4 author = "Andrew Tannenbaum"
,
5 title = "Computer Networks"
,
7 publisher = "Prentice Hall
, 3rd edition"
,
11 author = "Catherine Meadows"
,
12 title = "The
{NRL
} Protocol Analyzer
: An Overview"
,
13 journal = "Journal of Logic Programming"
,
19 @inproceedings
{kesdogan
:pet2002
,
20 title = {Unobservable Surfing on the World Wide Web
: Is Private Information Retrieval an
21 alternative to the MIX based Approach?
},
22 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink
},
23 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
26 editor = {Roger Dingledine and Paul Syverson
},
27 publisher = {Springer
-Verlag
, LNCS
2482},
30 @inproceedings
{statistical
-disclosure
,
31 title = {Statistical Disclosure Attacks
},
32 author = {George Danezis
},
33 booktitle = {Security and Privacy in the Age of Uncertainty
({SEC2003
})},
34 organization = {{IFIP TC11
}},
42 @inproceedings
{limits
-open
,
43 title = {Limits of Anonymity in Open Environments
},
44 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz
},
45 booktitle = {Information Hiding Workshop
(IH
2002)},
48 editor = {Fabien Petitcolas
},
49 publisher = {Springer
-Verlag
, LNCS
2578},
52 @inproceedings
{isdn
-mixes
,
53 title = {{ISDN
-mixes
: Untraceable communication with very small bandwidth overhead
}},
54 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner
},
55 booktitle = {GI
/ITG Conference on Communication in Distributed Systems
},
62 @Article
{jerichow
-jsac98
,
63 author = {Anja Jerichow and Jan M\"
{u
}ller and Andreas
64 Pfitzmann and Birgit Pfitzmann and Michael Waidner
},
65 title = {Real
-Time Mixes
: A Bandwidth
-Efficient Anonymity Protocol
},
66 journal = {IEEE Journal on Selected Areas in Communications
},
74 @inproceedings
{tarzan
:ccs02
,
75 title = {Tarzan
: A Peer
-to
-Peer Anonymizing Network Layer
},
76 author = {Michael J. Freedman and Robert Morris
},
77 booktitle = {9th
{ACM
} {C
}onference on
{C
}omputer and
{C
}ommunications
78 {S
}ecurity
({CCS
2002})},
81 address = {Washington
, DC
},
84 @inproceedings
{cebolla
,
85 title = {{Cebolla
: Pragmatic IP Anonymity
}},
86 author = {Zach Brown
},
87 booktitle = {Ottawa Linux Symposium
},
93 author = "M. Bellare and P. Rogaway and D. Wagner"
,
94 title = {The
{EAX
} Mode of Operation
: A Two
-Pass Authenticated
-Encryption Scheme Optimized for Simplicity and Efficiency
},
95 booktitle = {Fast Software Encryption
2004},
101 title = {{The Dark Side of the Web
: An Open Proxy's View
}},
102 author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson
},
103 note = {\newline \url
{http
://codeen.cs.princeton.edu
/}},
105 % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
109 title = {The
{Anonymizer
}},
110 note = {\url
{http
://anonymizer.com
/}}
116 note = {\url
{http
://www.privoxy.org
/}}
119 @inproceedings
{anonnet
,
120 title = {{Analysis of an Anonymity Network for Web Browsing
}},
121 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
123 booktitle = {{IEEE
7th Intl. Workshop on Enterprise Security
(WET ICE
127 address = {Pittsburgh
, USA
},
131 @inproceedings
{econymics
,
132 title = {On the Economics of Anonymity
},
133 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson
},
134 booktitle = {Financial Cryptography
},
136 editor = {Rebecca N. Wright
},
137 publisher = {Springer
-Verlag
, LNCS
2742},
140 @inproceedings
{defensive
-dropping
,
141 title = {Timing Analysis in Low
-Latency Mix
-Based Systems
},
142 author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright
},
143 booktitle = {Financial Cryptography
},
145 editor = {Ari Juels
},
146 publisher = {Springer
-Verlag
, LNCS
(forthcoming
)},
149 @inproceedings
{morphmix
:fc04
,
150 title = {Practical Anonymity for the Masses with MorphMix
},
151 author = {Marc Rennhard and Bernhard Plattner
},
152 booktitle = {Financial Cryptography
},
154 editor = {Ari Juels
},
155 publisher = {Springer
-Verlag
, LNCS
(forthcoming
)},
158 @inproceedings
{eternity
,
159 title = {The Eternity Service
},
160 author = {Ross Anderson
},
161 booktitle = {Pragocrypt '
96},
164 %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
167 @inproceedings
{minion
-design
,
168 title = {Mixminion
: Design of a Type
{III
} Anonymous Remailer Protocol
},
169 author = {George Danezis and Roger Dingledine and Nick Mathewson
},
170 booktitle = {2003 IEEE Symposium on Security and Privacy
},
173 publisher = {IEEE CS
},
176 %note = {\url{http://mixminion.net/minion-design.pdf}},
178 @inproceedings
{ rao
-pseudonymity
,
179 author = "Josyula R. Rao and Pankaj Rohatgi"
,
180 title = "Can Pseudonymity Really Guarantee Privacy?"
,
181 booktitle = "Proceedings of the Ninth USENIX Security Symposium"
,
184 publisher = {USENIX
},
187 %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
188 %full_papers/rao/rao.pdf}},
190 @InProceedings
{pfitzmann90how
,
191 author = "Birgit Pfitzmann and Andreas Pfitzmann"
,
192 title = "How to Break the Direct
{RSA
}-Implementation of
{MIXes
}"
,
193 booktitle = {Eurocrypt
89},
194 publisher = {Springer
-Verlag
, LNCS
434},
196 note = {\url
{http
://citeseer.nj.nec.com
/pfitzmann90how.html
}},
200 author = {Roger Dingledine and Nick Mathewson
},
201 title = {Tor Protocol Specifications
},
202 note = {\url
{http
://tor.eff.org
/svn
/trunk
/doc
/tor
-spec.txt
}},
205 @Misc
{incentives
-txt
,
206 author = {Roger Dingledine and Nick Mathewson
},
207 title = {Tor Incentives Design Brainstorms
},
208 note = {\url
{http
://tor.eff.org
/svn
/trunk
/doc
/incentives.txt
}},
211 @InProceedings
{BM
:mixencrypt
,
212 author = {M
{\"o
}ller
, Bodo
},
213 title = {Provably Secure Public
-Key Encryption for Length
-Preserving Chaumian Mixes
},
214 booktitle = {{CT
-RSA
} 2003},
215 publisher = {Springer
-Verlag
, LNCS
2612},
219 @InProceedings
{back01
,
220 author = {Adam Back and Ulf M\"oller and Anton Stiglic
},
221 title = {Traffic Analysis Attacks and Trade
-Offs in Anonymity Providing Systems
},
222 booktitle = {Information Hiding
(IH
2001)},
225 editor = {Ira S. Moskowitz
},
226 publisher = {Springer
-Verlag
, LNCS
2137},
228 %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
230 @InProceedings
{rackoff93cryptographic
,
231 author = {Charles Rackoff and Daniel R. Simon
},
232 title = {Cryptographic Defense Against Traffic Analysis
},
233 booktitle = {{ACM
} Symposium on Theory of Computing
},
237 %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
239 @InProceedings
{freehaven
-berk
,
240 author = {Roger Dingledine and Michael J. Freedman and David Molnar
},
241 title = {The Free Haven Project
: Distributed Anonymous Storage Service
},
242 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
243 on Design Issue in Anonymity and Unobservability
},
246 editor = {H. Federrath
},
247 publisher = {Springer
-Verlag
, LNCS
2009},
250 @InProceedings
{move
-ndss05
,
251 author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein
},
252 title = {MOVE
: An End
-to
-End Solution To Network Denial of Service
},
253 booktitle = {{ISOC Network and Distributed System Security Symposium
(NDSS05
)}},
256 publisher = {Internet Society
}
259 %note = {\url{http://freehaven.net/papers.html}},
264 @InProceedings
{raymond00
,
265 author = {J. F. Raymond
},
266 title = {{Traffic Analysis
: Protocols
, Attacks
, Design Issues
,
268 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
269 on Design Issue in Anonymity and Unobservability
},
273 editor = {H. Federrath
},
274 publisher = {Springer
-Verlag
, LNCS
2009},
277 @InProceedings
{sybil
,
278 author = "John Douceur"
,
279 title = {{The Sybil Attack
}},
280 booktitle = "Proceedings of the
1st International Peer To Peer Systems Workshop
(IPTPS
)"
,
286 @InCollection
{price
-privacy
,
287 author = {Paul Syverson and Adam Shostack
},
288 editor = {L. Jean Camp and Stephen Lewis
},
289 title = {What Price Privacy?
(and why identity theft is about neither identity nor theft
)},
290 booktitle = {Economics of Information Security
},
292 publisher = {Kluwer
},
298 @InProceedings
{trickle02
,
299 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson
},
300 title = {From a Trickle to a Flood
: Active Attacks on Several
302 booktitle = {Information Hiding
(IH
2002)},
304 editor = {Fabien Petitcolas
},
305 publisher = {Springer
-Verlag
, LNCS
2578},
308 @InProceedings
{langos02
,
309 author = {Oliver Berthold and Heinrich Langos
},
310 title = {Dummy Traffic Against Long Term Intersection Attacks
},
311 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
313 editor = {Roger Dingledine and Paul Syverson
},
314 publisher = {Springer
-Verlag
, LNCS
2482}
318 @InProceedings
{hintz
-pet02
,
319 author = {Andrew Hintz
},
320 title = {Fingerprinting Websites Using Traffic Analysis
},
321 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
324 editor = {Roger Dingledine and Paul Syverson
},
325 publisher = {Springer
-Verlag
, LNCS
2482}
328 @InProceedings
{or
-discex00
,
329 author = {Paul Syverson and Michael Reed and David Goldschlag
},
330 title = {{O
}nion
{R
}outing Access Configurations
},
331 booktitle = {DARPA Information Survivability Conference and
332 Exposition
(DISCEX
2000)},
334 publisher = {IEEE CS Press
},
338 %note = {\newline \url{http://www.onion-router.net/Publications.html}},
340 @Inproceedings
{or
-pet00
,
341 title = {{Towards an Analysis of Onion Routing Security
}},
342 author = {Paul Syverson and Gene Tsudik and Michael Reed and
344 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
345 on Design Issue in Anonymity and Unobservability
},
349 editor = {H. Federrath
},
350 publisher = {Springer
-Verlag
, LNCS
2009},
352 %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
354 @Inproceedings
{freenet
-pets00
,
355 title = {Freenet
: A Distributed Anonymous Information Storage
356 and Retrieval System
},
357 author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
359 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
360 on Design Issue in Anonymity and Unobservability
},
364 editor = {H. Federrath
},
365 publisher = {Springer
-Verlag
, LNCS
2009},
367 %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
369 @InProceedings
{or
-ih96
,
370 author = {David M. Goldschlag and Michael G. Reed and Paul
372 title = {Hiding Routing Information
},
373 booktitle = {Information Hiding
, First International Workshop
},
376 editor = {R. Anderson
},
378 publisher = {Springer
-Verlag
, LNCS
1174},
381 @InProceedings
{federrath
-ih96
,
382 author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann
},
383 title = {{MIXes
} in Mobile Communication Systems
: Location
384 Management with Privacy
},
385 booktitle = {Information Hiding
, First International Workshop
},
388 editor = {R. Anderson
},
390 publisher = {Springer
-Verlag
, LNCS
1174},
394 @InProceedings
{reed
-protocols97
,
395 author = {Michael G. Reed and Paul F. Syverson and David
397 title = {Protocols Using Anonymous Connections
: Mobile Applications
},
398 booktitle = {Security Protocols
: 5th International Workshop
},
401 editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
404 publisher = {Springer
-Verlag
, LNCS
1361}
410 author = {Michael G. Reed and Paul F. Syverson and David
412 title = {Anonymous Connections and Onion Routing
},
413 journal = {IEEE Journal on Selected Areas in Communications
},
420 %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
423 author = {T. Dierks and C. Allen
},
424 title = {The
{TLS
} {P
}rotocol
--- {V
}ersion
1.0},
425 howpublished = {IETF RFC
2246},
429 %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
432 author = {J. Postel
},
433 title = {Simple
{M
}ail
{T
}ransfer
{P
}rotocol
},
434 howpublished = {IETF RFC
2821 (also STD0010
)},
437 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc2821.txt
}},
441 author = {M. Crispin
},
442 title = {Internet
{M
}essage
{A
}ccess
{P
}rotocol
--- {V
}ersion
4rev1
},
443 howpublished = {IETF RFC
2060},
446 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc2060.txt
}},
450 title = {PipeNet
1.1},
454 howpublished = {Usenet post
},
455 note = {\url
{http
://www.eskimo.com
/~weidai
/pipenet.txt
} First mentioned
456 in a post to the cypherpunks list
, Feb.\
1995.
},
461 author = {J. Myers and M. Rose
},
462 title = {Post
{O
}ffice
{P
}rotocol
--- {V
}ersion
3},
463 howpublished = {IETF RFC
1939 (also STD0053
)},
466 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc1939.txt
}},
470 @InProceedings
{shuffle
,
471 author = {C. Andrew Neff
},
472 title = {A Verifiable Secret Shuffle and its Application to E
-Voting
},
473 booktitle = {8th ACM Conference on Computer and Communications
477 editor = {P. Samarati
},
479 publisher = {ACM Press
},
481 %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
482 % technicaldocs/shuffle.pdf}},
484 @InProceedings
{dolev91
,
485 author = {Danny Dolev and Cynthia Dwork and Moni Naor
},
486 title = {Non
-Malleable Cryptography
},
487 booktitle = {23rd ACM Symposium on the Theory of Computing
(STOC
)},
490 note = {Updated version at
491 \url
{http
://citeseer.nj.nec.com
/dolev00nonmalleable.html
}},
495 author = {Ronald L. Rivest and Adi Shamir and David A. Wagner
},
496 title = {Time
-lock puzzles and timed
-release Crypto
},
498 type = {MIT LCS technical memo
},
499 number = {MIT
/LCS
/TR
-684},
501 note = {\newline \url
{http
://citeseer.nj.nec.com
/rivest96timelock.html
}},
504 @InProceedings
{web
-mix
,
505 author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell
},
506 title = {Web
{MIX
}es
: A system for anonymous and unobservable
508 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
509 on Design Issue in Anonymity and Unobservability
},
510 editor = {H. Federrath
},
511 publisher = {Springer
-Verlag
, LNCS
2009},
514 % pages = {115--129},
516 @InProceedings
{disad
-free
-routes
,
517 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke
},
518 title = {The disadvantages of free
{MIX
} routes and how to overcome
520 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
521 on Design Issue in Anonymity and Unobservability
},
524 editor = {H. Federrath
},
525 publisher = {Springer
-Verlag
, LNCS
2009},
527 %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
528 % disadvantages_berthold.pdf}},
530 @InProceedings
{boneh00
,
531 author = {Dan Boneh and Moni Naor
},
532 title = {Timed Commitments
},
533 booktitle = {Advances in Cryptology
-- {CRYPTO
} 2000},
536 publisher = {Springer
-Verlag
, LNCS
1880},
537 note = {\newline \url
{http
://crypto.stanford.edu
/~dabo
/abstracts
/timedcommit.html
}},
540 @InProceedings
{goldschlag98
,
541 author = {David M. Goldschlag and Stuart G. Stubblebine
},
542 title = {Publicly Verifiable Lotteries
: Applications of
544 booktitle = {Financial Cryptography
},
547 publisher = {Springer
-Verlag
, LNCS
1465},
548 note = {\newline \url
{http
://citeseer.nj.nec.com
/goldschlag98publicly.html
}},
551 @InProceedings
{syverson98
,
552 author = {Paul Syverson
},
553 title = {Weakly Secret Bit Commitment
: Applications to
554 Lotteries and Fair Exchange
},
555 booktitle = {Computer Security Foundations Workshop
(CSFW11
)},
558 address = {Rockport Massachusetts
},
560 publisher = {IEEE CS Press
},
561 note = {\newline \url
{http
://chacs.nrl.navy.mil
/publications
/CHACS
/1998/}},
565 author = {Victor Shoup
},
566 title = {A Proposal for an
{ISO
} {S
}tandard for Public Key Encryption
(version
2.1)},
567 note = {Revised December
20, 2001. \url
{http
://www.shoup.net
/papers
/}},
571 author = {Victor Shoup
},
572 title = {{OAEP
} Reconsidered
},
573 howpublished = {{IACR
} e
-print
2000/060},
574 note = {\newline \url
{http
://eprint.iacr.org
/2000/060/}},
577 @Misc
{oaep
-still
-alive
,
578 author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern
},
579 title = {{RSA
}-{OAEP
} is Still Alive
!},
580 howpublished = {{IACR
} e
-print
2000/061},
581 note = {\newline \url
{http
://eprint.iacr.org
/2000/061/}},
585 author = {Peter Palfrader
},
586 title = {Echolot
: a pinger for anonymous remailers
},
587 note = {\url
{http
://www.palfrader.org
/echolot
/}},
590 @Misc
{mixmaster
-attacks
,
591 author = {Lance Cottrell
},
592 title = {Mixmaster and Remailer Attacks
},
593 note = {\url
{http
://www.obscura.com
/~loki
/remailer
/remailer
-essay.html
}},
596 @Misc
{mixmaster
-spec
,
597 author = {Ulf M
{\"o
}ller and Lance Cottrell and Peter
598 Palfrader and Len Sassaman
},
599 title = {Mixmaster
{P
}rotocol
--- {V
}ersion
2},
602 howpublished = {Draft
},
603 note = {\url
{http
://www.abditum.com
/mixmaster
-spec.txt
}},
606 @InProceedings
{puzzles
-tls
,
607 author = "Drew Dean and Adam Stubblefield"
,
608 title = {{Using Client Puzzles to Protect TLS
}},
609 booktitle = "Proceedings of the
10th USENIX Security Symposium"
,
612 publisher = {USENIX
},
615 @InProceedings
{breadpudding
,
616 author = {Markus Jakobsson and Ari Juels
},
617 title = {Proofs of Work and Bread Pudding Protocols
},
618 booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
619 Conference on Communications and Multimedia Security
627 author = {Adam Back
},
629 note = {\newline \url
{http
://www.cypherspace.org
/~adam
/hashcash
/}},
632 @InProceedings
{oreilly
-acc
,
633 author = {Roger Dingledine and Michael J. Freedman and David Molnar
},
634 title = {Accountability
},
635 booktitle = {Peer
-to
-peer
: Harnessing the Benefits of a Disruptive
638 publisher = {O'Reilly and Associates
},
643 author = {Yongfei Han
},
644 title = {Investigation of non
-repudiation protocols
},
645 booktitle = {ACISP '
96},
647 publisher = {Springer
-Verlag
},
653 title = {{SOCKS
} {P
}rotocol
{V
}ersion
5},
654 howpublished= {IETF RFC
1928},
657 note = {\url
{http
://www.ietf.org
/rfc
/rfc1928.txt
}}
661 author = {Masayuki Abe
},
662 title = {Universally Verifiable
{MIX
} With Verification Work Independent of
663 The Number of
{MIX
} Servers
},
664 booktitle = {{EUROCRYPT
} 1998},
666 publisher = {Springer
-Verlag
, LNCS
1403},
669 @InProceedings
{desmedt
,
670 author = {Yvo Desmedt and Kaoru Kurosawa
},
671 title = {How To Break a Practical
{MIX
} and Design a New One
},
672 booktitle = {{EUROCRYPT
} 2000},
674 publisher = {Springer
-Verlag
, LNCS
1803},
675 note = {\url
{http
://citeseer.nj.nec.com
/447709.html
}},
678 @InProceedings
{mitkuro
,
679 author = {M. Mitomo and K. Kurosawa
},
680 title = {{Attack for Flash MIX
}},
681 booktitle = {{ASIACRYPT
} 2000},
683 publisher = {Springer
-Verlag
, LNCS
1976},
684 note = {\newline \url
{http
://citeseer.nj.nec.com
/450148.html
}},
687 @InProceedings
{hybrid
-mix
,
688 author = {M. Ohkubo and M. Abe
},
689 title = {A
{L
}ength
-{I
}nvariant
{H
}ybrid
{MIX
}},
690 booktitle = {Advances in Cryptology
- {ASIACRYPT
} 2000},
692 publisher = {Springer
-Verlag
, LNCS
1976},
695 @InProceedings
{PShuffle
,
696 author = {Jun Furukawa and Kazue Sako
},
697 title = {An Efficient Scheme for Proving a Shuffle
},
698 editor = {Joe Kilian
},
699 booktitle = {CRYPTO
2001},
701 publisher = {Springer
-Verlag
, LNCS
2139},
705 @InProceedings
{jakobsson
-optimally
,
706 author = "Markus Jakobsson and Ari Juels"
,
707 title = "An Optimally Robust Hybrid Mix Network
(Extended Abstract
)"
,
708 booktitle = {Principles of Distributed Computing
- {PODC
} '
01},
710 publisher = {ACM Press
},
711 note = {\url
{http
://citeseer.nj.nec.com
/492015.html
}},
714 @InProceedings
{kesdogan
,
715 author = {D. Kesdogan and M. Egner and T. B\"uschkes
},
716 title = {Stop
-and
-Go
{MIX
}es Providing Probabilistic Anonymity in an Open
718 booktitle = {Information Hiding
(IH
1998)},
720 publisher = {Springer
-Verlag
, LNCS
1525},
722 %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
724 @InProceedings
{socks4
,
725 author = {David Koblas and Michelle R. Koblas
},
727 booktitle = {UNIX Security III Symposium
(1992 USENIX Security
731 publisher = {USENIX
},
734 @InProceedings
{flash
-mix
,
735 author = {Markus Jakobsson
},
736 title = {Flash
{M
}ixing
},
737 booktitle = {Principles of Distributed Computing
- {PODC
} '
99},
739 publisher = {ACM Press
},
740 note = {\newline \url
{http
://citeseer.nj.nec.com
/jakobsson99flash.html
}},
744 author = {Joe Kilian and Kazue Sako
},
745 title = {Receipt
-Free
{MIX
}-Type Voting Scheme
- A Practical Solution to
746 the Implementation of a Voting Booth
},
747 booktitle = {EUROCRYPT '
95},
749 publisher = {Springer
-Verlag
},
753 author = {M. Bellare and P. Rogaway
},
755 booktitle = {EUROCRYPT '
94},
756 title = {Optimal
{A
}symmetric
{E
}ncryption
{P
}adding
: How To Encrypt With
758 publisher = {Springer
-Verlag
},
759 note = {\newline \url
{http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/oaep.html
}},
761 @inproceedings
{babel
,
762 title = {Mixing
{E
}-mail With
{B
}abel
},
763 author = {Ceki G\"ulc\"u and Gene Tsudik
},
764 booktitle = {{Network and Distributed Security Symposium
(NDSS
96)}},
770 %note = {\url{http://citeseer.nj.nec.com/2254.html}},
774 title = {Selective Denial of Service Attacks
},
775 note = {\newline \url
{http
://www.eff.org
/pub
/Privacy
/Anonymity
/1999\_09\_DoS\_remail\_vuln.html
}},
778 @Article
{remailer
-history
,
779 author = {Sameer Parekh
},
780 title = {Prospects for Remailers
},
781 journal = {First Monday
},
786 note = {\url
{http
://www.firstmonday.dk
/issues
/issue2
/remailers
/}},
790 author = {David Chaum
},
791 title = {Untraceable electronic mail
, return addresses
, and digital pseudo
-nyms
},
792 journal = {Communications of the ACM
},
798 %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
800 @InProceedings
{nym
-alias
-net
,
801 author = {David Mazi\`
{e
}res and M. Frans Kaashoek
},
802 title = {{The Design
, Implementation and Operation of an Email
804 booktitle = {$
5^
{th
}$ ACM Conference on Computer and
805 Communications Security
(CCS'
98)},
807 publisher = {ACM Press
},
809 %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
811 @InProceedings
{tangler
,
812 author = {Marc Waldman and David Mazi\`
{e
}res
},
813 title = {Tangler
: A Censorship
-Resistant Publishing System
814 Based on Document Entanglements
},
815 booktitle = {$
8^
{th
}$ ACM Conference on Computer and
816 Communications Security
(CCS
-8)},
819 publisher = {ACM Press
},
821 %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
825 title = {Payment mixes for anonymity
},
826 howpublished = {E
-mail archived at
827 \url
{http
://\newline www.inet
-one.com
/cypherpunks
/dir
.2000.02.28-2000.03.05/msg00334.html
}},
831 author = {J. Helsingius
},
832 title = {{\tt anon.penet.fi
} press release
},
833 note = {\newline \url
{http
://www.penet.fi
/press
-english.html
}},
836 @InProceedings
{garay97secure
,
837 author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin
},
838 title = {Secure distributed storage and retrieval
},
839 booktitle = {11th International Workshop
, WDAG '
97},
842 publisher = {Springer
-Verlag
, LNCS
1320},
843 note = {\newline \url
{http
://citeseer.nj.nec.com
/garay97secure.html
}},
847 author = {C. Park and K. Itoh and K. Kurosawa
},
848 title = {Efficient anonymous channel and all
/nothing election scheme
},
849 booktitle = {Advances in Cryptology
-- {EUROCRYPT
} '
93},
851 publisher = {Springer
-Verlag
, LNCS
765},
856 title = {{PGP
} {FAQ
}},
857 note = {\newline \url
{http
://www.faqs.org
/faqs
/pgp
-faq
/}},
860 @Article
{riordan
-schneier
,
861 author = {James Riordan and Bruce Schneier
},
862 title = {A Certified E
-mail Protocol with No Trusted Third Party
},
863 journal = {13th Annual Computer Security Applications Conference
},
866 note = {\newline \url
{http
://www.counterpane.com
/certified
-email.html
}},
870 @Article
{crowds
-tissec
,
871 author = {Michael K. Reiter and Aviel D. Rubin
},
872 title = {Crowds
: Anonymity for Web Transactions
},
873 journal = {ACM TISSEC
},
880 %note = {\url{http://citeseer.nj.nec.com/284739.html}}
882 @Article
{crowds
-dimacs
,
883 author = {Michael K. Reiter and Aviel D. Rubin
},
884 title = {Crowds
: Anonymity for Web Transactions
},
885 journal = {{DIMACS
} Technical Report
(Revised
)},
893 author = {Raph Levien
},
894 title = {Advogato's Trust Metric
},
895 note = {\newline \url
{http
://www.advogato.org
/trust
-metric.html
}},
898 @InProceedings
{publius
,
899 author = {Marc Waldman and Aviel Rubin and Lorrie Cranor
},
900 title = {Publius
: {A
} robust
, tamper
-evident
, censorship
-resistant and
901 source
-anonymous web publishing system
},
902 booktitle = {Proc.
9th USENIX Security Symposium
},
907 %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
910 author = {Russell Samuels
},
911 title = {Untraceable Nym Creation on the
{F
}reedom
{N
}etwork
},
915 note = {\newline \url
{http
://www.freedom.net
/products
/whitepapers
/white11.html
}},
918 @techreport
{freedom2
-arch
,
919 title = {Freedom Systems
2.0 Architecture
},
920 author = {Philippe Boucher and Adam Shostack and Ian Goldberg
},
921 institution = {Zero Knowledge Systems
, {Inc.
}},
924 type = {White Paper
},
928 @techreport
{freedom21
-security
,
929 title = {Freedom Systems
2.1 Security Issues and Analysis
},
930 author = {Adam Back and Ian Goldberg and Adam Shostack
},
931 institution = {Zero Knowledge Systems
, {Inc.
}},
934 type = {White Paper
},
937 @inproceedings
{cfs
:sosp01
,
938 title = {Wide
-area cooperative storage with
{CFS
}},
939 author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
},
940 booktitle = {18th
{ACM
} {S
}ymposium on
{O
}perating
{S
}ystems
{P
}rinciples
({SOSP
} '
01)},
943 address = {Chateau Lake Louise
, Banff
, Canada
},
947 title = {Passive Attack Analysis for Connection
-Based Anonymity Systems
},
948 author = {Andrei Serjantov and Peter Sewell
},
949 booktitle = {Computer Security
-- ESORICS
2003},
950 publisher = {Springer
-Verlag
, LNCS
2808},
954 %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
957 author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway
},
958 title = {Relations Among Notions of Security for Public
-Key Encryption
961 Extended
abstract in
{\em Advances in Cryptology
- CRYPTO '
98}, LNCS Vol.
1462.
962 Springer
-Verlag
, 1998.
963 Full version available from \newline \url
{http
://www
-cse.ucsd.edu
/users
/mihir
/}},
967 @InProceedings
{mix
-acc
,
968 author = {Roger Dingledine and Michael J. Freedman and David
969 Hopwood and David Molnar
},
970 title = {{A Reputation System to Increase MIX
-net
972 booktitle = {Information Hiding
(IH
2001)},
975 editor = {Ira S. Moskowitz
},
976 publisher = {Springer
-Verlag
, LNCS
2137},
978 %note = {\url{http://www.freehaven.net/papers.html}},
980 @InProceedings
{casc
-rep
,
981 author = {Roger Dingledine and Paul Syverson
},
982 title = {{Reliable MIX Cascade Networks through Reputation
}},
983 booktitle = {Financial Cryptography
},
985 editor = {Matt Blaze
},
986 publisher = {Springer
-Verlag
, LNCS
2357},
988 %note = {\newline \url{http://www.freehaven.net/papers.html}},
990 @InProceedings
{zhou96certified
,
991 author = {Zhou and Gollmann
},
992 title = {Certified Electronic Mail
},
993 booktitle = {{ESORICS
: European Symposium on Research in Computer
995 publisher = {Springer
-Verlag
, LNCS
1146},
997 note = {\newline \url
{http
://citeseer.nj.nec.com
/zhou96certified.html
}},
1001 author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
1002 Birgit Pfitzmann and Michael Waidner
},
1003 title = {{Real
-Time MIXes
: A Bandwidth
-Efficient Anonymity Protocol
}},
1004 howpublished = {IEEE Journal on Selected Areas in Communications
, 1998.
},
1005 note = {\url
{http
://www.zurich.ibm.com
/security
/publications
/1998.html
}},
1008 @InProceedings
{danezis
:pet2003
,
1009 author = {George Danezis
},
1010 title = {Mix
-networks with Restricted Routes
},
1011 booktitle = {Privacy Enhancing Technologies
(PET
2003)},
1013 editor = {Roger Dingledine
},
1014 publisher = {Springer
-Verlag LNCS
2760}
1017 @InProceedings
{gap
-pets03
,
1018 author = {Krista Bennett and Christian Grothoff
},
1019 title = {{GAP
} -- practical anonymous networking
},
1020 booktitle = {Privacy Enhancing Technologies
(PET
2003)},
1022 editor = {Roger Dingledine
},
1023 publisher = {Springer
-Verlag LNCS
2760}
1026 @Article
{hordes
-jcs
,
1027 author = {Brian Neal Levine and Clay Shields
},
1028 title = {Hordes
: A Multicast
-Based Protocol for Anonymity
},
1029 journal = {Journal of Computer Security
},
1036 @TechReport
{herbivore
,
1037 author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"
{u
}n Sirer
},
1038 title = {Herbivore
: A Scalable and Efficient Protocol for Anonymous Communication
},
1039 institution = {Cornell University Computing and Information Science
},
1041 type = {Technical Report
},
1042 number = {TR2003
-1890},
1047 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan
},
1048 title = {$P^
5$
: A Protocol for Scalable Anonymous Communication
},
1049 booktitle = {IEEE Symposium on Security and Privacy
},
1052 publisher = {IEEE CS
}
1055 @phdthesis
{ian
-thesis
,
1056 title = {A Pseudonymous Communications Infrastructure for the Internet
},
1057 author = {Ian Goldberg
},
1058 school = {UC Berkeley
},
1064 author = {Ian Goldberg and David Wagner
},
1065 title = {TAZ Servers and the Rewebber Network
: Enabling
1066 Anonymous Publishing on the World Wide Web
},
1067 journal = {First Monday
},
1072 note = {\url
{http
://www.firstmonday.dk
/issues
/issue3_4
/goldberg
/}}
1075 @Misc
{tcp
-over
-tcp
-is
-bad
,
1076 key = {tcp
-over
-tcp
-is
-bad
},
1077 title = {Why
{TCP
} Over
{TCP
} Is A Bad Idea
},
1078 author = {Olaf Titz
},
1079 note = {\url
{http
://sites.inka.de
/sites
/bigred
/devel
/tcp
-tcp.html
}}
1082 @inproceedings
{wright02
,
1083 title = {An Analysis of the Degradation of Anonymous Protocols
},
1084 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields
},
1085 booktitle = {{Network and Distributed Security Symposium
(NDSS
02)}},
1091 @inproceedings
{wright03
,
1092 title = {Defending Anonymous Communication Against Passive Logging Attacks
},
1093 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields
},
1094 booktitle = {IEEE Symposium on Security and Privacy
},
1098 publisher = {IEEE CS
},
1102 @InProceedings
{attack
-tor
-oak05
,
1103 author = {Steven J. Murdoch and George Danezis
},
1104 title = {Low
-cost Traffic Analysis of Tor
},
1105 booktitle = {IEEE Symposium on Security and Privacy
},
1108 publisher = {IEEE CS
}
1112 author={{The AN.ON Project
}},
1113 howpublished={Press release
},
1116 title={German Police proceeds against anonymity service
},
1117 note={\url
{http
://www.datenschutzzentrum.de
/material
/themen
/presse
/anon
-bka_e.htm
}}
1121 title = {Using Caching for Browsing Anonymity
},
1122 author = {Anna Shubina and Sean Smith
},
1123 journal = {ACM SIGEcom Exchanges
},
1128 note = {\url
{http
://www.acm.org
/sigs
/sigecom
/exchanges
/volume_4_
(03)/4.2-Shubina.pdf
}},
1131 @inproceedings
{tor
-design
,
1132 title = {Tor
: The Second
-Generation Onion Router
},
1133 author = {Roger Dingledine and Nick Mathewson and Paul Syverson
},
1134 booktitle = {Proceedings of the
13th USENIX Security Symposium
},
1137 note = {\url
{http
://tor.eff.org
/tor
-design.pdf
}}
1140 @inproceedings
{flow
-correlation04
,
1141 title = {On Flow Correlation Attacks and Countermeasures in Mix Networks
},
1142 author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao
},
1143 booktitle = {Proceedings of Privacy Enhancing Technologies workshop
(PET
2004)},
1147 note = {\url
{http
://students.cs.tamu.edu
/xinwenfu
/paper
/PET04.pdf
}},
1150 @InProceedings
{danezis
:pet2004
,
1151 author = "George Danezis"
,
1152 title = "The Traffic Analysis of Continuous
-Time Mixes"
,
1153 booktitle= {Privacy Enhancing Technologies
(PET
2004)},
1154 editor = {David Martin and Andrei Serjantov
},
1158 note = {\url
{http
://www.cl.cam.ac.uk
/users
/gd216
/cmm2.pdf
}},
1161 @inproceedings
{feamster
:wpes2004
,
1162 title = {Location Diversity in Anonymity Networks
},
1163 author = {Nick Feamster and Roger Dingledine
},
1164 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society
(WPES
2004)}},
1167 address = {Washington
, DC
, USA
},
1168 note = {\url
{http
://freehaven.net
/doc
/routing
-zones
/routing
-zones.ps
}},
1171 @inproceedings
{koepsell
:wpes2004
,
1172 title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
},
1173 author = {Stefan K\"opsell and Ulf Hilling
},
1174 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society
(WPES
2004)}},
1177 address = {Washington
, DC
, USA
},
1178 note = {\url
{http
://freehaven.net
/anonbib
/papers
/p103
-koepsell.pdf
}},
1181 @inproceedings
{sync
-batching
,
1182 title = {Synchronous Batching
: From Cascades to Free Routes
},
1183 author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson
},
1184 booktitle = {Proceedings of Privacy Enhancing Technologies workshop
(PET
2004)},
1185 editor = {David Martin and Andrei Serjantov
},
1189 note = {\url
{http
://freehaven.net
/doc
/sync
-batching
/sync
-batching.pdf
}},
1192 @InProceedings
{e2e
-traffic
,
1193 author = "Nick Mathewson and Roger Dingledine"
,
1194 title = "Practical Traffic Analysis
: Extending and Resisting Statistical Disclosure"
,
1195 booktitle= {Privacy Enhancing Technologies
(PET
2004)},
1196 editor = {David Martin and Andrei Serjantov
},
1200 note = {\url
{http
://freehaven.net
/doc
/e2e
-traffic
/e2e
-traffic.pdf
}},
1204 author = {E. Rescorla and N. Modadugu
},
1205 title = {{Datagram Transport Layer Security
}},
1206 howpublished = {IETF Draft
},
1209 note = {\url
{http
://www.ietf.org
/internet
-drafts
/draft
-rescorla
-dtls
-02.txt
}},
1212 @InProceedings
{usability
-network
-effect
,
1213 author={Roger Dingledine and Nick Mathewson
},
1214 title={Anonymity Loves Company
: Usability and the Network Effect
},
1215 booktitle = {Designing Security Systems That People Can Use
},
1217 publisher = {O'Reilly Media
},
1220 @inproceedings
{usability
:weis2006
,
1221 title = {Anonymity Loves Company
: Usability and the Network Effect
},
1222 author = {Roger Dingledine and Nick Mathewson
},
1223 booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
1227 address = {Cambridge
, UK
},
1228 bookurl
= {http
://weis2006.econinfosec.org
/},
1229 note = {\url
{http
://freehaven.net
/doc
/wupss04
/usability.pdf
}},
1234 title = {{The Six
/Four System
}},
1235 note = {\url
{http
://sourceforge.net
/projects
/sixfour
/}}
1238 @inproceedings
{clayton
:pet2006
,
1239 title = {Ignoring the Great Firewall of China
},
1240 author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson
},
1241 booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies
(PET
2006)},
1244 address = {Cambridge
, UK
},
1245 publisher = {Springer
},
1246 bookurl
= {http
://petworkshop.org
/2006/},
1247 note = {\url
{http
://www.cl.cam.ac.uk
/~rnc1
/ignoring.pdf
}},
1250 @Misc
{zuckerman
-threatmodels
,
1251 key = {zuckerman
-threatmodels
},
1252 title = {We've got to adjust some of our threat models
},
1253 author = {Ethan Zuckerman
},
1254 note = {\url
{http
://www.ethanzuckerman.com
/blog
/?p
=1019}}
1259 title = {{CGIProxy
: HTTP
/FTP Proxy in a CGI Script
}},
1260 author = {James Marshall
},
1261 note = {\url
{http
://www.jmarshall.com
/tools
/cgiproxy
/}}
1265 key = {circumventor
},
1266 title = {{How to install the Circumventor program
}},
1267 author = {Bennett Haselton
},
1268 note = {\url
{http
://www.peacefire.org
/circumventor
/simple
-circumventor
-instructions.html
}}
1274 author = {Ronald Deibert et al
},
1275 note = {\url
{http
://psiphon.civisec.org
/}}
1278 @InProceedings
{tcpstego
, author = {Steven J. Murdoch and Stephen Lewis
},
1279 title = {Embedding Covert Channels into
{TCP
/IP
}},
1280 booktitle = {Information Hiding
: 7th International Workshop
},
1283 editor = {Mauro Barni and Jordi Herrera
-Joancomart\'
{\i
} and
1284 Stefan Katzenbeisser and Fernando P\'
{e
}rez
-Gonz\'
{a
}lez
},
1287 address = {Barcelona
, Catalonia
(Spain
)},
1289 publisher = {Springer
-Verlag
},
1290 url
= {http
://www.cl.cam.ac.uk
/~sjm217
/papers
/ih05coverttcp.pdf
}
1293 @phdthesis
{blossom
-thesis
,
1294 title = {Perspective Access Networks
},
1295 author = {Geoffrey Goodell
},
1296 school = {Harvard University
},
1299 note = {\url
{http
://afs.eecs.harvard.edu
/~goodell
/thesis.pdf
}},
1302 @inproceedings
{tap
:pet2006
,
1303 title = {On the Security of the Tor Authentication Protocol
},
1304 author = {Ian Goldberg
},
1305 booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies
(PET
2006)},
1308 address = {Cambridge
, UK
},
1309 publisher = {Springer
},
1310 bookurl
= {http
://petworkshop.org
/2006/},
1311 note = {\url
{http
://www.cypherpunks.ca
/~iang
/pubs
/torsec.pdf
}},
1314 @inproceedings
{rep
-anon
,
1315 title = {{Reputation in P2P Anonymity Systems
}},
1316 author = {Roger Dingledine and Nick Mathewson and Paul Syverson
},
1317 booktitle = {Proceedings of Workshop on Economics of Peer
-to
-Peer Systems
},
1320 note = {\url
{http
://freehaven.net
/doc
/econp2p03
/econp2p03.pdf
}},
1323 @misc
{tor
-challenges
,
1324 author = {Roger Dingledine and Nick Mathewson and Paul Syverson
},
1325 title = {Challenges in deploying low
-latency anonymity
},
1330 @InProceedings
{chaum
-blind
,
1331 author = {David Chaum
},
1332 title = {Blind Signatures for Untraceable Payments
},
1333 booktitle = {Advances in Cryptology
: Proceedings of Crypto
82},
1336 editor = {D. Chaum and R.L. Rivest and A.T. Sherman
},
1337 publisher = {Plenum Press
}
1340 @misc
{goodell
-syverson06
,
1341 author = {Geoffrey Goodell and Paul Syverson
},
1342 title = {The Right Place at the Right Time
: The Use of Network Location in Authentication and Abuse Prevention
},
1347 @misc
{ip
-to
-country
,
1348 key = {ip
-to
-country
},
1349 title = {IP
-to
-country database
},
1350 note = {\url
{http
://ip
-to
-country.webhosting.info
/}},
1353 @misc
{mackinnon
-personal
,
1354 author = {Rebecca MacKinnon
},
1355 title = {Private communication
},
1359 @inproceedings
{pet05
-bissias
,
1360 title = {Privacy Vulnerabilities in Encrypted HTTP Streams
},
1361 author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine
},
1362 booktitle = {Proceedings of Privacy Enhancing Technologies workshop
(PET
2005)},
1365 note = {\url
{http
://prisms.cs.umass.edu
/brian
/pubs
/bissias.liberatore.pet
.2005.pdf
}},
1368 @InProceedings
{infranet
,
1369 author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger
},
1370 title = {Infranet
: Circumventing Web Censorship and Surveillance
},
1371 booktitle = {Proceedings of the
11th USENIX Security Symposium
},
1374 note = {\url
{http
://nms.lcs.mit.edu
/~feamster
/papers
/usenixsec2002.pdf
}},
1377 @techreport
{ ptacek98insertion
,
1378 author = "Thomas H. Ptacek and Timothy N. Newsham"
,
1379 title = "Insertion
, Evasion
, and Denial of Service
: Eluding Network Intrusion Detection"
,
1380 institution = "Secure Networks
, Inc."
,
1381 address = "Suite
330, 1201 5th Street S.W
, Calgary
, Alberta
, Canada
, T2R
-0Y6"
,
1383 url
= "citeseer.ist.psu.edu
/ptacek98insertion.html"
,
1386 @inproceedings
{active
-wardens
,
1387 author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil"
,
1388 title = "Eliminating Steganography in Internet Traffic with Active Wardens"
,
1389 booktitle = {Information Hiding Workshop
(IH
2002)},
1392 editor = {Fabien Petitcolas
},
1393 publisher = {Springer
-Verlag
, LNCS
2578},
1396 %%% Local Variables:
1398 %%% TeX-master: "tor-design"