{"id":"https://openalex.org/W2092085685","doi":"https://doi.org/10.1145/1698750.1698753","title":"How much anonymity does network latency leak?","display_name":"How much anonymity does network latency leak?","publication_year":2010,"publication_date":"2010-02-01","ids":{"openalex":"https://openalex.org/W2092085685","doi":"https://doi.org/10.1145/1698750.1698753","mag":"2092085685"},"language":"en","primary_location":{"id":"doi:10.1145/1698750.1698753","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1698750.1698753","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051550317","display_name":"Nicholas Hopper","orcid":"https://orcid.org/0000-0003-2536-9587"},"institutions":[{"id":"https://openalex.org/I2800403580","display_name":"University of Minnesota System","ror":"https://ror.org/03grvy078","country_code":"US","type":"education","lineage":["https://openalex.org/I2800403580"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nicholas Hopper","raw_affiliation_strings":["University of Minnesota"],"affiliations":[{"raw_affiliation_string":"University of Minnesota","institution_ids":["https://openalex.org/I2800403580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061397405","display_name":"Eugene Y. Vasserman","orcid":"https://orcid.org/0000-0002-2420-4329"},"institutions":[{"id":"https://openalex.org/I2800403580","display_name":"University of Minnesota System","ror":"https://ror.org/03grvy078","country_code":"US","type":"education","lineage":["https://openalex.org/I2800403580"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eugene Y. Vasserman","raw_affiliation_strings":["University of Minnesota"],"affiliations":[{"raw_affiliation_string":"University of Minnesota","institution_ids":["https://openalex.org/I2800403580"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068148122","display_name":"Eric Chan\u2010Tin","orcid":"https://orcid.org/0000-0001-8367-5836"},"institutions":[{"id":"https://openalex.org/I2800403580","display_name":"University of Minnesota System","ror":"https://ror.org/03grvy078","country_code":"US","type":"education","lineage":["https://openalex.org/I2800403580"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Chan-TIN","raw_affiliation_strings":["University of Minnesota"],"affiliations":[{"raw_affiliation_string":"University of Minnesota","institution_ids":["https://openalex.org/I2800403580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051550317"],"corresponding_institution_ids":["https://openalex.org/I2800403580"],"apc_list":null,"apc_paid":null,"fwci":27.4636,"has_fulltext":false,"cited_by_count":156,"citation_normalized_percentile":{"value":0.99663129,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"13","issue":"2","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8677481412887573},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7898811101913452},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.607952356338501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.606442928314209},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.538325309753418},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4240197241306305},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1391884982585907}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8677481412887573},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7898811101913452},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.607952356338501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.606442928314209},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.538325309753418},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4240197241306305},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1391884982585907}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1698750.1698753","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1698750.1698753","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.154.1587","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www-users.cs.umn.edu/~hopper/tissec-latency-leak.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.215.7285","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.7285","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www-users.cs.umn.edu/~hopper/tissec-latency-leak.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7402796267","display_name":null,"funder_award_id":"CNS-0546162","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W51997014","https://openalex.org/W134713352","https://openalex.org/W1483446075","https://openalex.org/W1494538302","https://openalex.org/W1569777704","https://openalex.org/W1579427489","https://openalex.org/W1595797875","https://openalex.org/W1655958391","https://openalex.org/W1866884617","https://openalex.org/W1885428543","https://openalex.org/W1978884755","https://openalex.org/W1996497509","https://openalex.org/W2002080807","https://openalex.org/W2078813897","https://openalex.org/W2097725665","https://openalex.org/W2098981715","https://openalex.org/W2103597742","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2109683670","https://openalex.org/W2112178441","https://openalex.org/W2122312526","https://openalex.org/W2127295197","https://openalex.org/W2132051999","https://openalex.org/W2138719936","https://openalex.org/W2142449826","https://openalex.org/W2150248082","https://openalex.org/W2158698691","https://openalex.org/W2159692093","https://openalex.org/W2161721751","https://openalex.org/W2167868809","https://openalex.org/W2741659057","https://openalex.org/W4241257019","https://openalex.org/W4242138061","https://openalex.org/W6906355099"],"related_works":["https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W3125718803","https://openalex.org/W2127920220","https://openalex.org/W3119288169","https://openalex.org/W2945097178","https://openalex.org/W4388741024","https://openalex.org/W1966494590","https://openalex.org/W2082303399","https://openalex.org/W1555088513"],"abstract_inverted_index":{"Low-latency":[0],"anonymity":[1,79,157],"systems":[2],"such":[3],"as":[4],"Tor,":[5],"AN.ON,":[6],"Crowds,":[7],"and":[8,28,43,65,101,161],"Anonymizer.com":[9],"aim":[10],"to":[11,33,94,135,173],"provide":[12],"anonymous":[13,35],"connections":[14,108],"that":[15,52,168],"are":[16,115,170],"both":[17,152,169],"untraceable":[18],"by":[19],"\u201clocal\u201d":[20],"adversaries":[21],"who":[22],"control":[23],"only":[24],"a":[25,88,131,142],"few":[26],"machines":[27],"have":[29],"low":[30],"enough":[31],"delay":[32],"support":[34],"use":[36],"of":[37,48,90,139],"network":[38,60,160],"services":[39,54],"like":[40],"Web":[41,92,133],"browsing":[42],"remote":[44],"login.":[45],"One":[46],"consequence":[47],"these":[49,53,174],"goals":[50],"is":[51],"leak":[55],"some":[56],"information":[57,100,140],"about":[58,141],"the":[59,63,71,110,117,148,162],"latency":[61],"between":[62],"sender":[64],"one":[66],"or":[67],"more":[68,127],"nodes":[69],"in":[70],"system.":[72],"We":[73,150],"present":[74],"two":[75,107,155],"attacks":[76,153],"on":[77,97],"low-latency":[78,156],"schemes":[80],"using":[81,116],"this":[82],"information.":[83],"The":[84,123],"first":[85],"attack":[86,125],"allows":[87,130],"pair":[89],"colluding":[91],"sites":[93],"predict,":[95],"based":[96],"local":[98],"timing":[99],"with":[102,120],"no":[103],"additional":[104],"resources,":[105],"whether":[106],"from":[109],"same":[111,118],"Tor":[112,159],"exit":[113],"node":[114],"circuit":[119],"high":[121],"confidence.":[122],"second":[124],"requires":[126],"resources":[128],"but":[129],"malicious":[132],"site":[134],"gain":[136],"several":[137],"bits":[138],"client":[143],"each":[144],"time":[145],"he":[146],"visits":[147],"site.":[149],"evaluate":[151],"against":[154],"protocols\u2014the":[158],"MultiProxy":[163],"proxy":[164],"aggregator":[165],"service\u2014and":[166],"conclude":[167],"highly":[171],"vulnerable":[172],"attacks.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":15},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":16},{"year":2012,"cited_by_count":18}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
