tor-design.bib
上传用户:awang829
上传日期:2019-07-14
资源大小:2356k
文件大小:49k
- % hs-attack
- @inproceedings{hs-attack,
- title = {Locating Hidden Servers},
- author = {Lasse {O}verlier and Paul Syverson},
- booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
- year = {2006},
- month = {May},
- publisher = {IEEE CS},
- }
- @TechReport{bauer:tr2007,
- author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
- title = {Low-Resource Routing Attacks Against Anonymous Systems},
- institution = {University of Colorado at Boulder},
- year = 2007,
- number = {CU-CS-1025-07}
- }
- @inproceedings{bauer:wpes2007,
- title = {Low-Resource Routing Attacks Against Tor},
- author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
- booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}},
- year = {2007},
- month = {October},
- address = {Washington, DC, USA},
- }
- % fix me
- @misc{tannenbaum96,
- author = "Andrew Tannenbaum",
- title = "Computer Networks",
- year = "1996",
- publisher = "Prentice Hall, 3rd edition",
- }
- @article{ meadows96,
- author = "Catherine Meadows",
- title = "The {NRL} Protocol Analyzer: An Overview",
- journal = "Journal of Logic Programming",
- volume = "26",
- number = "2",
- pages = "113--131",
- year = "1996",
- }
- @inproceedings{kesdogan:pet2002,
- title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
- alternative to the MIX based Approach?},
- author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
- booktitle = {Privacy Enhancing Technologies (PET 2002)},
- year = {2002},
- month = {April},
- editor = {Roger Dingledine and Paul Syverson},
- publisher = {Springer-Verlag, LNCS 2482},
- }
- @inproceedings{statistical-disclosure,
- title = {Statistical Disclosure Attacks},
- author = {George Danezis},
- booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
- organization = {{IFIP TC11}},
- year = {2003},
- month = {May},
- address = {Athens},
- pages = {421--426},
- publisher = {Kluwer},
- }
- @inproceedings{limits-open,
- title = {Limits of Anonymity in Open Environments},
- author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
- booktitle = {Information Hiding Workshop (IH 2002)},
- year = {2002},
- month = {October},
- editor = {Fabien Petitcolas},
- publisher = {Springer-Verlag, LNCS 2578},
- }
- @inproceedings{isdn-mixes,
- title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
- author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
- booktitle = {GI/ITG Conference on Communication in Distributed Systems},
- year = {1991},
- month = {February},
- pages = {451-463},
- }
- @Article{jerichow-jsac98,
- author = {Anja Jerichow and Jan M"{u}ller and Andreas
- Pfitzmann and Birgit Pfitzmann and Michael Waidner},
- title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
- journal = {IEEE Journal on Selected Areas in Communications},
- year = 1998,
- volume = 16,
- number = 4,
- pages = {495--509},
- month = {May}
- }
- @inproceedings{tarzan:ccs02,
- title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
- author = {Michael J. Freedman and Robert Morris},
- booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
- {S}ecurity ({CCS 2002})},
- year = {2002},
- month = {November},
- address = {Washington, DC},
- }
- @inproceedings{cebolla,
- title = {{Cebolla: Pragmatic IP Anonymity}},
- author = {Zach Brown},
- booktitle = {Ottawa Linux Symposium},
- year = {2002},
- month = {June},
- }
- @inproceedings{eax,
- author = "M. Bellare and P. Rogaway and D. Wagner",
- title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
- booktitle = {Fast Software Encryption 2004},
- month = {February},
- year = {2004},
- }
- @misc{darkside,
- title = {{The Dark Side of the Web: An Open Proxy's View}},
- author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
- note = {newline url{http://codeen.cs.princeton.edu/}},
- }
- % note = {Submitted to HotNets-II. url{http://codeen.cs.princeton.edu/}},
- @Misc{anonymizer,
- key = {anonymizer},
- title = {The {Anonymizer}},
- note = {url{http://anonymizer.com/}}
- }
- @Misc{privoxy,
- key = {privoxy},
- title = {{Privoxy}},
- note = {url{http://www.privoxy.org/}}
- }
- @Misc{i2p,
- key = {i2p},
- title = {{I2P}},
- note = {url{http://www.i2p.net/}}
- }
- @Misc{nym,
- author = {Jason Holt},
- title = {nym: practical pseudonymity for anonymous networks},
- note = {Paper and source code at url{http://www.lunkwill.org/src/nym/}}
- }
- @InProceedings{nymble,
- author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
- title = {Nymble: Anonymous {IP}-address Blocking},
- booktitle = {Privacy Enhancing Technologies (PET 2007)},
- year = 2007,
- publisher = {Springer-Verlag, LNCS 4776}
- }
- @inproceedings{anonnet,
- title = {{Analysis of an Anonymity Network for Web Browsing}},
- author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
- David Hutchison},
- booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
- 2002)}},
- year = {2002},
- month = {June},
- address = {Pittsburgh, USA},
- }
- % pages = {49--54},
- @inproceedings{econymics,
- title = {On the Economics of Anonymity},
- author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
- booktitle = {Financial Cryptography},
- year = {2003},
- editor = {Rebecca N. Wright},
- publisher = {Springer-Verlag, LNCS 2742},
- }
- @inproceedings{defensive-dropping,
- title = {Timing Analysis in Low-Latency Mix-Based Systems},
- author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
- booktitle = {Financial Cryptography},
- year = {2004},
- editor = {Ari Juels},
- publisher = {Springer-Verlag, LNCS (forthcoming)},
- }
- @inproceedings{morphmix:fc04,
- title = {Practical Anonymity for the Masses with MorphMix},
- author = {Marc Rennhard and Bernhard Plattner},
- booktitle = {Financial Cryptography},
- year = {2004},
- editor = {Ari Juels},
- publisher = {Springer-Verlag, LNCS (forthcoming)},
- }
- @inproceedings{eternity,
- title = {The Eternity Service},
- author = {Ross Anderson},
- booktitle = {Pragocrypt '96},
- year = {1996},
- }
- %note = {url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
- @inproceedings{minion-design,
- title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
- author = {George Danezis and Roger Dingledine and Nick Mathewson},
- booktitle = {2003 IEEE Symposium on Security and Privacy},
- year = {2003},
- month = {May},
- publisher = {IEEE CS},
- pages = {2--15},
- }
- %note = {url{http://mixminion.net/minion-design.pdf}},
- @inproceedings{ rao-pseudonymity,
- author = "Josyula R. Rao and Pankaj Rohatgi",
- title = "Can Pseudonymity Really Guarantee Privacy?",
- booktitle = "Proceedings of the Ninth USENIX Security Symposium",
- year = {2000},
- month = Aug,
- publisher = {USENIX},
- pages = "85--96",
- }
- %note = {url{http://www.usenix.org/publications/library/proceedings/sec2000/
- %full_papers/rao/rao.pdf}},
- @InProceedings{pfitzmann90how,
- author = "Birgit Pfitzmann and Andreas Pfitzmann",
- title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
- booktitle = {Eurocrypt 89},
- publisher = {Springer-Verlag, LNCS 434},
- year = {1990},
- note = {url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
- }
- @Misc{tor-spec,
- author = {Roger Dingledine and Nick Mathewson},
- title = {Tor Protocol Specifications},
- note = {url{https://www.torproject.org/svn/trunk/doc/tor-spec.txt}},
- }
- @Misc{incentives-txt,
- author = {Roger Dingledine and Nick Mathewson},
- title = {Tor Incentives Design Brainstorms},
- note = {url{https://www.torproject.org/svn/trunk/doc/incentives.txt}},
- }
- @InProceedings{BM:mixencrypt,
- author = {M{"o}ller, Bodo},
- title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
- booktitle = {{CT-RSA} 2003},
- publisher = {Springer-Verlag, LNCS 2612},
- year = 2003,
- }
- @InProceedings{back01,
- author = {Adam Back and Ulf M"oller and Anton Stiglic},
- title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
- booktitle = {Information Hiding (IH 2001)},
- pages = {245--257},
- year = 2001,
- editor = {Ira S. Moskowitz},
- publisher = {Springer-Verlag, LNCS 2137},
- }
- %note = {newline url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
- @InProceedings{rackoff93cryptographic,
- author = {Charles Rackoff and Daniel R. Simon},
- title = {Cryptographic Defense Against Traffic Analysis},
- booktitle = {{ACM} Symposium on Theory of Computing},
- pages = {672--681},
- year = {1993},
- }
- %note = {url{http://research.microsoft.com/crypto/dansimon/me.htm}},
- @InProceedings{freehaven-berk,
- author = {Roger Dingledine and Michael J. Freedman and David Molnar},
- title = {The Free Haven Project: Distributed Anonymous Storage Service},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- year = 2000,
- month = {July},
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- }
- @InProceedings{move-ndss05,
- author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
- title = {MOVE: An End-to-End Solution To Network Denial of Service},
- booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
- year = 2005,
- month = {February},
- publisher = {Internet Society}
- }
- %note = {url{http://freehaven.net/papers.html}},
- @InProceedings{raymond00,
- author = {J. F. Raymond},
- title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
- and Open Problems}},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- year = 2000,
- month = {July},
- pages = {10-29},
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- }
- @InProceedings{sybil,
- author = "John Douceur",
- title = {{The Sybil Attack}},
- booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
- month = Mar,
- year = 2002,
- }
- @InCollection{price-privacy,
- author = {Paul Syverson and Adam Shostack},
- editor = {L. Jean Camp and Stephen Lewis},
- title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
- booktitle = {Economics of Information Security},
- chapter = 10,
- publisher = {Kluwer},
- year = 2004,
- pages = {129--142}
- }
- @InProceedings{trickle02,
- author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
- title = {From a Trickle to a Flood: Active Attacks on Several
- Mix Types},
- booktitle = {Information Hiding (IH 2002)},
- year = {2002},
- editor = {Fabien Petitcolas},
- publisher = {Springer-Verlag, LNCS 2578},
- }
- @InProceedings{langos02,
- author = {Oliver Berthold and Heinrich Langos},
- title = {Dummy Traffic Against Long Term Intersection Attacks},
- booktitle = {Privacy Enhancing Technologies (PET 2002)},
- year = {2002},
- editor = {Roger Dingledine and Paul Syverson},
- publisher = {Springer-Verlag, LNCS 2482}
- }
- @InProceedings{hintz-pet02,
- author = {Andrew Hintz},
- title = {Fingerprinting Websites Using Traffic Analysis},
- booktitle = {Privacy Enhancing Technologies (PET 2002)},
- pages = {171--178},
- year = 2002,
- editor = {Roger Dingledine and Paul Syverson},
- publisher = {Springer-Verlag, LNCS 2482}
- }
- @InProceedings{or-discex00,
- author = {Paul Syverson and Michael Reed and David Goldschlag},
- title = {{O}nion {R}outing Access Configurations},
- booktitle = {DARPA Information Survivability Conference and
- Exposition (DISCEX 2000)},
- year = {2000},
- publisher = {IEEE CS Press},
- pages = {34--40},
- volume = {1},
- }
- %note = {newline url{http://www.onion-router.net/Publications.html}},
- @Inproceedings{or-pet00,
- title = {{Towards an Analysis of Onion Routing Security}},
- author = {Paul Syverson and Gene Tsudik and Michael Reed and
- Carl Landwehr},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- year = 2000,
- month = {July},
- pages = {96--114},
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- }
- %note = {url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
- @Inproceedings{freenet-pets00,
- title = {Freenet: A Distributed Anonymous Information Storage
- and Retrieval System},
- author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
- Theodore W. Hong},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- year = 2000,
- month = {July},
- pages = {46--66},
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- }
- %note = {url{http://citeseer.nj.nec.com/clarke00freenet.html}},
- @InProceedings{or-ih96,
- author = {David M. Goldschlag and Michael G. Reed and Paul
- F. Syverson},
- title = {Hiding Routing Information},
- booktitle = {Information Hiding, First International Workshop},
- pages = {137--150},
- year = 1996,
- editor = {R. Anderson},
- month = {May},
- publisher = {Springer-Verlag, LNCS 1174},
- }
- @InProceedings{federrath-ih96,
- author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
- title = {{MIXes} in Mobile Communication Systems: Location
- Management with Privacy},
- booktitle = {Information Hiding, First International Workshop},
- pages = {121--135},
- year = 1996,
- editor = {R. Anderson},
- month = {May},
- publisher = {Springer-Verlag, LNCS 1174},
- }
- @InProceedings{reed-protocols97,
- author = {Michael G. Reed and Paul F. Syverson and David
- M. Goldschlag},
- title = {Protocols Using Anonymous Connections: Mobile Applications},
- booktitle = {Security Protocols: 5th International Workshop},
- pages = {13--23},
- year = 1997,
- editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
- and Michael Roe},
- month = {April},
- publisher = {Springer-Verlag, LNCS 1361}
- }
- @Article{or-jsac98,
- author = {Michael G. Reed and Paul F. Syverson and David
- M. Goldschlag},
- title = {Anonymous Connections and Onion Routing},
- journal = {IEEE Journal on Selected Areas in Communications},
- year = 1998,
- volume = 16,
- number = 4,
- pages = {482--494},
- month = {May},
- }
- %note = {url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
- @Misc{TLS,
- author = {T. Dierks and C. Allen},
- title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
- howpublished = {IETF RFC 2246},
- month = {January},
- year = {1999},
- }
- %note = {url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
- @Misc{SMTP,
- author = {J. Postel},
- title = {Simple {M}ail {T}ransfer {P}rotocol},
- howpublished = {IETF RFC 2821 (also STD0010)},
- month = {April},
- year = {2001},
- note = {url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
- }
- @Misc{IMAP,
- author = {M. Crispin},
- title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
- howpublished = {IETF RFC 2060},
- month = {December},
- year = {1996},
- note = {url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
- }
- @misc{pipenet,
- title = {PipeNet 1.1},
- author = {Wei Dai},
- year = 1996,
- month = {August},
- howpublished = {Usenet post},
- note = {url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
- in a post to the cypherpunks list, Feb. 1995.},
- }
- @Misc{POP3,
- author = {J. Myers and M. Rose},
- title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
- howpublished = {IETF RFC 1939 (also STD0053)},
- month = {May},
- year = {1996},
- note = {url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
- }
- @InProceedings{shuffle,
- author = {C. Andrew Neff},
- title = {A Verifiable Secret Shuffle and its Application to E-Voting},
- booktitle = {8th ACM Conference on Computer and Communications
- Security (CCS-8)},
- pages = {116--125},
- year = 2001,
- editor = {P. Samarati},
- month = {November},
- publisher = {ACM Press},
- }
- %note = {url{http://www.votehere.net/ada_compliant/ourtechnology/
- % technicaldocs/shuffle.pdf}},
- @InProceedings{dolev91,
- author = {Danny Dolev and Cynthia Dwork and Moni Naor},
- title = {Non-Malleable Cryptography},
- booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
- pages = {542--552},
- year = 1991,
- note = {Updated version at
- url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
- }
- @TechReport{rsw96,
- author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
- title = {Time-lock puzzles and timed-release Crypto},
- year = 1996,
- type = {MIT LCS technical memo},
- number = {MIT/LCS/TR-684},
- month = {February},
- note = {newline url{http://citeseer.nj.nec.com/rivest96timelock.html}},
- }
- @InProceedings{web-mix,
- author = {Oliver Berthold and Hannes Federrath and Stefan K"opsell},
- title = {Web {MIX}es: A system for anonymous and unobservable
- {I}nternet access},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- year = {2000},
- }
- % pages = {115--129},
- @InProceedings{disad-free-routes,
- author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
- title = {The disadvantages of free {MIX} routes and how to overcome
- them},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
- pages = {30--45},
- year = 2000,
- editor = {H. Federrath},
- publisher = {Springer-Verlag, LNCS 2009},
- }
- %note = {url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
- % disadvantages_berthold.pdf}},
- @InProceedings{boneh00,
- author = {Dan Boneh and Moni Naor},
- title = {Timed Commitments},
- booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
- pages = {236--254},
- year = 2000,
- publisher = {Springer-Verlag, LNCS 1880},
- note = {newline url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
- }
- @InProceedings{goldschlag98,
- author = {David M. Goldschlag and Stuart G. Stubblebine},
- title = {Publicly Verifiable Lotteries: Applications of
- Delaying Functions},
- booktitle = {Financial Cryptography},
- pages = {214--226},
- year = 1998,
- publisher = {Springer-Verlag, LNCS 1465},
- note = {newline url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
- }
- @InProceedings{syverson98,
- author = {Paul Syverson},
- title = {Weakly Secret Bit Commitment: Applications to
- Lotteries and Fair Exchange},
- booktitle = {Computer Security Foundations Workshop (CSFW11)},
- pages = {2--13},
- year = 1998,
- address = {Rockport Massachusetts},
- month = {June},
- publisher = {IEEE CS Press},
- note = {newline url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
- }
- @Misc{shoup-iso,
- author = {Victor Shoup},
- title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
- note = {Revised December 20, 2001. url{http://www.shoup.net/papers/}},
- }
- @Misc{shoup-oaep,
- author = {Victor Shoup},
- title = {{OAEP} Reconsidered},
- howpublished = {{IACR} e-print 2000/060},
- note = {newline url{http://eprint.iacr.org/2000/060/}},
- }
- @Misc{oaep-still-alive,
- author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
- title = {{RSA}-{OAEP} is Still Alive!},
- howpublished = {{IACR} e-print 2000/061},
- note = {newline url{http://eprint.iacr.org/2000/061/}},
- }
- @misc{echolot,
- author = {Peter Palfrader},
- title = {Echolot: a pinger for anonymous remailers},
- note = {url{http://www.palfrader.org/echolot/}},
- }
- @Misc{mixmaster-attacks,
- author = {Lance Cottrell},
- title = {Mixmaster and Remailer Attacks},
- note = {url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
- }
- @Misc{mixmaster-spec,
- author = {Ulf M{"o}ller and Lance Cottrell and Peter
- Palfrader and Len Sassaman},
- title = {Mixmaster {P}rotocol --- {V}ersion 2},
- year = {2003},
- month = {July},
- howpublished = {Draft},
- note = {url{http://www.abditum.com/mixmaster-spec.txt}},
- }
- @InProceedings{puzzles-tls,
- author = "Drew Dean and Adam Stubblefield",
- title = {{Using Client Puzzles to Protect TLS}},
- booktitle = "Proceedings of the 10th USENIX Security Symposium",
- year = {2001},
- month = Aug,
- publisher = {USENIX},
- }
- @InProceedings{breadpudding,
- author = {Markus Jakobsson and Ari Juels},
- title = {Proofs of Work and Bread Pudding Protocols},
- booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
- Conference on Communications and Multimedia Security
- (CMS '99)},
- year = 1999,
- month = {September},
- publisher = {Kluwer}
- }
- @Misc{hashcash,
- author = {Adam Back},
- title = {Hash cash},
- note = {newline url{http://www.cypherspace.org/~adam/hashcash/}},
- }
- @InProceedings{oreilly-acc,
- author = {Roger Dingledine and Michael J. Freedman and David Molnar},
- title = {Accountability},
- booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
- Technology},
- year = {2001},
- publisher = {O'Reilly and Associates},
- }
- @InProceedings{han,
- author = {Yongfei Han},
- title = {Investigation of non-repudiation protocols},
- booktitle = {ACISP '96},
- year = 1996,
- publisher = {Springer-Verlag},
- }
- @Misc{socks5,
- key = {socks5},
- title = {{SOCKS} {P}rotocol {V}ersion 5},
- howpublished= {IETF RFC 1928},
- month = {March},
- year = 1996,
- note = {url{http://www.ietf.org/rfc/rfc1928.txt}}
- }
- @InProceedings{abe,
- author = {Masayuki Abe},
- title = {Universally Verifiable {MIX} With Verification Work Independent of
- The Number of {MIX} Servers},
- booktitle = {{EUROCRYPT} 1998},
- year = {1998},
- publisher = {Springer-Verlag, LNCS 1403},
- }
- @InProceedings{desmedt,
- author = {Yvo Desmedt and Kaoru Kurosawa},
- title = {How To Break a Practical {MIX} and Design a New One},
- booktitle = {{EUROCRYPT} 2000},
- year = {2000},
- publisher = {Springer-Verlag, LNCS 1803},
- note = {url{http://citeseer.nj.nec.com/447709.html}},
- }
- @InProceedings{mitkuro,
- author = {M. Mitomo and K. Kurosawa},
- title = {{Attack for Flash MIX}},
- booktitle = {{ASIACRYPT} 2000},
- year = {2000},
- publisher = {Springer-Verlag, LNCS 1976},
- note = {newline url{http://citeseer.nj.nec.com/450148.html}},
- }
- @InProceedings{hybrid-mix,
- author = {M. Ohkubo and M. Abe},
- title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
- booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
- year = {2000},
- publisher = {Springer-Verlag, LNCS 1976},
- }
- @InProceedings{PShuffle,
- author = {Jun Furukawa and Kazue Sako},
- title = {An Efficient Scheme for Proving a Shuffle},
- editor = {Joe Kilian},
- booktitle = {CRYPTO 2001},
- year = {2001},
- publisher = {Springer-Verlag, LNCS 2139},
- }
- @InProceedings{jakobsson-optimally,
- author = "Markus Jakobsson and Ari Juels",
- title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
- booktitle = {Principles of Distributed Computing - {PODC} '01},
- year = "2001",
- publisher = {ACM Press},
- note = {url{http://citeseer.nj.nec.com/492015.html}},
- }
- @InProceedings{kesdogan,
- author = {D. Kesdogan and M. Egner and T. B"uschkes},
- title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
- System},
- booktitle = {Information Hiding (IH 1998)},
- year = {1998},
- publisher = {Springer-Verlag, LNCS 1525},
- }
- %note = {url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
- @InProceedings{socks4,
- author = {David Koblas and Michelle R. Koblas},
- title = {{SOCKS}},
- booktitle = {UNIX Security III Symposium (1992 USENIX Security
- Symposium)},
- pages = {77--83},
- year = 1992,
- publisher = {USENIX},
- }
- @InProceedings{flash-mix,
- author = {Markus Jakobsson},
- title = {Flash {M}ixing},
- booktitle = {Principles of Distributed Computing - {PODC} '99},
- year = {1999},
- publisher = {ACM Press},
- note = {newline url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
- }
- @InProceedings{SK,
- author = {Joe Kilian and Kazue Sako},
- title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
- the Implementation of a Voting Booth},
- booktitle = {EUROCRYPT '95},
- year = {1995},
- publisher = {Springer-Verlag},
- }
- @InProceedings{OAEP,
- author = {M. Bellare and P. Rogaway},
- year = {1994},
- booktitle = {EUROCRYPT '94},
- title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
- {RSA}},
- publisher = {Springer-Verlag},
- note = {newline url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
- }
- @inproceedings{babel,
- title = {Mixing {E}-mail With {B}abel},
- author = {Ceki G"ulc"u and Gene Tsudik},
- booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
- year = 1996,
- month = {February},
- pages = {2--16},
- publisher = {IEEE},
- }
- %note = {url{http://citeseer.nj.nec.com/2254.html}},
- @Misc{rprocess,
- author = {RProcess},
- title = {Selective Denial of Service Attacks},
- note = {newline url{http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html}},
- }
- @Article{remailer-history,
- author = {Sameer Parekh},
- title = {Prospects for Remailers},
- journal = {First Monday},
- volume = {1},
- number = {2},
- month = {August},
- year = {1996},
- note = {url{http://www.firstmonday.dk/issues/issue2/remailers/}},
- }
- @Article{chaum-mix,
- author = {David Chaum},
- title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
- journal = {Communications of the ACM},
- year = {1981},
- volume = {4},
- number = {2},
- month = {February},
- }
- %note = {url{http://www.eskimo.com/~weidai/mix-net.txt}},
- @InProceedings{nym-alias-net,
- author = {David Mazi`{e}res and M. Frans Kaashoek},
- title = {{The Design, Implementation and Operation of an Email
- Pseudonym Server}},
- booktitle = {$5^{th}$ ACM Conference on Computer and
- Communications Security (CCS'98)},
- year = 1998,
- publisher = {ACM Press},
- }
- %note = {newline url{http://www.scs.cs.nyu.edu/~dm/}},
- @InProceedings{tangler,
- author = {Marc Waldman and David Mazi`{e}res},
- title = {Tangler: A Censorship-Resistant Publishing System
- Based on Document Entanglements},
- booktitle = {$8^{th}$ ACM Conference on Computer and
- Communications Security (CCS-8)},
- pages = {86--135},
- year = 2001,
- publisher = {ACM Press},
- }
- %note = {url{http://www.scs.cs.nyu.edu/~dm/}}
- @misc{neochaum,
- author = {Tim May},
- title = {Payment mixes for anonymity},
- howpublished = {E-mail archived at
- url{http://newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
- }
- @misc{helsingius,
- author = {J. Helsingius},
- title = {{tt anon.penet.fi} press release},
- note = {newline url{http://www.penet.fi/press-english.html}},
- }
- @InProceedings{garay97secure,
- author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
- title = {Secure distributed storage and retrieval},
- booktitle = {11th International Workshop, WDAG '97},
- pages = {275--289},
- year = {1997},
- publisher = {Springer-Verlag, LNCS 1320},
- note = {newline url{http://citeseer.nj.nec.com/garay97secure.html}},
- }
- @InProceedings{PIK,
- author = {C. Park and K. Itoh and K. Kurosawa},
- title = {Efficient anonymous channel and all/nothing election scheme},
- booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
- pages = {248--259},
- publisher = {Springer-Verlag, LNCS 765},
- }
- @Misc{pgpfaq,
- key = {PGP},
- title = {{PGP} {FAQ}},
- note = {newline url{http://www.faqs.org/faqs/pgp-faq/}},
- }
- @Article{riordan-schneier,
- author = {James Riordan and Bruce Schneier},
- title = {A Certified E-mail Protocol with No Trusted Third Party},
- journal = {13th Annual Computer Security Applications Conference},
- month = {December},
- year = {1998},
- note = {newline url{http://www.counterpane.com/certified-email.html}},
- }
- @Article{crowds-tissec,
- author = {Michael K. Reiter and Aviel D. Rubin},
- title = {Crowds: Anonymity for Web Transactions},
- journal = {ACM TISSEC},
- year = 1998,
- volume = 1,
- number = 1,
- pages = {66--92},
- month = {June},
- }
- %note = {url{http://citeseer.nj.nec.com/284739.html}}
- @Article{crowds-dimacs,
- author = {Michael K. Reiter and Aviel D. Rubin},
- title = {Crowds: Anonymity for Web Transactions},
- journal = {{DIMACS} Technical Report (Revised)},
- volume = {97},
- number = {15},
- month = {August},
- year = {1997},
- }
- @Misc{advogato,
- author = {Raph Levien},
- title = {Advogato's Trust Metric},
- note = {newline url{http://www.advogato.org/trust-metric.html}},
- }
- @InProceedings{publius,
- author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
- title = {Publius: {A} robust, tamper-evident, censorship-resistant and
- source-anonymous web publishing system},
- booktitle = {Proc. 9th USENIX Security Symposium},
- pages = {59--72},
- year = {2000},
- month = {August},
- }
- %note = {newline url{http://citeseer.nj.nec.com/waldman00publius.html}},
- @Misc{freedom-nyms,
- author = {Russell Samuels},
- title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
- year = {1999},
- month = {November},
- day = {21},
- note = {newline url{http://www.freedom.net/products/whitepapers/white11.html}},
- }
- @techreport{freedom2-arch,
- title = {Freedom Systems 2.0 Architecture},
- author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
- institution = {Zero Knowledge Systems, {Inc.}},
- year = {2000},
- month = {December},
- type = {White Paper},
- day = {18},
- }
- @techreport{freedom21-security,
- title = {Freedom Systems 2.1 Security Issues and Analysis},
- author = {Adam Back and Ian Goldberg and Adam Shostack},
- institution = {Zero Knowledge Systems, {Inc.}},
- year = {2001},
- month = {May},
- type = {White Paper},
- }
- @inproceedings{cfs:sosp01,
- title = {Wide-area cooperative storage with {CFS}},
- author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
- booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
- year = {2001},
- month = {October},
- address = {Chateau Lake Louise, Banff, Canada},
- }
- @inproceedings{SS03,
- title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
- author = {Andrei Serjantov and Peter Sewell},
- booktitle = {Computer Security -- ESORICS 2003},
- publisher = {Springer-Verlag, LNCS 2808},
- year = {2003},
- month = {October},
- }
- %note = {url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
- @Misc{pk-relations,
- author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
- title = {Relations Among Notions of Security for Public-Key Encryption
- Schemes},
- howpublished = {
- Extended abstract in {em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
- Springer-Verlag, 1998.
- Full version available from newline url{http://www-cse.ucsd.edu/users/mihir/}},
- }
- @InProceedings{mix-acc,
- author = {Roger Dingledine and Michael J. Freedman and David
- Hopwood and David Molnar},
- title = {{A Reputation System to Increase MIX-net
- Reliability}},
- booktitle = {Information Hiding (IH 2001)},
- pages = {126--141},
- year = 2001,
- editor = {Ira S. Moskowitz},
- publisher = {Springer-Verlag, LNCS 2137},
- }
- %note = {url{http://www.freehaven.net/papers.html}},
- @InProceedings{casc-rep,
- author = {Roger Dingledine and Paul Syverson},
- title = {{Reliable MIX Cascade Networks through Reputation}},
- booktitle = {Financial Cryptography},
- year = 2002,
- editor = {Matt Blaze},
- publisher = {Springer-Verlag, LNCS 2357},
- }
- %note = {newline url{http://www.freehaven.net/papers.html}},
- @InProceedings{zhou96certified,
- author = {Zhou and Gollmann},
- title = {Certified Electronic Mail},
- booktitle = {{ESORICS: European Symposium on Research in Computer
- Security}},
- publisher = {Springer-Verlag, LNCS 1146},
- year = {1996},
- note = {newline url{http://citeseer.nj.nec.com/zhou96certified.html}},
- }
- @Misc{realtime-mix,
- author = {Anja Jerichow and Jan M"uller and Andreas Pfitzmann and
- Birgit Pfitzmann and Michael Waidner},
- title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
- howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
- note = {url{http://www.zurich.ibm.com/security/publications/1998.html}},
- }
- @InProceedings{danezis:pet2003,
- author = {George Danezis},
- title = {Mix-networks with Restricted Routes},
- booktitle = {Privacy Enhancing Technologies (PET 2003)},
- year = 2003,
- editor = {Roger Dingledine},
- publisher = {Springer-Verlag LNCS 2760}
- }
- @InProceedings{gap-pets03,
- author = {Krista Bennett and Christian Grothoff},
- title = {{GAP} -- practical anonymous networking},
- booktitle = {Privacy Enhancing Technologies (PET 2003)},
- year = 2003,
- editor = {Roger Dingledine},
- publisher = {Springer-Verlag LNCS 2760}
- }
- @Article{hordes-jcs,
- author = {Brian Neal Levine and Clay Shields},
- title = {Hordes: A Multicast-Based Protocol for Anonymity},
- journal = {Journal of Computer Security},
- year = 2002,
- volume = 10,
- number = 3,
- pages = {213--240}
- }
- @TechReport{herbivore,
- author = {Sharad Goel and Mark Robson and Milo Polte and Emin G"{u}n Sirer},
- title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
- institution = {Cornell University Computing and Information Science},
- year = 2003,
- type = {Technical Report},
- number = {TR2003-1890},
- month = {February}
- }
- @InProceedings{p5,
- author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
- title = {$P^5$: A Protocol for Scalable Anonymous Communication},
- booktitle = {IEEE Symposium on Security and Privacy},
- pages = {58--70},
- year = 2002,
- publisher = {IEEE CS}
- }
- @phdthesis{ian-thesis,
- title = {A Pseudonymous Communications Infrastructure for the Internet},
- author = {Ian Goldberg},
- school = {UC Berkeley},
- year = {2000},
- month = {Dec},
- }
- @Article{taz,
- author = {Ian Goldberg and David Wagner},
- title = {TAZ Servers and the Rewebber Network: Enabling
- Anonymous Publishing on the World Wide Web},
- journal = {First Monday},
- year = 1998,
- volume = 3,
- number = 4,
- month = {August},
- note = {url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
- }
- @Misc{tcp-over-tcp-is-bad,
- key = {tcp-over-tcp-is-bad},
- title = {Why {TCP} Over {TCP} Is A Bad Idea},
- author = {Olaf Titz},
- note = {url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
- }
- @inproceedings{wright02,
- title = {An Analysis of the Degradation of Anonymous Protocols},
- author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
- booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
- year = {2002},
- month = {February},
- publisher = {IEEE},
- }
- @inproceedings{wright03,
- title = {Defending Anonymous Communication Against Passive Logging Attacks},
- author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
- booktitle = {IEEE Symposium on Security and Privacy},
- pages= {28--41},
- year = {2003},
- month = {May},
- publisher = {IEEE CS},
- }
- @InProceedings{attack-tor-oak05,
- author = {Steven J. Murdoch and George Danezis},
- title = {Low-cost Traffic Analysis of {T}or},
- booktitle = {IEEE Symposium on Security and Privacy},
- year = 2005,
- month = {May},
- publisher = {IEEE CS}
- }
- @Misc{jap-backdoor,
- author={{The AN.ON Project}},
- howpublished={Press release},
- year={2003},
- month={September},
- title={German Police proceeds against anonymity service},
- note={url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
- }
- @article{shsm03,
- title = {Using Caching for Browsing Anonymity},
- author = {Anna Shubina and Sean Smith},
- journal = {ACM SIGEcom Exchanges},
- volume = {4},
- number = {2},
- year = {2003},
- month = {Sept},
- note = {url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
- }
- @inproceedings{tor-design,
- title = {Tor: The Second-Generation Onion Router},
- author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
- booktitle = {Proceedings of the 13th USENIX Security Symposium},
- year = {2004},
- month = {August},
- note = {url{https://www.torproject.org/tor-design.pdf}}
- }
- @inproceedings{flow-correlation04,
- title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
- author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
- booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
- year = {2004},
- month = {May},
- series = {LNCS},
- note = {url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
- }
- @InProceedings{danezis:pet2004,
- author = "George Danezis",
- title = "The Traffic Analysis of Continuous-Time Mixes",
- booktitle= {Privacy Enhancing Technologies (PET 2004)},
- editor = {David Martin and Andrei Serjantov},
- month = {May},
- year = {2004},
- series = {LNCS},
- note = {url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
- }
- @inproceedings{feamster:wpes2004,
- title = {Location Diversity in Anonymity Networks},
- author = {Nick Feamster and Roger Dingledine},
- booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
- year = {2004},
- month = {October},
- address = {Washington, DC, USA},
- note = {url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
- }
- @inproceedings{koepsell:wpes2004,
- title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
- author = {Stefan K"opsell and Ulf Hilling},
- booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
- year = {2004},
- month = {October},
- address = {Washington, DC, USA},
- note = {url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
- }
- @inproceedings{sync-batching,
- title = {Synchronous Batching: From Cascades to Free Routes},
- author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
- booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
- editor = {David Martin and Andrei Serjantov},
- year = {2004},
- month = {May},
- series = {LNCS},
- note = {url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
- }
- @InProceedings{e2e-traffic,
- author = "Nick Mathewson and Roger Dingledine",
- title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
- booktitle= {Privacy Enhancing Technologies (PET 2004)},
- editor = {David Martin and Andrei Serjantov},
- month = {May},
- year = {2004},
- series = {LNCS},
- note = {url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
- }
- @Misc{dtls,
- author = {E. Rescorla and N. Modadugu},
- title = {{Datagram Transport Layer Security}},
- howpublished = {IETF Draft},
- month = {December},
- year = {2003},
- note = {url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
- }
- @InProceedings{usability-network-effect,
- author={Roger Dingledine and Nick Mathewson},
- title={Anonymity Loves Company: Usability and the Network Effect},
- booktitle = {Designing Security Systems That People Can Use},
- year = {2005},
- publisher = {O'Reilly Media},
- }
- @inproceedings{usability:weis2006,
- title = {Anonymity Loves Company: Usability and the Network Effect},
- author = {Roger Dingledine and Nick Mathewson},
- booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
- (WEIS 2006)},
- year = {2006},
- month = {June},
- address = {Cambridge, UK},
- bookurl = {http://weis2006.econinfosec.org/},
- note = {url{http://freehaven.net/doc/wupss04/usability.pdf}},
- }
- @Misc{six-four,
- key = {six-four},
- title = {{The Six/Four System}},
- note = {url{http://sourceforge.net/projects/sixfour/}}
- }
- @inproceedings{clayton:pet2006,
- title = {Ignoring the Great Firewall of China},
- author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
- booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
- year = {2006},
- month = {June},
- address = {Cambridge, UK},
- publisher = {Springer},
- bookurl = {http://petworkshop.org/2006/},
- note = {url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
- }
- @Misc{zuckerman-threatmodels,
- key = {zuckerman-threatmodels},
- title = {We've got to adjust some of our threat models},
- author = {Ethan Zuckerman},
- note = {url{http://www.ethanzuckerman.com/blog/?p=1019}}
- }
- @Misc{cgiproxy,
- key = {cgiproxy},
- title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
- author = {James Marshall},
- note = {url{http://www.jmarshall.com/tools/cgiproxy/}}
- }
- @Misc{circumventor,
- key = {circumventor},
- title = {{How to install the Circumventor program}},
- author = {Bennett Haselton},
- note = {url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
- }
- @Misc{psiphon,
- key = {psiphon},
- title = {Psiphon},
- author = {Ronald Deibert et al},
- note = {url{http://psiphon.civisec.org/}}
- }
- @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
- title = {Embedding Covert Channels into {TCP/IP}},
- booktitle = {Information Hiding: 7th International Workshop},
- pages = {247--261},
- year = {2005},
- editor = {Mauro Barni and Jordi Herrera-Joancomart'{i} and
- Stefan Katzenbeisser and Fernando P'{e}rez-Gonz'{a}lez},
- volume = {3727},
- series = {LNCS},
- address = {Barcelona, Catalonia (Spain)},
- month = {June},
- publisher = {Springer-Verlag},
- url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
- }
- @phdthesis{blossom-thesis,
- title = {Perspective Access Networks},
- author = {Geoffrey Goodell},
- school = {Harvard University},
- year = {2006},
- month = {July},
- note = {url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
- }
- @inproceedings{tap:pet2006,
- title = {On the Security of the Tor Authentication Protocol},
- author = {Ian Goldberg},
- booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
- year = {2006},
- month = {June},
- address = {Cambridge, UK},
- publisher = {Springer},
- bookurl = {http://petworkshop.org/2006/},
- note = {url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
- }
- @inproceedings{rep-anon,
- title = {{Reputation in P2P Anonymity Systems}},
- author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
- booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
- year = {2003},
- month = {June},
- note = {url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
- }
- @misc{tor-challenges,
- author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
- title = {Challenges in deploying low-latency anonymity},
- year = {2005},
- note = {Manuscript}
- }
- @InProceedings{chaum-blind,
- author = {David Chaum},
- title = {Blind Signatures for Untraceable Payments},
- booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
- pages = {199--203},
- year = 1983,
- editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
- publisher = {Plenum Press}
- }
- @Article{netauth,
- author = {Geoffrey Goodell and Paul Syverson},
- title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},
- journal = {Communications of the ACM},
- year = 2007,
- volume = 50,
- number = 5,
- pages = {113--117},
- month = {May}
- }
- @misc{ip-to-country,
- key = {ip-to-country},
- title = {IP-to-country database},
- note = {url{http://ip-to-country.webhosting.info/}},
- }
- @misc{mackinnon-personal,
- author = {Rebecca MacKinnon},
- title = {Private communication},
- year = {2006},
- }
- @inproceedings{pet05-bissias,
- title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
- author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
- booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
- year = {2005},
- month = {May},
- note = {url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
- }
- @InProceedings{infranet,
- author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
- title = {Infranet: Circumventing Web Censorship and Surveillance},
- booktitle = {Proceedings of the 11th USENIX Security Symposium},
- year = {2002},
- month = {August},
- note = {url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
- }
- @techreport{ ptacek98insertion,
- author = "Thomas H. Ptacek and Timothy N. Newsham",
- title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
- institution = "Secure Networks, Inc.",
- address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
- year = "1998",
- url = "citeseer.ist.psu.edu/ptacek98insertion.html",
- }
- @inproceedings{active-wardens,
- author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
- title = "Eliminating Steganography in Internet Traffic with Active Wardens",
- booktitle = {Information Hiding Workshop (IH 2002)},
- year = {2002},
- month = {October},
- editor = {Fabien Petitcolas},
- publisher = {Springer-Verlag, LNCS 2578},
- }
- @inproceedings{clog-the-queue,
- title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes},
- author = {Jon McLachlan and Nicholas Hopper},
- booktitle = {Proceedings of Financial Cryptography (FC '08)},
- year = {2008},
- month = {January},
- }
- @inproceedings{snader08,
- title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},
- author = {Robin Snader and Nikita Borisov},
- booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},
- year = {2008},
- month = {February},
- publisher = {Internet Society},
- }
- @inproceedings{murdoch-pet2008,
- title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},
- author = {Steven J. Murdoch and Robert N. M. Watson},
- booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
- year = {2008},
- month = {July},
- address = {Leuven, Belgium},
- pages = {115--132},
- editor = {Nikita Borisov and Ian Goldberg},
- publisher = {Springer},
- bookurl = {http://petsymposium.org/2008/},
- }
- @inproceedings{danezis-pet2008,
- title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
- author = {George Danezis and Paul Syverson},
- booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
- year = {2008},
- month = {July},
- address = {Leuven, Belgium},
- pages = {133--150},
- editor = {Nikita Borisov and Ian Goldberg},
- publisher = {Springer},
- bookurl = {http://petsymposium.org/2008/},
- }
- %%% Local Variables:
- %%% mode: latex
- %%% TeX-master: "tor-design"
- %%% End: