{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:46:07Z","timestamp":1774021567386,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,4]],"date-time":"2015-10-04T00:00:00Z","timestamp":1443916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF 2","award":["CNS-1413920"],"award-info":[{"award-number":["CNS-1413920"]}]},{"name":"NSF 1","award":["CNS-1053143"],"award-info":[{"award-number":["CNS-1053143"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,4]]},"DOI":"10.1145\/2815400.2815417","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T12:01:58Z","timestamp":1443700918000},"page":"137-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":164,"title":["Vuvuzela"],"prefix":"10.1145","author":[{"given":"Jelle","family":"van den Hooff","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"David","family":"Lazar","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Matei","family":"Zaharia","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2015,10,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731866"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.18"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.54"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765308"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_12"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0442-5"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/54235.54239"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_2_11_1","first-page":"46","volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability","author":"Clarke I.","year":"2000","unstructured":"I. Clarke , O. Sandberg , B. Wiley , and T. W. Hong . Freenet: A distributed anonymous information storage and retrieval system . In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability , pages 46 -- 66 , Berkeley, CA , July 2000 . I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pages 46--66, Berkeley, CA, July 2000."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"e_1_3_2_2_13_1","first-page":"421","volume-title":"Proceedings of the 18th International Conference on Information Security","author":"Danezis G.","year":"2003","unstructured":"G. Danezis . Statistical disclosure attacks: Traffic confirmation in open environments . In Proceedings of the 18th International Conference on Information Security , pages 421 -- 426 , Athens, Greece , May 2003 . G. Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of the 18th International Conference on Information Security, pages 421--426, Athens, Greece, May 2003."},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the DIMACS Workshop on Measuring Anonymity","author":"Danezis G.","year":"2013","unstructured":"G. Danezis . Measuring anonymity: a few thoughts and a differentially private bound . In Proceedings of the DIMACS Workshop on Measuring Anonymity , May 2013 . G. Danezis. Measuring anonymity: a few thoughts and a differentially private bound. In Proceedings of the DIMACS Workshop on Measuring Anonymity, May 2013."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_19_1","article-title":"Bulk bandwidth prices get steadier after long swoon","author":"Fitzgerald D.","year":"2014","unstructured":"D. Fitzgerald . Bulk bandwidth prices get steadier after long swoon . Wall Street Journal , Sept. 2014 . http:\/\/www.wsj.com\/articles\/bulk-bandwidth-prices-get-steadier-after-long-plunge-1411602100. D. Fitzgerald. Bulk bandwidth prices get steadier after long swoon. Wall Street Journal, Sept. 2014. http:\/\/www.wsj.com\/articles\/bulk-bandwidth-prices-get-steadier-after-long-plunge-1411602100.","journal-title":"Wall Street Journal"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_2_22_1","volume-title":"Off-the-record messaging","author":"Goldberg I.","year":"2015","unstructured":"I. Goldberg and The OTR Development Team . Off-the-record messaging , 2015 . https:\/\/otr.cypherpunks.ca\/. I. Goldberg and The OTR Development Team. Off-the-record messaging, 2015. https:\/\/otr.cypherpunks.ca\/."},{"key":"e_1_3_2_2_23_1","volume-title":"Johns Hopkins Foreign Affairs Symposium","author":"Hayden M.","year":"2014","unstructured":"M. Hayden . The price of privacy: Re-evaluating the NSA . Johns Hopkins Foreign Affairs Symposium , Apr. 2014 . https:\/\/www.youtube.com\/watch?v=kV2HDM86XgI&t=17m50s. M. Hayden. The price of privacy: Re-evaluating the NSA. Johns Hopkins Foreign Affairs Symposium, Apr. 2014. https:\/\/www.youtube.com\/watch?v=kV2HDM86XgI&t=17m50s."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_2_25_1","unstructured":"A. Langley. Pond 2015. https:\/\/pond.imperialviolet.org\/.  A. Langley. Pond 2015. https:\/\/pond.imperialviolet.org\/."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_2"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_2_29_1","volume-title":"Nov.","author":"Systems Open Whisper","year":"2014","unstructured":"Open Whisper Systems . Open Whisper Systems partners with WhatsApp to provide end-to-end encryption , Nov. 2014 . https:\/\/whispersystems.org\/blog\/whatsapp\/. Open Whisper Systems. Open Whisper Systems partners with WhatsApp to provide end-to-end encryption, Nov. 2014. https:\/\/whispersystems.org\/blog\/whatsapp\/."},{"key":"e_1_3_2_2_30_1","volume-title":"TextSecure protocol v2","author":"Systems Open Whisper","year":"2015","unstructured":"Open Whisper Systems . TextSecure protocol v2 , 2015 . https:\/\/github.com\/WhisperSystems\/TextSecure\/wiki\/ProtocolV2. Open Whisper Systems. TextSecure protocol v2, 2015. https:\/\/github.com\/WhisperSystems\/TextSecure\/wiki\/ProtocolV2."},{"key":"e_1_3_2_2_31_1","volume-title":"Axolotl ratchet","author":"Perrin T.","year":"2014","unstructured":"T. Perrin and M. Marlinspike . Axolotl ratchet , 2014 . https:\/\/github.com\/trevp\/axolotl\/wiki. T. Perrin and M. Marlinspike. Axolotl ratchet, 2014. https:\/\/github.com\/trevp\/axolotl\/wiki."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_2_33_1","volume-title":"The New York Review of Books","author":"Rusbridger A.","year":"2013","unstructured":"A. Rusbridger . The Snowden leaks and the public . The New York Review of Books , Nov. 2013 . A. Rusbridger. The Snowden leaks and the public. The New York Review of Books, Nov. 2013."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102201"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884368"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Wolinsky D. I.","year":"2012","unstructured":"D. I. Wolinsky , H. Corrigan-Gibbs , B. Ford , and A. Johnson . Dissent in numbers: Making strong anonymity scale . In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI) , Hollywood, CA , Oct. 2012 . D. I. Wolinsky, H. Corrigan-Gibbs, B. Ford, and A. Johnson. Dissent in numbers: Making strong anonymity scale. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI), Hollywood, CA, Oct. 2012."}],"event":{"name":"SOSP '15: ACM SIGOPS 25th Symposium on Operating Systems Principles","location":"Monterey California","acronym":"SOSP '15","sponsor":["SSRC Storage Systems Research Center, UC Santa Cruz","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 25th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815400.2815417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:13Z","timestamp":1750225393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815417"}},"subtitle":["scalable private messaging resistant to traffic analysis"],"short-title":[],"issued":{"date-parts":[[2015,10,4]]},"references-count":35,"alternative-id":["10.1145\/2815400.2815417","10.1145\/2815400"],"URL":"https:\/\/doi.org\/10.1145\/2815400.2815417","relation":{},"subject":[],"published":{"date-parts":[[2015,10,4]]},"assertion":[{"value":"2015-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}