{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:57:02Z","timestamp":1772042222832,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3658664.3659631","type":"proceedings-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T15:09:27Z","timestamp":1718204967000},"page":"199-209","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CLAM: Client-Aware Routing in Mix Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0223-9082","authenticated-orcid":false,"given":"Mahdi","family":"Rahimi","sequence":"first","affiliation":[{"name":"COSIC, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.26"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0044"},{"key":"e_1_3_2_1_5_1","volume-title":"27th $USENIX$ Security Symposium ($USENIX$ Security 18). 429--444.","author":"Barton Armon","unstructured":"Armon Barton, Matthew Wright, Jiang Ming, and Mohsen Imani. 2018. Towards predicting efficient and anonymous Tor circuits. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 429--444."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00011"},{"key":"e_1_3_2_1_8_1","unstructured":"Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network. (2021)."},{"key":"e_1_3_2_1_9_1","volume-title":"Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22--27","author":"Diaz Claudia","year":"2004","unstructured":"Claudia Diaz and Bart Preneel. 2004. Taxonomy of mixes and dummy traffic. In Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22--27 August 2004 Toulouse, France. Springer, 217--232."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994630"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_1_13_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kohls Katharina","year":"2022","unstructured":"Katharina Kohls and Claudia Diaz. 2022. $$VerLoc$$: Verifiable Localization in Decentralized Systems. In 31st USENIX Security Symposium (USENIX Security 22). 2637--2654."},{"key":"e_1_3_2_1_14_1","volume-title":"Measuring and mitigating AS-level adversaries against Tor. arXiv preprint arXiv:1505.05173","author":"Nithyanand Rishab","year":"2015","unstructured":"Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, and Michael Schapira. 2015. Measuring and mitigating AS-level adversaries against Tor. arXiv preprint arXiv:1505.05173 (2015)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"e_1_3_2_1_16_1","volume-title":"26th $USENIX$ Security Symposium ($USENIX$ Security 17). 1199--1216.","author":"Piotrowska Ania M","unstructured":"Ania M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 1199--1216."},{"key":"e_1_3_2_1_17_1","volume-title":"LARMix: Latency-Aware Routing in Mix Networks. In The Network and Distributed System Security Symposium. Internet Society.","author":"Rahimi Mahdi","year":"2024","unstructured":"Mahdi Rahimi, Piyush Kumar Sharma, and Claudia Diaz. 2024. LARMix: Latency-Aware Routing in Mix Networks. In The Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417279"},{"key":"e_1_3_2_1_19_1","volume-title":"Communication theory of secrecy systems. The Bell system technical journal","author":"Shannon Claude E","year":"1949","unstructured":"Claude E Shannon. 1949. Communication theory of secrecy systems. The Bell system technical journal , Vol. 28, 4 (1949), 656--715."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182658"},{"key":"e_1_3_2_1_22_1","first-page":"2","article-title":"Ripe atlas: A global internet measurement network","volume":"18","author":"Ncc Staff RIPE","year":"2015","unstructured":"RIPE Ncc Staff. 2015. Ripe atlas: A global internet measurement network. Internet Protocol Journal , Vol. 18, 3 (2015), 2--26.","journal-title":"Internet Protocol Journal"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.34"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0069"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_9"}],"event":{"name":"IH&MMSEC '24: ACM Workshop on Information Hiding and Multimedia Security","location":"Baiona Spain","acronym":"IH&MMSEC '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658664.3659631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:44:00Z","timestamp":1755906240000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":25,"alternative-id":["10.1145\/3658664.3659631","10.1145\/3658664"],"URL":"https:\/\/doi.org\/10.1145\/3658664.3659631","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}