{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,12]],"date-time":"2024-02-12T11:43:00Z","timestamp":1707738180804},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Huawei Innovation Research Program"},{"name":"HK RGC ECS","award":["27200916"]},{"name":"HK RGC GRF","award":["17207117","17202318"]},{"name":"Croucher Innovation Award"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tdsc.2021.3052831","type":"journal-article","created":{"date-parts":[[2021,2,5]],"date-time":"2021-02-05T13:41:43Z","timestamp":1612532503000},"page":"2286-2303","source":"Crossref","is-referenced-by-count":2,"title":["DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6116-5488","authenticated-orcid":false,"given":"Tianxiang","family":"Shen","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8684-8509","authenticated-orcid":false,"given":"Jianyu","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]},{"given":"Yunpeng","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, South China University of Technology, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2807-9780","authenticated-orcid":false,"given":"Xusheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8548-116X","authenticated-orcid":false,"given":"Ji","family":"Qi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1643-2583","authenticated-orcid":false,"given":"Shixiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7746-440X","authenticated-orcid":false,"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"ref2","article-title":"Metadata time marking information for indicating a section of an audio object","author":"Resch","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2014.895655"},{"key":"ref5","first-page":"1","article-title":"How the Great Firewall of China is Blocking Tor","volume-title":"Proc. 2nd USENIX Workshop Free Open Commun. Internet","author":"Winter"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"key":"ref7","first-page":"1199","article-title":"The loopix anonymity system","volume-title":"Proc. 26th USENIX Secur. Symp. USENIX Secur.","author":"Piotrowska"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.449977"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2015.7114742"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133578"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"ref14","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Des. Implementation","author":"Wolinsky"},{"key":"ref15","first-page":"711","article-title":"Karaoke: Distributed private messaging immune to passive traffic analysis","volume-title":"Proc. 13th USENIX Symp. Operating Syst. Des. Implementation","author":"Lazar"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"ref17","first-page":"1841","article-title":"No right to remain silent: Isolating malicious mixes","volume-title":"Proc. 28th USENIX Secur. Symp. USENIX Secur.","author":"Leibowitz"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_26"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3810\/pgm.2005.07.1672"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-x_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref22","first-page":"551","article-title":"Unobservable communication over fully untrusted infrastructure","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Des. Implementation","author":"Angel"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/bf00206326"},{"key":"ref24","first-page":"1","article-title":"Trusted code execution on untrusted platforms using intel SGX","volume-title":"Proc. Virus Bull. Conf.","author":"Noubir"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2868054"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v2n4p153"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.03.007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916716"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"ref32","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Des. Implementation","author":"Wolinsky"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2946802"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"ref38","first-page":"1823","article-title":"Point break: A study of bandwidth denial-of-service attacks against tor","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Jansen"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258606"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.1630903"},{"key":"ref44","article-title":"Innovative technology for CPU based attestation and sealing","volume-title":"Proc. 2nd ACM Int. Workshop Hardware Architect. Support Secur. Privacy","author":"Anati"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37401-2_67"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_6"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253565"},{"key":"ref50","article-title":"Adding watermarks to images using alpha channels"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005154"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"ref53","article-title":"L1 terminal fault"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36415-3_3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36415-3_4"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1186\/s13104-015-1280-z"},{"key":"ref58","article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"Proc. 11th USENIX Workshop Offensive Technol.","author":"Brasser"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"ref61","article-title":"Wiki","author":"Tracker","year":"2018"},{"key":"ref62","first-page":"271","article-title":"$\\lbrace${RAPTOR$\\rbrace$}: Routing attacks on privacy in tor","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Sun"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.34"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"ref65","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Hayes"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.11.005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_11"},{"key":"ref70","first-page":"33","article-title":"A practical congestion attack on tor using long paths","volume-title":"Proc. USENIX Secur. Symp.","author":"Evans"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_9"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"ref73","article-title":"A tune-up for Tor: Improving security and performance in the Tor network","volume-title":"Proc. NDSS","author":"Snader"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994050"},{"key":"ref76","article-title":"WTF-PAD: Toward an efficient website fingerprinting defense for Tor","author":"Ju\u00e1rez","year":"2015","journal-title":"CoRR, abs\/1512.00524"},{"key":"ref77","article-title":"Software guard extensions programming reference"},{"key":"ref78","first-page":"283","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","volume-title":"Proc. 14th USENIX Conf. Netw. Syst. Des. Implementation","author":"Zheng"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"ref81","first-page":"145","article-title":"Enhancing security and privacy of Tor\u2019s ecosystem by using trusted execution environments","volume-title":"Proc. NSDI","author":"Kim"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00064"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2002.1043764"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9821019\/09328493.pdf?arnumber=9328493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:37:51Z","timestamp":1704843471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9328493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":86,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3052831","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}