{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:10Z","timestamp":1750307170867,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076750","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"123-137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A peel of onion"],"prefix":"10.1145","author":[{"given":"Paul","family":"Syverson","sequence":"first","affiliation":[{"name":"Center for High Assurance Computer Systems, U. S. Naval Research Laboratory, Washington DC"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"84","volume-title":"7th International Conference, FC 2003","author":"Acquisti Alessandro","year":"2003"},{"volume-title":"Inc.","year":"2001","author":"Back Adam","key":"e_1_3_2_1_2_1"},{"volume-title":"Inc.","year":"2001","author":"Back Adam","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731866"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_6_1","first-page":"115","volume-title":"Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability","author":"Berthold Oliver","year":"2009"},{"volume-title":"Inc.","year":"2000","author":"Boucher Philippe","key":"e_1_3_2_1_7_1"},{"volume-title":"Proceedings of the 2002 Ottawa Linux Symposium","year":"2002","author":"Brown Zach","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_10_1","unstructured":"Wei Dai. Pipenet February 1995. Original suggestion posted to the cypherpunks mailing list in Feb. 1995. Later versions are in the Free Haven Anonymity Bibliography.  Wei Dai. Pipenet February 1995. Original suggestion posted to the cypherpunks mailing list in Feb. 1995. Later versions are in the Free Haven Anonymity Bibliography."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420059823-c13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_10"},{"key":"e_1_3_2_1_14_1","unstructured":"Roger Dingledine. Strategies for getting more bridge addresses. https:\/\/blog.torproject.org\/blog\/strategies-getting-more-bridge-addresses May 2011.  Roger Dingledine. Strategies for getting more bridge addresses. https:\/\/blog.torproject.org\/blog\/strategies-getting-more-bridge-addresses May 2011."},{"volume-title":"Fifth Workshop on the Economics of Information Security (WEIS 2006)","year":"2006","author":"Dingledine Roger","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Roger Dingledine and Nick Mathewson. Design of a blocking-resistant anonymity system (draft). https:\/\/svn.torproject.org\/svn\/projects\/design-paper\/blocking.html November 2006.  Roger Dingledine and Nick Mathewson. Design of a blocking-resistant anonymity system (draft). https:\/\/svn.torproject.org\/svn\/projects\/design-paper\/blocking.html November 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.108"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881161"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"volume-title":"Inc.","year":"1999","author":"Goldberg Ian","key":"e_1_3_2_1_25_1"},{"volume-title":"Inc.","year":"2001","author":"Goldberg Ian","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"key":"e_1_3_2_1_28_1","first-page":"2","volume-title":"G\u00fclc\u00fc and Gene Tsudik. Mixing E-mail with Babel. In Proceedings of the Symposium on Network and Distributed Security Symposium - NDSS '96","author":"Ceki","year":"1996"},{"key":"e_1_3_2_1_29_1","article-title":"A brief history of anon.penet.fi - the legendary anonymous remailer","author":"Helmers Sabine","year":"1997","journal-title":"CMC Magazine"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.27"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046729"},{"key":"e_1_3_2_1_32_1","unstructured":"JonDonym -- the internet anonymisation service. https:\/\/www.jondos.de\/en\/ 2008. Commercial version of the Java Anon Proxy (JAP). Initially published description in {6}.  JonDonym -- the internet anonymisation service. https:\/\/www.jondos.de\/en\/ 2008. Commercial version of the Java Anon Proxy (JAP). Initially published description in {6}."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163601"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779337"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_38_1","first-page":"167","volume-title":"Privacy Enhancing Technologies: 7th International Symposium, PET 2007","author":"Steven","year":"2007"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_3_2_1_40_1","unstructured":"Onion routing: Brief selected history. http:\/\/www.onion-router.net\/History.html 2006.  Onion routing: Brief selected history. http:\/\/www.onion-router.net\/History.html 2006."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779339"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/784588.784596"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_1_46_1","first-page":"141","volume-title":"8th European Symposium on Research in Computer Security","author":"Serjantov Andrei","year":"2003"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046569"},{"volume-title":"Seventeenth International Workshop on Security Protocols. Springer-Verlag, LNCS","year":"2009","author":"Syverson Paul","key":"e_1_3_2_1_48_1"},{"volume-title":"4th Hot Topics in Privacy Enhancing Technologies (HotPETs 2011)","year":"2011","author":"Syverson Paul","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824941"},{"key":"e_1_3_2_1_51_1","first-page":"96","volume-title":"Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability","author":"Syverson Paul","year":"2009"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884368"},{"key":"e_1_3_2_1_53_1","unstructured":"Tor Metrics Portal. https:\/\/metrics.torproject.org\/ 2011.  Tor Metrics Portal. https:\/\/metrics.torproject.org\/ 2011."}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '11"},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":52,"alternative-id":["10.1145\/2076732.2076750","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076750","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}