{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:00Z","timestamp":1750308540811,"version":"3.41.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2015,9,28]]},"abstract":"<jats:p>The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.<\/jats:p>","DOI":"10.1145\/2714561","type":"journal-article","created":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T19:22:29Z","timestamp":1443554549000},"page":"58-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Seeking anonymity in an internet panopticon"],"prefix":"10.1145","volume":"58","author":[{"given":"Joan","family":"Feigenbaum","sequence":"first","affiliation":[{"name":"Yale University, New Haven, CT"}]},{"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[{"name":"Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150415"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/54235.54239"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium (Washington, D.C., Aug. 14--16)","author":"Corrigan-Gibbs H.","year":"2013","unstructured":"Corrigan-Gibbs , H. , Wolinsky , D.I. , and Ford , B . Proactively accountable anonymous messaging in Verdict . In Proceedings of the 22nd USENIX Security Symposium (Washington, D.C., Aug. 14--16) . USENIX Association, Berkeley, CA , 2013 . Corrigan-Gibbs, H., Wolinsky, D.I., and Ford, B. Proactively accountable anonymous messaging in Verdict. In Proceedings of the 22nd USENIX Security Symposium (Washington, D.C., Aug. 14--16). USENIX Association, Berkeley, CA, 2013."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_2_1_6_1","volume-title":"NV, July 30--Aug. 2","author":"Dingledine R.","year":"2009","unstructured":"Dingledine , R. and Murdoch , S.J . Performance improvements on Tor, or why Tor is slow and what we're going to do about it. Presented at DEFCON 17 (Las Vegas , NV, July 30--Aug. 2 , 2009 ); https:\/\/svn.torproject.org\/svn\/projects\/roadmaps\/2009-03-11-performance.pdf Dingledine, R. and Murdoch, S.J. Performance improvements on Tor, or why Tor is slow and what we're going to do about it. Presented at DEFCON 17 (Las Vegas, NV, July 30--Aug. 2, 2009); https:\/\/svn.torproject.org\/svn\/projects\/roadmaps\/2009-03-11-performance.pdf"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855771"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382452"},{"key":"e_1_2_1_9_1","volume-title":"New Snowden documents show NSA deemed Google networks a 'target.' Slate (Sept. 9","author":"Gallagher R.","year":"2013","unstructured":"Gallagher , R. New Snowden documents show NSA deemed Google networks a 'target.' Slate (Sept. 9 , 2013 ). Gallagher, R. New Snowden documents show NSA deemed Google networks a 'target.' Slate (Sept. 9, 2013)."},{"key":"e_1_2_1_10_1","volume-title":"Secret NSA documents show campaign against Tor encrypted network. The Washington Post (Oct. 4","author":"Gellman B.","year":"2013","unstructured":"Gellman , B. , Timberg , C. , and Rich , S . Secret NSA documents show campaign against Tor encrypted network. The Washington Post (Oct. 4 , 2013 ). Gellman, B., Timberg, C., and Rich, S. Secret NSA documents show campaign against Tor encrypted network. The Washington Post (Oct. 4, 2013)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486002"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_2"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_2_1_16_1","volume-title":"The New York Times (Nov. 22","author":"Risen J.","year":"2013","unstructured":"Risen , J. and Poitras , L . NSA report outlined goals for more power . The New York Times (Nov. 22 , 2013 ). Risen, J. and Poitras, L. NSA report outlined goals for more power. The New York Times (Nov. 22, 2013)."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the Fourth USENIX Workshop on Free and Open Communications on the Internet","author":"Segal A.","year":"2014","unstructured":"Segal , A. , Ford , B. , and Feigenbaum , J . Catching bandits and only bandits: Privacy-preserving intersection warrants for lawful surveillance . In Proceedings of the Fourth USENIX Workshop on Free and Open Communications on the Internet ( San Diego, CA, Aug. 18). USENIX Association, Berkeley, CA , 2014 . Segal, A., Ford, B., and Feigenbaum, J. Catching bandits and only bandits: Privacy-preserving intersection warrants for lawful surveillance. In Proceedings of the Fourth USENIX Workshop on Free and Open Communications on the Internet (San Diego, CA, Aug. 18). USENIX Association, Berkeley, CA, 2014."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133611"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629621"},{"key":"e_1_2_1_20_1","unstructured":"Tor. Anonymity Online; https:\/\/www.torproject.org  Tor. Anonymity Online ; https:\/\/www.torproject.org"},{"key":"e_1_2_1_21_1","unstructured":"Tor. Metrics portal; http:\/\/metrics.torproject.org  Tor. Metrics portal; http:\/\/metrics.torproject.org"},{"key":"e_1_2_1_22_1","volume-title":"The Telegraph (July 13","author":"Watts R.","year":"2013","unstructured":"Watts . R. JK Rowling unmasked as author of acclaimed detective novel . The Telegraph (July 13 , 2013 ). Watts. R. JK Rowling unmasked as author of acclaimed detective novel. The Telegraph (July 13, 2013)."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation","author":"Wolinsky D.I.","year":"2012","unstructured":"Wolinsky , D.I. , Corrigan-Gibbs , H. , Johnson , A. , and Ford , B . Dissent in numbers: Making strong anonymity scale . In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation ( Hollywood, CA, Oct. 8--10). USENIX Association, Berkeley, CA , 2012 . Wolinsky, D.I., Corrigan-Gibbs, H., Johnson, A., and Ford, B. Dissent in numbers: Making strong anonymity scale. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (Hollywood, CA, Oct. 8--10). USENIX Association, Berkeley, CA, 2012."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2750315.2750326"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516740"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714561","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:14Z","timestamp":1750272974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714561"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,9,28]]}},"alternative-id":["10.1145\/2714561"],"URL":"https:\/\/doi.org\/10.1145\/2714561","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}