{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:22:50Z","timestamp":1774524170261,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642390760","type":"print"},{"value":"9783642390777","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39077-7_9","type":"book-chapter","created":{"date-parts":[[2013,6,4]],"date-time":"2013-06-04T01:39:59Z","timestamp":1370309999000},"page":"164-184","source":"Crossref","is-referenced-by-count":18,"title":["How Low Can You Go: Balancing Performance with Anonymity in Tor"],"prefix":"10.1007","author":[{"given":"John","family":"Geddes","sequence":"first","affiliation":[]},{"given":"Rob","family":"Jansen","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"AlSabah, M., Bauer, K., Goldberg, I.: Enhancing Tor\u2019s performance using real-time traffic classification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012)","DOI":"10.1145\/2382196.2382208"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-22263-4_8","volume-title":"Privacy Enhancing Technologies","author":"M. AlSabah","year":"2011","unstructured":"AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G.M.: DefenestraTor: Throwing out windows in Tor. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 134\u2013154. Springer, Heidelberg (2011)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Chaabane, A., Manils, P., Kaafar, M.A.: Digging into anonymous traffic: A deep analysis of the tor anonymizing network. In: 2010 4th International Conference on Network and System Security (NSS) (2010)","DOI":"10.1109\/NSS.2010.47"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-15497-3_16","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S. Chakravarty","year":"2010","unstructured":"Chakravarty, S., Stavrou, A., Keromytis, A.D.: Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 249\u2013267. Springer, Heidelberg (2010)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: PlanetLab: an overlay testbed for broad-coverage services. SIGCOMM Computer Communication Review 33 (2003)","DOI":"10.1145\/956993.956995"},{"key":"9_CR6","unstructured":"Cohen, B.: Incentives build robustness in BitTorrent. In: Workshop on Economics of Peer-to-Peer Systems, vol.\u00a06 (2003)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: Proc. of IEEE Security and Privacy (2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"9_CR9","unstructured":"Dingledine, R.: Adaptive throttling of Tor clients by entry guards. Technical Report 2010-09-001, The Tor Project (September 2010)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th Usenix Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"9_CR12","unstructured":"Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (2009)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Gopal, D., Heninger, N.: Torchestra: Reducing interactive traffic delays over Tor. In: Proc. of the Workshop on Privacy in the Electronic Society (2012)","DOI":"10.1145\/2381966.2381972"},{"key":"9_CR14","unstructured":"Gulcu, C., Tsudik, G.: Mixing E-mail with Babel. In: Proceedings of the Symposium on Network and Distributed System Security (1996)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hahne, E.: Round-robin scheduling for max-min fairness in data networks. IEEE Journal on Selected Areas in Communications 9(7) (1991)","DOI":"10.1109\/49.103550"},{"key":"9_CR16","unstructured":"Hastie, T.J., Tibshirani, R.J.: Generalized additive models, vol.\u00a043 (1990)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM (2007)","DOI":"10.1145\/1315245.1315257"},{"key":"9_CR18","unstructured":"Houmansadr, A., Borisov, N.: SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: Proc. of the Network and Distributed Security Symp. (2011)"},{"key":"9_CR19","unstructured":"Jansen, R.: The Shadow Simulator, http:\/\/shadow.cs.umn.edu\/"},{"key":"9_CR20","unstructured":"Jansen, R., Bauer, K., Hopper, N., Dingledine, R.: Methodically Modeling the Tor Network. In: Proceedings of the 5th Workshop on Cyber Security Experimentation and Test (August 2012)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N.: Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In: Proceedings of the 19th Network and Distributed System Security Symposium (2012)","DOI":"10.21236\/ADA559181"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Jansen, R., Syverson, P., Hopper, N.: Throttling Tor Bandwidth Parasites. In: Proceedings of the 21st USENIX Security Symposium (2012)","DOI":"10.21236\/ADA559183"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-70630-4_5","volume-title":"Privacy Enhancing Technologies","author":"D. McCoy","year":"2008","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the Tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 63\u201376. Springer, Heidelberg (2008)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Mittal, P., Khurshid, A., Juen, J., Caesar, M., Borisov, N.: Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM (2011)","DOI":"10.1145\/2046707.2046732"},{"key":"9_CR25","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol version 2. Draft (July 2003)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Moore, W.B., Wacek, C., Sherr, M.: Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise. In: Proceedings of 2011 Annual Computer Security Applications Conference (2011)","DOI":"10.1145\/2076732.2076762"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: 2005 IEEE Symposium on Security and Privacy. IEEE (2005)","DOI":"10.1109\/SP.2005.12"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.24"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM (2010)","DOI":"10.1145\/1866307.1866345"},{"key":"9_CR31","unstructured":"The Tor Project: The Tor Metrics Portal, https:\/\/metrics.torproject.org\/"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)","DOI":"10.1109\/SECPRI.2003.1199325"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39077-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T13:50:49Z","timestamp":1563112249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39077-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390760","9783642390777"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39077-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}