{"id":"https://openalex.org/W3110752304","doi":"https://doi.org/10.1145/3427228.3427238","title":"Quantifying measurement quality and load distribution in Tor","display_name":"Quantifying measurement quality and load distribution in Tor","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3110752304","doi":"https://doi.org/10.1145/3427228.3427238","mag":"3110752304"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427238","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427238","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427238","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054201211","display_name":"Andr\u00e9 Greubel","orcid":"https://orcid.org/0000-0002-7915-6520"},"institutions":[{"id":"https://openalex.org/I25974101","display_name":"University of W\u00fcrzburg","ror":"https://ror.org/00fbnyb24","country_code":"DE","type":"education","lineage":["https://openalex.org/I25974101"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Andre Greubel","raw_affiliation_strings":["","University of Wuerzburg Wuerzburg, Germany"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"University of Wuerzburg Wuerzburg, Germany","institution_ids":["https://openalex.org/I25974101"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026556613","display_name":"Steffen Pohl","orcid":null},"institutions":[{"id":"https://openalex.org/I8087733","display_name":"University of T\u00fcbingen","ror":"https://ror.org/03a1kwz48","country_code":"DE","type":"education","lineage":["https://openalex.org/I8087733"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steffen Pohl","raw_affiliation_strings":["","University of Tuebingen Tuebingen, Germany"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"University of Tuebingen Tuebingen, Germany","institution_ids":["https://openalex.org/I8087733"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051138595","display_name":"Samuel Kounev","orcid":null},"institutions":[{"id":"https://openalex.org/I25974101","display_name":"University of W\u00fcrzburg","ror":"https://ror.org/00fbnyb24","country_code":"DE","type":"education","lineage":["https://openalex.org/I25974101"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Samuel Kounev","raw_affiliation_strings":["","University of Wuerzburg Wuerzburg, Germany"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"University of Wuerzburg Wuerzburg, Germany","institution_ids":["https://openalex.org/I25974101"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054201211"],"corresponding_institution_ids":["https://openalex.org/I25974101"],"apc_list":null,"apc_paid":null,"fwci":0.5516,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71288344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"129","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7728337049484253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7704691886901855},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.7430640459060669},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5958965420722961},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5035359263420105},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.06445810198783875}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7728337049484253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7704691886901855},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.7430640459060669},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5958965420722961},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5035359263420105},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.06445810198783875},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427238","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427238","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3427228.3427238","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427238","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3110752304.pdf","grobid_xml":"https://content.openalex.org/works/W3110752304.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1545050218","https://openalex.org/W1655958391","https://openalex.org/W1765711557","https://openalex.org/W1820393415","https://openalex.org/W2022986388","https://openalex.org/W2031925412","https://openalex.org/W2080977773","https://openalex.org/W2099868491","https://openalex.org/W2100833413","https://openalex.org/W2115149102","https://openalex.org/W2127295197","https://openalex.org/W2156410527","https://openalex.org/W2163007546","https://openalex.org/W2182209354","https://openalex.org/W2185051875","https://openalex.org/W2221045997","https://openalex.org/W2395952473","https://openalex.org/W2604796301","https://openalex.org/W2911518933","https://openalex.org/W2914598610","https://openalex.org/W2996756184","https://openalex.org/W4237192363","https://openalex.org/W4249902158"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126"],"abstract_inverted_index":{"Tor":[0,33,130],"is":[1,8,38,77],"a":[2,21,141],"widely":[3],"used":[4,73],"anonymization":[5],"network.":[6],"Traffic":[7],"routed":[9],"over":[10],"different":[11],"relay":[12,23],"nodes":[13],"to":[14,80,96],"conceal":[15],"the":[16,68,82,102,111,116],"communication":[17],"partners.":[18],"However,":[19],"if":[20],"single":[22],"handles":[24],"too":[25],"much":[26,183],"traffic,":[27],"de-anonymization":[28,122],"attacks":[29,123],"are":[30,94],"possible.":[31],"The":[32],"Load":[34],"Balancing":[35],"Mechanism":[36],"(TLBM)":[37],"responsible":[39],"for":[40,74,119],"balanced":[41],"and":[42,160,172],"secure":[43,185],"load":[44,104,113,186],"distribution.":[45],"It":[46],"must":[47],"verify":[48,81],"that":[49,67,110,151,174],"relays":[50,93,133,138,162],"cannot":[51],"attract":[52],"more":[53,125],"traffic":[54,191],"than":[55,126],"they":[56],"should":[57,178],"by":[58,124,164],"lying":[59],"about":[60],"their":[61],"self-reported":[62],"bandwidth.":[63],"This":[64],"work":[65],"shows":[66],"current":[69,103,112],"bandwidth":[70,75,83],"measurement":[71],"method":[72],"verification":[76],"not":[78],"suitable":[79],"of":[84,91,144,154,158],"many":[85],"relays.":[86],"Most":[87],"importantly,":[88],"multiple":[89],"measurements":[90],"high-bandwidth":[92],"uncorrelated":[95],"each":[97],"other.":[98],"Furthermore,":[99],"we":[100,149],"analyze":[101],"distribution":[105,114,187],"in":[106],"Tor.":[107],"We":[108,166],"show":[109,150],"reduces":[115],"resources":[117],"necessary":[118],"several":[120],"large-scale":[121],"80%.":[127],"Additionally,":[128],"as":[129,182,188],"favors":[131],"fast":[132],"during":[134],"path":[135],"selection,":[136],"verifiable":[137,163],"only":[139,152],"handle":[140],"small":[142],"fraction":[143],"Tor\u2019s":[145],"traffic.":[146],"More":[147],"precisely,":[148],"7.21%":[153],"all":[155],"paths":[156],"consist":[157],"entry":[159],"exit":[161],"measurements.":[165],"discuss":[167],"these":[168],"results\u2019":[169],"security":[170],"implications":[171],"argue":[173],"future":[175],"TLBM":[176],"research":[177],"focus":[179],"at":[180],"least":[181],"on":[184,189],"high":[190],"performance.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
