{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:15:14Z","timestamp":1730283314725,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9653038","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T16:06:10Z","timestamp":1640880370000},"page":"323-328","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Security Analysis of the Unlinkability in Tor"],"prefix":"10.1109","author":[{"given":"Jing","family":"Tian","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yangyang","family":"Guan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Wei","family":"Xia","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"journal-title":"Tor project obfsproxy4","year":"0","key":"ref10"},{"journal-title":"Obfs3 is blocked","year":"0","key":"ref11"},{"journal-title":"Dust A Blocking-Resistant Internet Transport Protocol","year":"2011","author":"wiley","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3394520"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23210"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref4","article-title":"Anonymity with tor: A survey on tor attacks","volume":"abs 2009 13018","author":"karunanayake","year":"2020","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00042"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"ref6","first-page":"271","article-title":"RAPTOR: routing attacks on privacy in tor","author":"sun","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134074"},{"key":"ref8","first-page":"877","article-title":"Libfte: A toolkit for constructing practical, format-abiding encryption schemes","author":"luchaup","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2272740"},{"journal-title":"Tor project stem","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"journal-title":"Tor project meek","year":"0","key":"ref9"},{"key":"ref20","first-page":"253","article-title":"Operating systems support for planetary-scale network services","author":"bavier","year":"2004","journal-title":"1st Symposium on Networked Systems Design and Implementation (NSDI 2004)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"ref21","article-title":"RAINBOW: A robust and invisible non-blind watermark for network flows","author":"houmansadr","year":"2009","journal-title":"Proceedings of the Network and Distributed System Security Symposium NDSS 2009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"journal-title":"Tor obfuscation mode","year":"2016","key":"ref26"},{"journal-title":"Obfs2 out of services","year":"0","key":"ref25"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09653038.pdf?arnumber=9653038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:09:30Z","timestamp":1659470970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9653038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9653038","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}