{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:16Z","timestamp":1763468236380,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1314637"],"award-info":[{"award-number":["CNS-1314637"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665943.2665948","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"181-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["IMUX"],"prefix":"10.1145","author":[{"given":"John","family":"Geddes","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Rob","family":"Jansen","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory, Washington, DC, USA"}]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shadow Homepage and Code Repositories. https:\/\/shadow.github.io\/ https:\/\/github.com\/shadow\/.  Shadow Homepage and Code Repositories. https:\/\/shadow.github.io\/ https:\/\/github.com\/shadow\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032162.2032170"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516715"},{"key":"e_1_3_2_1_6_1","first-page":"664","volume-title":"Computer Security-ESORICS","author":"BARBERA M. V.","year":"2013","unstructured":"BARBERA , M. V. , KEMERLIS , V. P. , PAPPAS , V. , AND KEROMYTIS , A. D. Cellflood: Attacking tor onion routers on the cheap . In Computer Security-ESORICS 2013 . Springer , 2013, pp. 664 -- 681 . BARBERA, M. V., KEMERLIS, V. P., PAPPAS, V., AND KEROMYTIS, A. D. Cellflood: Attacking tor onion routers on the cheap. In Computer Security-ESORICS 2013. Springer, 2013, pp. 664--681."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381972"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372336.2372347"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 23rd conference on USENIX security symposium","author":"JANSEN R.","year":"2014","unstructured":"JANSEN , R. , GEDDES , J. , WACEK , C. , SHERR , M. , AND SYVERSON , P. Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport . In Proceedings of the 23rd conference on USENIX security symposium ( 2014 ), USENIX Association. JANSEN, R., GEDDES, J., WACEK, C., SHERR, M., AND SYVERSON, P. Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport. In Proceedings of the 23rd conference on USENIX security symposium (2014), USENIX Association."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 19th Network and Distributed System Security Symposium","author":"JANSEN R.","year":"2012","unstructured":"JANSEN , R. , AND HOPPER , N. Shadow : Running Tor in a Box for Accurate and Efficient Experimentation . In Proc. of the 19th Network and Distributed System Security Symposium ( 2012 ). JANSEN, R., AND HOPPER, N. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In Proc. of the 19th Network and Distributed System Security Symposium (2012)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866344"},{"key":"e_1_3_2_1_13_1","volume-title":"20th Annual Network & Distributed System Security Symposium (NDSS'13)","author":"JANSEN R.","year":"2013","unstructured":"JANSEN , R. , JOHNSON , A. , AND SYVERSON , P. LIRA : Lightweight incentivized routing for anonymity . In 20th Annual Network & Distributed System Security Symposium (NDSS'13) ( 2013 ), Internet Society. JANSEN, R., JOHNSON, A., AND SYVERSON, P. LIRA: Lightweight incentivized routing for anonymity. In 20th Annual Network & Distributed System Security Symposium (NDSS'13) (2013), Internet Society."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362811"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"NOWLAN M. F.","year":"2012","unstructured":"NOWLAN , M. F. , TIWARI , N. , IYENGAR , J. , AMIN , S. O. , AND FORD , B. Fitting square pegs through round pipes . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2012 ). NOWLAN, M. F., TIWARI, N., IYENGAR, J., AMIN, S. O., AND FORD, B. Fitting square pegs through round pipes. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012)."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"NOWLAN M. F.","year":"2013","unstructured":"NOWLAN , M. F. , WOLINSKY , D. , AND FORD , B. Reducing latency in Tor circuits with unordered delivery . In USENIX Workshop on Free and Open Communications on the Internet (FOCI) ( 2013 ). NOWLAN, M. F., WOLINSKY, D., AND FORD, B. Reducing latency in Tor circuits with unordered delivery. In USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2013)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855776"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866345"},{"key":"e_1_3_2_1_22_1","volume-title":"I. Congestion-aware Path Selection for Tor. In Proceedings of Financial Cryptography and Data Security (FC'12)","author":"WANG T.","year":"2012","unstructured":"WANG , T. , BAUER , K. , FORERO , C. , AND GOLDBERG , I. Congestion-aware Path Selection for Tor. In Proceedings of Financial Cryptography and Data Security (FC'12) ( February 2012 ). WANG, T., BAUER, K., FORERO, C., AND GOLDBERG, I. Congestion-aware Path Selection for Tor. In Proceedings of Financial Cryptography and Data Security (FC'12) (February 2012)."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 13th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665943.2665948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665948"}},"subtitle":["Managing Tor Connections from Two to Infinity, and Beyond"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":21,"alternative-id":["10.1145\/2665943.2665948","10.1145\/2665943"],"URL":"https:\/\/doi.org\/10.1145\/2665943.2665948","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}