{"id":"https://openalex.org/W2293277129","doi":"https://doi.org/10.1145/1030083.1030114","title":"Fragile mixing","display_name":"Fragile mixing","publication_year":2004,"publication_date":"2004-10-25","ids":{"openalex":"https://openalex.org/W2293277129","doi":"https://doi.org/10.1145/1030083.1030114","mag":"2293277129"},"language":"en","primary_location":{"id":"doi:10.1145/1030083.1030114","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074117167","display_name":"Michael K. Reiter","orcid":"https://orcid.org/0000-0001-7007-8274"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael K. Reiter","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333239","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0002-3583-369X"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaofeng Wang","raw_affiliation_strings":["Indiana University at Bloomington"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Indiana University at Bloomington","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074117167"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":1.8504,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88471887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"227","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6697454452514648},{"id":"https://openalex.org/keywords/mixing","display_name":"Mixing (physics)","score":0.6478576064109802},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5859116911888123},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5283135771751404},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5231146216392517},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4936009645462036},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4811328947544098},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34893563389778137},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.1610957384109497},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.11201289296150208}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6697454452514648},{"id":"https://openalex.org/C138777275","wikidata":"https://www.wikidata.org/wiki/Q6884054","display_name":"Mixing (physics)","level":2,"score":0.6478576064109802},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5859116911888123},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5283135771751404},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5231146216392517},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4936009645462036},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4811328947544098},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34893563389778137},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.1610957384109497},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.11201289296150208},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1030083.1030114","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W182534311","https://openalex.org/W1479744988","https://openalex.org/W1490590996","https://openalex.org/W1494929562","https://openalex.org/W1518119787","https://openalex.org/W1546293047","https://openalex.org/W1548880861","https://openalex.org/W1551436681","https://openalex.org/W1566461722","https://openalex.org/W1578378251","https://openalex.org/W1589034595","https://openalex.org/W1604746990","https://openalex.org/W1612316802","https://openalex.org/W1805249784","https://openalex.org/W1850322980","https://openalex.org/W1887037345","https://openalex.org/W1894333397","https://openalex.org/W1932868796","https://openalex.org/W2005708967","https://openalex.org/W2020805258","https://openalex.org/W2059889410","https://openalex.org/W2078813897","https://openalex.org/W2101770573","https://openalex.org/W2102795810","https://openalex.org/W2103647628","https://openalex.org/W2106583429","https://openalex.org/W2137435127","https://openalex.org/W2150248082","https://openalex.org/W2295017432","https://openalex.org/W2488547546","https://openalex.org/W2561675875","https://openalex.org/W2602645338","https://openalex.org/W2944132414","https://openalex.org/W3084253169","https://openalex.org/W4285719527","https://openalex.org/W6639499974","https://openalex.org/W6680397440","https://openalex.org/W6782816059"],"related_works":["https://openalex.org/W2367468089","https://openalex.org/W2358591856","https://openalex.org/W2098133976","https://openalex.org/W2347416728","https://openalex.org/W2468219149","https://openalex.org/W2974100988","https://openalex.org/W2215702767","https://openalex.org/W4388137405","https://openalex.org/W2567150521","https://openalex.org/W2380969787"],"abstract_inverted_index":{"No":[0],"matter":[1],"how":[2],"well":[3],"designed":[4],"and":[5,21,28,116,118],"engineered,":[6],"a":[7,45,107,113],"mix":[8,72,114],"server":[9],"offers":[10],"little":[11],"protection":[12],"if":[13],"its":[14,26,110],"administrator":[15,52],"can":[16],"be":[17],"convinced":[18],"to":[19,35,49,61],"log":[20],"selectively":[22],"disclose":[23],"correspondences":[24,92],"between":[25],"input":[27],"output":[29,97],"messages,":[30],"either":[31],"for":[32,93],"profit":[33],"or":[34],"cooperate":[36],"with":[37,112],"an":[38,51,86],"investigation.":[39],"In":[40],"this":[41,101],"paper":[42],"we":[43],"propose":[44],"technique,":[46],"fragile":[47,77],"mixing,":[48],"discourage":[50],"from":[53],"revealing":[54],"such":[55,91],"correspondences,":[56],"assuming":[57],"he":[58],"is":[59],"motivated":[60],"protect":[62],"the":[63,71,80,104],"unlinkability":[64],"of":[65,85,96,106],"other":[66],"communications":[67],"that":[68,82,94],"flow":[69],"through":[70],"(e.g.,":[73],"his":[74],"own).":[75],"Briefly,":[76],"mixing":[78],"implements":[79],"property":[81],"any":[83],"disclosure":[84],"input-message-to-output-message":[87],"correspondence":[88],"discloses":[89],"all":[90],"batch":[95],"messages.":[98],"We":[99],"detail":[100],"technique":[102],"in":[103],"context":[105],"re-encryption":[108],"mix,":[109],"integration":[111],"network,":[115],"incentive":[117],"efficiency":[119],"issues.":[120]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2016-06-24T00:00:00"}
