{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:55Z","timestamp":1750306855139,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 0953655"],"award-info":[{"award-number":["CNS 0953655"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600187","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing an adaptive reputation metric for anonymity systems"],"prefix":"10.1145","author":[{"given":"Anupam","family":"Das","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dutch government proposes cyberattacks against... everyone. https:\/\/www.eff.org\/deeplinks\/2012\/10\/dutch-government-proposes-cyberattacks-against-everyone.  Dutch government proposes cyberattacks against... everyone. https:\/\/www.eff.org\/deeplinks\/2012\/10\/dutch-government-proposes-cyberattacks-against-everyone."},{"key":"e_1_3_2_1_2_1","unstructured":"Known bad relays in Tor. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotsky.  Known bad relays in Tor. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotsky."},{"key":"e_1_3_2_1_3_1","unstructured":"NSA attacks Tor. http:\/\/gizmodo.com\/the-nsas-been-trying-to-hack-into-tors-anonymous-inte-1441153819.  NSA attacks Tor. http:\/\/gizmodo.com\/the-nsas-been-trying-to-hack-into-tors-anonymous-inte-1441153819."},{"key":"e_1_3_2_1_4_1","unstructured":"Tor Compass. https:\/\/compass.torproject.org\/.  Tor Compass. https:\/\/compass.torproject.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Tor directory authorities compromised. https:\/\/blog.torproject.org\/blog\/tor-project-infrastructure-updates.  Tor directory authorities compromised. https:\/\/blog.torproject.org\/blog\/tor-project-infrastructure-updates."},{"key":"e_1_3_2_1_6_1","unstructured":"Tor Proposal 209. https:\/\/gitweb.torproject.org\/user\/mikeperry\/torspec.git\/blob\/path-bias-tuning:\/proposals\/209-path-bias-tuning.txt.  Tor Proposal 209. https:\/\/gitweb.torproject.org\/user\/mikeperry\/torspec.git\/blob\/path-bias-tuning:\/proposals\/209-path-bias-tuning.txt."},{"key":"e_1_3_2_1_7_1","unstructured":"TorFlow Project. https:\/\/gitweb.torproject.org\/torflow.git.  TorFlow Project. https:\/\/gitweb.torproject.org\/torflow.git."},{"key":"e_1_3_2_1_8_1","unstructured":"Trotsky IP addresses. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotskyIps.  Trotsky IP addresses. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/badRelays\/trotskyIps."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79361-0_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_14"},{"key":"e_1_3_2_1_12_1","volume-title":"On the Optimal Path Length for Tor","author":"Bauer K.","year":"2010","unstructured":"Bauer , K. , Juen , J. , Borisov , N. , Grunwald , D. , Sicker , D. , and Mccoy , D . On the Optimal Path Length for Tor , 2010 . Bauer, K., Juen, J., Borisov, N., Grunwald, D., Sicker, D., and Mccoy, D. On the Optimal Path Length for Tor, 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382449"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_17"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731862"},{"key":"e_1_3_2_1_19_1","unstructured":"Dingledine R. and Mathewson N. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git\/blob\/HEAD:\/path-spec.txt.  Dingledine R. and Mathewson N. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git\/blob\/HEAD:\/path-spec.txt."},{"key":"e_1_3_2_1_20_1","unstructured":"Dingledine R. and Mathewson N. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt.  Dingledine R. and Mathewson N. Tor path specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt."},{"volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium (2004), SSYM'04, USENIX Association.","author":"Dingledine R.","key":"e_1_3_2_1_21_1","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P . Tor: The Second-generation Onion Router . In Proceedings of the 13th Conference on USENIX Security Symposium (2004), SSYM'04, USENIX Association. Dingledine, R., Mathewson, N., and Syverson, P. Tor: The Second-generation Onion Router. In Proceedings of the 13th Conference on USENIX Security Symposium (2004), SSYM'04, USENIX Association."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_1_23_1","series-title":"INFOCOM '01","first-page":"1510","volume-title":"Proceedings of the 20th IEEE International Conference on Computer Communications","author":"Hollot C.","year":"2001","unstructured":"Hollot , C. , Misra , V. , Towsley , D. , and Gong , W . -B. A control theoretic analysis of RED . In Proceedings of the 20th IEEE International Conference on Computer Communications ( 2001 ), vol. 3 of INFOCOM '01 , pp. 1510 -- 1519 . Hollot, C., Misra, V., Towsley, D., and Gong, W.-B. A control theoretic analysis of RED. In Proceedings of the 20th IEEE International Conference on Computer Communications (2001), vol. 3 of INFOCOM '01, pp. 1510--1519."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187839"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163590"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/115994.115995"},{"key":"e_1_3_2_1_28_1","first-page":"251","volume-title":"Financial Cryptography and Data Security","author":"Levine B.","year":"2004","unstructured":"Levine , B. , Reiter , M. , Wang , C. , and Wright , M . Timing Attacks in Low-Latency Mix Systems . In Financial Cryptography and Data Security . Springer Berlin Heidelberg , 2004 , pp. 251 -- 265 . Levine, B., Reiter, M., Wang, C., and Wright, M. Timing Attacks in Low-Latency Mix Systems. In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2004, pp. 251--265."},{"key":"e_1_3_2_1_29_1","first-page":"107","volume-title":"Advanced Communications and Multimedia Security, IFIP -- The International Federation for Information Processing","author":"Michiardi P.","year":"2002","unstructured":"Michiardi , P. , and Molva , R . Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks . In Advanced Communications and Multimedia Security, IFIP -- The International Federation for Information Processing . Springer US , 2002 , pp. 107 -- 121 . Michiardi, P., and Molva, R. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In Advanced Communications and Multimedia Security, IFIP -- The International Federation for Information Processing. Springer US, 2002, pp. 107--121."},{"volume-title":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences (Washington, DC, USA, 2002), HICSS '02, IEEE Computer Society.","author":"Mui L.","key":"e_1_3_2_1_30_1","unstructured":"Mui , L. , Mohtashemi , M. , and Halberstadt , A . A computational model of trust and reputation for e-businesses . In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (Washington, DC, USA, 2002), HICSS '02, IEEE Computer Society. Mui, L., Mohtashemi, M., and Halberstadt, A. A computational model of trust and reputation for e-businesses. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (Washington, DC, USA, 2002), HICSS '02, IEEE Computer Society."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_1_32_1","volume-title":"Introduction to Feedback Control Theory","author":"Ozbay H.","year":"1999","unstructured":"Ozbay , H. Introduction to Feedback Control Theory , 1 st ed. CRC Press, Inc. , 1999 . Ozbay, H. Introduction to Feedback Control Theory, 1st ed. CRC Press, Inc., 1999.","edition":"1"},{"key":"e_1_3_2_1_33_1","unstructured":"Pfitzmann A. and Hansen M. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf Aug. 2010. v0.34.  Pfitzmann A. and Hansen M. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf Aug. 2010. v0.34."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163275"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060808"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371981"},{"key":"e_1_3_2_1_39_1","first-page":"28","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003), SP '03","author":"Wright M.","unstructured":"Wright , M. , Adler , M. , Levine , B. , and Shields , C . Defending anonymous communications against passive logging attacks . In Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003), SP '03 , pp. 28 -- 41 . Wright, M., Adler, M., Levine, B., and Shields, C. Defending anonymous communications against passive logging attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003), SP '03, pp. 28--41."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 9th Network and Distributed System Security Symposium","author":"Wright M. K.","year":"2002","unstructured":"Wright , M. K. , Adler , M. , Levine , B. N. , and Shields , C . An Analysis of the Degradation of Anonymous Protocols . In Proceedings of the 9th Network and Distributed System Security Symposium ( 2002 ), NDSS '02. Wright, M. K., Adler, M., Levine, B. N., and Shields, C. An Analysis of the Degradation of Anonymous Protocols. In Proceedings of the 9th Network and Distributed System Security Symposium (2002), NDSS '02."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_13"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:25Z","timestamp":1750234225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":43,"alternative-id":["10.1145\/2600176.2600187","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600187","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}