{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:10Z","timestamp":1750307170918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA8750-09-1-0075"],"award-info":[{"award-number":["FA8750-09-1-0075"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076742","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["\"Mix-in-Place\" anonymous networking using secure function evaluation"],"prefix":"10.1145","author":[{"given":"Nilesh","family":"Nipane","sequence":"first","affiliation":[{"name":"Converging Infrastructure Security (CISEC) Laboratory, Georgia Tech Information Security Center (GTISC), Georgia Institute of Technology"}]},{"given":"Italo","family":"Dacosta","sequence":"additional","affiliation":[{"name":"Converging Infrastructure Security (CISEC) Laboratory, Georgia Tech Information Security Center (GTISC), Georgia Institute of Technology"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"Converging Infrastructure Security (CISEC) Laboratory, Georgia Tech Information Security Center (GTISC), Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-540-24676-3_3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1314333.1314336"},{"doi-asserted-by":"crossref","unstructured":"A. Beimel and S. Dolev. Buses for Anonymous Message Delivery. Journal of Cryptology 2001 16 1","key":"e_1_3_2_1_4_1","DOI":"10.1007\/s00145-002-0128-6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1455770.1455804"},{"volume-title":"Proceedings of Designing Privacy Enhancing Technologies","year":"2000","author":"Berthold O.","key":"e_1_3_2_1_6_1"},{"volume-title":"Boer. Detection of Disrupters in the DC Protocol. In Proceedings of Eurocrypt","year":"1989","author":"Bos J.","key":"e_1_3_2_1_7_1"},{"issue":"9","key":"e_1_3_2_1_8_1","volume":"4","author":"Boyan J.","year":"1997","journal-title":"Protecting User Privacy on the Web. Computer-Mediated Communication Magazine"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/11836810_3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/54235.54239"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/4236.978368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.5555\/647967.741620"},{"unstructured":"W. Dai. PipeNet 1.1. http:\/\/www.weidai.com 1998.  W. Dai. PipeNet 1.1. http:\/\/www.weidai.com 1998.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.5555\/829515.830555"},{"volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability","year":"2000","author":"Dingledine R.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/1251375.1251396"},{"volume-title":"Proceedings of CRYPTO","year":"1997","author":"Dolev S.","key":"e_1_3_2_1_18_1"},{"volume-title":"Proceedings of the USENIX Security Symposium (USENIX)","year":"2009","author":"Evans N. S.","key":"e_1_3_2_1_19_1"},{"unstructured":"H. Federrath. JAP -- Anonymity and Privacy. http:\/\/anon.inf.tu-dresden.de\/index_en.html 2008.  H. Federrath. JAP -- Anonymity and Privacy. http:\/\/anon.inf.tu-dresden.de\/index_en.html 2008.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/1785594.1785607"},{"volume-title":"Proceedings of the EU Workshop on Secure Multiparty Protocols (SMP)","year":"2004","author":"Feigenbaum J.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-540-24676-3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/586110.586137"},{"unstructured":"I. Goldberg and A. Shostack. Freedom Systems 2.0 Architecture. http:\/\/osiris.978.org\/%7Ebrianr\/crypto-research\/anon\/www.freedom.net\/products\/whitepapers\/Freedom_ System_2_Architecture.pdf 1999.  I. Goldberg and A. Shostack. Freedom Systems 2.0 Architecture. http:\/\/osiris.978.org\/%7Ebrianr\/crypto-research\/anon\/www.freedom.net\/products\/whitepapers\/Freedom_ System_2_Architecture.pdf 1999.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/28395.28420"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1007\/978-3-540-24660-2_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/978-3-540-24676-3_27"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/978-3-540-72738-5_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/525423.830456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/1179601.1179603"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/AINA.2005.40"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY)","year":"2011","author":"Huang Y.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/301308.301333"},{"volume-title":"Proceedings of the Conference on Email and Anti-Spam (CEAS)","year":"2007","author":"Johansen L.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/302979.303160"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/1180405.1180455"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_1_39_1","first-page":"10","author":"Levine B. N.","year":"2002","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Y. Lindell and B. Pinkas. Privacy preserving data mining. 15(3) 2002.  Y. Lindell and B. Pinkas. Privacy preserving data mining. 15(3) 2002.","key":"e_1_3_2_1_40_1","DOI":"10.1007\/s00145-001-0019-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/948109.948139"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY)","year":"2004","author":"Malkhi D.","key":"e_1_3_2_1_42_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1007\/11423409_2"},{"volume-title":"Kalmanek. Enterprise Security: A Community of Interest Based Approach. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)","year":"2006","author":"McDaniel P.","key":"e_1_3_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/NCA.2006.32"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/263105.263179"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/1180405.1180410"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1109\/SP.2005.12"},{"volume-title":"Proceedings of the ACM Symposium on Discrete Algorithms (SODA)","year":"2001","author":"Naor M.","key":"e_1_3_2_1_50_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.5555\/645662.664536"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1016\/0167-4048(87)90087-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/336992.337028"},{"unstructured":"K. Poulsen. FBI retires its Carnivore. http:\/\/www.securityfocus.com\/news\/10307 2005.  K. Poulsen. FBI retires its Carnivore. http:\/\/www.securityfocus.com\/news\/10307 2005.","key":"e_1_3_2_1_54_1"},{"unstructured":"J. Powers. The attack of the eavesdropping neighbors. http:\/\/www.michigandaily.com\/content\/attack-eavesdropping-neighbors 2002.  J. Powers. The attack of the eavesdropping neighbors. http:\/\/www.michigandaily.com\/content\/attack-eavesdropping-neighbors 2002.","key":"e_1_3_2_1_55_1"},{"unstructured":"Proxify.com. Proxify anonymous proxy - surf the Web privately and securely. http:\/\/proxify.com\/ 2008.  Proxify.com. Proxify anonymous proxy - surf the Web privately and securely. http:\/\/proxify.com\/ 2008.","key":"e_1_3_2_1_56_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/INFCOM.2007.80"},{"volume-title":"Proceedings of Annual Computer Security Applications Conference (ACSAC)","year":"2006","author":"Reed M.","key":"e_1_3_2_1_59_1"},{"unstructured":"C. Reis S. D. Gribble T. Kohno and N. Weaver. UW CSE and ICSI Web Integrity Checker. http:\/\/vancouver.cs.washington.edu\/ 2007.  C. Reis S. D. Gribble T. Kohno and N. Weaver. UW CSE and ICSI Web Integrity Checker. http:\/\/vancouver.cs.washington.edu\/ 2007.","key":"e_1_3_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/290163.290168"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/1102199.1102201"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.5555\/829514.830524"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.5555\/2163273.2163275"},{"unstructured":"R. Singel. Google-DoubleClick Privacy Fight Hangs Over Fed's E-Advertising Forum. http:\/\/blog.wired.com\/27bstroke6\/2007\/10\/google-doublecl.html 2007.  R. Singel. Google-DoubleClick Privacy Fight Hangs Over Fed's E-Advertising Forum. http:\/\/blog.wired.com\/27bstroke6\/2007\/10\/google-doublecl.html 2007.","key":"e_1_3_2_1_65_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1145\/1133572.1133611"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1109\/SP.2008.10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_68_1","DOI":"10.5555\/882493.884368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.5555\/371931.371981"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1145\/948109.948128"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.5555\/111563.111594"},{"volume-title":"Proceedings of Eurocrypt","year":"1989","author":"Waidner M.","key":"e_1_3_2_1_72_1"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY)","year":"2000","author":"Waldman M.","key":"e_1_3_2_1_73_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/1102120.1102133"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.1109\/SP.2007.30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_76_1","DOI":"10.5555\/646649.699363"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_77_1","DOI":"10.1109\/SFCS.1986.25"},{"unstructured":"YouHide.com. Anonymous Proxy Server. http:\/\/www.youhide.com\/ 2008.  YouHide.com. Anonymous Proxy Server. http:\/\/www.youhide.com\/ 2008.","key":"e_1_3_2_1_78_1"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY)","year":"2000","author":"Zhang Y.","key":"e_1_3_2_1_79_1"}],"event":{"sponsor":["ACSA Applied Computing Security Assoc"],"acronym":"ACSAC '11","name":"ACSAC '11: Annual Computer Security Applications Conference","location":"Orlando Florida USA"},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":76,"alternative-id":["10.1145\/2076732.2076742","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076742","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}