{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:29:39Z","timestamp":1773091779609,"version":"3.50.1"},"reference-count":116,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T00:00:00Z","timestamp":1474416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NPRP","award":["7-1469-1-273"],"award-info":[{"award-number":["7-1469-1-273"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2017,6,30]]},"abstract":"<jats:p>Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and unobservability. Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network. We shed light on the design weaknesses and challenges facing the network and point out unresolved issues.<\/jats:p>","DOI":"10.1145\/2946802","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T12:42:46Z","timestamp":1474461766000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Performance and Security Improvements for Tor"],"prefix":"10.1145","volume":"49","author":[{"given":"Mashael","family":"Alsabah","sequence":"first","affiliation":[{"name":"Qatar University and Qatar Computing Research Institute, Doha-Qatar"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"e_1_2_1_3_1","volume-title":"13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10--12, 2013. Proceedings. Springer","author":"AlSabah Mashael","year":"2013"},{"key":"e_1_2_1_4_1","volume-title":"PETS 2011, Waterloo, ON, Canada, July 27--29, 2011. Proceedings. Springer","author":"AlSabah Mashael"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516715"},{"key":"e_1_2_1_7_1","volume-title":"19th USENIX Security Symposium","author":"Antonakakis Manos","year":"2010"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 21th USENIX Security Symposium","author":"Antonakakis Manos","year":"2012"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381974"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_2_1_11_1","unstructured":"BBC News. 2007. Data disaster: Your Queries Answered. http:\/\/news.bbc.co.uk\/2\/hi\/business\/7105592.stm. (November 2007). Accessed March 2015.  BBC News. 2007. Data disaster: Your Queries Answered. http:\/\/news.bbc.co.uk\/2\/hi\/business\/7105592.stm. (November 2007). Accessed March 2015."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_2_1_16_1","unstructured":"Henry Blodget. 2007. Compete CEO: ISPs Sell Clickstreams For &dollar;5 A Month. http:\/\/seekingalpha.com\/article\/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month. (March 2007). Accessed March 2015.  Henry Blodget. 2007. Compete CEO: ISPs Sell Clickstreams For &dollar;5 A Month. http:\/\/seekingalpha.com\/article\/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month. (March 2007). Accessed March 2015."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653682"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_2_1_24_1","unstructured":"Jen Christensen. 2008. FBI Tracked King\u2019s Every Move. http:\/\/edition.cnn.com\/2008\/US\/03\/31\/mlk.fbi.conspiracy\/. (December 2008). Accessed March 2015.  Jen Christensen. 2008. FBI Tracked King\u2019s Every Move. http:\/\/edition.cnn.com\/2008\/US\/03\/31\/mlk.fbi.conspiracy\/. (December 2008). Accessed March 2015."},{"key":"e_1_2_1_25_1","unstructured":"Lucian Constantin. 2012. Tor network used to command Skynet botnet. http:\/\/www.techworld.com\/news\/security\/tor-network-used-command-skynet-botnet-3415592\/. (December 2012). Accessed March 2015.  Lucian Constantin. 2012. Tor network used to command Skynet botnet. http:\/\/www.techworld.com\/news\/security\/tor-network-used-command-skynet-botnet-3415592\/. (December 2012). Accessed March 2015."},{"key":"e_1_2_1_26_1","volume-title":"7th International Symposium, PET 2007 Ottawa, Canada, June 20--22","author":"Danezis George","year":"2007"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. 2008. RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. http:\/\/www.ietf.org\/rfc\/rfc5246.txt. (August 2008). Accessed March 2015.  Tim Dierks and Eric Rescorla. 2008. RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. http:\/\/www.ietf.org\/rfc\/rfc5246.txt. (August 2008). Accessed March 2015.","DOI":"10.17487\/rfc5246"},{"key":"e_1_2_1_29_1","volume-title":"Research Problems: Ten Ways to Discover Tor Bridges. https:\/\/blog.torproject.org\/blog\/research-problems-ten-ways-discover-tor-bridges. (October","author":"Dingledine Roger","year":"2011"},{"key":"e_1_2_1_30_1","volume-title":"Getting the HSDir flag should require more effort. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/8243. (2013). Accessed","author":"Dingledine Roger","year":"2015"},{"key":"e_1_2_1_31_1","volume-title":"One Fast Guard for Life (or 9 Months). https:\/\/www.petsymposium.org\/2014\/papers\/Dingledine.pdf. (July","author":"Dingledine Roger","year":"2014"},{"key":"e_1_2_1_32_1","volume-title":"Workshop on the Economics of Information Security. 547--559","author":"Dingledine Roger","year":"2006"},{"key":"e_1_2_1_33_1","volume-title":"Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/tor-spec.txt. (2015). Accessed","author":"Dingledine Roger","year":"2015"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Dingledine Roger","year":"2004"},{"key":"e_1_2_1_35_1","unstructured":"John Dunn. 2013. Mevade botnet miscalculated effect on Tor network says Damballa. http:\/\/www.techworld.com\/news\/security\/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa-3468988\/. (Sept-ember 2013). Accessed March 2015.  John Dunn. 2013. Mevade botnet miscalculated effect on Tor network says Damballa. http:\/\/www.techworld.com\/news\/security\/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa-3468988\/. (Sept-ember 2013). Accessed March 2015."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/217382.318122"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855771"},{"key":"e_1_2_1_41_1","volume-title":"IETF BCP 188: Pervasive Monitoring Is an Attack. (May","author":"Farrell Stephen","year":"2014"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_2_1_43_1","volume-title":"10th International Symposium, PETS 2010, Berlin, Germany, July 21--23, 2010. Proceedings","volume":"6205","author":"Feigenbaum Joan"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_13"},{"key":"e_1_2_1_45_1","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy Enhancing Technologies, Emiliano De Cristofaro and Matthew Wright (Eds.)","author":"Geddes John"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665948"},{"key":"e_1_2_1_47_1","unstructured":"Mainak Ghosh Miles Richardson Bryan Ford and Rob Jansen. 2014. A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays. http:\/\/www.robgjansen.com\/publications\/torpath-hotpets2014.pdf. (July 2014). Accessed March 2015.  Mainak Ghosh Miles Richardson Bryan Ford and Rob Jansen. 2014. A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays. http:\/\/www.robgjansen.com\/publications\/torpath-hotpets2014.pdf. (July 2014). Accessed March 2015."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381972"},{"key":"e_1_2_1_50_1","volume-title":"RSA Uncovers New POS Malware Operation Stealing Payment Card & Personal Information. https:\/\/blogs.rsa.com\/rsa-uncovers-new-pos-malware-operation-stealing-payment-card-personal-information\/. (January","author":"Gottesman Yotam","year":"2014"},{"key":"e_1_2_1_51_1","unstructured":"Larry Greenemeier. 2006. VA Secretary Comes Under Fire At House And Senate Data Theft Hearings. http:\/\/www.informationweek.com\/va-secretary-comes-under-fire-at-house-a\/188500312. (May 2006). Accessed March 2015.  Larry Greenemeier. 2006. VA Secretary Comes Under Fire At House And Senate Data Theft Hearings. http:\/\/www.informationweek.com\/va-secretary-comes-under-fire-at-house-a\/188500312. (May 2006). Accessed March 2015."},{"key":"e_1_2_1_52_1","volume-title":"Security Breach: Feds Lose Laptop Containing Sensitive Data \u2014 Again","author":"Greenemeier Larry","year":"2008"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.13"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_21"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"e_1_2_1_57_1","volume-title":"PETS 2013, Bloomington, IN, USA, July 10--12, 2013. Proceedings","volume":"7981","author":"Houmansadr Amir","year":"2013"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_2_1_59_1","volume-title":"New Tor Denial of Service Attacks and Defenses. https:\/\/blog.torproject.org\/blog\/new-tor-denial-service-attacks-and-defenses. (2016). Accessed","author":"Jansen Rob","year":"2016"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Jansen Rob","year":"2014"},{"key":"e_1_2_1_61_1","volume-title":"19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Jansen Rob","year":"2012"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866344"},{"key":"e_1_2_1_63_1","volume-title":"19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Jansen Rob","year":"2012"},{"key":"e_1_2_1_64_1","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS 2013","author":"Jansen Rob","year":"2013"},{"key":"e_1_2_1_65_1","volume-title":"From Onions to Shallots: Rewarding Tor Relays with TEARS. https:\/\/petsymposium.org\/2014\/papers\/Jansen.pdf. (July","author":"Jansen Rob","year":"2014"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_2_1_67_1","volume-title":"7th International Symposium, PET 2007 Ottawa, Canada, June 20--22","author":"Kate Aniket","year":"2007"},{"key":"e_1_2_1_68_1","unstructured":"Jeremy Kirk. 2013. Passwords reset after Pony botnet stole 2 million credentials. http:\/\/www.pcworld.com\/article\/2069260\/passwords-reset-after-pony-botnet-stole-2-million-credentials.html. (December 2013). Accessed March 2015.  Jeremy Kirk. 2013. Passwords reset after Pony botnet stole 2 million credentials. http:\/\/www.pcworld.com\/article\/2069260\/passwords-reset-after-pony-botnet-stole-2-million-credentials.html. (December 2013). Accessed March 2015."},{"key":"e_1_2_1_69_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Kwon Albert","year":"2015"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566894"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.11.005"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"e_1_2_1_74_1","unstructured":"Mary Madden. 2014. Public Perceptions of Privacy and Security in the Post-Snowden Era. http:\/\/www.pewinternet.org\/2014\/11\/12\/public-privacy-perceptions\/. (November 2014). Accessed March 2015.  Mary Madden. 2014. Public Perceptions of Privacy and Security in the Post-Snowden Era. http:\/\/www.pewinternet.org\/2014\/11\/12\/public-privacy-perceptions\/. (November 2014). Accessed March 2015."},{"key":"e_1_2_1_75_1","volume-title":"The reverse statistical disclosure attack","author":"Mallesh Nayantara"},{"key":"e_1_2_1_76_1","volume-title":"Split relay and link crypto across multiple CPU cores. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/1749. (2010). Accessed","author":"Mathewson Nick","year":"2016"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046732"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC\u201911)","author":"Mittal Prateek","year":"2011"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_2_1_84_1","unstructured":"Ulf M\u00f6ller Lance Cottrell Peter Palfrader and Len Sassaman. 2003. Mixmaster Protocol - Version 3. IETF Internet Draft. (2003). http:\/\/www.eskimo.com\/rowdenw\/crypt\/Mix\/draft-moeller-v3-01.txt.  Ulf M\u00f6ller Lance Cottrell Peter Palfrader and Len Sassaman. 2003. Mixmaster Protocol - Version 3. IETF Internet Draft. (2003). http:\/\/www.eskimo.com\/rowdenw\/crypt\/Mix\/draft-moeller-v3-01.txt."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076762"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_8"},{"key":"e_1_2_1_88_1","volume-title":"7th International Symposium, PET 2007 Ottawa, Canada","author":"Steven","year":"2007"},{"key":"e_1_2_1_89_1","unstructured":"Kate Murphy. 2012. How to Muddy Your Tracks on the Internet. http:\/\/www.nytimes.com\/2012\/05\/03\/technology\/personaltech\/how-to-muddy-your-tracks-on-the-internet.html?_r&equals;0. (May 2012). Accessed March 2015.  Kate Murphy. 2012. How to Muddy Your Tracks on the Internet. http:\/\/www.nytimes.com\/2012\/05\/03\/technology\/personaltech\/how-to-muddy-your-tracks-on-the-internet.html?_r&equals;0. (May 2012). Accessed March 2015."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163590"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665950"},{"key":"e_1_2_1_92_1","volume-title":"David Isaac Wolinsky, and Bryan Ford","author":"Nowlan Michael F.","year":"2013"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_2_1_94_1","volume-title":"7th International Symposium, PET 2007 Ottawa, Canada, June 20--22","volume":"4776","author":"\u00d8verlier Lasse","year":"2007"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_2_1_96_1","volume-title":"The Trouble with Cloud Flare. https:\/\/blog.torproject.org\/blog\/trouble-cloudflare. (2016). Accessed","author":"Perry Mike","year":"2016"},{"key":"e_1_2_1_97_1","volume-title":"http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.31.pdf. (February","author":"Pfitzmann Andreas","year":"2008"},{"key":"e_1_2_1_98_1","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS","author":"Raymond Jean-Fran\u00e7ois","year":"2000"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855776"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_2_1_101_1","volume-title":"Will Your Internet Provider Be Spying on You? http:\/\/www.cnn.com\/2012\/07\/06\/opinion\/rushkoff-online-monitoring\/. (July","author":"Rushkoff Douglas","year":"2012"},{"key":"e_1_2_1_102_1","unstructured":"Juha Saarinen. 2014. First Shellshock Botnet Attacks Akamai US DoD Networks. http:\/\/www.itnews.com.au\/News\/396197 first-shellshock-botnet-attacks-akamai-us-dod-networks.aspx. (September 2014). Accessed March 2015.  Juha Saarinen. 2014. First Shellshock Botnet Attacks Akamai US DoD Networks. http:\/\/www.itnews.com.au\/News\/396197 first-shellshock-botnet-attacks-akamai-us-dod-networks.aspx. (September 2014). Accessed March 2015."},{"key":"e_1_2_1_103_1","unstructured":"Symantec Security. 2014. Apple IDs Targeted by Kelihos Botnet Phishing Campaign. http:\/\/www.symantec.com\/connect\/blogs\/apple-ids-targeted-kelihos-botnet-phishing-campaign. (September 2014). Accessed March 2015.  Symantec Security. 2014. Apple IDs Targeted by Kelihos Botnet Phishing Campaign. http:\/\/www.symantec.com\/connect\/blogs\/apple-ids-targeted-kelihos-botnet-phishing-campaign. (September 2014). Accessed March 2015."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163275"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2008","author":"Snader Robin","year":"2008"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866345"},{"key":"e_1_2_1_109_1","volume-title":"Tor Metrics Portal: Network. https:\/\/metrics.torproject.org\/networksize.html?graph&equals;networksize&start&equals;&equals;2014-12-08&end&equals;&equals;2015-03-08. (October","author":"Project The Tor","year":"2015"},{"key":"e_1_2_1_110_1","volume-title":"Tor Metrics Portal: Network. https:\/\/metrics.torproject.org\/torperf.html. (October","author":"Project The Tor","year":"2015"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115503"},{"key":"e_1_2_1_112_1","unstructured":"Camilo Viecco. 2008. UDP-OR: A Fair Onion Transport Design. http:\/\/www.petsymposium.org\/2008\/hotpets\/udp-tor.pdf. (July 2008). Accessed March 2015.  Camilo Viecco. 2008. UDP-OR: A Fair Onion Transport Design. http:\/\/www.petsymposium.org\/2008\/hotpets\/udp-tor.pdf. (July 2008). Accessed March 2015."},{"key":"e_1_2_1_113_1","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS 2013","author":"Wacek Chris","year":"2013"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866343"},{"key":"e_1_2_1_115_1","volume-title":"FC 2012, Kralendijk, Bonaire, Februray 27--March 2","volume":"7397","author":"Wang Tao","year":"2012"},{"key":"e_1_2_1_116_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Wang Tao","year":"2014"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455812"},{"key":"e_1_2_1_119_1","volume-title":"2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI\u201912","author":"Winter Philipp","year":"2012"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2946802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2946802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:02Z","timestamp":1750223222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2946802"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2016,9,21]]},"references-count":116,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,30]]}},"alternative-id":["10.1145\/2946802"],"URL":"https:\/\/doi.org\/10.1145\/2946802","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,21]]},"assertion":[{"value":"2015-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}