r13703@catbus: nickm | 2007-07-12 11:41:38 -0400
[tor.git] / doc / design-paper / tor-design.bib
blobcb8282c19b91c58589354e58dd469235f6384b4f
2 % fix me
3 @misc{tannenbaum96,
4 author = "Andrew Tannenbaum",
5 title = "Computer Networks",
6 year = "1996",
7 publisher = "Prentice Hall, 3rd edition",
10 @article{ meadows96,
11 author = "Catherine Meadows",
12 title = "The {NRL} Protocol Analyzer: An Overview",
13 journal = "Journal of Logic Programming",
14 volume = "26",
15 number = "2",
16 pages = "113--131",
17 year = "1996",
19 @inproceedings{kesdogan:pet2002,
20 title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
21 alternative to the MIX based Approach?},
22 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
23 booktitle = {Privacy Enhancing Technologies (PET 2002)},
24 year = {2002},
25 month = {April},
26 editor = {Roger Dingledine and Paul Syverson},
27 publisher = {Springer-Verlag, LNCS 2482},
30 @inproceedings{statistical-disclosure,
31 title = {Statistical Disclosure Attacks},
32 author = {George Danezis},
33 booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
34 organization = {{IFIP TC11}},
35 year = {2003},
36 month = {May},
37 address = {Athens},
38 pages = {421--426},
39 publisher = {Kluwer},
42 @inproceedings{limits-open,
43 title = {Limits of Anonymity in Open Environments},
44 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
45 booktitle = {Information Hiding Workshop (IH 2002)},
46 year = {2002},
47 month = {October},
48 editor = {Fabien Petitcolas},
49 publisher = {Springer-Verlag, LNCS 2578},
52 @inproceedings{isdn-mixes,
53 title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
54 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
55 booktitle = {GI/ITG Conference on Communication in Distributed Systems},
56 year = {1991},
57 month = {February},
58 pages = {451-463},
62 @Article{jerichow-jsac98,
63 author = {Anja Jerichow and Jan M\"{u}ller and Andreas
64 Pfitzmann and Birgit Pfitzmann and Michael Waidner},
65 title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
66 journal = {IEEE Journal on Selected Areas in Communications},
67 year = 1998,
68 volume = 16,
69 number = 4,
70 pages = {495--509},
71 month = {May}
74 @inproceedings{tarzan:ccs02,
75 title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
76 author = {Michael J. Freedman and Robert Morris},
77 booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
78 {S}ecurity ({CCS 2002})},
79 year = {2002},
80 month = {November},
81 address = {Washington, DC},
84 @inproceedings{cebolla,
85 title = {{Cebolla: Pragmatic IP Anonymity}},
86 author = {Zach Brown},
87 booktitle = {Ottawa Linux Symposium},
88 year = {2002},
89 month = {June},
92 @inproceedings{eax,
93 author = "M. Bellare and P. Rogaway and D. Wagner",
94 title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
95 booktitle = {Fast Software Encryption 2004},
96 month = {February},
97 year = {2004},
100 @misc{darkside,
101 title = {{The Dark Side of the Web: An Open Proxy's View}},
102 author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
103 note = {\newline \url{http://codeen.cs.princeton.edu/}},
105 % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
107 @Misc{anonymizer,
108 key = {anonymizer},
109 title = {The {Anonymizer}},
110 note = {\url{http://anonymizer.com/}}
113 @Misc{privoxy,
114 key = {privoxy},
115 title = {{Privoxy}},
116 note = {\url{http://www.privoxy.org/}}
119 @inproceedings{anonnet,
120 title = {{Analysis of an Anonymity Network for Web Browsing}},
121 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
122 David Hutchison},
123 booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
124 2002)}},
125 year = {2002},
126 month = {June},
127 address = {Pittsburgh, USA},
129 % pages = {49--54},
131 @inproceedings{econymics,
132 title = {On the Economics of Anonymity},
133 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
134 booktitle = {Financial Cryptography},
135 year = {2003},
136 editor = {Rebecca N. Wright},
137 publisher = {Springer-Verlag, LNCS 2742},
140 @inproceedings{defensive-dropping,
141 title = {Timing Analysis in Low-Latency Mix-Based Systems},
142 author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
143 booktitle = {Financial Cryptography},
144 year = {2004},
145 editor = {Ari Juels},
146 publisher = {Springer-Verlag, LNCS (forthcoming)},
149 @inproceedings{morphmix:fc04,
150 title = {Practical Anonymity for the Masses with MorphMix},
151 author = {Marc Rennhard and Bernhard Plattner},
152 booktitle = {Financial Cryptography},
153 year = {2004},
154 editor = {Ari Juels},
155 publisher = {Springer-Verlag, LNCS (forthcoming)},
158 @inproceedings{eternity,
159 title = {The Eternity Service},
160 author = {Ross Anderson},
161 booktitle = {Pragocrypt '96},
162 year = {1996},
164 %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
167 @inproceedings{minion-design,
168 title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
169 author = {George Danezis and Roger Dingledine and Nick Mathewson},
170 booktitle = {2003 IEEE Symposium on Security and Privacy},
171 year = {2003},
172 month = {May},
173 publisher = {IEEE CS},
174 pages = {2--15},
176 %note = {\url{http://mixminion.net/minion-design.pdf}},
178 @inproceedings{ rao-pseudonymity,
179 author = "Josyula R. Rao and Pankaj Rohatgi",
180 title = "Can Pseudonymity Really Guarantee Privacy?",
181 booktitle = "Proceedings of the Ninth USENIX Security Symposium",
182 year = {2000},
183 month = Aug,
184 publisher = {USENIX},
185 pages = "85--96",
187 %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
188 %full_papers/rao/rao.pdf}},
190 @InProceedings{pfitzmann90how,
191 author = "Birgit Pfitzmann and Andreas Pfitzmann",
192 title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
193 booktitle = {Eurocrypt 89},
194 publisher = {Springer-Verlag, LNCS 434},
195 year = {1990},
196 note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
199 @Misc{tor-spec,
200 author = {Roger Dingledine and Nick Mathewson},
201 title = {Tor Protocol Specifications},
202 note = {\url{http://tor.eff.org/svn/trunk/doc/tor-spec.txt}},
205 @Misc{incentives-txt,
206 author = {Roger Dingledine and Nick Mathewson},
207 title = {Tor Incentives Design Brainstorms},
208 note = {\url{http://tor.eff.org/svn/trunk/doc/incentives.txt}},
211 @InProceedings{BM:mixencrypt,
212 author = {M{\"o}ller, Bodo},
213 title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
214 booktitle = {{CT-RSA} 2003},
215 publisher = {Springer-Verlag, LNCS 2612},
216 year = 2003,
219 @InProceedings{back01,
220 author = {Adam Back and Ulf M\"oller and Anton Stiglic},
221 title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
222 booktitle = {Information Hiding (IH 2001)},
223 pages = {245--257},
224 year = 2001,
225 editor = {Ira S. Moskowitz},
226 publisher = {Springer-Verlag, LNCS 2137},
228 %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
230 @InProceedings{rackoff93cryptographic,
231 author = {Charles Rackoff and Daniel R. Simon},
232 title = {Cryptographic Defense Against Traffic Analysis},
233 booktitle = {{ACM} Symposium on Theory of Computing},
234 pages = {672--681},
235 year = {1993},
237 %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
239 @InProceedings{freehaven-berk,
240 author = {Roger Dingledine and Michael J. Freedman and David Molnar},
241 title = {The Free Haven Project: Distributed Anonymous Storage Service},
242 booktitle = {Designing Privacy Enhancing Technologies: Workshop
243 on Design Issue in Anonymity and Unobservability},
244 year = 2000,
245 month = {July},
246 editor = {H. Federrath},
247 publisher = {Springer-Verlag, LNCS 2009},
250 @InProceedings{move-ndss05,
251 author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
252 title = {MOVE: An End-to-End Solution To Network Denial of Service},
253 booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
254 year = 2005,
255 month = {February},
256 publisher = {Internet Society}
259 %note = {\url{http://freehaven.net/papers.html}},
264 @InProceedings{raymond00,
265 author = {J. F. Raymond},
266 title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
267 and Open Problems}},
268 booktitle = {Designing Privacy Enhancing Technologies: Workshop
269 on Design Issue in Anonymity and Unobservability},
270 year = 2000,
271 month = {July},
272 pages = {10-29},
273 editor = {H. Federrath},
274 publisher = {Springer-Verlag, LNCS 2009},
277 @InProceedings{sybil,
278 author = "John Douceur",
279 title = {{The Sybil Attack}},
280 booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
281 month = Mar,
282 year = 2002,
286 @InCollection{price-privacy,
287 author = {Paul Syverson and Adam Shostack},
288 editor = {L. Jean Camp and Stephen Lewis},
289 title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
290 booktitle = {Economics of Information Security},
291 chapter = 10,
292 publisher = {Kluwer},
293 year = 2004,
294 pages = {129--142}
298 @InProceedings{trickle02,
299 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
300 title = {From a Trickle to a Flood: Active Attacks on Several
301 Mix Types},
302 booktitle = {Information Hiding (IH 2002)},
303 year = {2002},
304 editor = {Fabien Petitcolas},
305 publisher = {Springer-Verlag, LNCS 2578},
308 @InProceedings{langos02,
309 author = {Oliver Berthold and Heinrich Langos},
310 title = {Dummy Traffic Against Long Term Intersection Attacks},
311 booktitle = {Privacy Enhancing Technologies (PET 2002)},
312 year = {2002},
313 editor = {Roger Dingledine and Paul Syverson},
314 publisher = {Springer-Verlag, LNCS 2482}
318 @InProceedings{hintz-pet02,
319 author = {Andrew Hintz},
320 title = {Fingerprinting Websites Using Traffic Analysis},
321 booktitle = {Privacy Enhancing Technologies (PET 2002)},
322 pages = {171--178},
323 year = 2002,
324 editor = {Roger Dingledine and Paul Syverson},
325 publisher = {Springer-Verlag, LNCS 2482}
328 @InProceedings{or-discex00,
329 author = {Paul Syverson and Michael Reed and David Goldschlag},
330 title = {{O}nion {R}outing Access Configurations},
331 booktitle = {DARPA Information Survivability Conference and
332 Exposition (DISCEX 2000)},
333 year = {2000},
334 publisher = {IEEE CS Press},
335 pages = {34--40},
336 volume = {1},
338 %note = {\newline \url{http://www.onion-router.net/Publications.html}},
340 @Inproceedings{or-pet00,
341 title = {{Towards an Analysis of Onion Routing Security}},
342 author = {Paul Syverson and Gene Tsudik and Michael Reed and
343 Carl Landwehr},
344 booktitle = {Designing Privacy Enhancing Technologies: Workshop
345 on Design Issue in Anonymity and Unobservability},
346 year = 2000,
347 month = {July},
348 pages = {96--114},
349 editor = {H. Federrath},
350 publisher = {Springer-Verlag, LNCS 2009},
352 %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
354 @Inproceedings{freenet-pets00,
355 title = {Freenet: A Distributed Anonymous Information Storage
356 and Retrieval System},
357 author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
358 Theodore W. Hong},
359 booktitle = {Designing Privacy Enhancing Technologies: Workshop
360 on Design Issue in Anonymity and Unobservability},
361 year = 2000,
362 month = {July},
363 pages = {46--66},
364 editor = {H. Federrath},
365 publisher = {Springer-Verlag, LNCS 2009},
367 %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
369 @InProceedings{or-ih96,
370 author = {David M. Goldschlag and Michael G. Reed and Paul
371 F. Syverson},
372 title = {Hiding Routing Information},
373 booktitle = {Information Hiding, First International Workshop},
374 pages = {137--150},
375 year = 1996,
376 editor = {R. Anderson},
377 month = {May},
378 publisher = {Springer-Verlag, LNCS 1174},
381 @InProceedings{federrath-ih96,
382 author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
383 title = {{MIXes} in Mobile Communication Systems: Location
384 Management with Privacy},
385 booktitle = {Information Hiding, First International Workshop},
386 pages = {121--135},
387 year = 1996,
388 editor = {R. Anderson},
389 month = {May},
390 publisher = {Springer-Verlag, LNCS 1174},
394 @InProceedings{reed-protocols97,
395 author = {Michael G. Reed and Paul F. Syverson and David
396 M. Goldschlag},
397 title = {Protocols Using Anonymous Connections: Mobile Applications},
398 booktitle = {Security Protocols: 5th International Workshop},
399 pages = {13--23},
400 year = 1997,
401 editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
402 and Michael Roe},
403 month = {April},
404 publisher = {Springer-Verlag, LNCS 1361}
409 @Article{or-jsac98,
410 author = {Michael G. Reed and Paul F. Syverson and David
411 M. Goldschlag},
412 title = {Anonymous Connections and Onion Routing},
413 journal = {IEEE Journal on Selected Areas in Communications},
414 year = 1998,
415 volume = 16,
416 number = 4,
417 pages = {482--494},
418 month = {May},
420 %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
422 @Misc{TLS,
423 author = {T. Dierks and C. Allen},
424 title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
425 howpublished = {IETF RFC 2246},
426 month = {January},
427 year = {1999},
429 %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
431 @Misc{SMTP,
432 author = {J. Postel},
433 title = {Simple {M}ail {T}ransfer {P}rotocol},
434 howpublished = {IETF RFC 2821 (also STD0010)},
435 month = {April},
436 year = {2001},
437 note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
440 @Misc{IMAP,
441 author = {M. Crispin},
442 title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
443 howpublished = {IETF RFC 2060},
444 month = {December},
445 year = {1996},
446 note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
449 @misc{pipenet,
450 title = {PipeNet 1.1},
451 author = {Wei Dai},
452 year = 1996,
453 month = {August},
454 howpublished = {Usenet post},
455 note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
456 in a post to the cypherpunks list, Feb.\ 1995.},
460 @Misc{POP3,
461 author = {J. Myers and M. Rose},
462 title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
463 howpublished = {IETF RFC 1939 (also STD0053)},
464 month = {May},
465 year = {1996},
466 note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
470 @InProceedings{shuffle,
471 author = {C. Andrew Neff},
472 title = {A Verifiable Secret Shuffle and its Application to E-Voting},
473 booktitle = {8th ACM Conference on Computer and Communications
474 Security (CCS-8)},
475 pages = {116--125},
476 year = 2001,
477 editor = {P. Samarati},
478 month = {November},
479 publisher = {ACM Press},
481 %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
482 % technicaldocs/shuffle.pdf}},
484 @InProceedings{dolev91,
485 author = {Danny Dolev and Cynthia Dwork and Moni Naor},
486 title = {Non-Malleable Cryptography},
487 booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
488 pages = {542--552},
489 year = 1991,
490 note = {Updated version at
491 \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
494 @TechReport{rsw96,
495 author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
496 title = {Time-lock puzzles and timed-release Crypto},
497 year = 1996,
498 type = {MIT LCS technical memo},
499 number = {MIT/LCS/TR-684},
500 month = {February},
501 note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
504 @InProceedings{web-mix,
505 author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
506 title = {Web {MIX}es: A system for anonymous and unobservable
507 {I}nternet access},
508 booktitle = {Designing Privacy Enhancing Technologies: Workshop
509 on Design Issue in Anonymity and Unobservability},
510 editor = {H. Federrath},
511 publisher = {Springer-Verlag, LNCS 2009},
512 year = {2000},
514 % pages = {115--129},
516 @InProceedings{disad-free-routes,
517 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
518 title = {The disadvantages of free {MIX} routes and how to overcome
519 them},
520 booktitle = {Designing Privacy Enhancing Technologies: Workshop
521 on Design Issue in Anonymity and Unobservability},
522 pages = {30--45},
523 year = 2000,
524 editor = {H. Federrath},
525 publisher = {Springer-Verlag, LNCS 2009},
527 %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
528 % disadvantages_berthold.pdf}},
530 @InProceedings{boneh00,
531 author = {Dan Boneh and Moni Naor},
532 title = {Timed Commitments},
533 booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
534 pages = {236--254},
535 year = 2000,
536 publisher = {Springer-Verlag, LNCS 1880},
537 note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
540 @InProceedings{goldschlag98,
541 author = {David M. Goldschlag and Stuart G. Stubblebine},
542 title = {Publicly Verifiable Lotteries: Applications of
543 Delaying Functions},
544 booktitle = {Financial Cryptography},
545 pages = {214--226},
546 year = 1998,
547 publisher = {Springer-Verlag, LNCS 1465},
548 note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
551 @InProceedings{syverson98,
552 author = {Paul Syverson},
553 title = {Weakly Secret Bit Commitment: Applications to
554 Lotteries and Fair Exchange},
555 booktitle = {Computer Security Foundations Workshop (CSFW11)},
556 pages = {2--13},
557 year = 1998,
558 address = {Rockport Massachusetts},
559 month = {June},
560 publisher = {IEEE CS Press},
561 note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
564 @Misc{shoup-iso,
565 author = {Victor Shoup},
566 title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
567 note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
570 @Misc{shoup-oaep,
571 author = {Victor Shoup},
572 title = {{OAEP} Reconsidered},
573 howpublished = {{IACR} e-print 2000/060},
574 note = {\newline \url{http://eprint.iacr.org/2000/060/}},
577 @Misc{oaep-still-alive,
578 author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
579 title = {{RSA}-{OAEP} is Still Alive!},
580 howpublished = {{IACR} e-print 2000/061},
581 note = {\newline \url{http://eprint.iacr.org/2000/061/}},
584 @misc{echolot,
585 author = {Peter Palfrader},
586 title = {Echolot: a pinger for anonymous remailers},
587 note = {\url{http://www.palfrader.org/echolot/}},
590 @Misc{mixmaster-attacks,
591 author = {Lance Cottrell},
592 title = {Mixmaster and Remailer Attacks},
593 note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
596 @Misc{mixmaster-spec,
597 author = {Ulf M{\"o}ller and Lance Cottrell and Peter
598 Palfrader and Len Sassaman},
599 title = {Mixmaster {P}rotocol --- {V}ersion 2},
600 year = {2003},
601 month = {July},
602 howpublished = {Draft},
603 note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
606 @InProceedings{puzzles-tls,
607 author = "Drew Dean and Adam Stubblefield",
608 title = {{Using Client Puzzles to Protect TLS}},
609 booktitle = "Proceedings of the 10th USENIX Security Symposium",
610 year = {2001},
611 month = Aug,
612 publisher = {USENIX},
615 @InProceedings{breadpudding,
616 author = {Markus Jakobsson and Ari Juels},
617 title = {Proofs of Work and Bread Pudding Protocols},
618 booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
619 Conference on Communications and Multimedia Security
620 (CMS '99)},
621 year = 1999,
622 month = {September},
623 publisher = {Kluwer}
626 @Misc{hashcash,
627 author = {Adam Back},
628 title = {Hash cash},
629 note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
632 @InProceedings{oreilly-acc,
633 author = {Roger Dingledine and Michael J. Freedman and David Molnar},
634 title = {Accountability},
635 booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
636 Technology},
637 year = {2001},
638 publisher = {O'Reilly and Associates},
642 @InProceedings{han,
643 author = {Yongfei Han},
644 title = {Investigation of non-repudiation protocols},
645 booktitle = {ACISP '96},
646 year = 1996,
647 publisher = {Springer-Verlag},
651 @Misc{socks5,
652 key = {socks5},
653 title = {{SOCKS} {P}rotocol {V}ersion 5},
654 howpublished= {IETF RFC 1928},
655 month = {March},
656 year = 1996,
657 note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
660 @InProceedings{abe,
661 author = {Masayuki Abe},
662 title = {Universally Verifiable {MIX} With Verification Work Independent of
663 The Number of {MIX} Servers},
664 booktitle = {{EUROCRYPT} 1998},
665 year = {1998},
666 publisher = {Springer-Verlag, LNCS 1403},
669 @InProceedings{desmedt,
670 author = {Yvo Desmedt and Kaoru Kurosawa},
671 title = {How To Break a Practical {MIX} and Design a New One},
672 booktitle = {{EUROCRYPT} 2000},
673 year = {2000},
674 publisher = {Springer-Verlag, LNCS 1803},
675 note = {\url{http://citeseer.nj.nec.com/447709.html}},
678 @InProceedings{mitkuro,
679 author = {M. Mitomo and K. Kurosawa},
680 title = {{Attack for Flash MIX}},
681 booktitle = {{ASIACRYPT} 2000},
682 year = {2000},
683 publisher = {Springer-Verlag, LNCS 1976},
684 note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
687 @InProceedings{hybrid-mix,
688 author = {M. Ohkubo and M. Abe},
689 title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
690 booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
691 year = {2000},
692 publisher = {Springer-Verlag, LNCS 1976},
695 @InProceedings{PShuffle,
696 author = {Jun Furukawa and Kazue Sako},
697 title = {An Efficient Scheme for Proving a Shuffle},
698 editor = {Joe Kilian},
699 booktitle = {CRYPTO 2001},
700 year = {2001},
701 publisher = {Springer-Verlag, LNCS 2139},
705 @InProceedings{jakobsson-optimally,
706 author = "Markus Jakobsson and Ari Juels",
707 title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
708 booktitle = {Principles of Distributed Computing - {PODC} '01},
709 year = "2001",
710 publisher = {ACM Press},
711 note = {\url{http://citeseer.nj.nec.com/492015.html}},
714 @InProceedings{kesdogan,
715 author = {D. Kesdogan and M. Egner and T. B\"uschkes},
716 title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
717 System},
718 booktitle = {Information Hiding (IH 1998)},
719 year = {1998},
720 publisher = {Springer-Verlag, LNCS 1525},
722 %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
724 @InProceedings{socks4,
725 author = {David Koblas and Michelle R. Koblas},
726 title = {{SOCKS}},
727 booktitle = {UNIX Security III Symposium (1992 USENIX Security
728 Symposium)},
729 pages = {77--83},
730 year = 1992,
731 publisher = {USENIX},
734 @InProceedings{flash-mix,
735 author = {Markus Jakobsson},
736 title = {Flash {M}ixing},
737 booktitle = {Principles of Distributed Computing - {PODC} '99},
738 year = {1999},
739 publisher = {ACM Press},
740 note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
743 @InProceedings{SK,
744 author = {Joe Kilian and Kazue Sako},
745 title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
746 the Implementation of a Voting Booth},
747 booktitle = {EUROCRYPT '95},
748 year = {1995},
749 publisher = {Springer-Verlag},
752 @InProceedings{OAEP,
753 author = {M. Bellare and P. Rogaway},
754 year = {1994},
755 booktitle = {EUROCRYPT '94},
756 title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
757 {RSA}},
758 publisher = {Springer-Verlag},
759 note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
761 @inproceedings{babel,
762 title = {Mixing {E}-mail With {B}abel},
763 author = {Ceki G\"ulc\"u and Gene Tsudik},
764 booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
765 year = 1996,
766 month = {February},
767 pages = {2--16},
768 publisher = {IEEE},
770 %note = {\url{http://citeseer.nj.nec.com/2254.html}},
772 @Misc{rprocess,
773 author = {RProcess},
774 title = {Selective Denial of Service Attacks},
775 note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
778 @Article{remailer-history,
779 author = {Sameer Parekh},
780 title = {Prospects for Remailers},
781 journal = {First Monday},
782 volume = {1},
783 number = {2},
784 month = {August},
785 year = {1996},
786 note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
789 @Article{chaum-mix,
790 author = {David Chaum},
791 title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
792 journal = {Communications of the ACM},
793 year = {1981},
794 volume = {4},
795 number = {2},
796 month = {February},
798 %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
800 @InProceedings{nym-alias-net,
801 author = {David Mazi\`{e}res and M. Frans Kaashoek},
802 title = {{The Design, Implementation and Operation of an Email
803 Pseudonym Server}},
804 booktitle = {$5^{th}$ ACM Conference on Computer and
805 Communications Security (CCS'98)},
806 year = 1998,
807 publisher = {ACM Press},
809 %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
811 @InProceedings{tangler,
812 author = {Marc Waldman and David Mazi\`{e}res},
813 title = {Tangler: A Censorship-Resistant Publishing System
814 Based on Document Entanglements},
815 booktitle = {$8^{th}$ ACM Conference on Computer and
816 Communications Security (CCS-8)},
817 pages = {86--135},
818 year = 2001,
819 publisher = {ACM Press},
821 %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
823 @misc{neochaum,
824 author = {Tim May},
825 title = {Payment mixes for anonymity},
826 howpublished = {E-mail archived at
827 \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
830 @misc{helsingius,
831 author = {J. Helsingius},
832 title = {{\tt anon.penet.fi} press release},
833 note = {\newline \url{http://www.penet.fi/press-english.html}},
836 @InProceedings{garay97secure,
837 author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
838 title = {Secure distributed storage and retrieval},
839 booktitle = {11th International Workshop, WDAG '97},
840 pages = {275--289},
841 year = {1997},
842 publisher = {Springer-Verlag, LNCS 1320},
843 note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
846 @InProceedings{PIK,
847 author = {C. Park and K. Itoh and K. Kurosawa},
848 title = {Efficient anonymous channel and all/nothing election scheme},
849 booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
850 pages = {248--259},
851 publisher = {Springer-Verlag, LNCS 765},
854 @Misc{pgpfaq,
855 key = {PGP},
856 title = {{PGP} {FAQ}},
857 note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
860 @Article{riordan-schneier,
861 author = {James Riordan and Bruce Schneier},
862 title = {A Certified E-mail Protocol with No Trusted Third Party},
863 journal = {13th Annual Computer Security Applications Conference},
864 month = {December},
865 year = {1998},
866 note = {\newline \url{http://www.counterpane.com/certified-email.html}},
870 @Article{crowds-tissec,
871 author = {Michael K. Reiter and Aviel D. Rubin},
872 title = {Crowds: Anonymity for Web Transactions},
873 journal = {ACM TISSEC},
874 year = 1998,
875 volume = 1,
876 number = 1,
877 pages = {66--92},
878 month = {June},
880 %note = {\url{http://citeseer.nj.nec.com/284739.html}}
882 @Article{crowds-dimacs,
883 author = {Michael K. Reiter and Aviel D. Rubin},
884 title = {Crowds: Anonymity for Web Transactions},
885 journal = {{DIMACS} Technical Report (Revised)},
886 volume = {97},
887 number = {15},
888 month = {August},
889 year = {1997},
892 @Misc{advogato,
893 author = {Raph Levien},
894 title = {Advogato's Trust Metric},
895 note = {\newline \url{http://www.advogato.org/trust-metric.html}},
898 @InProceedings{publius,
899 author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
900 title = {Publius: {A} robust, tamper-evident, censorship-resistant and
901 source-anonymous web publishing system},
902 booktitle = {Proc. 9th USENIX Security Symposium},
903 pages = {59--72},
904 year = {2000},
905 month = {August},
907 %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
909 @Misc{freedom-nyms,
910 author = {Russell Samuels},
911 title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
912 year = {1999},
913 month = {November},
914 day = {21},
915 note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
918 @techreport{freedom2-arch,
919 title = {Freedom Systems 2.0 Architecture},
920 author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
921 institution = {Zero Knowledge Systems, {Inc.}},
922 year = {2000},
923 month = {December},
924 type = {White Paper},
925 day = {18},
928 @techreport{freedom21-security,
929 title = {Freedom Systems 2.1 Security Issues and Analysis},
930 author = {Adam Back and Ian Goldberg and Adam Shostack},
931 institution = {Zero Knowledge Systems, {Inc.}},
932 year = {2001},
933 month = {May},
934 type = {White Paper},
937 @inproceedings{cfs:sosp01,
938 title = {Wide-area cooperative storage with {CFS}},
939 author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
940 booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
941 year = {2001},
942 month = {October},
943 address = {Chateau Lake Louise, Banff, Canada},
946 @inproceedings{SS03,
947 title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
948 author = {Andrei Serjantov and Peter Sewell},
949 booktitle = {Computer Security -- ESORICS 2003},
950 publisher = {Springer-Verlag, LNCS 2808},
951 year = {2003},
952 month = {October},
954 %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
956 @Misc{pk-relations,
957 author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
958 title = {Relations Among Notions of Security for Public-Key Encryption
959 Schemes},
960 howpublished = {
961 Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
962 Springer-Verlag, 1998.
963 Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
967 @InProceedings{mix-acc,
968 author = {Roger Dingledine and Michael J. Freedman and David
969 Hopwood and David Molnar},
970 title = {{A Reputation System to Increase MIX-net
971 Reliability}},
972 booktitle = {Information Hiding (IH 2001)},
973 pages = {126--141},
974 year = 2001,
975 editor = {Ira S. Moskowitz},
976 publisher = {Springer-Verlag, LNCS 2137},
978 %note = {\url{http://www.freehaven.net/papers.html}},
980 @InProceedings{casc-rep,
981 author = {Roger Dingledine and Paul Syverson},
982 title = {{Reliable MIX Cascade Networks through Reputation}},
983 booktitle = {Financial Cryptography},
984 year = 2002,
985 editor = {Matt Blaze},
986 publisher = {Springer-Verlag, LNCS 2357},
988 %note = {\newline \url{http://www.freehaven.net/papers.html}},
990 @InProceedings{zhou96certified,
991 author = {Zhou and Gollmann},
992 title = {Certified Electronic Mail},
993 booktitle = {{ESORICS: European Symposium on Research in Computer
994 Security}},
995 publisher = {Springer-Verlag, LNCS 1146},
996 year = {1996},
997 note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
1000 @Misc{realtime-mix,
1001 author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
1002 Birgit Pfitzmann and Michael Waidner},
1003 title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
1004 howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
1005 note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
1008 @InProceedings{danezis:pet2003,
1009 author = {George Danezis},
1010 title = {Mix-networks with Restricted Routes},
1011 booktitle = {Privacy Enhancing Technologies (PET 2003)},
1012 year = 2003,
1013 editor = {Roger Dingledine},
1014 publisher = {Springer-Verlag LNCS 2760}
1017 @InProceedings{gap-pets03,
1018 author = {Krista Bennett and Christian Grothoff},
1019 title = {{GAP} -- practical anonymous networking},
1020 booktitle = {Privacy Enhancing Technologies (PET 2003)},
1021 year = 2003,
1022 editor = {Roger Dingledine},
1023 publisher = {Springer-Verlag LNCS 2760}
1026 @Article{hordes-jcs,
1027 author = {Brian Neal Levine and Clay Shields},
1028 title = {Hordes: A Multicast-Based Protocol for Anonymity},
1029 journal = {Journal of Computer Security},
1030 year = 2002,
1031 volume = 10,
1032 number = 3,
1033 pages = {213--240}
1036 @TechReport{herbivore,
1037 author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
1038 title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
1039 institution = {Cornell University Computing and Information Science},
1040 year = 2003,
1041 type = {Technical Report},
1042 number = {TR2003-1890},
1043 month = {February}
1046 @InProceedings{p5,
1047 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
1048 title = {$P^5$: A Protocol for Scalable Anonymous Communication},
1049 booktitle = {IEEE Symposium on Security and Privacy},
1050 pages = {58--70},
1051 year = 2002,
1052 publisher = {IEEE CS}
1055 @phdthesis{ian-thesis,
1056 title = {A Pseudonymous Communications Infrastructure for the Internet},
1057 author = {Ian Goldberg},
1058 school = {UC Berkeley},
1059 year = {2000},
1060 month = {Dec},
1063 @Article{taz,
1064 author = {Ian Goldberg and David Wagner},
1065 title = {TAZ Servers and the Rewebber Network: Enabling
1066 Anonymous Publishing on the World Wide Web},
1067 journal = {First Monday},
1068 year = 1998,
1069 volume = 3,
1070 number = 4,
1071 month = {August},
1072 note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
1075 @Misc{tcp-over-tcp-is-bad,
1076 key = {tcp-over-tcp-is-bad},
1077 title = {Why {TCP} Over {TCP} Is A Bad Idea},
1078 author = {Olaf Titz},
1079 note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
1082 @inproceedings{wright02,
1083 title = {An Analysis of the Degradation of Anonymous Protocols},
1084 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
1085 booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
1086 year = {2002},
1087 month = {February},
1088 publisher = {IEEE},
1091 @inproceedings{wright03,
1092 title = {Defending Anonymous Communication Against Passive Logging Attacks},
1093 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
1094 booktitle = {IEEE Symposium on Security and Privacy},
1095 pages= {28--41},
1096 year = {2003},
1097 month = {May},
1098 publisher = {IEEE CS},
1102 @InProceedings{attack-tor-oak05,
1103 author = {Steven J. Murdoch and George Danezis},
1104 title = {Low-cost Traffic Analysis of Tor},
1105 booktitle = {IEEE Symposium on Security and Privacy},
1106 year = 2005,
1107 month = {May},
1108 publisher = {IEEE CS}
1111 @Misc{jap-backdoor,
1112 author={{The AN.ON Project}},
1113 howpublished={Press release},
1114 year={2003},
1115 month={September},
1116 title={German Police proceeds against anonymity service},
1117 note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
1120 @article{shsm03,
1121 title = {Using Caching for Browsing Anonymity},
1122 author = {Anna Shubina and Sean Smith},
1123 journal = {ACM SIGEcom Exchanges},
1124 volume = {4},
1125 number = {2},
1126 year = {2003},
1127 month = {Sept},
1128 note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
1131 @inproceedings{tor-design,
1132 title = {Tor: The Second-Generation Onion Router},
1133 author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
1134 booktitle = {Proceedings of the 13th USENIX Security Symposium},
1135 year = {2004},
1136 month = {August},
1137 note = {\url{http://tor.eff.org/tor-design.pdf}}
1140 @inproceedings{flow-correlation04,
1141 title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
1142 author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
1143 booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
1144 year = {2004},
1145 month = {May},
1146 series = {LNCS},
1147 note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
1150 @InProceedings{danezis:pet2004,
1151 author = "George Danezis",
1152 title = "The Traffic Analysis of Continuous-Time Mixes",
1153 booktitle= {Privacy Enhancing Technologies (PET 2004)},
1154 editor = {David Martin and Andrei Serjantov},
1155 month = {May},
1156 year = {2004},
1157 series = {LNCS},
1158 note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
1161 @inproceedings{feamster:wpes2004,
1162 title = {Location Diversity in Anonymity Networks},
1163 author = {Nick Feamster and Roger Dingledine},
1164 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
1165 year = {2004},
1166 month = {October},
1167 address = {Washington, DC, USA},
1168 note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
1171 @inproceedings{koepsell:wpes2004,
1172 title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
1173 author = {Stefan K\"opsell and Ulf Hilling},
1174 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
1175 year = {2004},
1176 month = {October},
1177 address = {Washington, DC, USA},
1178 note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
1181 @inproceedings{sync-batching,
1182 title = {Synchronous Batching: From Cascades to Free Routes},
1183 author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
1184 booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
1185 editor = {David Martin and Andrei Serjantov},
1186 year = {2004},
1187 month = {May},
1188 series = {LNCS},
1189 note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
1192 @InProceedings{e2e-traffic,
1193 author = "Nick Mathewson and Roger Dingledine",
1194 title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
1195 booktitle= {Privacy Enhancing Technologies (PET 2004)},
1196 editor = {David Martin and Andrei Serjantov},
1197 month = {May},
1198 year = {2004},
1199 series = {LNCS},
1200 note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
1203 @Misc{dtls,
1204 author = {E. Rescorla and N. Modadugu},
1205 title = {{Datagram Transport Layer Security}},
1206 howpublished = {IETF Draft},
1207 month = {December},
1208 year = {2003},
1209 note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
1212 @InProceedings{usability-network-effect,
1213 author={Roger Dingledine and Nick Mathewson},
1214 title={Anonymity Loves Company: Usability and the Network Effect},
1215 booktitle = {Designing Security Systems That People Can Use},
1216 year = {2005},
1217 publisher = {O'Reilly Media},
1220 @inproceedings{usability:weis2006,
1221 title = {Anonymity Loves Company: Usability and the Network Effect},
1222 author = {Roger Dingledine and Nick Mathewson},
1223 booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
1224 (WEIS 2006)},
1225 year = {2006},
1226 month = {June},
1227 address = {Cambridge, UK},
1228 bookurl = {http://weis2006.econinfosec.org/},
1229 note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
1232 @Misc{six-four,
1233 key = {six-four},
1234 title = {{The Six/Four System}},
1235 note = {\url{http://sourceforge.net/projects/sixfour/}}
1238 @inproceedings{clayton:pet2006,
1239 title = {Ignoring the Great Firewall of China},
1240 author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
1241 booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
1242 year = {2006},
1243 month = {June},
1244 address = {Cambridge, UK},
1245 publisher = {Springer},
1246 bookurl = {http://petworkshop.org/2006/},
1247 note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
1250 @Misc{zuckerman-threatmodels,
1251 key = {zuckerman-threatmodels},
1252 title = {We've got to adjust some of our threat models},
1253 author = {Ethan Zuckerman},
1254 note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
1257 @Misc{cgiproxy,
1258 key = {cgiproxy},
1259 title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
1260 author = {James Marshall},
1261 note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
1264 @Misc{circumventor,
1265 key = {circumventor},
1266 title = {{How to install the Circumventor program}},
1267 author = {Bennett Haselton},
1268 note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
1271 @Misc{psiphon,
1272 key = {psiphon},
1273 title = {Psiphon},
1274 author = {Ronald Deibert et al},
1275 note = {\url{http://psiphon.civisec.org/}}
1278 @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
1279 title = {Embedding Covert Channels into {TCP/IP}},
1280 booktitle = {Information Hiding: 7th International Workshop},
1281 pages = {247--261},
1282 year = {2005},
1283 editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
1284 Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
1285 volume = {3727},
1286 series = {LNCS},
1287 address = {Barcelona, Catalonia (Spain)},
1288 month = {June},
1289 publisher = {Springer-Verlag},
1290 url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
1293 @phdthesis{blossom-thesis,
1294 title = {Perspective Access Networks},
1295 author = {Geoffrey Goodell},
1296 school = {Harvard University},
1297 year = {2006},
1298 month = {July},
1299 note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
1302 @inproceedings{tap:pet2006,
1303 title = {On the Security of the Tor Authentication Protocol},
1304 author = {Ian Goldberg},
1305 booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
1306 year = {2006},
1307 month = {June},
1308 address = {Cambridge, UK},
1309 publisher = {Springer},
1310 bookurl = {http://petworkshop.org/2006/},
1311 note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
1314 @inproceedings{rep-anon,
1315 title = {{Reputation in P2P Anonymity Systems}},
1316 author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
1317 booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
1318 year = {2003},
1319 month = {June},
1320 note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
1323 @misc{tor-challenges,
1324 author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
1325 title = {Challenges in deploying low-latency anonymity},
1326 year = {2005},
1327 note = {Manuscript}
1330 @InProceedings{chaum-blind,
1331 author = {David Chaum},
1332 title = {Blind Signatures for Untraceable Payments},
1333 booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
1334 pages = {199--203},
1335 year = 1983,
1336 editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
1337 publisher = {Plenum Press}
1340 @misc{goodell-syverson06,
1341 author = {Geoffrey Goodell and Paul Syverson},
1342 title = {The Right Place at the Right Time: The Use of Network Location in Authentication and Abuse Prevention},
1343 year = {2006},
1344 note = {Submitted},
1347 @misc{ip-to-country,
1348 key = {ip-to-country},
1349 title = {IP-to-country database},
1350 note = {\url{http://ip-to-country.webhosting.info/}},
1353 @misc{mackinnon-personal,
1354 author = {Rebecca MacKinnon},
1355 title = {Private communication},
1356 year = {2006},
1359 @inproceedings{pet05-bissias,
1360 title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
1361 author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
1362 booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
1363 year = {2005},
1364 month = {May},
1365 note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
1368 @InProceedings{infranet,
1369 author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
1370 title = {Infranet: Circumventing Web Censorship and Surveillance},
1371 booktitle = {Proceedings of the 11th USENIX Security Symposium},
1372 year = {2002},
1373 month = {August},
1374 note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
1377 @techreport{ ptacek98insertion,
1378 author = "Thomas H. Ptacek and Timothy N. Newsham",
1379 title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
1380 institution = "Secure Networks, Inc.",
1381 address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
1382 year = "1998",
1383 url = "citeseer.ist.psu.edu/ptacek98insertion.html",
1386 @inproceedings{active-wardens,
1387 author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
1388 title = "Eliminating Steganography in Internet Traffic with Active Wardens",
1389 booktitle = {Information Hiding Workshop (IH 2002)},
1390 year = {2002},
1391 month = {October},
1392 editor = {Fabien Petitcolas},
1393 publisher = {Springer-Verlag, LNCS 2578},
1396 %%% Local Variables:
1397 %%% mode: latex
1398 %%% TeX-master: "tor-design"
1399 %%% End: