{"id":"https://openalex.org/W2128735745","doi":"https://doi.org/10.1007/3-540-36415-3_3","title":"From a Trickle to a Flood: Active Attacks on Several Mix Types","display_name":"From a Trickle to a Flood: Active Attacks on Several Mix Types","publication_year":2002,"publication_date":"2002-12-18","ids":{"openalex":"https://openalex.org/W2128735745","doi":"https://doi.org/10.1007/3-540-36415-3_3","mag":"2128735745"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-36415-3_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture Notes in Computer Science","issn_l":"0302-9743","issn":["1611-3349","0302-9743"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057636987","display_name":"Andrei Serjantov","orcid":null},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andrei Serjantov","raw_affiliation_string":"University of Cambridge Computer Laboratory#TAB#","raw_affiliation_strings":["University of Cambridge Computer Laboratory#TAB#"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074119993","display_name":"Roger Dingledine","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roger Dingledine","raw_affiliation_string":"The Free Haven Project","raw_affiliation_strings":["The Free Haven Project"]},{"author_position":"last","author":{"id":"https://openalex.org/A5028116351","display_name":"Paul Syverson","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I175003984"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul F. Syverson","raw_affiliation_string":"Naval Research Laboratory","raw_affiliation_strings":["Naval Research Laboratory"]}],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392,"provenance":"doaj"},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392,"provenance":"doaj"},"has_fulltext":false,"cited_by_count":100,"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"36","last_page":"52"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"active attacks","score":0.6483},{"keyword":"several mix types","score":0.4425},{"keyword":"flood","score":0.3695}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.9005151},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81767917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.63482124},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5492551},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.5026634},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.48040918},{"id":"https://openalex.org/C2778091609","wikidata":"https://www.wikidata.org/wiki/Q14713","display_name":"Mount","level":2,"score":0.4111014},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06858128},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-36415-3_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture Notes in Computer Science","issn_l":"0302-9743","issn":["1611-3349","0302-9743"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.53}],"grants":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W1523373677","https://openalex.org/W1604746990","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2295017432"],"related_works":["https://openalex.org/W2119752897","https://openalex.org/W2523443373","https://openalex.org/W1545371006","https://openalex.org/W2117874351","https://openalex.org/W2161963552","https://openalex.org/W2090164013","https://openalex.org/W4390763661","https://openalex.org/W2391780702","https://openalex.org/W2356532375","https://openalex.org/W2834885115"],"ngrams_url":"https://api.openalex.org/works/W2128735745/ngrams","abstract_inverted_index":{"The":[0],"literature":[1],"contains":[2],"a":[3,57],"variety":[4],"of":[5,9,56,66,71,74,94,119],"different":[6],"mixes,":[7],"some":[8],"which":[10,101],"have":[11],"been":[12],"used":[13],"in":[14,69,100,128],"deployed":[15],"anonymity":[16,21,55],"systems.":[17],"We":[18,42,61,89],"explore":[19],"their":[20,102],"and":[22,26,83,92,97,112,131],"message":[23,59],"delay":[24],"properties,":[25],"show":[27,43],"how":[28],"to":[29],"mount":[30],"active":[31],"attacks":[32,51,68],"against":[33,121],"them":[34],"by":[35],"altering":[36],"the":[37,40,54,64,72,76,81,84,98,122],"traffic":[38,111],"between":[39],"mixes.":[41],"that":[44],"if":[45],"certain":[46],"mixes":[47,96,114],"are":[48],"used,":[49],"such":[50],"cannot":[52],"destroy":[53],"particular":[58],"completely.":[60],"work":[62],"out":[63,125],"cost":[65],"these":[67,95],"terms":[70],"number":[73],"messages":[75],"attacker":[77],"must":[78,87],"insert":[79],"into":[80],"network":[82],"time":[85],"he":[86],"spend.":[88],"discuss":[90],"advantages":[91],"disadvantages":[93],"settings":[99],"use":[103],"is":[104],"appropriate.":[105],"Finally,":[106],"we":[107],"look":[108],"at":[109],"dummy":[110],"SG":[113],"as":[115],"other":[116],"promising":[117],"ways":[118],"protecting":[120],"attacks,":[123],"point":[124],"potential":[126],"weaknesses":[127],"existing":[129],"designs,":[130],"suggest":[132],"improvements.":[133]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2128735745","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2024-03-03T05:19:01.187220","created_date":"2016-06-24"}