{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:42:31Z","timestamp":1760305351131,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032080660"},{"type":"electronic","value":"9783032080677"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_11","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:37Z","timestamp":1760301457000},"page":"209-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Empirical Mixnet Design"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7441-0841","authenticated-orcid":false,"given":"Yongzhao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7559-8383","authenticated-orcid":false,"given":"Tariq","family":"Elahi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2667-5906","authenticated-orcid":false,"given":"Vasilios","family":"Mavroudis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5898-6123","authenticated-orcid":false,"given":"Edward","family":"Plumb","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1262-7831","authenticated-orcid":false,"given":"Rahul","family":"Savani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2265-844X","authenticated-orcid":false,"given":"Theodore","family":"Turocy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"11_CR1","unstructured":"Viqueira, E.A., Greenwald, A., Cousins, C., Upfal, E.: Learning simulation-based games from data. In: AAMAS (2019)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ben Guirat, I., Gosain, D., Diaz, C.: Mixim: mixnet design decisions and empirical evaluation. In: Workshop on Privacy in the Electronic Society (2021)","DOI":"10.1145\/3463676.3485613"},{"key":"11_CR3","unstructured":"Benedicic, L., Busch, M.B., B\u00fcrgel, S., Kiel, R. and McDowell, R.: HOPR as the transport layer of privacy-aware, GDPR-compliant IoT health systems (2022)"},{"key":"11_CR4","unstructured":"Bighashdel, A., Wang, Y., McAleer, S., Savani, R.M., Oliehoek, F.A.: A survey. In: IJCAI, Policy Space Response Oracles (2024)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Brinkman, E., Wellman, M.P.: Empirical mechanism design for optimizing clearing interval in frequent call markets. In: EC (2017)","DOI":"10.1145\/3033274.3085153"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. In: Communications of the ACM (1981)","DOI":"10.1145\/358549.358563"},{"key":"11_CR7","unstructured":"Corrigan-Gibbs, H., Wolinsky, D.I., Ford, B.: Proactively accountable anonymous messaging in verdict. In: USENIX Security (2013)"},{"key":"11_CR8","unstructured":"Diaz, C., Halpin, H., Kiayias, A.: The next generation of privacy infrastructure. The nym network (2021)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Elahi, T., Doucette, J.A., Hosseini, H., Murdoch, S.J., Goldberg, I.: A framework for the game-theoretic analysis of censorship resistance, privacy enhancing technologies (2016)","DOI":"10.1515\/popets-2016-0030"},{"key":"11_CR10","unstructured":"Gatchel, M., Wiedenbeck, B.: Learning parameterized families of games. In: AAMAS (2023)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Guirat, I.B., Diaz, C.: Mixnet optimization methods. In: Privacy Enhancing Technologies (2022)","DOI":"10.56553\/popets-2022-0081"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Halpin, H., Serjantov, A.: Incentives and censorship resistance for mixnets revisited. In: Cambridge International Workshop on Security Protocols, pp. 64\u201369. Springer (2023)","DOI":"10.1007\/978-3-031-43033-6_7"},{"key":"11_CR13","unstructured":"HOPR. The Book of HOPR. https:\/\/hoprnet.org\/Book_Of_Hopr_2021.01_v1.pdf (2021)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Jordan, P.R., Wellman, M.P., Balakrishnan, G.: Strategy and mechanism lessons from the first ad auctions trading agent competition. In: EC (2010)","DOI":"10.1145\/1807342.1807389"},{"key":"11_CR15","unstructured":"Lanctot, M., et al.: A unified game-theoretic approach to multiagent reinforcement learning. In: Neurips (2017)"},{"key":"11_CR16","unstructured":"Lazar, D., Zeldovich, N.: Alpenhorn: bootstrapping secure communication without leaking metadata. In: OSDI (2016)"},{"key":"11_CR17","unstructured":"Li, Z., et al.: Combining tree-search, generative models, and nash bargaining concepts in game-theoretic reinforcement learning. arXiv arXiv:2302.00797 (2023)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Ma, X., Rochet, F., Elahi, T.: Defending against malicious mixes with topological engineering. In: ACSAC, Stopping Silent Sneaks (2022)","DOI":"10.1145\/3564625.3567996"},{"key":"11_CR19","unstructured":"Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G.: The loopix anonymity system. In: USENIX Security Symposium (2017)"},{"key":"11_CR20","unstructured":"Raffin, A., Hill, A., Ernestus, M., Gleave, A., Kanervisto, A., Dormann, N.: Stable baselines3. https:\/\/github.com\/DLR-RM\/stable-baselines3 (2019)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Rahimi, M., Sharma, P.K., Diaz, C.: Larmix: latency-aware routing in mix networks. In: The Network and Distributed System Security Symposium. Internet Society (2024)","DOI":"10.14722\/ndss.2024.23221"},{"key":"11_CR22","unstructured":"Savani, R., Turocy, T.L.: Gambit: the package for computation in game theory (2024)"},{"key":"11_CR23","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Soleimani, M.H.M., Mansoorizadeh, M., Nassiri, M.: Real-time identification of three tor pluggable transports using machine learning techniques. J. Supercomput. (2018)","DOI":"10.1007\/s11227-018-2268-y"},{"key":"11_CR25","unstructured":"Vinyals, O., et al.: StarCraft II: a new challenge for reinforcement learning. Technical Report 1708.04782v1, arXiv (2017)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Vorobeychik, Y., Kiekintveld, C., Wellman, M.P.: Empirical mechanism design: methods, with application to a supply-chain scenario. In: Proceedings of the 7th ACM Conference on Electronic Commerce, pp. 306\u2013315 (2006)","DOI":"10.1145\/1134707.1134741"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10458-011-9177-2","volume":"25","author":"Y Vorobeychik","year":"2012","unstructured":"Vorobeychik, Y., Reeves, D.M., Wellman, M.P.: Constrained automated mechanism design for infinite games of incomplete information. Auton. Agent. Multi-Agent Syst. 25, 313\u2013351 (2012)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"11_CR28","unstructured":"Wang, Y., Wellman, M.P.: Regularization for strategy exploration in empirical game-theoretic analysis. arXiv preprint arXiv:2302.04928 (2023)"},{"key":"11_CR29","unstructured":"Wellman, M.P.: Methods for empirical game-theoretic analysis (extended abstract). In: AAAI (2006)"},{"key":"11_CR30","unstructured":"Wolinsky, D.I., Corrigan-Gibbs, H., Ford, B., Johnson, A.: Dissent in numbers: making strong anonymity scale. In: 10th USENIX Symposium on Operating Systems Design and Implementation (2012)"},{"key":"11_CR31","unstructured":"Wolinsky, D.I., Corrigan-Gibbs, H., Ford, B., Johnson, A.: Scalable anonymous group communication in the anytrust model. In: EuroSec (2012)"},{"key":"11_CR32","unstructured":"xx\u00a0Network. White Paper xx cMix. https:\/\/xx.network\/wp-content\/uploads\/2021\/10\/xxcMixwhitepaper.pdf (2021)"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:52Z","timestamp":1760302972000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}