{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:05:38Z","timestamp":1769731538188,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319664019","type":"print"},{"value":"9783319664026","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66402-6_3","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T13:44:11Z","timestamp":1502459051000},"page":"18-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Once and Future Onion"],"prefix":"10.1007","author":[{"given":"Paul","family":"Syverson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"3_CR1","unstructured":"Anderson, R.: The eternity service. In: 1st International Conference on the Theory and Applications of Cryptology (Pragocrypt 1996), pp. 242\u2013252. Czech Technical University Publishing House, Prague, Czech Republic, September\/October 1996"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Appelbaum, J., Muffett, A.: The .onion special-use domain name (2015). https:\/\/tools.ietf.org\/html\/rfc7686","DOI":"10.17487\/RFC7686"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Weinmann, R.P.: Trawling for Tor hidden services: detection, measurement, deanonymization. In: IEEE Symposium on Security and Privacy (SP) (2013)","DOI":"10.1109\/SP.2013.15"},{"key":"3_CR4","unstructured":"Brown, T.W., Brooks, J., Johnson, A., Jansen, R., Kadianakis, G., Syverson, P., Dingledine, R.: Rendezvous single onion services, Tor proposal 252 (2015). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/260-rend-single-onion.txt"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004","DOI":"10.21236\/ADA465464"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D.: TAZ servers and the Rewebber network: enabling anonymous publishing on the World Wide Web. First Monday 3(4) (1998)","DOI":"10.5210\/fm.v3i4.586"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"DM Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137\u2013150. Springer, Heidelberg (1996). doi:10.1007\/3-540-61996-8_37"},{"key":"3_CR8","unstructured":"Goulet, D., Johnson, A., Kadianakis, G., Loesing, K.: Hidden-service statistics reported by relays. Tor Technical report 2015\u201304-001, The Tor Project, April 2015"},{"key":"3_CR9","unstructured":"Goulet, D., Kadianakis, G.: Random number generation during Tor voting, (Tor proposal 250) (2015). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/250-commit-reveal-consensus.txt"},{"key":"3_CR10","unstructured":"Jansen, R.: Onionperf. https:\/\/github.com\/robgjansen\/onionperf"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Jansen, R., Johnson, A.: Safely measuring Tor. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016) (2016)","DOI":"10.1145\/2976749.2978310"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jansen, R., Tschorsch, F., Johnson, A., Scheuermann, B.: The sniper attack: anonymously deanonymizing and disabling the Tor network. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2014. IEEE, February 2014","DOI":"10.14722\/ndss.2014.23288"},{"key":"3_CR13","unstructured":"Kadianakis, G., Perry, M.: Defending against guard discovery attacks using vanguards, (Tor proposal 247) (2015). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/247-hs-guard-discovery.txt"},{"key":"3_CR14","unstructured":"Mathewson, N.: Next-generation hidden services in Tor (Tor proposal 224). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/224-rend-spec-ng.txt"},{"key":"3_CR15","unstructured":"Muffett, A.: How to get a company or organisation to implement an onion site, i.e. a Tor hidden service, October 2015. https:\/\/www.facebook.com\/notes\/alec-muffett\/how-to-get-a-company-or-organisation-to-implement-an-onion-site-ie-a-tor-hidden-\/10153762090530962"},{"key":"3_CR16","unstructured":"Muffett, A.: 1 million people use Facebook over Tor, April 2016. https:\/\/www.facebook.com\/notes\/facebook-over-tor\/1-million-people-use-facebook-over-tor\/865624066877648"},{"key":"3_CR17","unstructured":"Onion service traffic metrics site. https:\/\/metrics.torproject.org\/hidserv-rend-relayed-cells.html"},{"key":"3_CR18","unstructured":"Onionshare. https:\/\/onionshare.org\/"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: 2006 IEEE Symposium on Security and Privacy (S & P 2006), Proceedings, pp. 100\u2013114. IEEE CS, May 2006","DOI":"10.1109\/SP.2006.24"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/11957454_13","volume-title":"Privacy Enhancing Technologies","author":"L \u00d8verlier","year":"2006","unstructured":"\u00d8verlier, L., Syverson, P.: Valet services: improving hidden servers with a personal touch. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 223\u2013244. Springer, Heidelberg (2006). doi:10.1007\/11957454_13"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Proxies for anonymous routing. In: Twelfth Annual Computer Security Applications Conference, pp. 95\u2013104. IEEE CS Press (1996)","DOI":"10.1109\/CSAC.1996.569678"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0028156","volume-title":"Security Protocols","author":"MG Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Protocols using anonymous connections: mobile applications. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 13\u201323. Springer, Heidelberg (1998). doi:10.1007\/BFb0028156"},{"key":"3_CR23","unstructured":"Ricochet. https:\/\/ricochet.im\/"},{"key":"3_CR24","unstructured":"Shackleton, W.: Improved sharing of .onion links on Facebook (2017). https:\/\/www.facebook.com\/notes\/facebook-over-tor\/improved-sharing-of-onion-links-on-facebook\/1196217037151681\/"},{"key":"3_CR25","unstructured":"Tor: Hidden Services Protocol. https:\/\/www.torproject.org\/docs\/hidden-services.html.en"},{"key":"3_CR26","unstructured":"Tor network size. https:\/\/metrics.torproject.org\/networksize.html"},{"key":"3_CR27","unstructured":"Tor Rendezvous Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec.txt"},{"key":"3_CR28","unstructured":"The Tor Project. https:\/\/www.torproject.org\/"},{"issue":"1","key":"3_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1515\/popets-2017-0003","volume":"2017","author":"J Victors","year":"2017","unstructured":"Victors, J., Li, M., Fu, X.: The onion name system: Tor-powered decentralized DNS for Tor onion services. Proc. Priv. Enhancing Technol. 2017(1), 21\u201341 (2017)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"3_CR30","unstructured":"Waldmen, M., Rubin, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant web publishing system. In: Proceedings of the 9th USENIX Security Symposium, August 2000"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66402-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T21:59:45Z","timestamp":1750802385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66402-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319664019","9783319664026"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66402-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}