Stopping Silent Sneaks: Defending against Malicious Mixes with...

Thread Model

Bow-Tie Design

Methodology

Security Metrics

Reference Algorithms