{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:18Z","timestamp":1750392498154,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957666","type":"print"},{"value":"9783031957673","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95767-3_7","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:24Z","timestamp":1750335924000},"page":"159-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PARSAN-Mix: Packet-Aware Routing and\u00a0Shuffling with\u00a0Additional Noise for\u00a0Latency Optimization in\u00a0Mix Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0223-9082","authenticated-orcid":false,"given":"Mahdi","family":"Rahimi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Akhoondi, M., Yu, C., Madhyastha, H.V.: Lastor: a low-latency as-aware tor client. In: 2012 IEEE Symposium on Security and Privacy, pp. 476\u2013490. IEEE (2012)","DOI":"10.1109\/SP.2012.35"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11\u201320 (2007)","DOI":"10.1145\/1314333.1314336"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-319-61204-1_28","volume-title":"Applied Cryptography and Network Security","author":"D Chaum","year":"2017","unstructured":"Chaum, D., et al.: cMix: mixing with minimal real-time asymmetric cryptographic operations. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 557\u2013578. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_28"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-40956-4_1","volume-title":"Privacy Enhancing Technologies","author":"G Danezis","year":"2003","unstructured":"Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1\u201317. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_1"},{"key":"7_CR6","unstructured":"Diaz, C.: Anonymity and privacy in electronic services. Heverlee: Katholieke Universiteit Leuven. Faculteit Ingenieurswetenschappen (2005)"},{"key":"7_CR7","unstructured":"Diaz, C., Halpin, H., Kiayias, A.: The nym network (2021)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-14527-8_11","volume-title":"Privacy Enhancing Technologies","author":"C Diaz","year":"2010","unstructured":"Diaz, C., Murdoch, S.J., Troncoso, C.: Impact of network topology on anonymity and overhead in low-latency anonymity networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 184\u2013201. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14527-8_11"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Diaz, C., Preneel, B.: Taxonomy of mixes and dummy traffic. In: Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops, 22\u201327 August 2004, Toulouse, France, pp. 217\u2013232. Springer (2004)","DOI":"10.1007\/1-4020-8145-6_18"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: International Workshop on Privacy Enhancing Technologies, pp. 54\u201368. Springer (2002)","DOI":"10.1007\/3-540-36467-6_5"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco, CA, USA, 14\u201315 April 2002, Revised Papers, pp. 54\u201368. Springer (2003)","DOI":"10.1007\/3-540-36467-6_5"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.F., et\u00a0al.: Tor: the second-generation onion router. In: USENIX Security Symposium, vol.\u00a04, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"7_CR13","unstructured":"Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: USENIX Security Symposium, pp. 33\u201350 (2009)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 337\u2013348 (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go-mixes providing probabilistic anonymity in an open system. In: International Workshop on Information Hiding, pp. 83\u201398. Springer (1998)","DOI":"10.1007\/3-540-49380-8_7"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go MIXes: providing probabilistic anonymity in an open system. In: Proceedings of Information Hiding Workshop (IH 1998). LNCS, vol. 1525. Springer (1998)","DOI":"10.1007\/3-540-49380-8_7"},{"key":"7_CR17","unstructured":"Kohls, K., Diaz, C.: $$\\{$$VerLoc$$\\}$$: verifiable localization in decentralized systems. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 2637\u20132654 (2022)"},{"key":"7_CR18","unstructured":"Kwon, A., Lu, D., Devadas, S.: $$\\{$$XRD$$\\}$$: scalable messaging system with cryptographic privacy. In: 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2020), pp. 759\u2013776 (2020)"},{"key":"7_CR19","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol-version 2 (2003)"},{"key":"7_CR20","unstructured":"Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G.: The loopix anonymity system. In: 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 2017), pp. 1199\u20131216 (2017)"},{"key":"7_CR21","unstructured":"Python: Event discrete, process based simulation for python (2013). https:\/\/pypi.org\/project\/simpy\/"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Rahimi, M.: CLAM: client-aware routing in mix networks. In: P\u00e9rez-Gonz\u00e1lez, F., Alfaro, P.C., Kr\u00e4tzer, C., Zhao, H.V. (eds.) Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2024, Baiona, Spain, 24\u201326 June 2024, pp. 199\u2013209. ACM (2024). https:\/\/doi.org\/10.1145\/3658664.3659631","DOI":"10.1145\/3658664.3659631"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Rahimi, M.: Larmix++: latency-aware routing in mix networks with free routes topology. In: International Conference on Cryptology and Network Security, pp. 187\u2013211. Springer (2024)","DOI":"10.1007\/978-981-97-8013-6_9"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Rahimi, M.: Malaria: management of low-latency routing impact on mix network anonymity. In: 2024 IEEE 22nd International Symposium on Network Computing and Applications (NCA), vol.\u00a022. IEEE (2024)","DOI":"10.1109\/NCA61908.2024.00038"},{"key":"7_CR25","unstructured":"Rahimi, M.: Parsan-mix: packet-aware routing and shuffling with additional noise for latency optimization in mix networks (extended version). Cryptology ePrint Archive (2025)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Rahimi, M., Sharma, P.K., Diaz, C.: Larmix: latency-aware routing in mix networks. In: The Network and Distributed System Security Symposium. Internet Society (2024)","DOI":"10.14722\/ndss.2024.23221"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Rochet, F., Wails, R., Johnson, A., Mittal, P., Pereira, O.: Claps: client-location-aware path selection in tor. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201334 (2020)","DOI":"10.1145\/3372297.3417279"},{"issue":"4","key":"7_CR28","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"3","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182658","volume":"51","author":"F Shirazi","year":"2018","unstructured":"Shirazi, F., Simeonovski, M., Asghar, M.R., Backes, M., Diaz, C.: A survey on routing in anonymous communication protocols. ACM Comput. Surv. (CSUR) 51(3), 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"7_CR30","first-page":"2","volume":"18","author":"RN Staff","year":"2015","unstructured":"Staff, R.N.: Ripe atlas: a global internet measurement network. Internet Protocol J. 18(3), 2\u201326 (2015)","journal-title":"Internet Protocol J."},{"key":"7_CR31","unstructured":"Sun, Y., et al.: $$\\{$$RAPTOR$$\\}$$: routing attacks on privacy in tor. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 271\u2013286 (2015)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Van Den\u00a0Hooff, J., Lazar, D., Zaharia, M., Zeldovich, N.: Vuvuzela: scalable private messaging resistant to traffic analysis. In: Proceedings of the 25th Symposium on Operating Systems Principles, pp. 137\u2013152 (2015)","DOI":"10.1145\/2815400.2815417"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Wan, G., Johnson, A., Wails, R., Wagh, S., Mittal, P.: Guard placement attacks on path selection algorithms for tor. Proc. Priv. Enhancing Technol. 2019(4) (2019)","DOI":"10.2478\/popets-2019-0069"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95767-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T13:02:17Z","timestamp":1750338137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95767-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957666","9783031957673"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95767-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}