{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:37:01Z","timestamp":1762004221392,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653709","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"390-399","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Membership-concealing overlay networks"],"prefix":"10.1145","author":[{"given":"Eugene","family":"Vasserman","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Rob","family":"Jansen","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"James","family":"Tyra","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Opennet initiative. http:\/\/opennet.net\/.  Opennet initiative. http:\/\/opennet.net\/."},{"volume-title":"BBC News","year":"2008","key":"e_1_3_2_1_2_1","unstructured":"China \"blocks\" itunes music store . BBC News , August 2008 . China \"blocks\" itunes music store. BBC News, August 2008."},{"volume-title":"BBC News","year":"2008","key":"e_1_3_2_1_3_1","unstructured":"Pakistan blocks youtube website . BBC News , February 2008 . Pakistan blocks youtube website. BBC News, February 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005152"},{"key":"e_1_3_2_1_5_1","volume-title":"The darknet and the future of content distribution. Tech. rep","author":"BIDDLE P.","year":"2002","unstructured":"BIDDLE , P. , ENGLAND , P. , PEINADO , M. , AND WILLMAN , B. The darknet and the future of content distribution. Tech. rep ., Microsoft Corporation , 2002 . BIDDLE, P., ENGLAND, P., PEINADO, M., AND WILLMAN, B. The darknet and the future of content distribution. Tech. rep., Microsoft Corporation, 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_7_1","unstructured":"BUSKIRK E. V. LimeWire adds private file sharing. http:\/\/blog.wired.com\/business\/2008\/12\/lime-wire-adds.html 2008.  BUSKIRK E. V. LimeWire adds private file sharing. http:\/\/blog.wired.com\/business\/2008\/12\/lime-wire-adds.html 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159954"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_10_1","first-page":"46","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July","author":"CLARKE I.","year":"2000","unstructured":"CLARKE , I. , SANDBERG , O. , WILEY , B. , AND HONG , T. W. Freenet : A distributed anonymous information storage and retrieval system . In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July 2000 ), pp. 46 -- 66 . CLARKE, I., SANDBERG, O., WILEY, B., AND HONG, T. W. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July 2000), pp. 46--66."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_18"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Workshop on The Economics of Information Security (WEIS) (June","author":"DANEZIS G.","year":"2006","unstructured":"DANEZIS , G. , AND WITTNEBEN , B. The economics of mass surveillance and the questionable value of anonymous communications . In Proceedings of the Workshop on The Economics of Information Security (WEIS) (June 2006 ). DANEZIS, G., AND WITTNEBEN, B. The economics of mass surveillance and the questionable value of anonymous communications. In Proceedings of the Workshop on The Economics of Information Security (WEIS) (June 2006)."},{"key":"e_1_3_2_1_13_1","volume-title":"J","author":"DEIBERT R. J.","year":"2006","unstructured":"DEIBERT , R. J. , PALFREY , J. G. , ROHOZINSKI , R. , AND ZITTRAIN , J . Access Denied : The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics). MIT Press , 2006 . DEIBERT, R. J., PALFREY, J. G., ROHOZINSKI, R., AND ZITTRAIN, J. Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics). MIT Press, 2006."},{"key":"e_1_3_2_1_14_1","volume-title":"Design of a blocking-resistant anonymity system. https:\/\/www.torproject.org\/svn\/trunk\/doc\/design-paper\/blocking.html","author":"DINGLEDINE R.","year":"2007","unstructured":"DINGLEDINE , R. , AND MATHEWSON , N. Design of a blocking-resistant anonymity system. https:\/\/www.torproject.org\/svn\/trunk\/doc\/design-paper\/blocking.html , 2007 . DINGLEDINE, R., AND MATHEWSON, N. Design of a blocking-resistant anonymity system. https:\/\/www.torproject.org\/svn\/trunk\/doc\/design-paper\/blocking.html, 2007."},{"key":"e_1_3_2_1_15_1","unstructured":"DINGLEDINE R. AND MATHEWSON N. Tor protocol specification. http:\/\/www.torproject.org\/svn\/trunk\/doc\/spec\/tor-spec.txt 2008.  DINGLEDINE R. AND MATHEWSON N. Tor protocol specification. http:\/\/www.torproject.org\/svn\/trunk\/doc\/spec\/tor-spec.txt 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 11th USENIX Security Symposium (August","author":"FEAMSTER N.","year":"2002","unstructured":"FEAMSTER , N. , BALAZINSKA , M. , HARFST , G. , BALAKRISHNAN , H. , AND KARGER , D. Infranet : Circumventing web censorship and surveillance . In Proceedings of the 11th USENIX Security Symposium (August 2002 ). FEAMSTER, N., BALAZINSKA, M., HARFST, G., BALAKRISHNAN, H., AND KARGER, D. Infranet: Circumventing web censorship and surveillance. In Proceedings of the 11th USENIX Security Symposium (August 2002)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_9"},{"key":"e_1_3_2_1_20_1","volume-title":"Archived at: http:\/\/slackerbitch.free.fr\/waste\/","author":"FRANKEL J.","year":"2003","unstructured":"FRANKEL , J. Archived at: http:\/\/slackerbitch.free.fr\/waste\/ , 2003 . FRANKEL, J. Archived at: http:\/\/slackerbitch.free.fr\/waste\/, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232420"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS)","author":"DANEZIS G.","year":"2009","unstructured":"G. DANEZIS , G. , AND MITTAL , P. SybilInfer : Detecting Sybil nodes using social networks . In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) ( 2009 ). G. DANEZIS, G., AND MITTAL, P. SybilInfer: Detecting Sybil nodes using social networks. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) (2009)."},{"key":"e_1_3_2_1_24_1","unstructured":"GIL T. M. KAASHOEK F. LI J. MORRIS R. AND STRIBLING J. The \"King\" data set. http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/ 2005.  GIL T. M. KAASHOEK F. LI J. MORRIS R. AND STRIBLING J. The \"King\" data set. http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/ 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179603"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_27_1","volume-title":"Friendto- friend data sharing with OneSwarm. Tech. rep","author":"ISDAL T.","year":"2009","unstructured":"ISDAL , T. , PIATEK , M. , KRISHNAMURTHY , A. , AND ANDERSON , T. Friendto- friend data sharing with OneSwarm. Tech. rep ., University of Washington , 2009 . http:\/\/oneswarm.cs.washington.edu\/f2f_tr.pdf. ISDAL, T., PIATEK, M., KRISHNAMURTHY, A., AND ANDERSON, T. Friendto- friend data sharing with OneSwarm. Tech. rep., University of Washington, 2009. http:\/\/oneswarm.cs.washington.edu\/f2f_tr.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647184.719664"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288098"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_35_1","volume-title":"July","author":"PFITZMANN A.","year":"2000","unstructured":"PFITZMANN , A. , AND HANSEN , M. Anonymity , unobservability, and pseudonymity: A consolidated proposal for terminology. Draft (v.0.31) , July 2000 . PFITZMANN, A., AND HANSEN, M. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft (v.0.31), July 2000."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Cambridge International Workshop on Security Protocols","author":"POPESCU B. C.","year":"2004","unstructured":"POPESCU , B. C. Safe and private data sharing with turtle: Friends team-up and beat the system . In Proceedings of the Cambridge International Workshop on Security Protocols ( 2004 ). POPESCU, B. C. Safe and private data sharing with turtle: Friends team-up and beat the system. In Proceedings of the Cambridge International Workshop on Security Protocols (2004)."},{"key":"e_1_3_2_1_37_1","first-page":"85","volume-title":"Proceedings of the 9th USENIX Security Symposium (August","author":"RAO J. R.","year":"2000","unstructured":"RAO , J. R. , AND ROHATGI , P. Can pseudonymity really guarantee privacy? In Proceedings of the 9th USENIX Security Symposium (August 2000 ), USENIX, pp. 85 -- 96 . RAO, J. R., AND ROHATGI, P. Can pseudonymity really guarantee privacy? In Proceedings of the 9th USENIX Security Symposium (August 2000), USENIX, pp. 85--96."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.11.004"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972863.14"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"e_1_3_2_1_44_1","volume-title":"International Workshop on Peer-to-Peer Systems (IPTPS) (February","author":"SOVRAN Y.","year":"2008","unstructured":"SOVRAN , Y. , LIBONATI , A. , AND LI , J. Pass it on: Social networks stymie censors . In International Workshop on Peer-to-Peer Systems (IPTPS) (February 2008 ). SOVRAN, Y., LIBONATI, A., AND LI, J. Pass it on: Social networks stymie censors. In International Workshop on Peer-to-Peer Systems (IPTPS) (February 2008)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830535"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502002"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Network and Distributed Security Symposium (NDSS) (February","author":"WRIGHT M.","year":"2002","unstructured":"WRIGHT , M. , ADLER , M. , LEVINE , B. N. , AND SHIELDS , C. An analysis of the degradation of anonymous protocols . In Proceedings of the Network and Distributed Security Symposium (NDSS) (February 2002 ), IEEE. WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed Security Symposium (NDSS) (February 2002), IEEE."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189191"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:53Z","timestamp":1750253933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":50,"alternative-id":["10.1145\/1653662.1653709","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653709","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}