{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:02:02Z","timestamp":1769547722729,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.23919\/ifipnetworking52078.2021.9472843","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:09:00Z","timestamp":1625861340000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network"],"prefix":"10.23919","author":[{"given":"Matteo","family":"Varvello","sequence":"first","affiliation":[]},{"given":"Inigo Querejeta","family":"Azurmendi","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Nappa","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Goncalo","family":"Pestana","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Sentinel Interoperable network layer for distributed resources"},{"key":"ref38","article-title":"TLS Encrypted Client Hello. Internet-Draft draft-ietf-tls-esni-07","author":"rescorla","year":"2020","journal-title":"Internet Engineering Task Force"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.125"},{"key":"ref32","year":"2019","journal-title":"Create your own vpn"},{"key":"ref31","year":"2019","journal-title":"Open VPN"},{"key":"ref30","first-page":"229","article-title":"VPN gate: A volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls","author":"nobori","year":"2014","journal-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)"},{"key":"ref37","article-title":"Encrypted Server Name Indication for TLS 1.3. Internet-Draft draft-ietf-tls-esni-03","author":"rescorla","year":"2019","journal-title":"Internet Engineering Task Force"},{"key":"ref36","author":"rescorla","year":"2018","journal-title":"Tls 1 3 rfc"},{"key":"ref35","year":"2019","journal-title":"Proton vpn"},{"key":"ref34","year":"2021","journal-title":"Filecoin a decentralized storage system"},{"key":"ref10","year":"0","journal-title":"Automated free proxies discovery\/usage"},{"key":"ref40","author":"silverman","year":"2020","journal-title":"Popular vpn and ad-blocking apps are secretly harvesting user data"},{"key":"ref11","author":"cimpanu","year":"2020","journal-title":"Hacking vpn servers to plant backdoors in companies"},{"key":"ref12","year":"2021","journal-title":"Browsing experience security check"},{"key":"ref13","first-page":"53","article-title":"N2n: A layer two peer-to-peer vpn","author":"deri","year":"0","journal-title":"IFIP International Conference on Autonomous Infrastructure Management and Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"key":"ref15","first-page":"10","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"el gamal","year":"0","journal-title":"Proceedings of CRYPTO 84 on Advances in cryptology"},{"key":"ref16","year":"2019","journal-title":"eMule"},{"key":"ref17","year":"2019","journal-title":"Puppet"},{"key":"ref18","article-title":"A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory","author":"guillou","year":"0","journal-title":"EUROCRYPT'88"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref28","author":"kirk","year":"2019","journal-title":"Nordvpn says server compromised due to misconfiguration"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_31"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278570"},{"key":"ref3","article-title":"Hybrid Public Key Encryption","author":"barnes","year":"2020","journal-title":"Internet-Draft draft-irtf-cfrg-hpke-04 Internet Engineering Task Force"},{"key":"ref6","author":"brinkmann","year":"2015","journal-title":"Beware Hola vpn turns your pc into an exit node and sells your traffic"},{"key":"ref29","author":"martin","year":"2015","journal-title":"Do you use hola vpn? you could be part of a ddos content theft - or worse"},{"key":"ref5","author":"brainard","year":"2010"},{"key":"ref8","first-page":"410","article-title":"Efficient group signature schemes for large groups (extended abstract)","author":"camenisch","year":"0","journal-title":"Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '97"},{"key":"ref7","first-page":"107","article-title":"Proving in zero-knowledge that a number is the product of two safe primes","author":"camenisch","year":"1999","journal-title":"EUROCRYPT'99"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2005.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02627-0_6"},{"key":"ref1","year":"2019","journal-title":"The Pirate Bay"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1919","DOI":"10.1145\/3372297.3417239","article-title":"DECO: liberating web data using decentralized oracles for TLS","author":"zhang","year":"2020","journal-title":"CCS '20 2020 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref45","author":"vilenski","year":"2020","journal-title":"Hola free vpn - unblock any website"},{"key":"ref22","year":"0","journal-title":"Inter-Planetary File System"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"ref42","year":"0","journal-title":"Mysterium network Decentralised vpn built on blockchain"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-009-0053-7"},{"key":"ref23","author":"jackson","year":"2016","journal-title":"Ipact - controversial new uk isp internet snooping bill becoming law"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_4"},{"key":"ref26","author":"kastrenakes","year":"2017","journal-title":"Congress just cleared the way for internet providers to sell your web browsing history"},{"key":"ref43","year":"2019","journal-title":"Transmission"},{"key":"ref25","first-page":"98","article-title":"Koorde: A simple degree-optimal distributed hash table","author":"kaashoek","year":"0","journal-title":"International Workshop on Peer-to-Peer Systems"}],"event":{"name":"2021 IFIP Networking Conference (IFIP Networking)","location":"Espoo and Helsinki, Finland","start":{"date-parts":[[2021,6,21]]},"end":{"date-parts":[[2021,6,24]]}},"container-title":["2021 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9472750\/9472195\/09472843.pdf?arnumber=9472843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:56:01Z","timestamp":1725396961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9472843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":47,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking52078.2021.9472843","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]}}}