{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:17:35Z","timestamp":1743221855126,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642306327"},{"type":"electronic","value":"9783642306334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30633-4_12","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:25:28Z","timestamp":1338348328000},"page":"98-108","source":"Crossref","is-referenced-by-count":0,"title":["Instant Degradation of Anonymity in Low-Latency Anonymisation Systems"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Ries","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"JAP Anonymity and Privacy, http:\/\/anon.tu-dresden.de"},{"key":"12_CR2","unstructured":"JonDonym, http:\/\/anonymous-proxy-servers.net\/"},{"key":"12_CR3","unstructured":"Proxy Server Usage, http:\/\/www.statowl.com\/network_behind_proxy_server.php?1=1&timeframe=last_12&interval=month&chart_id=6&fltr_br=&fltr_os=&fltr_se=&fltr_cn=&chart_id=4"},{"key":"12_CR4","first-page":"37","volume":"6","author":"D.W. Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn.\u00a06, 37\u201366 (1991)","journal-title":"Mach. Learn."},{"key":"12_CR5","unstructured":"Appelbaum, J., Dingledine, R.: How governments have tried to block tor. In: 28th Chaos Communication Congress (28C3) (December 2011), http:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/events\/4800.en.html"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","volume-title":"Information Hiding","author":"A. Back","year":"2001","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 245\u2013257. Springer, Heidelberg (2001)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)","DOI":"10.1145\/1314333.1314336"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-15497-3_16","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S. Chakravarty","year":"2010","unstructured":"Chakravarty, S., Stavrou, A., Keromytis, A.D.: Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 249\u2013267. Springer, Heidelberg (2010)"},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TNSM.2011.110911.100079","volume":"8","author":"Y. Chen","year":"2011","unstructured":"Chen, Y., Wang, X., Shi, C., Lua, E.K., Fu, X., Deng, B., Li, X.: Phoenix: A weight-based network coordinate system using matrix factorization. IEEE Transactions on Network and Service Management\u00a08(4), 334\u2013347 (2011)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T.M. Cover","year":"1967","unstructured":"Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Transactions on Information Theory\u00a013, 21\u201327 (1967)","journal-title":"IEEE Transactions on Information Theory"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Dabek, F., Cox, R., Kaashoek, F., Morris, R.: Vivaldi: A decentralized network coordinate system. In: SIGCOMM, pp. 15\u201326 (2004)","DOI":"10.1145\/1030194.1015471"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"12_CR13","first-page":"21","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol.\u00a013, p. 21. USENIX Association, Berkeley (2004)"},{"key":"12_CR14","unstructured":"PlanetLab Europe. PlanetLab Europe Website, http:\/\/www.planet-lab.eu"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1698750.1698753","volume":"13","author":"N. Hopper","year":"2010","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur.\u00a013, 13:1\u201313:28 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-27809-2_25","volume-title":"Financial Cryptography","author":"B.N. Levine","year":"2004","unstructured":"Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix Systems. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183\u2013195. IEEE CS (2005)","DOI":"10.1109\/SP.2005.12"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-75551-7_11","volume-title":"Privacy Enhancing Technologies","author":"S.J. Murdoch","year":"2007","unstructured":"Murdoch, S.J., Zieli\u0144ski, P.: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 167\u2013183. Springer, Heidelberg (2007)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Eugene Ng, T.S., Zhang, H.: Towards global network positioning. In: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement, pp. 25\u201329 (2001)","DOI":"10.1145\/505202.505206"},{"issue":"4","key":"12_CR20","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"12_CR21","unstructured":"Ries, T., Panchenko, A., State, R., Engel, T.: Comparison of low-latency anonymous communication systems - practical usage and performance. In: Proceedings of the Australasian International Security Conference, AISC 2011 (2011)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-31966-5_19","volume-title":"Passive and Active Network Measurement","author":"H. Zheng","year":"2005","unstructured":"Zheng, H., Lua, E.K., Pias, M., Griffin, T.G.: Internet Routing Policies and Round-Trip-Times. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 236\u2013250. Springer, Heidelberg (2005)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11423409_13","volume-title":"Privacy Enhancing Technologies","author":"Y. Zhu","year":"2005","unstructured":"Zhu, Y., Fu, X., Graham, B., Bettati, R., Zhao, W.: On Flow Correlation Attacks and Countermeasures in Mix Networks. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 207\u2013225. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Dependable Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30633-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T01:27:38Z","timestamp":1743211658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30633-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642306327","9783642306334"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30633-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}