{"id":"https://openalex.org/W2031653693","doi":"https://doi.org/10.1109/ccis.2012.6664257","title":"TMT: A new Tunable Mechanism of Tor based on the path length","display_name":"TMT: A new Tunable Mechanism of Tor based on the path length","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2031653693","doi":"https://doi.org/10.1109/ccis.2012.6664257","mag":"2031653693"},"language":"en","primary_location":{"id":"doi:10.1109/ccis.2012.6664257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100398923","display_name":"Chenglong Li","orcid":"https://orcid.org/0000-0001-6775-9386"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenglong Li","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109879581","display_name":"Yibo Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibo Xue","raw_affiliation_strings":["Tsinghua National Laboratory for Information Science and Technology (TNList), Beijing, China","Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology (TNList), Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083944036","display_name":"Longtao He","orcid":"https://orcid.org/0000-0001-7072-7457"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longtao He","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100424666","display_name":"Lidong Wang","orcid":"https://orcid.org/0000-0002-9998-602X"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong Wang","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team, Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"Nat. Comput. Network Emergency Response Tech. Team / Coordination Center of China (CNCERT/CC), Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100398923"],"corresponding_institution_ids":["https://openalex.org/I4210087772"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09268191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"13","issue":null,"first_page":"661","last_page":"665"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.8353846073150635},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8197993636131287},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7691076993942261},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6756429672241211},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5661311745643616},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.474346786737442},{"id":"https://openalex.org/keywords/path-length","display_name":"Path length","score":0.4212665259838104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4070873260498047},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38498079776763916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2967653274536133},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.25250518321990967},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17642760276794434}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.8353846073150635},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8197993636131287},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7691076993942261},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6756429672241211},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5661311745643616},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.474346786737442},{"id":"https://openalex.org/C129045301","wikidata":"https://www.wikidata.org/wiki/Q7144654","display_name":"Path length","level":2,"score":0.4212665259838104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4070873260498047},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38498079776763916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2967653274536133},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.25250518321990967},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17642760276794434},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccis.2012.6664257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1484798037","https://openalex.org/W1593719721","https://openalex.org/W1655958391","https://openalex.org/W1978884755","https://openalex.org/W2012813880","https://openalex.org/W2103647628","https://openalex.org/W2109187517","https://openalex.org/W2138683822","https://openalex.org/W2156410527","https://openalex.org/W2162297215","https://openalex.org/W2341111334","https://openalex.org/W6628958682","https://openalex.org/W6637080381"],"related_works":["https://openalex.org/W2129550502","https://openalex.org/W2009808060","https://openalex.org/W2093961518","https://openalex.org/W2372801012","https://openalex.org/W2009843927","https://openalex.org/W2361133696","https://openalex.org/W1995629993","https://openalex.org/W2092513144","https://openalex.org/W2069032895","https://openalex.org/W1974037309"],"abstract_inverted_index":{"Tor":[0,30,48],"is":[1,81,88],"one":[2],"of":[3,47,60,73,77,98,114],"the":[4,38,52,57,61,71,74,78,84,109],"most":[5],"widely":[6],"used":[7],"low-latency":[8],"anonymous":[9],"communication":[10],"systems":[11],"currently.":[12],"However,":[13],"a":[14,43],"fact":[15],"that":[16],"users":[17,100],"have":[18],"different":[19,96],"requirements":[20],"on":[21,51],"anonymity":[22,58],"and":[23,35,90,101,112],"performance":[24,34,75],"could":[25,94],"not":[26],"be":[27],"required":[28],"in":[29],"impacts":[31],"its":[32],"usability,":[33,110],"anonymity.":[36],"In":[37],"paper,":[39],"we":[40],"firstly":[41],"provide":[42],"new":[44],"Tunable":[45],"Mechanism":[46],"(TMT)":[49],"based":[50],"path":[53,62,79],"length.":[54],"We":[55],"analyze":[56],"influence":[59,76],"length":[63,80],"by":[64],"theoretical":[65],"derivation.":[66],"Then,":[67],"through":[68],"experiment":[69],"evaluation,":[70],"result":[72],"shown.":[82],"From":[83],"results":[85],"above,":[86],"TMT":[87],"flexible":[89],"easily":[91],"deployed":[92],"which":[93],"fulfill":[95],"demands":[97],"various":[99],"become":[102],"practical":[103],"complement":[104],"to":[105],"Tor,":[106],"thus":[107],"enhancing":[108],"diversity":[111],"security":[113],"Tor.":[115]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
