{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:00Z","timestamp":1772039520973,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["C15\/IS\/10486741"],"award-info":[{"award-number":["C15\/IS\/10486741"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363249","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2533-2535","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Wladimir","family":"De la Cadena","sequence":"first","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Asya","family":"Mitseva","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Jens","family":"Hiller","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Fabian","family":"Lanze","sequence":"additional","affiliation":[{"name":"Huf Secure Mobile GmbH, Velbert, Germany"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology, Cottbus, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Xiang Cai et al. 2014a. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES.  Xiang Cai et al. 2014a. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES.","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Xiang Cai et al. 2014b. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In ACM CCS.  Xiang Cai et al. 2014b. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In ACM CCS.","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Wladimir De la Cadena etal 2019. Analysis of Multi-path Onion Routing-Based Anonymization Networks. In IFIP WG 11.3 DBSec.  Wladimir De la Cadena et al. 2019. Analysis of Multi-path Onion Routing-Based Anonymization Networks. In IFIP WG 11.3 DBSec.","DOI":"10.1007\/978-3-030-22479-0_13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Kevin Dyer et al. 2012. Peek-a-Boo I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In IEEE S&P.  Kevin Dyer et al. 2012. Peek-a-Boo I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In IEEE S&P.","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_5_1","volume-title":"Network-Based Website Fingerprinting. https:\/\/tools.ietf.org\/html\/draft-wood-privsec-wfattacks-00. (Accessed","author":"Goldberg Ian","year":"2019","unstructured":"Ian Goldberg . 2019. Network-Based Website Fingerprinting. https:\/\/tools.ietf.org\/html\/draft-wood-privsec-wfattacks-00. (Accessed : August 2019 ). Ian Goldberg. 2019. Network-Based Website Fingerprinting. https:\/\/tools.ietf.org\/html\/draft-wood-privsec-wfattacks-00. (Accessed: August 2019)."},{"key":"e_1_3_2_1_6_1","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX Security.  Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX Security."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jens Hiller et al. 2019. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In IEEE ICNP.  Jens Hiller et al. 2019. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In IEEE ICNP.","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Marc Juarez et al. 2016. Toward an Efficient Website Fingerprinting Defense. In ESORICS.  Marc Juarez et al. 2016. Toward an Efficient Website Fingerprinting Defense. In ESORICS.","DOI":"10.1007\/978-3-319-45744-4_2"},{"issue":"4","key":"e_1_3_2_1_10_1","first-page":"0","article-title":"New Release","volume":"0","author":"Mathewson Nick","year":"2019","unstructured":"Nick Mathewson . 2019 . New Release : Tor 0 . 4 . 0 .5. https:\/\/blog.torproject.org\/new-release-tor-0405. (Accessed: August 2019). Nick Mathewson. 2019. New Release: Tor 0.4.0.5. https:\/\/blog.torproject.org\/new-release-tor-0405. (Accessed: August 2019).","journal-title":"Tor"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko et al. 2016. Website Fingerprinting at Internet Scale. In NDSS.  Andriy Panchenko et al. 2016. Website Fingerprinting at Internet Scale. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_12_1","volume-title":"Path Selection Metrics for Performance-Improved Onion Routing","author":"Panchenko Andriy","unstructured":"Andriy Panchenko and Johannes Renner . 2009. Path Selection Metrics for Performance-Improved Onion Routing . In IEEE SAINT. Andriy Panchenko and Johannes Renner. 2009. Path Selection Metrics for Performance-Improved Onion Routing. In IEEE SAINT."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jan Pennekamp et al. 2019. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. In IEEE ICNP.  Jan Pennekamp et al. 2019. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. In IEEE ICNP.","DOI":"10.1109\/ICNP.2019.8888029"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_15_1","unstructured":"Tao Wang et al. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security.  Tao Wang et al. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security."},{"key":"e_1_3_2_1_16_1","unstructured":"Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security.  Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363249","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363249"}},"subtitle":["Traffic Splitting to Counter Website Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":15,"alternative-id":["10.1145\/3319535.3363249","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363249","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}