{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:28:27Z","timestamp":1766136507612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0953655"],"award-info":[{"award-number":["CNS-0953655"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590338","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Re\n            <sup>3<\/sup>"],"prefix":"10.1145","author":[{"given":"Anupam","family":"Das","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Emulab. https:\/\/www.emulab.net.  Emulab. https:\/\/www.emulab.net."},{"key":"e_1_3_2_1_2_1","unstructured":"Known bad relays in Tor. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays.  Known bad relays in Tor. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays."},{"key":"e_1_3_2_1_3_1","unstructured":"PlanetLab. http:\/\/www.planet-lab.org\/.  PlanetLab. http:\/\/www.planet-lab.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Tor Compass. https:\/\/compass.torproject.org\/.  Tor Compass. https:\/\/compass.torproject.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Tor Consensus. https:\/\/metrics.torproject.org\/consensus-health.html.  Tor Consensus. https:\/\/metrics.torproject.org\/consensus-health.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Tor controller. https:\/\/svn.torproject.org\/svn\/blossom\/trunk\/TorCtl.py.  Tor controller. https:\/\/svn.torproject.org\/svn\/blossom\/trunk\/TorCtl.py."},{"key":"e_1_3_2_1_7_1","unstructured":"Tor Proposal 209. https:\/\/gitweb.torproject.org\/user\/mikeperry\/torspec.git\/blob\/path-bias-tuning:\/proposals\/209-path-bias-tuning.txt.  Tor Proposal 209. https:\/\/gitweb.torproject.org\/user\/mikeperry\/torspec.git\/blob\/path-bias-tuning:\/proposals\/209-path-bias-tuning.txt."},{"key":"e_1_3_2_1_8_1","unstructured":"TorFlow Project. https:\/\/gitweb.torproject.org\/torflow.git.  TorFlow Project. https:\/\/gitweb.torproject.org\/torflow.git."},{"key":"e_1_3_2_1_9_1","unstructured":"TorStatus. http:\/\/torstatus.blutmagie.de\/index.php.  TorStatus. http:\/\/torstatus.blutmagie.de\/index.php."},{"key":"e_1_3_2_1_10_1","unstructured":"Trotsky IP addresses. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotskyIps.  Trotsky IP addresses. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotskyIps."},{"key":"e_1_3_2_1_11_1","unstructured":"Tor directory authorities compromised. 2010. https:\/\/blog.torproject.org\/blog\/tor-project-infrastructure-updates.  Tor directory authorities compromised. 2010. https:\/\/blog.torproject.org\/blog\/tor-project-infrastructure-updates."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v57:4"},{"key":"e_1_3_2_1_14_1","volume-title":"On the Optimal Path Length for Tor","author":"Bauer K.","year":"2010","unstructured":"K. Bauer , J. Juen , N. Borisov , D. Grunwald , D. Sicker , and D. Mccoy . On the Optimal Path Length for Tor , 2010 . http:\/\/petsymposium.org\/2010\/papers\/hotpets10-Bauer.pdf. K. Bauer, J. Juen, N. Borisov, D. Grunwald, D. Sicker, and D. Mccoy. On the Optimal Path Length for Tor, 2010. http:\/\/petsymposium.org\/2010\/papers\/hotpets10-Bauer.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PEcon)","author":"Buchegger S.","year":"2004","unstructured":"S. Buchegger and J. Y. Le Boudec . A Robust Reputation System for P2P and Mobile Ad-hoc Networks . In Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PEcon) , 2004 . S. Buchegger and J. Y. Le Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PEcon), 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_17"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731862"},{"key":"e_1_3_2_1_21_1","unstructured":"R. Dingledine and N. Mathewson. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt.  R. Dingledine and N. Mathewson. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765278.1765296"},{"key":"e_1_3_2_1_24_1","volume-title":"Dutch government proposes cyberattacks against... everyone","author":"Eckersley P.","year":"2012","unstructured":"P. Eckersley , E. Galperin , and K. Rodriguez . Dutch government proposes cyberattacks against... everyone ., 2012 . https:\/\/www.eff.org\/deeplinks\/2012\/10\/dutch-government-proposes-cyberattacks-against-everyone. P. Eckersley, E. Galperin, and K. Rodriguez. Dutch government proposes cyberattacks against... everyone., 2012. https:\/\/www.eff.org\/deeplinks\/2012\/10\/dutch-government-proposes-cyberattacks-against-everyone."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_1_26_1","unstructured":"A. C. Estes. NSA attacks Tor. http:\/\/gizmodo.com\/the-nsas-been-trying-to-hack-into-tors-anonymous-inte-1441153819.  A. C. Estes. NSA attacks Tor. http:\/\/gizmodo.com\/the-nsas-been-trying-to-hack-into-tors-anonymous-inte-1441153819."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_29_1","volume-title":"Linear Optimal Control Systems","author":"Kwakernaak H.","year":"1972","unstructured":"H. Kwakernaak . Linear Optimal Control Systems . John Wiley & Sons, Inc. , New York, NY, USA , 1972 . H. Kwakernaak. Linear Optimal Control Systems. John Wiley & Sons, Inc., New York, NY, USA, 1972."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737297"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/820745.821158"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.374"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163275"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060808"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371981"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163590"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830556"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 9th Network and Distributed System Security Symposium, NDSS '02","author":"Wright M. K.","year":"2002","unstructured":"M. K. Wright , M. Adler , B. N. Levine , and C. Shields . An Analysis of the Degradation of Anonymous Protocols . In Proceedings of the 9th Network and Distributed System Security Symposium, NDSS '02 , 2002 . M. K. Wright, M. Adler, B. N. Levine, and C. Shields. An Analysis of the Degradation of Anonymous Protocols. In Proceedings of the 9th Network and Distributed System Security Symposium, NDSS '02, 2002."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_13"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590338"}},"subtitle":["relay reliability reputation for anonymity systems"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":45,"alternative-id":["10.1145\/2590296.2590338","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590338","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}