{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T08:12:44Z","timestamp":1772007164789,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00043","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"394-410","source":"Crossref","is-referenced-by-count":0,"title":["DP-Mix: Differentially Private Routing in Mix Networks"],"prefix":"10.1109","author":[{"given":"Mahdi","family":"Rahimi","sequence":"first","affiliation":[{"name":"KU Leuven,COSIC,Leuven,Belgium"}]}],"member":"263","reference":[{"key":"ref1","first-page":"759","article-title":"XRD: Scalable messaging system with cryptographic privacy","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Kwon"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref3","first-page":"1199","article-title":"The loopix anonymity system","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Piotrowska","year":"2017"},{"key":"ref4","author":"Diaz","year":"2021","journal-title":"The Nym network"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref6","article-title":"Anonymity and privacy in electronic services","author":"Diaz","year":"2005","journal-title":"Heverlee: Katholieke Universiteit Leuven. Faculteit Ingenieurswetenschappen"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23221"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.241156"},{"issue":"3","key":"ref12","first-page":"2","article-title":"RIPE Atlas: A global internet measurement network","volume":"18","author":"Staff","year":"2015","journal-title":"Internet Protocol Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref15","first-page":"2637","article-title":"VerLoc: Verifiable localization in decentralized systems","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kohls"},{"key":"ref16","first-page":"303","article-title":"Tor: The secondgeneration onion router","volume-title":"USENIX security symposium","volume":"4","author":"Dingledine"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3084459"},{"issue":"2","key":"ref18","first-page":"1","article-title":"Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","volume":"2","author":"Fanti"},{"key":"ref19","first-page":"187","article-title":"LARMix++: Latency-aware routing in mix networks with free routes topology","volume-title":"International Conference on Cryptology and Network Security","author":"Rahimi"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659631"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00011"},{"key":"ref22","volume-title":"Event discrete, process based simulation for Python","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485613"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485614"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"ref26","first-page":"711","article-title":"Karaoke: Distributed private messaging immune to passive traffic analysis","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI18)","author":"Lazar"},{"key":"ref27","article-title":"OptiMix: Scalable and distributed approaches for latency optimization in modern mixnets","volume-title":"The Network and Distributed System Security Symposium","author":"Rahimi"},{"key":"ref28","article-title":"OptiMix: Scalable and distributed approaches for latency optimization in modern mixnets (extended version)","year":"2026","journal-title":"Cryptology ePrint Archive"},{"key":"ref29","first-page":"159","article-title":"PARSAN-Mix: Packet-aware routing and shuffling with additional noise for latency optimization in mix networks","volume-title":"International Conference on Applied Cryptography and Network Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/nca61908.2024.00038"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3733102.3733150"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.34"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8145-6_18"},{"key":"ref34","author":"M\u00f6ller","year":"2003","journal-title":"Mixmaster protocol-version 2"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11391860.pdf?arnumber=11391860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:23:39Z","timestamp":1772004219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00043","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}