{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T02:22:06Z","timestamp":1770776526470,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["617605"],"award-info":[{"award-number":["617605"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M013286\/1"],"award-info":[{"award-number":["EP\/M013286\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU Horizon 2020","award":["653497"],"award-info":[{"award-number":["653497"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813628","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1441-1454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":86,"title":["HORNET"],"prefix":"10.1145","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[{"name":"Carnegie Mellon University &amp; ETH Zurich, Zurich, Switzerland"}]},{"given":"Daniele E.","family":"Asoni","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"David","family":"Barrera","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"University College London, London, Gt Britain"}]},{"given":"Adrain","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/. Retrieved on","author":"Cisco","year":"2015","unstructured":"Cisco ASR-1000. http:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/. Retrieved on 2015 .04.28. Cisco ASR-1000. http:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/. Retrieved on 2015.04.28."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.cisco.com\/c\/en\/us\/products\/routers. Retrieved on","author":"Cisco","year":"2015","unstructured":"Cisco routers. http:\/\/www.cisco.com\/c\/en\/us\/products\/routers. Retrieved on 2015 .08.05. Cisco routers. http:\/\/www.cisco.com\/c\/en\/us\/products\/routers. Retrieved on 2015.08.05."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/code.google.com\/p\/curve25519-donna\/. Retrieved on","year":"2014","unstructured":"curve25519-donna. https:\/\/code.google.com\/p\/curve25519-donna\/. Retrieved on 2014 .12.13. curve25519-donna. https:\/\/code.google.com\/p\/curve25519-donna\/. Retrieved on 2014.12.13."},{"key":"e_1_3_2_1_4_1","unstructured":"DPDK\n  : Data plane development kit. http:\/\/dpdk.org\/. Retrieved on 2014.12.23.  DPDK: Data plane development kit. http:\/\/dpdk.org\/. Retrieved on 2014.12.23."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/software.intel.com\/en-us\/articles\/download-the-intel-aesni-sample-library. Retrieved on","author":"Intel AESNI","year":"2014","unstructured":"Intel AESNI sample library. https:\/\/software.intel.com\/en-us\/articles\/download-the-intel-aesni-sample-library. Retrieved on 2014 .12.13. Intel AESNI sample library. https:\/\/software.intel.com\/en-us\/articles\/download-the-intel-aesni-sample-library. Retrieved on 2014.12.13."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/iplane.cs.washington.edu\/data\/data.html. Traceroute data was generated on","author":"Plane","year":"2014","unstructured":"i Plane dataset. http:\/\/iplane.cs.washington.edu\/data\/data.html. Traceroute data was generated on October 12, 2014 . iPlane dataset. http:\/\/iplane.cs.washington.edu\/data\/data.html. Traceroute data was generated on October 12, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/daserste:ndr.de\/panorama\/aktuell\/NSA-targets-the-privacy-conscious;nsa230.html. Retrieved on","author":"NSA","year":"2015","unstructured":"NSA targets the privacy-conscious. http:\/\/daserste:ndr.de\/panorama\/aktuell\/NSA-targets-the-privacy-conscious;nsa230.html. Retrieved on 2015 .05.13. NSA targets the privacy-conscious. http:\/\/daserste:ndr.de\/panorama\/aktuell\/NSA-targets-the-privacy-conscious;nsa230.html. Retrieved on 2015.05.13."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/polarssl.org\/. Retrieved on","author":"SSL.","year":"2014","unstructured":"Polar SSL. https:\/\/polarssl.org\/. Retrieved on 2014 .12.13. PolarSSL. https:\/\/polarssl.org\/. Retrieved on 2014.12.13."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-spring-segment-routing\/. Retrieved on","author":"Segment","year":"2015","unstructured":"Segment routing architecture (IETF draft). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-spring-segment-routing\/. Retrieved on 2015 .05.13. Segment routing architecture (IETF draft). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-spring-segment-routing\/. Retrieved on 2015.05.13."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/www.spirent.com\/Ethernet_Testing\/Software\/TestCenter. Retrieved on","author":"Spirent TestCenter","year":"2014","unstructured":"Spirent TestCenter . http:\/\/www.spirent.com\/Ethernet_Testing\/Software\/TestCenter. Retrieved on 2014 .12.23. Spirent TestCenter. http:\/\/www.spirent.com\/Ethernet_Testing\/Software\/TestCenter. Retrieved on 2014.12.23."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/metrics.torproject.org. Retrieved on","author":"Tor","year":"2015","unstructured":"Tor metrics. https:\/\/metrics.torproject.org. Retrieved on 2015 .05.13. Tor metrics. https:\/\/metrics.torproject.org. Retrieved on 2015.05.13."},{"key":"e_1_3_2_1_12_1","volume-title":"August","author":"Barrera David","year":"2015","unstructured":"David Barrera , Raphael M. Reischuk , Pawel Szalachowski , and Adrian Perrig . SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks. arXiv\/1508.01651 , August 2015 . David Barrera, Raphael M. Reischuk, Pawel Szalachowski, and Adrian Perrig. SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks. arXiv\/1508.01651, August 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_14_1","volume-title":"Freedom systems 2.0 architecture","author":"Boucher Philippe","year":"2000","unstructured":"Philippe Boucher , Adam Shostack , and Ian Goldberg . Freedom systems 2.0 architecture , 2000 . White paper, Zero Knowledge Systems, Inc . Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom systems 2.0 architecture, 2000. White paper, Zero Knowledge Systems, Inc."},{"key":"e_1_3_2_1_15_1","volume-title":"Ottawa Linux Symposium","author":"Brown Zach","year":"2002","unstructured":"Zach Brown . Cebolla : Pragmatic IP anonymity . In Ottawa Linux Symposium , 2002 . Zach Brown. Cebolla: Pragmatic IP anonymity. In Ottawa Linux Symposium, 2002."},{"key":"e_1_3_2_1_16_1","unstructured":"R. Bush and R. Austein. The resource public key infrastructure (RPKI) to router protocol. IETF RFC 6810.  R. Bush and R. Austein. The resource public key infrastructure (RPKI) to router protocol. IETF RFC 6810."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_19_1","volume-title":"David Barrera, George Danezis, and Adrian Perrig. HORNET: High-speed Onion Routing at the Network Layer. arXiv\/1507.05724","author":"Chen Chen","year":"2015","unstructured":"Chen Chen , Daniele Enrico Asoni , David Barrera, George Danezis, and Adrian Perrig. HORNET: High-speed Onion Routing at the Network Layer. arXiv\/1507.05724 , July 2015 . Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig. HORNET: High-speed Onion Routing at the Network Layer. arXiv\/1507.05724, July 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_21_1","volume-title":"Mixminion: Design of a type III anonymous remailer protocol","author":"Danezis George","year":"2003","unstructured":"George Danezis , Roger Dingledine , and Nick Mathewson . Mixminion: Design of a type III anonymous remailer protocol . In IEEE S &P, 2003 . George Danezis, Roger Dingledine, and Nick Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE S&P, 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security","author":"Dean Drew","year":"2001","unstructured":"Drew Dean and Adam Stubblefield . Using client puzzles to protect TLS . In USENIX Security , 2001 . Drew Dean and Adam Stubblefield. Using client puzzles to protect TLS. In USENIX Security, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS","author":"DiBenedetto Steven","year":"2011","unstructured":"Steven DiBenedetto , Paolo Gasti , Gene Tsudik , and Ersin Uzun . ANDaNA : Anonymous named data networking application . In NDSS , 2011 . Steven DiBenedetto, Paolo Gasti, Gene Tsudik, and Ersin Uzun. ANDaNA : Anonymous named data networking application. In NDSS, 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_26_1","unstructured":"S. Farrell and H. Tschofenig. Pervasive monitoring is an attack. IETF RFC 7258.  S. Farrell and H. Tschofenig. Pervasive monitoring is an attack. IETF RFC 7258."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"key":"e_1_3_2_1_30_1","volume-title":"NDSS","author":"G\u00fclc\u00fc Ceki","year":"1996","unstructured":"Ceki G\u00fclc\u00fc and Gene Tsudik . Mixing email with Babel . In NDSS , 1996 . Ceki G\u00fclc\u00fc and Gene Tsudik. Mixing email with Babel. In NDSS, 1996."},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE GLOBECOM","author":"He Yihua","year":"2005","unstructured":"Yihua He , Michalis Faloutsos , Srikanth Krishnamurthy , and Bradley Huffaker . On routing asymmetry in the Internet . In IEEE GLOBECOM , 2005 . Yihua He, Michalis Faloutsos, Srikanth Krishnamurthy, and Bradley Huffaker. On routing asymmetry in the Internet. In IEEE GLOBECOM, 2005."},{"key":"e_1_3_2_1_32_1","volume-title":"Adrian Perrig, Akira Yamada","author":"Hsiao Hsu Chun","year":"2012","unstructured":"Hsu Chun Hsiao , Tiffany Hyun Jin Kim , Adrian Perrig, Akira Yamada , Samuel C. Nelson , Marco Gruteser, and Wei Meng. LAP : Lightweight anonymity and privacy. In IEEE S&P, 2012 . Hsu Chun Hsiao, Tiffany Hyun Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, and Wei Meng. LAP: Lightweight anonymity and privacy. In IEEE S&P, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_34_1","volume-title":"FC","author":"Levine Brian N.","year":"2004","unstructured":"Brian N. Levine , Michael K. Reiter , Chenxi Wang , and Matthew K. Wright . Timing attacks in low-latency mix-based systems . In FC , 2004 . Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright. Timing attacks in low-latency mix-based systems. In FC, 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070576"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111328"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security","author":"Mittal Prateek","year":"2011","unstructured":"Prateek Mittal , Femi Olumofin , Carmela Troncoso , Nikita Borisov , and Ian Goldberg . PIR-Tor : Scalable anonymous communication using private information retrieval . In USENIX Security , 2011 . Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg. PIR-Tor: Scalable anonymous communication using private information retrieval. In USENIX Security, 2011."},{"key":"e_1_3_2_1_38_1","volume-title":"Mixmaster protocol v. 2. IETF Draft","author":"M\u00f6ller Ulf","year":"2003","unstructured":"Ulf M\u00f6ller , Lance Cottrell , Peter Palfrader , and Len Sassaman . Mixmaster protocol v. 2. IETF Draft , 2003 . Ulf M\u00f6ller, Lance Cottrell, Peter Palfrader, and Len Sassaman. Mixmaster protocol v. 2. IETF Draft, 2003."},{"key":"e_1_3_2_1_39_1","unstructured":"R. Moskowitz and P. Nikander. Host identity protocol (HIP) architecture. IETF RFC 4423.  R. Moskowitz and P. Nikander. Host identity protocol (HIP) architecture. IETF RFC 4423."},{"key":"e_1_3_2_1_40_1","volume-title":"PETS","author":"Steven","year":"2007","unstructured":"Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by Internet-Exchange-level adversaries . In PETS , 2007 . Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by Internet-Exchange-level adversaries. In PETS, 2007."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371968"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371972"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_44_1","volume-title":"PETS","author":"Sankey Jody","year":"2014","unstructured":"Jody Sankey and Matthew Wright . Dovetail : Stronger anonymity in next-generation internet routing . In PETS , 2014 . Jody Sankey and Matthew Wright. Dovetail: Stronger anonymity in next-generation internet routing. In PETS, 2014."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security","author":"Smart Matthew","year":"2000","unstructured":"Matthew Smart , G. Robert Malan , and Farnam Jahanian . Defeating TCP\/IP stack fingerprinting. In USENIX Security , 2000 . Matthew Smart, G. Robert Malan, and Farnam Jahanian. Defeating TCP\/IP stack fingerprinting. In USENIX Security, 2000."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455812"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893888"},{"key":"e_1_3_2_1_49_1","volume-title":"ICN","author":"Zantout Bassam","year":"2011","unstructured":"Bassam Zantout and Ramzi Haraty . I2P data communication system . In ICN , 2011 . Bassam Zantout and Ramzi Haraty. I2P data communication system. In ICN, 2011."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813628"}},"subtitle":["High-speed Onion Routing at the Network Layer"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":51,"alternative-id":["10.1145\/2810103.2813628","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813628","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}