{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:10:27Z","timestamp":1728177027731},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CyberSecurity Research Flanders","award":["VR20192203"]},{"name":"Research Council KU Leuven","award":["C24\/18\/049"]},{"name":"DARPA","award":["FA8750-19-C-0502"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3463676.3485613","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:07:38Z","timestamp":1636150058000},"page":"33-37","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["MiXiM"],"prefix":"10.1145","author":[{"given":"Iness","family":"Ben Guirat","sequence":"first","affiliation":[{"name":"imec-COSIC, KU Leuven, Leuven, Belgium"}]},{"given":"Devashish","family":"Gosain","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"imec-COSIC, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_2_2_1","volume-title":"Technical report","author":"Chaum D.","year":"2016","unstructured":"Chaum , D. , Javani , F. , Kate , A. , Krasnova , A. , Ruiter , J. , Sherman , A. T. , and Das , D . cmix: Anonymization by high-performance scalable mixing. Tech. rep ., Technical report , 2016 . Chaum, D., Javani, F., Kate, A., Krasnova, A., Ruiter, J., Sherman, A. T., and Das, D. cmix: Anonymization by high-performance scalable mixing. Tech. rep., Technical report, 2016."},{"key":"e_1_3_2_2_3_1","volume-title":"Mixmaster and remailer attacks","author":"Cottrell L.","year":"1995","unstructured":"Cottrell , L. Mixmaster and remailer attacks , 1995 . Cottrell, L. Mixmaster and remailer attacks, 1995."},{"key":"e_1_3_2_2_4_1","first-page":"35","volume-title":"International Workshop on Privacy Enhancing Technologies","author":"Danezis G.","year":"2004","unstructured":"Danezis , G. The traffic analysis of continuous-time mixes . In International Workshop on Privacy Enhancing Technologies ( 2004 ), Springer , pp. 35 -- 50 . Danezis, G. The traffic analysis of continuous-time mixes. In International Workshop on Privacy Enhancing Technologies (2004), Springer, pp. 35--50."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00011"},{"key":"e_1_3_2_2_6_1","volume-title":"February","author":"Diaz C.","year":"2021","unstructured":"Diaz , C. , Halpin , H. , and Kiayias , A . The Nym Network. https:\/\/nymtech.net\/nym-whitepaper.pdf , February 2021 . Diaz, C., Halpin, H., and Kiayias, A. The Nym Network. https:\/\/nymtech.net\/nym-whitepaper.pdf, February 2021."},{"key":"e_1_3_2_2_7_1","first-page":"184","volume-title":"Proceedings of the 10th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2010), PETS'10, Springer-Verlag","author":"Diaz C.","unstructured":"Diaz , C. , Murdoch , S. J. , and Troncoso , C . Impact of network topology on anonymity and overhead in low-latency anonymity networks . In Proceedings of the 10th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2010), PETS'10, Springer-Verlag , pp. 184 -- 201 . Diaz, C., Murdoch, S. J., and Troncoso, C. Impact of network topology on anonymity and overhead in low-latency anonymity networks. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2010), PETS'10, Springer-Verlag, pp. 184--201."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8145-6_18"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765304"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_11_1","first-page":"390","volume-title":"International Conference on Cryptology and Network Security","author":"Gelernter N.","year":"2017","unstructured":"Gelernter , N. , Herzberg , A. , and Leibowitz , H . Two cents for strong anonymity: The anonymous post-office protocol . In International Conference on Cryptology and Network Security ( 2017 ), Springer , pp. 390 -- 412 . Gelernter, N., Herzberg, A., and Leibowitz, H. Two cents for strong anonymity: The anonymous post-office protocol. In International Conference on Cryptology and Network Security (2017), Springer, pp. 390--412."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS) (February","author":"Jansen R.","year":"2012","unstructured":"Jansen , R. , and Hopper , N . Shadow: Running tor in a box for accurate and efficient experimentation . In Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS) (February 2012 ), Internet Society. Jansen, R., and Hopper, N. Shadow: Running tor in a box for accurate and efficient experimentation. In Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS) (February 2012), Internet Society."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_2_15_1","first-page":"759","volume-title":"17th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20)","author":"Kwon A.","year":"2020","unstructured":"Kwon , A. , Lu , D. , and Devadas , S . $$XRD$$: Scalable messaging system with cryptographic privacy . In 17th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20) ( 2020 ), pp. 759 -- 776 . Kwon, A., Lu, D., and Devadas, S. $$XRD$$: Scalable messaging system with cryptographic privacy. In 17th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20) (2020), pp. 759--776."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_23"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_11"},{"key":"e_1_3_2_2_18_1","first-page":"1199","volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17)","author":"Piotrowska A. M.","year":"2017","unstructured":"Piotrowska , A. M. , Hayes , J. , Elahi , T. , Meiser , S. , and Danezis , G . The loopix anonymity system . In 26th {USENIX} Security Symposium ({USENIX} Security 17) ( 2017 ), pp. 1199 -- 1216 . Piotrowska, A. M., Hayes, J., Elahi, T., Meiser, S., and Danezis, G. The loopix anonymity system. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (2017), pp. 1199--1216."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765303"},{"key":"e_1_3_2_2_20_1","volume-title":"A survey on routing in anonymous communication protocols. ACM Computing Surveys (CSUR) 51, 3","author":"Shirazi F.","year":"2018","unstructured":"Shirazi , F. , Simeonovski , M. , Asghar , M. R. , Backes , M. , and Diaz , C . A survey on routing in anonymous communication protocols. ACM Computing Surveys (CSUR) 51, 3 ( 2018 ), 1--39. Shirazi, F., Simeonovski, M., Asghar, M. R., Backes, M., and Diaz, C. A survey on routing in anonymous communication protocols. ACM Computing Surveys (CSUR) 51, 3 (2018), 1--39."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485613","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T04:33:39Z","timestamp":1673238819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485613"}},"subtitle":["Mixnet Design Decisions and Empirical Evaluation"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":20,"alternative-id":["10.1145\/3463676.3485613","10.1145\/3463676"],"URL":"https:\/\/doi.org\/10.1145\/3463676.3485613","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}