{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:38Z","timestamp":1725552098480},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123337"},{"type":"electronic","value":"9783642123344"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12334-4_14","type":"book-chapter","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T15:05:39Z","timestamp":1271084739000},"page":"131-140","source":"Crossref","is-referenced-by-count":3,"title":["MOR: Monitoring and Measurements through the Onion Router"],"prefix":"10.1007","author":[{"given":"Demetris","family":"Antoniades","sequence":"first","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]},{"given":"Constantine","family":"Dovrolis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A. Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 84\u2013102. Springer, Heidelberg (2003)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Antoniades, D., et al.: One-Click Hosting Services: A File-Sharing Hideout. In: Proceedings of the ACM\/SIGCOMM conference on Internet Measurements (November 2009)","DOI":"10.1145\/1644893.1644920"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Athanasopoulos, E., Anagnostakis, K., Markatos, E.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Proceedings of the 4th International Conference on Applied Cryptography and Network Security (June 2006)","DOI":"10.1007\/11767480_9"},{"key":"14_CR4","unstructured":"Athanasopoulos, E., et al.: GAS: Overloading a File Sharing Network as an Anonymizing System. In: Proceedings of the 2nd International Workshop on Security (2007)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Barth, A., Jackson, C., Mitchell, J.: Robust Defenses for Cross-Site Request Forgery. In: Proceedings of the 15th ACM conference on Computer and Communications security (2008)","DOI":"10.1145\/1455770.1455782"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Baset, S., Schulzrinne, H.: An Analysis of the Skype Peer-To-Peer Internet Telephony Protocol. In: IEEE International Conference on Computer Communications (2006)","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Beverly, R., et al.: The Internet\u2019s Not a Big Truck: Toward Quantifying Network Neutrality. In: Proceedings of the 8th Passive and Active Measurement Workshop (April 2007)","DOI":"10.1007\/978-3-540-71617-4_14"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In: Proceedings of the 14th ACM Conference on Computer and Communication Security (October 2007)","DOI":"10.1145\/1315245.1315258"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2) (1981)","DOI":"10.1145\/358549.358563"},{"issue":"3","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/956993.956995","volume":"33","author":"B. Chun","year":"2003","unstructured":"Chun, B., et al.: Planetlab: an overlay testbed for broad-coverage services. SIGCOMM Comput. Commun. Rev.\u00a033(3), 3\u201312 (2003)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"14_CR11","unstructured":"Dingledine, R., Mathewson, N.: Anonymity Loves Company: Usability and the Network Effect. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006) (June 2006)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the Second-Generation Onion Router. In: Proceedings of the 13th conference on USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"14_CR13","unstructured":"Evans, N., Dingledine, R., Grothoff, C.: A Practical Congestion Attack on Tor Using Long Paths. In: Proceedings of the 18th USENIX Security Symposium (August 2009)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Proceedings of Information Hiding: First International Workshop (May 1996)","DOI":"10.1007\/3-540-61996-8_37"},{"key":"14_CR15","unstructured":"K. Loesing. Measuring The Tor Network: Evaluation of Client Requests to the Directories (2009), \n                  \n                    http:\/\/git.torproject.org\/checkout\/metrics\/master\/report\/dirreq\/directory-requests-2009-06-26.pdf"},{"key":"14_CR16","unstructured":"McCoy, D., et al.: Shining Light in Dark Places: Understanding the Tor Network. In: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (July 2008)"},{"key":"14_CR17","unstructured":"Murdoch, S.J., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (May 2005)"},{"key":"14_CR18","unstructured":"Pappas, V., et al.: Compromising Anonymity Using Packet Spinning. In: Proceedings of the 11th Information Security Conference (September 2008)"},{"key":"14_CR19","unstructured":"Reis, C., et al.: Detecting In-flight Page Changes with Web Tripwires. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (2008)"},{"key":"14_CR20","unstructured":"Snader, R., et al.: A Tune-up for Tor: Improving Security and Performance in the Tor Network. In: Proceedings of the Network and Distributed Security Symposium (February 2008)"},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1113361.1113368","volume":"40","author":"N. Spring","year":"2006","unstructured":"Spring, N., Peterson, L., Bavier, A., Pai, V.: Using PlanetLab for Network Research: Myths, Realities, and Best Practices. SIGOPS Oper. Syst. Rev.\u00a040(1), 17\u201324 (2006)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"14_CR22","unstructured":"The Tor Project. TorCtl., \n                  \n                    https:\/\/svn.torproject.org\/cgi-bin\/viewvc.cgi\/torctl\/"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12334-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:57:50Z","timestamp":1558292270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12334-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123337","9783642123344"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12334-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}