"2002","unstructured":"Matthew Wright , Micah Adler , Brian Neil Levine , and Clay Shields . 2002 . An analysis of the degradation of anonymous protocols . In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902) . The Internet Society. Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields. 2002. An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902). The Internet Society."},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.146"},{"key":"e_1_2_1_138_1","volume-title":"Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics (SCI\u201902)","author":"Zou Xukai","year":"2002","unstructured":"Xukai Zou , Byrav Ramamurthy , and Spyros Magliveras . 2002 . Routing techniques in wireless ad hoc networks\u2014Classification and comparison . In Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics (SCI\u201902) Xukai Zou, Byrav Ramamurthy, and Spyros Magliveras. 2002. Routing techniques in wireless ad hoc networks\u2014Classification and comparison. In Proceedings of the 6th World Multiconference on Systemics, Cybernetics, and Informatics (SCI\u201902)"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3182658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T19:16:28Z","timestamp":1672514188000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3182658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,12]]},"references-count":133,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3182658"],"URL":"https:\/\/doi.org\/10.1145\/3182658","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,12]]},"assertion":[{"value":"2017-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}