fix the function comment
[tor.git] / doc / tor-design.bib
blob66c4a73c5e6c558de83ad537a81e1d015f687d7c
2 % fix me
3 @misc{tannenbaum96,
4 author = "Andrew Tannenbaum",
5 title = "Computer Networks",
6 year = "1996",
7 publisher = "Prentice Hall, 3rd edition",
10 @article{ meadows96,
11 author = "Catherine Meadows",
12 title = "The {NRL} Protocol Analyzer: An Overview",
13 journal = "Journal of Logic Programming",
14 volume = "26",
15 number = "2",
16 pages = "113--131",
17 year = "1996",
19 @inproceedings{kesdogan:pet2002,
20 title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
21 alternative to the MIX based Approach?},
22 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
23 booktitle = {Privacy Enhancing Technologies (PET 2002)},
24 year = {2002},
25 month = {April},
26 editor = {Roger Dingledine and Paul Syverson},
27 publisher = {Springer-Verlag, LNCS 2482},
30 @inproceedings{statistical-disclosure,
31 title = {Statistical Disclosure Attacks},
32 author = {George Danezis},
33 booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
34 organization = {{IFIP TC11}},
35 year = {2003},
36 month = {May},
37 address = {Athens},
38 pages = {421--426},
39 publisher = {Kluwer},
42 @inproceedings{limits-open,
43 title = {Limits of Anonymity in Open Environments},
44 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
45 booktitle = {Information Hiding Workshop (IH 2002)},
46 year = {2002},
47 month = {October},
48 editor = {Fabien Petitcolas},
49 publisher = {Springer-Verlag, LNCS 2578},
52 @inproceedings{isdn-mixes,
53 title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
54 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
55 booktitle = {GI/ITG Conference on Communication in Distributed Systems},
56 year = {1991},
57 month = {February},
58 pages = {451-463},
62 @Article{jerichow-jsac98,
63 author = {Anja Jerichow and Jan M\"{u}ller and Andreas
64 Pfitzmann and Birgit Pfitzmann and Michael Waidner},
65 title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
66 journal = {IEEE Journal on Selected Areas in Communications},
67 year = 1998,
68 volume = 16,
69 number = 4,
70 pages = {495--509},
71 month = {May}
74 @inproceedings{tarzan:ccs02,
75 title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
76 author = {Michael J. Freedman and Robert Morris},
77 booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
78 {S}ecurity ({CCS 2002})},
79 year = {2002},
80 month = {November},
81 address = {Washington, DC},
84 @inproceedings{cebolla,
85 title = {{Cebolla: Pragmatic IP Anonymity}},
86 author = {Zach Brown},
87 booktitle = {Ottawa Linux Symposium},
88 year = {2002},
89 month = {June},
92 @misc{eax,
93 author = "M. Bellare and P. Rogaway and D. Wagner",
94 title = "A conventional authenticated-encryption mode",
95 howpublished = {Manuscript},
96 month = {April},
97 year = {2003},
100 @misc{darkside,
101 title = {{The Dark Side of the Web: An Open Proxy's View}},
102 author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
103 note = {\newline \url{http://codeen.cs.princeton.edu/}},
105 % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
107 @Misc{anonymizer,
108 key = {anonymizer},
109 title = {The {Anonymizer}},
110 note = {\url{http://anonymizer.com/}}
113 @Misc{privoxy,
114 key = {privoxy},
115 title = {{Privoxy}},
116 note = {\url{http://www.privoxy.org/}}
119 @inproceedings{anonnet,
120 title = {{Analysis of an Anonymity Network for Web Browsing}},
121 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
122 David Hutchison},
123 booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
124 2002)}},
125 year = {2002},
126 month = {June},
127 address = {Pittsburgh, USA},
129 % pages = {49--54},
131 @inproceedings{econymics,
132 title = {On the Economics of Anonymity},
133 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
134 booktitle = {Financial Cryptography},
135 year = {2003},
136 editor = {Rebecca N. Wright},
137 publisher = {Springer-Verlag, LNCS 2742},
140 @inproceedings{defensive-dropping,
141 title = {Timing Analysis in Low-Latency Mix-Based Systems},
142 author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
143 booktitle = {Financial Cryptography},
144 year = {2004},
145 editor = {Ari Juels},
146 publisher = {Springer-Verlag, LNCS (forthcoming)},
149 @inproceedings{morphmix:fc04,
150 title = {Practical Anonymity for the Masses with MorphMix},
151 author = {Marc Rennhard and Bernhard Plattner},
152 booktitle = {Financial Cryptography},
153 year = {2004},
154 editor = {Ari Juels},
155 publisher = {Springer-Verlag, LNCS (forthcoming)},
158 @inproceedings{eternity,
159 title = {The Eternity Service},
160 author = {Ross Anderson},
161 booktitle = {Pragocrypt '96},
162 year = {1996},
164 %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
167 @inproceedings{minion-design,
168 title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
169 author = {George Danezis and Roger Dingledine and Nick Mathewson},
170 booktitle = {2003 IEEE Symposium on Security and Privacy},
171 year = {2003},
172 month = {May},
173 publisher = {IEEE CS},
174 pages = {2--15},
176 %note = {\url{http://mixminion.net/minion-design.pdf}},
178 @inproceedings{ rao-pseudonymity,
179 author = "Josyula R. Rao and Pankaj Rohatgi",
180 title = "Can Pseudonymity Really Guarantee Privacy?",
181 booktitle = "Proceedings of the Ninth USENIX Security Symposium",
182 year = {2000},
183 month = Aug,
184 publisher = {USENIX},
185 pages = "85--96",
187 %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
188 %full_papers/rao/rao.pdf}},
190 @InProceedings{pfitzmann90how,
191 author = "Birgit Pfitzmann and Andreas Pfitzmann",
192 title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
193 booktitle = {Eurocrypt 89},
194 publisher = {Springer-Verlag, LNCS 434},
195 year = {1990},
196 note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
199 @Misc{tor-spec,
200 author = {Roger Dingledine and Nick Mathewson},
201 title = {Tor Protocol Specifications},
202 note = {\url{http://freehaven.net/tor/tor-spec.txt}},
205 @InProceedings{BM:mixencrypt,
206 author = {M{\"o}ller, Bodo},
207 title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
208 booktitle = {{CT-RSA} 2003},
209 publisher = {Springer-Verlag, LNCS 2612},
210 year = 2003,
213 @InProceedings{back01,
214 author = {Adam Back and Ulf M\"oller and Anton Stiglic},
215 title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
216 booktitle = {Information Hiding (IH 2001)},
217 pages = {245--257},
218 year = 2001,
219 editor = {Ira S. Moskowitz},
220 publisher = {Springer-Verlag, LNCS 2137},
222 %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
224 @InProceedings{rackoff93cryptographic,
225 author = {Charles Rackoff and Daniel R. Simon},
226 title = {Cryptographic Defense Against Traffic Analysis},
227 booktitle = {{ACM} Symposium on Theory of Computing},
228 pages = {672--681},
229 year = {1993},
231 %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
233 @InProceedings{freehaven-berk,
234 author = {Roger Dingledine and Michael J. Freedman and David Molnar},
235 title = {The Free Haven Project: Distributed Anonymous Storage Service},
236 booktitle = {Designing Privacy Enhancing Technologies: Workshop
237 on Design Issue in Anonymity and Unobservability},
238 year = {2000},
239 month = {July},
240 editor = {H. Federrath},
241 publisher = {Springer-Verlag, LNCS 2009},
243 %note = {\url{http://freehaven.net/papers.html}},
245 @InProceedings{raymond00,
246 author = {J. F. Raymond},
247 title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
248 and Open Problems}},
249 booktitle = {Designing Privacy Enhancing Technologies: Workshop
250 on Design Issue in Anonymity and Unobservability},
251 year = 2000,
252 month = {July},
253 pages = {10-29},
254 editor = {H. Federrath},
255 publisher = {Springer-Verlag, LNCS 2009},
258 @InProceedings{sybil,
259 author = "John Douceur",
260 title = {{The Sybil Attack}},
261 booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
262 month = Mar,
263 year = 2002,
266 @InProceedings{trickle02,
267 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
268 title = {From a Trickle to a Flood: Active Attacks on Several
269 Mix Types},
270 booktitle = {Information Hiding (IH 2002)},
271 year = {2002},
272 editor = {Fabien Petitcolas},
273 publisher = {Springer-Verlag, LNCS 2578},
276 @InProceedings{langos02,
277 author = {Oliver Berthold and Heinrich Langos},
278 title = {Dummy Traffic Against Long Term Intersection Attacks},
279 booktitle = {Privacy Enhancing Technologies (PET 2002)},
280 year = {2002},
281 editor = {Roger Dingledine and Paul Syverson},
282 publisher = {Springer-Verlag, LNCS 2482}
286 @InProceedings{hintz-pet02,
287 author = {Andrew Hintz},
288 title = {Fingerprinting Websites Using Traffic Analysis},
289 booktitle = {Privacy Enhancing Technologies (PET 2002)},
290 pages = {171--178},
291 year = 2002,
292 editor = {Roger Dingledine and Paul Syverson},
293 publisher = {Springer-Verlag, LNCS 2482}
296 @InProceedings{or-discex00,
297 author = {Paul Syverson and Michael Reed and David Goldschlag},
298 title = {{O}nion {R}outing Access Configurations},
299 booktitle = {DARPA Information Survivability Conference and
300 Exposition (DISCEX 2000)},
301 year = {2000},
302 publisher = {IEEE CS Press},
303 pages = {34--40},
304 volume = {1},
306 %note = {\newline \url{http://www.onion-router.net/Publications.html}},
308 @Inproceedings{or-pet00,
309 title = {{Towards an Analysis of Onion Routing Security}},
310 author = {Paul Syverson and Gene Tsudik and Michael Reed and
311 Carl Landwehr},
312 booktitle = {Designing Privacy Enhancing Technologies: Workshop
313 on Design Issue in Anonymity and Unobservability},
314 year = 2000,
315 month = {July},
316 pages = {96--114},
317 editor = {H. Federrath},
318 publisher = {Springer-Verlag, LNCS 2009},
320 %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
322 @Inproceedings{freenet-pets00,
323 title = {Freenet: A Distributed Anonymous Information Storage
324 and Retrieval System},
325 author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
326 Theodore W. Hong},
327 booktitle = {Designing Privacy Enhancing Technologies: Workshop
328 on Design Issue in Anonymity and Unobservability},
329 year = 2000,
330 month = {July},
331 pages = {46--66},
332 editor = {H. Federrath},
333 publisher = {Springer-Verlag, LNCS 2009},
335 %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
337 @InProceedings{or-ih96,
338 author = {David M. Goldschlag and Michael G. Reed and Paul
339 F. Syverson},
340 title = {Hiding Routing Information},
341 booktitle = {Information Hiding, First International Workshop},
342 pages = {137--150},
343 year = 1996,
344 editor = {R. Anderson},
345 month = {May},
346 publisher = {Springer-Verlag, LNCS 1174},
349 @InProceedings{federrath-ih96,
350 author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
351 title = {{MIXes} in Mobile Communication Systems: Location
352 Management with Privacy},
353 booktitle = {Information Hiding, First International Workshop},
354 pages = {121--135},
355 year = 1996,
356 editor = {R. Anderson},
357 month = {May},
358 publisher = {Springer-Verlag, LNCS 1174},
362 @InProceedings{reed-protocols97,
363 author = {Michael G. Reed and Paul F. Syverson and David
364 M. Goldschlag},
365 title = {Protocols Using Anonymous Connections: Mobile Applications},
366 booktitle = {Security Protocols: 5th International Workshop},
367 pages = {13--23},
368 year = 1997,
369 editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
370 and Michael Roe},
371 month = {April},
372 publisher = {Springer-Verlag, LNCS 1361}
377 @Article{or-jsac98,
378 author = {Michael G. Reed and Paul F. Syverson and David
379 M. Goldschlag},
380 title = {Anonymous Connections and Onion Routing},
381 journal = {IEEE Journal on Selected Areas in Communications},
382 year = 1998,
383 volume = 16,
384 number = 4,
385 pages = {482--494},
386 month = {May},
388 %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
390 @Misc{TLS,
391 author = {T. Dierks and C. Allen},
392 title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
393 howpublished = {IETF RFC 2246},
394 month = {January},
395 year = {1999},
397 %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
399 @Misc{SMTP,
400 author = {J. Postel},
401 title = {Simple {M}ail {T}ransfer {P}rotocol},
402 howpublished = {IETF RFC 2821 (also STD0010)},
403 month = {April},
404 year = {2001},
405 note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
408 @Misc{IMAP,
409 author = {M. Crispin},
410 title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
411 howpublished = {IETF RFC 2060},
412 month = {December},
413 year = {1996},
414 note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
417 @misc{pipenet,
418 title = {PipeNet 1.1},
419 author = {Wei Dai},
420 year = 1996,
421 month = {August},
422 howpublished = {Usenet post},
423 note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
424 in a post to the cypherpunks list, Feb.\ 1995.},
428 @Misc{POP3,
429 author = {J. Myers and M. Rose},
430 title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
431 howpublished = {IETF RFC 1939 (also STD0053)},
432 month = {May},
433 year = {1996},
434 note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
438 @InProceedings{shuffle,
439 author = {C. Andrew Neff},
440 title = {A Verifiable Secret Shuffle and its Application to E-Voting},
441 booktitle = {8th ACM Conference on Computer and Communications
442 Security (CCS-8)},
443 pages = {116--125},
444 year = 2001,
445 editor = {P. Samarati},
446 month = {November},
447 publisher = {ACM Press},
449 %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
450 % technicaldocs/shuffle.pdf}},
452 @InProceedings{dolev91,
453 author = {Danny Dolev and Cynthia Dwork and Moni Naor},
454 title = {Non-Malleable Cryptography},
455 booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
456 pages = {542--552},
457 year = 1991,
458 note = {Updated version at
459 \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
462 @TechReport{rsw96,
463 author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
464 title = {Time-lock puzzles and timed-release Crypto},
465 year = 1996,
466 type = {MIT LCS technical memo},
467 number = {MIT/LCS/TR-684},
468 month = {February},
469 note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
472 @InProceedings{web-mix,
473 author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
474 title = {Web {MIX}es: A system for anonymous and unobservable
475 {I}nternet access},
476 booktitle = {Designing Privacy Enhancing Technologies: Workshop
477 on Design Issue in Anonymity and Unobservability},
478 editor = {H. Federrath},
479 publisher = {Springer-Verlag, LNCS 2009},
480 year = {2000},
482 % pages = {115--129},
484 @InProceedings{disad-free-routes,
485 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
486 title = {The disadvantages of free {MIX} routes and how to overcome
487 them},
488 booktitle = {Designing Privacy Enhancing Technologies: Workshop
489 on Design Issue in Anonymity and Unobservability},
490 pages = {30--45},
491 year = 2000,
492 editor = {H. Federrath},
493 publisher = {Springer-Verlag, LNCS 2009},
495 %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
496 % disadvantages_berthold.pdf}},
498 @InProceedings{boneh00,
499 author = {Dan Boneh and Moni Naor},
500 title = {Timed Commitments},
501 booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
502 pages = {236--254},
503 year = 2000,
504 publisher = {Springer-Verlag, LNCS 1880},
505 note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
508 @InProceedings{goldschlag98,
509 author = {David M. Goldschlag and Stuart G. Stubblebine},
510 title = {Publicly Verifiable Lotteries: Applications of
511 Delaying Functions},
512 booktitle = {Financial Cryptography},
513 pages = {214--226},
514 year = 1998,
515 publisher = {Springer-Verlag, LNCS 1465},
516 note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
519 @InProceedings{syverson98,
520 author = {Paul Syverson},
521 title = {Weakly Secret Bit Commitment: Applications to
522 Lotteries and Fair Exchange},
523 booktitle = {Computer Security Foundations Workshop (CSFW11)},
524 pages = {2--13},
525 year = 1998,
526 address = {Rockport Massachusetts},
527 month = {June},
528 publisher = {IEEE CS Press},
529 note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
532 @Misc{shoup-iso,
533 author = {Victor Shoup},
534 title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
535 note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
538 @Misc{shoup-oaep,
539 author = {Victor Shoup},
540 title = {{OAEP} Reconsidered},
541 howpublished = {{IACR} e-print 2000/060},
542 note = {\newline \url{http://eprint.iacr.org/2000/060/}},
545 @Misc{oaep-still-alive,
546 author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
547 title = {{RSA}-{OAEP} is Still Alive!},
548 howpublished = {{IACR} e-print 2000/061},
549 note = {\newline \url{http://eprint.iacr.org/2000/061/}},
552 @misc{echolot,
553 author = {Peter Palfrader},
554 title = {Echolot: a pinger for anonymous remailers},
555 note = {\url{http://www.palfrader.org/echolot/}},
558 @Misc{mixmaster-attacks,
559 author = {Lance Cottrell},
560 title = {Mixmaster and Remailer Attacks},
561 note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
564 @Misc{mixmaster-spec,
565 author = {Ulf M{\"o}ller and Lance Cottrell and Peter
566 Palfrader and Len Sassaman},
567 title = {Mixmaster {P}rotocol --- {V}ersion 2},
568 year = {2003},
569 month = {July},
570 howpublished = {Draft},
571 note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
574 @InProceedings{puzzles-tls,
575 author = "Drew Dean and Adam Stubblefield",
576 title = {{Using Client Puzzles to Protect TLS}},
577 booktitle = "Proceedings of the 10th USENIX Security Symposium",
578 year = {2001},
579 month = Aug,
580 publisher = {USENIX},
583 @InProceedings{breadpudding,
584 author = {Markus Jakobsson and Ari Juels},
585 title = {Proofs of Work and Bread Pudding Protocols},
586 booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
587 Conference on Communications and Multimedia Security
588 (CMS '99)},
589 year = 1999,
590 month = {September},
591 publisher = {Kluwer}
594 @Misc{hashcash,
595 author = {Adam Back},
596 title = {Hash cash},
597 note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
600 @InProceedings{oreilly-acc,
601 author = {Roger Dingledine and Michael J. Freedman and David Molnar},
602 title = {Accountability},
603 booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
604 Technology},
605 year = {2001},
606 publisher = {O'Reilly and Associates},
610 @InProceedings{han,
611 author = {Yongfei Han},
612 title = {Investigation of non-repudiation protocols},
613 booktitle = {ACISP '96},
614 year = 1996,
615 publisher = {Springer-Verlag},
619 @Misc{socks5,
620 key = {socks5},
621 title = {{SOCKS} {P}rotocol {V}ersion 5},
622 howpublished= {IETF RFC 1928},
623 month = {March},
624 year = 1996,
625 note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
628 @InProceedings{abe,
629 author = {Masayuki Abe},
630 title = {Universally Verifiable {MIX} With Verification Work Independent of
631 The Number of {MIX} Servers},
632 booktitle = {{EUROCRYPT} 1998},
633 year = {1998},
634 publisher = {Springer-Verlag, LNCS 1403},
637 @InProceedings{desmedt,
638 author = {Yvo Desmedt and Kaoru Kurosawa},
639 title = {How To Break a Practical {MIX} and Design a New One},
640 booktitle = {{EUROCRYPT} 2000},
641 year = {2000},
642 publisher = {Springer-Verlag, LNCS 1803},
643 note = {\url{http://citeseer.nj.nec.com/447709.html}},
646 @InProceedings{mitkuro,
647 author = {M. Mitomo and K. Kurosawa},
648 title = {{Attack for Flash MIX}},
649 booktitle = {{ASIACRYPT} 2000},
650 year = {2000},
651 publisher = {Springer-Verlag, LNCS 1976},
652 note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
655 @InProceedings{hybrid-mix,
656 author = {M. Ohkubo and M. Abe},
657 title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
658 booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
659 year = {2000},
660 publisher = {Springer-Verlag, LNCS 1976},
663 @InProceedings{PShuffle,
664 author = {Jun Furukawa and Kazue Sako},
665 title = {An Efficient Scheme for Proving a Shuffle},
666 editor = {Joe Kilian},
667 booktitle = {CRYPTO 2001},
668 year = {2001},
669 publisher = {Springer-Verlag, LNCS 2139},
673 @InProceedings{jakobsson-optimally,
674 author = "Markus Jakobsson and Ari Juels",
675 title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
676 booktitle = {Principles of Distributed Computing - {PODC} '01},
677 year = "2001",
678 publisher = {ACM Press},
679 note = {\url{http://citeseer.nj.nec.com/492015.html}},
682 @InProceedings{kesdogan,
683 author = {D. Kesdogan and M. Egner and T. B\"uschkes},
684 title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
685 System},
686 booktitle = {Information Hiding (IH 1998)},
687 year = {1998},
688 publisher = {Springer-Verlag, LNCS 1525},
690 %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
692 @InProceedings{socks4,
693 author = {David Koblas and Michelle R. Koblas},
694 title = {{SOCKS}},
695 booktitle = {UNIX Security III Symposium (1992 USENIX Security
696 Symposium)},
697 pages = {77--83},
698 year = 1992,
699 publisher = {USENIX},
702 @InProceedings{flash-mix,
703 author = {Markus Jakobsson},
704 title = {Flash {M}ixing},
705 booktitle = {Principles of Distributed Computing - {PODC} '99},
706 year = {1999},
707 publisher = {ACM Press},
708 note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
711 @InProceedings{SK,
712 author = {Joe Kilian and Kazue Sako},
713 title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
714 the Implementation of a Voting Booth},
715 booktitle = {EUROCRYPT '95},
716 year = {1995},
717 publisher = {Springer-Verlag},
720 @InProceedings{OAEP,
721 author = {M. Bellare and P. Rogaway},
722 year = {1994},
723 booktitle = {EUROCRYPT '94},
724 title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
725 {RSA}},
726 publisher = {Springer-Verlag},
727 note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
729 @inproceedings{babel,
730 title = {Mixing {E}-mail With {B}abel},
731 author = {Ceki G\"ulc\"u and Gene Tsudik},
732 booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
733 year = 1996,
734 month = {February},
735 pages = {2--16},
736 publisher = {IEEE},
738 %note = {\url{http://citeseer.nj.nec.com/2254.html}},
740 @Misc{rprocess,
741 author = {RProcess},
742 title = {Selective Denial of Service Attacks},
743 note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
746 @Article{remailer-history,
747 author = {Sameer Parekh},
748 title = {Prospects for Remailers},
749 journal = {First Monday},
750 volume = {1},
751 number = {2},
752 month = {August},
753 year = {1996},
754 note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
757 @Article{chaum-mix,
758 author = {David Chaum},
759 title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
760 journal = {Communications of the ACM},
761 year = {1981},
762 volume = {4},
763 number = {2},
764 month = {February},
766 %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
768 @InProceedings{nym-alias-net,
769 author = {David Mazi\`{e}res and M. Frans Kaashoek},
770 title = {{The Design, Implementation and Operation of an Email
771 Pseudonym Server}},
772 booktitle = {$5^{th}$ ACM Conference on Computer and
773 Communications Security (CCS'98)},
774 year = 1998,
775 publisher = {ACM Press},
777 %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
779 @InProceedings{tangler,
780 author = {Marc Waldman and David Mazi\`{e}res},
781 title = {Tangler: A Censorship-Resistant Publishing System
782 Based on Document Entanglements},
783 booktitle = {$8^{th}$ ACM Conference on Computer and
784 Communications Security (CCS-8)},
785 pages = {86--135},
786 year = 2001,
787 publisher = {ACM Press},
789 %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
791 @misc{neochaum,
792 author = {Tim May},
793 title = {Payment mixes for anonymity},
794 howpublished = {E-mail archived at
795 \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
798 @misc{helsingius,
799 author = {J. Helsingius},
800 title = {{\tt anon.penet.fi} press release},
801 note = {\newline \url{http://www.penet.fi/press-english.html}},
804 @InProceedings{garay97secure,
805 author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
806 title = {Secure distributed storage and retrieval},
807 booktitle = {11th International Workshop, WDAG '97},
808 pages = {275--289},
809 year = {1997},
810 publisher = {Springer-Verlag, LNCS 1320},
811 note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
814 @InProceedings{PIK,
815 author = {C. Park and K. Itoh and K. Kurosawa},
816 title = {Efficient anonymous channel and all/nothing election scheme},
817 booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
818 pages = {248--259},
819 publisher = {Springer-Verlag, LNCS 765},
822 @Misc{pgpfaq,
823 key = {PGP},
824 title = {{PGP} {FAQ}},
825 note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
828 @Article{riordan-schneier,
829 author = {James Riordan and Bruce Schneier},
830 title = {A Certified E-mail Protocol with No Trusted Third Party},
831 journal = {13th Annual Computer Security Applications Conference},
832 month = {December},
833 year = {1998},
834 note = {\newline \url{http://www.counterpane.com/certified-email.html}},
838 @Article{crowds-tissec,
839 author = {Michael K. Reiter and Aviel D. Rubin},
840 title = {Crowds: Anonymity for Web Transactions},
841 journal = {ACM TISSEC},
842 year = 1998,
843 volume = 1,
844 number = 1,
845 pages = {66--92},
846 month = {June},
848 %note = {\url{http://citeseer.nj.nec.com/284739.html}}
850 @Article{crowds-dimacs,
851 author = {Michael K. Reiter and Aviel D. Rubin},
852 title = {Crowds: Anonymity for Web Transactions},
853 journal = {{DIMACS} Technical Report (Revised)},
854 volume = {97},
855 number = {15},
856 month = {August},
857 year = {1997},
860 @Misc{advogato,
861 author = {Raph Levien},
862 title = {Advogato's Trust Metric},
863 note = {\newline \url{http://www.advogato.org/trust-metric.html}},
866 @InProceedings{publius,
867 author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
868 title = {Publius: {A} robust, tamper-evident, censorship-resistant and
869 source-anonymous web publishing system},
870 booktitle = {Proc. 9th USENIX Security Symposium},
871 pages = {59--72},
872 year = {2000},
873 month = {August},
875 %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
877 @Misc{freedom-nyms,
878 author = {Russell Samuels},
879 title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
880 year = {1999},
881 month = {November},
882 day = {21},
883 note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
886 @techreport{freedom2-arch,
887 title = {Freedom Systems 2.0 Architecture},
888 author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
889 institution = {Zero Knowledge Systems, {Inc.}},
890 year = {2000},
891 month = {December},
892 type = {White Paper},
893 day = {18},
896 @techreport{freedom21-security,
897 title = {Freedom Systems 2.1 Security Issues and Analysis},
898 author = {Adam Back and Ian Goldberg and Adam Shostack},
899 institution = {Zero Knowledge Systems, {Inc.}},
900 year = {2001},
901 month = {May},
902 type = {White Paper},
905 @inproceedings{cfs:sosp01,
906 title = {Wide-area cooperative storage with {CFS}},
907 author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
908 booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
909 year = {2001},
910 month = {October},
911 address = {Chateau Lake Louise, Banff, Canada},
914 @inproceedings{SS03,
915 title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
916 author = {Andrei Serjantov and Peter Sewell},
917 booktitle = {Computer Security -- ESORICS 2003},
918 publisher = {Springer-Verlag, LNCS (forthcoming)},
919 year = {2003},
920 month = {October},
922 %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
924 @Misc{pk-relations,
925 author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
926 title = {Relations Among Notions of Security for Public-Key Encryption
927 Schemes},
928 howpublished = {
929 Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
930 Springer-Verlag, 1998.
931 Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
935 @InProceedings{mix-acc,
936 author = {Roger Dingledine and Michael J. Freedman and David
937 Hopwood and David Molnar},
938 title = {{A Reputation System to Increase MIX-net
939 Reliability}},
940 booktitle = {Information Hiding (IH 2001)},
941 pages = {126--141},
942 year = 2001,
943 editor = {Ira S. Moskowitz},
944 publisher = {Springer-Verlag, LNCS 2137},
946 %note = {\url{http://www.freehaven.net/papers.html}},
948 @InProceedings{casc-rep,
949 author = {Roger Dingledine and Paul Syverson},
950 title = {{Reliable MIX Cascade Networks through Reputation}},
951 booktitle = {Financial Cryptography},
952 year = 2002,
953 editor = {Matt Blaze},
954 publisher = {Springer-Verlag, LNCS 2357},
956 %note = {\newline \url{http://www.freehaven.net/papers.html}},
958 @InProceedings{zhou96certified,
959 author = {Zhou and Gollmann},
960 title = {Certified Electronic Mail},
961 booktitle = {{ESORICS: European Symposium on Research in Computer
962 Security}},
963 publisher = {Springer-Verlag, LNCS 1146},
964 year = {1996},
965 note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
968 @Misc{realtime-mix,
969 author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
970 Birgit Pfitzmann and Michael Waidner},
971 title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
972 howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
973 note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
976 @InProceedings{danezis-pets03,
977 author = {George Danezis},
978 title = {Mix-networks with Restricted Routes},
979 booktitle = {Privacy Enhancing Technologies (PET 2003)},
980 year = 2003,
981 editor = {Roger Dingledine},
982 publisher = {Springer-Verlag LNCS 2760}
985 @InProceedings{gap-pets03,
986 author = {Krista Bennett and Christian Grothoff},
987 title = {{GAP} -- practical anonymous networking},
988 booktitle = {Privacy Enhancing Technologies (PET 2003)},
989 year = 2003,
990 editor = {Roger Dingledine},
991 publisher = {Springer-Verlag LNCS 2760}
994 @Article{hordes-jcs,
995 author = {Brian Neal Levine and Clay Shields},
996 title = {Hordes: A Multicast-Based Protocol for Anonymity},
997 journal = {Journal of Computer Security},
998 year = 2002,
999 volume = 10,
1000 number = 3,
1001 pages = {213--240}
1004 @TechReport{herbivore,
1005 author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
1006 title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
1007 institution = {Cornell University Computing and Information Science},
1008 year = 2003,
1009 type = {Technical Report},
1010 number = {TR2003-1890},
1011 month = {February}
1014 @InProceedings{p5,
1015 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
1016 title = {$P^5$: A Protocol for Scalable Anonymous Communication},
1017 booktitle = {2002 IEEE Symposium on Security and Privacy},
1018 pages = {58--70},
1019 year = 2002,
1020 publisher = {IEEE CS}
1023 @phdthesis{ian-thesis,
1024 title = {A Pseudonymous Communications Infrastructure for the Internet},
1025 author = {Ian Goldberg},
1026 school = {UC Berkeley},
1027 year = {2000},
1028 month = {Dec},
1031 @Article{taz,
1032 author = {Ian Goldberg and David Wagner},
1033 title = {TAZ Servers and the Rewebber Network: Enabling
1034 Anonymous Publishing on the World Wide Web},
1035 journal = {First Monday},
1036 year = 1998,
1037 volume = 3,
1038 number = 4,
1039 month = {August},
1040 note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
1043 @Misc{tcp-over-tcp-is-bad,
1044 key = {tcp-over-tcp-is-bad},
1045 title = {Why {TCP} Over {TCP} Is A Bad Idea},
1046 author = {Olaf Titz},
1047 note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
1050 @inproceedings{wright02,
1051 title = {An Analysis of the Degradation of Anonymous Protocols},
1052 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
1053 booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
1054 year = {2002},
1055 month = {February},
1056 publisher = {IEEE},
1059 @inproceedings{wright03,
1060 title = {Defending Anonymous Communication Against Passive Logging Attacks},
1061 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
1062 booktitle = {IEEE Symposium on Security and Privacy},
1063 pages= {28--41},
1064 year = {2003},
1065 month = {May},
1066 publisher = {IEEE CS},
1069 @Misc{jap-backdoor,
1070 author={{The AN.ON Project}},
1071 howpublished={Press release},
1072 year={2003},
1073 month={September},
1074 title={German Police proceeds against anonymity service},
1075 note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
1078 @article{shsm03,
1079 title = {Using Caching for Browsing Anonymity},
1080 author = {Anna Shubina and Sean Smith},
1081 journal = {ACM SIGEcom Exchanges},
1082 volume = {4},
1083 number = {2},
1084 year = {2003},
1085 month = {Sept},
1086 www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
1087 www_section = {Anonymous communication},
1090 %%% Local Variables:
1091 %%% mode: latex
1092 %%% TeX-master: "tor-design"
1093 %%% End: