{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:03:47Z","timestamp":1758845027528,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653707","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"369-379","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["The bayesian traffic analysis of mix networks"],"prefix":"10.1145","author":[{"given":"Carmela","family":"Troncoso","sequence":"first","affiliation":[{"name":"IBBT-K.U.Leuven, ESAT\/COSIC, B-3001 Leuven-Heverlee, Belgium"}]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253565"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179539"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779333"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007","author":"Danezis George","year":"2007","unstructured":"George Danezis , Claudia Diaz , and Carmela Troncoso . Two-sided statistical disclosure attack. In Nikita Borisov and Philippe Golle, editors , Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007 ), Ottawa, Canada , June 2007 . Springer. George Danezis, Claudia Diaz, and Carmela Troncoso. Two-sided statistical disclosure attack. In Nikita Borisov and Philippe Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005154"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_10"},{"key":"e_1_3_2_1_11_1","volume-title":"Micorsoft Research","author":"Danezis George","year":"2008","unstructured":"George Danezis and Carmela Troncoso . The application of bayesian inference to traffic analysis. Technical report , Micorsoft Research , August 2008 . George Danezis and Carmela Troncoso. The application of bayesian inference to traffic analysis. Technical report, Micorsoft Research, August 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777688.1777693"},{"key":"e_1_3_2_1_13_1","volume-title":"Towards practical dependant link padding. Under submission","author":"Diaz Claudia","year":"2009","unstructured":"Claudia Diaz , Steven J. Murdoch , and Carmela Troncoso . Towards practical dependant link padding. Under submission , 2009 . Claudia Diaz, Steven J. Murdoch, and Carmela Troncoso. Towards practical dependant link padding. Under submission, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_22"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET 2002","author":"Diaz Claudia","year":"2002","unstructured":"Claudia Diaz , Stefaan Seys , Joris Claessens , and Bart Preneel . Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors , Proceedings of Privacy Enhancing Technologies Workshop (PET 2002 ). Springer-Verlag, LNCS 2482, April 2002 . Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379497"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456422"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/57.1.97"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511790423","volume-title":"Probability Theory : The Logic of Science","author":"Jaynes E.T.","year":"2003","unstructured":"E.T. Jaynes . Probability Theory : The Logic of Science . Cambridge University Press , April 2003 . E.T. Jaynes. Probability Theory : The Logic of Science. Cambridge University Press, April 2003."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of Information Hiding Workshop (IH 2002","author":"Kesdogan Dogan","year":"2002","unstructured":"Dogan Kesdogan , Dakshi Agrawal , and Stefan Penz . Limits of anonymity in open environments. In Fabien Petitcolas, editor , Proceedings of Information Hiding Workshop (IH 2002 ). Springer-Verlag, LNCS 2578, October 2002 . Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_23"},{"key":"e_1_3_2_1_24_1","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"Mackay David J.C.","year":"2003","unstructured":"David J.C. Mackay . Information Theory, Inference, and Learning Algorithms . Cambridge University Press , 2003 . David J.C. Mackay. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_2"},{"key":"e_1_3_2_1_26_1","series-title":"Lecture Notes in Computer Science","first-page":"167","volume-title":"Privacy Enhancing Technologies","author":"Steven","year":"2007","unstructured":"Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by internet-exchange-level adversaries . In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies , volume 4776 of Lecture Notes in Computer Science , pages 167 -- 183 . Springer , 2007 . Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 167--183. Springer, 2007."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_4"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET 2002","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov and George Danezis . Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors , Proceedings of Privacy Enhancing Technologies Workshop (PET 2002 ). Springer-Verlag, LNCS 2482, April 2002 . Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_41"},{"key":"e_1_3_2_1_31_1","first-page":"96","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability","author":"Syverson Paul","year":"2009","unstructured":"Paul Syverson , Gene Tsudik , Michael Reed , and Carl Landwehr . Towards an Analysis of Onion Routing Security. In H. Federrath, editor , Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 96 -- 114 . Springer-Verlag, LNCS 2009 , July 2000. Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96--114. Springer-Verlag, LNCS 2009, July 2000."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_2"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Network and Distributed Security Symposium NDSS '02","author":"Wright Matthew","year":"2002","unstructured":"Matthew Wright , Micah Adler , Brian Neil Levine , and Clay Shields . An analysis of the degradation of anonymous protocols . In Proceedings of the Network and Distributed Security Symposium NDSS '02 . IEEE, February 2002 . Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields. An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed Security Symposium NDSS '02. IEEE, February 2002."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:53Z","timestamp":1750253933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":32,"alternative-id":["10.1145\/1653662.1653707","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653707","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}