{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:32:28Z","timestamp":1774189948653,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T00:00:00Z","timestamp":1193529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,28]]},"DOI":"10.1145\/1315245.1315257","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"82-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["How much anonymity does network latency leak?"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Hopper","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]},{"given":"Eric","family":"Chan-Tin","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]}],"member":"320","published-online":{"date-parts":[[2007,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/proxy.org\/tor.shtml","year":"2007","unstructured":"TOR (the onion router) servers. http:\/\/proxy.org\/tor.shtml , 2007 . TOR (the onion router) servers. http:\/\/proxy.org\/tor.shtml, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948241"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731866"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977998"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_2"},{"key":"e_1_3_2_1_12_1","unstructured":"Dingledine R. etal Anonymity bibliography. http:\/\/freehaven.net\/anonbib 1999 - 2007.  Dingledine R. et al. Anonymity bibliography. http:\/\/freehaven.net\/anonbib 1999 - 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_15_1","unstructured":"Federrath H. etal JAP: Java anonymous proxy. http:\/\/anon.inf.tu-dresden.de\/.  Federrath H. et al. JAP: Java anonymous proxy. http:\/\/anon.inf.tu-dresden.de\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2616"},{"key":"e_1_3_2_1_17_1","volume-title":"The \"King\" data set.http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/","author":"Gil T. M.","year":"2005","unstructured":"Gil , T. M. , Kaashoek , F. , Li , J. , Morris , R. , and Stribling , J . The \"King\" data set.http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/ , 2005 . Gil, T. M., Kaashoek, F., Li, J., Morris, R., and Stribling, J. The \"King\" data set.http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. 2nd Privacy Enhancing Technologies workshop (PET 2002)","author":"Hintz A.","year":"2002","unstructured":"Hintz , A. Fingerprinting websites using traffic analysis . In Proc. 2nd Privacy Enhancing Technologies workshop (PET 2002) ( April 2002 ), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482. Hintz, A. Fingerprinting websites using traffic analysis. In Proc. 2nd Privacy Enhancing Technologies workshop (PET 2002) (April 2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482."},{"key":"e_1_3_2_1_21_1","unstructured":"jrandom etal I2P. http:\/\/www.i2p.net\/ 2007.  jrandom et al. I2P. http:\/\/www.i2p.net\/ 2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. 4th USENIX Symposium on Network Systems Design and Implementation (April","author":"Ledlie J.","year":"2007","unstructured":"Ledlie , J. , Gardner , P. , and Seltzer , M . Network coordinates in the wild . In Proc. 4th USENIX Symposium on Network Systems Design and Implementation (April 2007 ). Ledlie, J., Gardner, P., and Seltzer, M. Network coordinates in the wild. In Proc. 4th USENIX Symposium on Network Systems Design and Implementation (April 2007)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/11423409_2","volume-title":"Proc. 4th Privacy Enhancing Technologies workshop (PET 2004)","volume":"3424","author":"Mathewson N.","year":"2004","unstructured":"Mathewson , N. , and Dingledine , R . Practical traffic analysis: Extending and resisting statistical disclosure . In Proc. 4th Privacy Enhancing Technologies workshop (PET 2004) ( May 2004 ), vol. 3424 of LNCS, pp. 17 -- 34 . Mathewson, N., and Dingledine, R. Practical traffic analysis: Extending and resisting statistical disclosure. In Proc. 4th Privacy Enhancing Technologies workshop (PET 2004) (May 2004), vol. 3424 of LNCS, pp. 17--34."},{"key":"e_1_3_2_1_25_1","unstructured":"Moeller U. Cottrell L. Palfrader P. and Sassaman L. IETF draft: Mixmaster protocol version 2. http:\/\/www.ietf.org\/internet-drafts\/draft-sassaman-mixmaster-03.txt 2005.  Moeller U. Cottrell L. Palfrader P. and Sassaman L. IETF draft: Mixmaster protocol version 2. http:\/\/www.ietf.org\/internet-drafts\/draft-sassaman-mixmaster-03.txt 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. USENIX Conference","author":"Ng T. E.","year":"2004","unstructured":"Ng , T. E. , and Zhang , H . A network positioning system for the Internet . Proc. USENIX Conference ( 2004 ). Ng, T. E., and Zhang, H. A network positioning system for the Internet. Proc. USENIX Conference (2004)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1459"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3261"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Symposium on Internet Technologies and Systems (USITS)","author":"Spring N.","year":"2003","unstructured":"Spring , N. , Wetherall , D. , and Anderson , T . Scriptroute: A public Internet measurement facility . USENIX Symposium on Internet Technologies and Systems (USITS) ( 2003 ), 225--238. Spring, N., Wetherall, D., and Anderson, T. Scriptroute: A public Internet measurement facility. USENIX Symposium on Internet Technologies and Systems (USITS) (2003), 225--238."},{"key":"e_1_3_2_1_36_1","first-page":"96","volume-title":"Designing Privacy Enhancing Technologies: Proc. Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009","author":"Syverson P.","unstructured":"Syverson , P. , Tsudik , G. , Reed , M. , and Landwehr , C . Towards an analysis of onion routing security . In Designing Privacy Enhancing Technologies: Proc. Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009 , pp. 96 -- 114 . Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. Towards an analysis of onion routing security. In Designing Privacy Enhancing Technologies: Proc. Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009, pp. 96--114."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. USENIX WORLDS","author":"Wong B.","year":"2006","unstructured":"Wong , B. , Stoyanov , I. , and Sirer , E. G . 2006. Geolocalization on the internet through constraint satisfaction . In Proc. USENIX WORLDS 2006 . Wong, B., Stoyanov, I., and Sirer, E. G. 2006. Geolocalization on the internet through constraint satisfaction. In Proc. USENIX WORLDS 2006."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830556"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 14th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1315245.1315257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:12Z","timestamp":1750254972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,28]]},"references-count":38,"alternative-id":["10.1145\/1315245.1315257","10.1145\/1315245"],"URL":"https:\/\/doi.org\/10.1145\/1315245.1315257","relation":{},"subject":[],"published":{"date-parts":[[2007,10,28]]},"assertion":[{"value":"2007-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}