{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:24:35Z","timestamp":1725686675735},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427238","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T17:20:18Z","timestamp":1607534418000},"page":"129-140","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Quantifying measurement quality and load distribution in Tor"],"prefix":"10.1145","author":[{"given":"Andre","family":"Greubel","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Pohl","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Tao Chen Weiqi Cui and Eric Chan-Tin. 2019. Measuring Tor Relay Popularity. In Security and Privacy in Communication Networks. Tao Chen Weiqi Cui and Eric Chan-Tin. 2019. Measuring Tor Relay Popularity. In Security and Privacy in Communication Networks.","DOI":"10.1007\/978-3-030-37228-6_19"},{"volume-title":"Statistical power analysis for the behavioral sciences New York","year":"1988","author":"Cohen Jacob","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"European court\u00a0of auditors. 2018. Broadband in the EU Member States: despite progress not all the Europe 2020 targets will be met. https:\/\/www.eca.europa.eu\/en\/Pages\/DocItem.aspx?did=45796 (accessed 25.08.2020). European court\u00a0of auditors. 2018. Broadband in the EU Member States: despite progress not all the Europe 2020 targets will be met. https:\/\/www.eca.europa.eu\/en\/Pages\/DocItem.aspx?did=45796 (accessed 25.08.2020)."},{"key":"e_1_3_2_1_6_1","unstructured":"Roger Dingledine. 2013. The lifecycle of a new relay. https:\/\/blog.torproject.org\/lifecycle-new-relay (accessed 25.08.2020). Roger Dingledine. 2013. The lifecycle of a new relay. https:\/\/blog.torproject.org\/lifecycle-new-relay (accessed 25.08.2020)."},{"volume-title":"7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs","year":"2014","author":"Dingledine Roger","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381973"},{"key":"e_1_3_2_1_10_1","unstructured":"The\u00a0Tor Foundationt. 2020. Tor Metrics. https:\/\/metrics.torproject.org\/ (accessed 25.08.2020). The\u00a0Tor Foundationt. 2020. Tor Metrics. https:\/\/metrics.torproject.org\/ (accessed 25.08.2020)."},{"key":"e_1_3_2_1_11_1","unstructured":"Andr\u00e9 Greubel. 2020. Tor Bandwidth Measurement and Load Distribution Data. https:\/\/go.uniwue.de\/20 (accessed 25.08.2020). Andr\u00e9 Greubel. 2020. Tor Bandwidth Measurement and Load Distribution Data. https:\/\/go.uniwue.de\/20 (accessed 25.08.2020)."},{"volume-title":"Proceedings of the 34th Annual Computer Security Applications Conference.","year":"2018","author":"Greubel Andr\u00e9","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346860"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Karsten Loesing Steven\u00a0J. Murdoch and Roger Dingledine. 2010. A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In Financial Cryptography and Data Security. Karsten Loesing Steven\u00a0J. Murdoch and Roger Dingledine. 2010. A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-642-14992-4_19"},{"key":"e_1_3_2_1_17_1","unstructured":"Damon McCoy Kevin Bauer Dirk Grunwald Tadayoshi Kohno and Douglas Sicker. 2008. Shining Light in Dark Places: Understanding the Tor Network. In Privacy Enhancing Technologies. Damon McCoy Kevin Bauer Dirk Grunwald Tadayoshi Kohno and Douglas Sicker. 2008. Shining Light in Dark Places: Understanding the Tor Network. In Privacy Enhancing Technologies."},{"volume-title":"Sicherheit","year":"2020","author":"Mitseva Asya","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.63"},{"volume-title":"Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies.","year":"2009","author":"Perry Mike","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Mike Perry. 2018. Tor\u2019s Open Research Topics: 2018 Edition. https:\/\/blog.torproject.org\/tors-open-research-topics-2018-edition (accessed 25.08.2020). Mike Perry. 2018. Tor\u2019s Open Research Topics: 2018 Edition. https:\/\/blog.torproject.org\/tors-open-research-topics-2018-edition (accessed 25.08.2020)."},{"key":"e_1_3_2_1_24_1","unstructured":"Reporters without Borders. 2020. World press freedom index. (2020). Reporters without Borders. 2020. World press freedom index. (2020)."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","year":"2008","author":"Snader Robin","key":"e_1_3_2_1_25_1"},{"volume-title":"Proceedings of the 8th international conference on Peer-to-peer systems.","year":"2009","author":"Snader Robin","key":"e_1_3_2_1_26_1"},{"volume-title":"RAPTOR: Routing Attacks on Privacy in Tor. In 24th Usenix Security Symposium.","year":"2015","author":"Sun Yixin","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"The Tor Foundation. 2019. How Bandwidth Scanners Monitor The Tor Network. https:\/\/blog.torproject.org\/how-bandwidth-scanners-monitor-tor-network (accessed 25.08.2020). The Tor Foundation. 2019. How Bandwidth Scanners Monitor The Tor Network. https:\/\/blog.torproject.org\/how-bandwidth-scanners-monitor-tor-network (accessed 25.08.2020)."},{"key":"e_1_3_2_1_29_1","unstructured":"The Tor Foundation. 2020. Tor Bandwidth file specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/bandwidth-file-spec.txt (accessed 25.08.2020). The Tor Foundation. 2020. Tor Bandwidth file specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/bandwidth-file-spec.txt (accessed 25.08.2020)."},{"key":"e_1_3_2_1_30_1","unstructured":"The Tor Foundation. 2020. Tor directory protocol version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt (accessed 25.08.2020). The Tor Foundation. 2020. Tor directory protocol version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt (accessed 25.08.2020)."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","year":"2013","author":"Wacek Chris","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Tao Wang Kevin Bauer Clara Forero and Ian Goldberg. 2012. Congestion-Aware Path Selection for Tor. In Financial Cryptography and Data Security. Tao Wang Kevin Bauer Clara Forero and Ian Goldberg. 2012. Congestion-Aware Path Selection for Tor. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-642-32946-3_9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_16"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T10:36:54Z","timestamp":1673519814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":33,"alternative-id":["10.1145\/3427228.3427238","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427238","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}