{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:52:14Z","timestamp":1776783134012,"version":"3.51.2"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057949","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:58:20Z","timestamp":1426265900000},"page":"468-473","source":"Crossref","is-referenced-by-count":16,"title":["Deanonymizing schemes of hidden services in tor network: A survey"],"prefix":"10.1109","author":[{"given":"Sabita","family":"Nepal","sequence":"first","affiliation":[]},{"given":"Saurav","family":"Dahal","sequence":"additional","affiliation":[]},{"given":"Seokjoo","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"TorDir &#x2013; the link list\/and pm system\/of tor","year":"2012"},{"key":"ref11","article-title":"The TLS Protocol &#x2014; Version 1.0","author":"dierks","year":"1999","journal-title":"IETF RFC 2246"},{"key":"ref12","article-title":"Tor Metrics Portal","year":"0"},{"key":"ref13","article-title":"Tor Directory Protocol, Version 3","year":"2012"},{"key":"ref14","article-title":"Tor and censorship: lessons learned","author":"dingledine","year":"2011"},{"key":"ref15","article-title":"Tor Path Specific ation","author":"dingledine","year":"2008"},{"key":"ref16","first-page":"100","article-title":"Locating Hidden Servers","author":"\u00f8verlier","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (S&P)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2178036"},{"key":"ref3","article-title":"Silk Road (marketplace)","year":"2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566894"},{"key":"ref8","article-title":"Configuring Hidden Services for Tor","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"ref2","article-title":"Tor: Anonymity Online","year":"2012","journal-title":"The Tor Project Inc"},{"key":"ref1","first-page":"303","article-title":"Tor: The Second-Generation Onion Router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref9","article-title":"Dutch police infiltrate hidden child porn websites in the U.S","year":"2011"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","location":"Cambodia","start":{"date-parts":[[2015,1,12]]},"end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057949.pdf?arnumber=7057949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:05:55Z","timestamp":1490364355000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057949","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}