{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:09Z","timestamp":1755882609949,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664516","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0096-470X","authenticated-orcid":false,"given":"Sarah Abdelwahab","family":"Gaballah","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6237-7378","authenticated-orcid":false,"given":"Lamya","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-5327","authenticated-orcid":false,"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_28"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_1"},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 35\u201350","author":"Danezis George","year":"2004","unstructured":"George Danezis. 2004. The traffic analysis of continuous-time mixes. In International Workshop on Privacy Enhancing Technologies. Springer, 35\u201350."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.11.004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_9"},{"key":"e_1_3_2_1_11_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 54\u201368","author":"Diaz Claudia","year":"2002","unstructured":"Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. 2002. Towards measuring anonymity. In International Workshop on Privacy Enhancing Technologies. Springer, 54\u201368."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_14"},{"key":"e_1_3_2_1_13_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 186\u2013206","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Vitaly Shmatikov, and Paul Syverson. 2004. Synchronous batching: From cascades to free routes. In International Workshop on Privacy Enhancing Technologies. Springer, 186\u2013206."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600166"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22295-5_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00028"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68063-7_15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0059"},{"key":"e_1_3_2_1_21_1","first-page":"22","article-title":"Mixnet optimization methods","volume":"1","author":"Guirat Iness\u00a0Ben","year":"2022","unstructured":"Iness\u00a0Ben Guirat and Claudia Diaz. 2022. Mixnet optimization methods. Proceedings on Privacy Enhancing Technologies 1 (2022), 22.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"volume-title":"Improving security and efficiency of mix-based anonymous communication systems. Ph.\u00a0D. Dissertation","author":"Madani Shaahin","key":"e_1_3_2_1_22_1","unstructured":"Shaahin Madani. 2015. Improving security and efficiency of mix-based anonymous communication systems. Ph.\u00a0D. Dissertation. RMIT University."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0546-3"},{"key":"e_1_3_2_1_24_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485614"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_2"},{"key":"e_1_3_2_1_27_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 41\u201353","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov and George Danezis. 2002. Towards an information theoretic metric for anonymity. In International Workshop on Privacy Enhancing Technologies. Springer, 41\u201353."},{"key":"e_1_3_2_1_28_1","volume-title":"International Workshop on Information Hiding. Springer, 36\u201352","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov, Roger Dingledine, and Paul Syverson. 2002. From a trickle to a flood: Active attacks on several mix types. In International Workshop on Information Hiding. Springer, 36\u201352."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_41"},{"key":"e_1_3_2_1_30_1","unstructured":"Micah Sherr Boon\u00a0Thau Loo and Matt Blaze. 2007. Towards Application-Aware Anonymous Routing.. In HotSec."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1140814.1140816"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"key":"e_1_3_2_1_33_1","unstructured":"Robin Snader and Nikita Borisov. 2008. A Tune-up for Tor: Improving Security and Performance in the Tor Network.. In ndss Vol.\u00a08. 127."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11534310_49"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:53:33Z","timestamp":1755881613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":34,"alternative-id":["10.1145\/3664476.3664516","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664516","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}