4 author = "Andrew Tannenbaum"
,
5 title = "Computer Networks"
,
7 publisher = "Prentice Hall
, 3rd edition"
,
11 author = "Catherine Meadows"
,
12 title = "The
{NRL
} Protocol Analyzer
: An Overview"
,
13 journal = "Journal of Logic Programming"
,
19 @inproceedings
{kesdogan
:pet2002
,
20 title = {Unobservable Surfing on the World Wide Web
: Is Private Information Retrieval an
21 alternative to the MIX based Approach?
},
22 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink
},
23 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
26 editor = {Roger Dingledine and Paul Syverson
},
27 publisher = {Springer
-Verlag
, LNCS
2482},
30 @inproceedings
{statistical
-disclosure
,
31 title = {Statistical Disclosure Attacks
},
32 author = {George Danezis
},
33 booktitle = {Security and Privacy in the Age of Uncertainty
({SEC2003
})},
34 organization = {{IFIP TC11
}},
42 @inproceedings
{limits
-open
,
43 title = {Limits of Anonymity in Open Environments
},
44 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz
},
45 booktitle = {Information Hiding Workshop
(IH
2002)},
48 editor = {Fabien Petitcolas
},
49 publisher = {Springer
-Verlag
, LNCS
2578},
52 @inproceedings
{isdn
-mixes
,
53 title = {{ISDN
-mixes
: Untraceable communication with very small bandwidth overhead
}},
54 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner
},
55 booktitle = {GI
/ITG Conference on Communication in Distributed Systems
},
62 @Article
{jerichow
-jsac98
,
63 author = {Anja Jerichow and Jan M\"
{u
}ller and Andreas
64 Pfitzmann and Birgit Pfitzmann and Michael Waidner
},
65 title = {Real
-Time Mixes
: A Bandwidth
-Efficient Anonymity Protocol
},
66 journal = {IEEE Journal on Selected Areas in Communications
},
74 @inproceedings
{tarzan
:ccs02
,
75 title = {Tarzan
: A Peer
-to
-Peer Anonymizing Network Layer
},
76 author = {Michael J. Freedman and Robert Morris
},
77 booktitle = {9th
{ACM
} {C
}onference on
{C
}omputer and
{C
}ommunications
78 {S
}ecurity
({CCS
2002})},
81 address = {Washington
, DC
},
84 @inproceedings
{cebolla
,
85 title = {{Cebolla
: Pragmatic IP Anonymity
}},
86 author = {Zach Brown
},
87 booktitle = {Ottawa Linux Symposium
},
93 author = "M. Bellare and P. Rogaway and D. Wagner"
,
94 title = {The
{EAX
} Mode of Operation
: A Two
-Pass Authenticated
-Encryption Scheme Optimized for Simplicity and Efficiency
},
95 booktitle = {Fast Software Encryption
2004},
101 title = {{The Dark Side of the Web
: An Open Proxy's View
}},
102 author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson
},
103 note = {\newline \url
{http
://codeen.cs.princeton.edu
/}},
105 % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
109 title = {The
{Anonymizer
}},
110 note = {\url
{http
://anonymizer.com
/}}
116 note = {\url
{http
://www.privoxy.org
/}}
119 @inproceedings
{anonnet
,
120 title = {{Analysis of an Anonymity Network for Web Browsing
}},
121 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
123 booktitle = {{IEEE
7th Intl. Workshop on Enterprise Security
(WET ICE
127 address = {Pittsburgh
, USA
},
131 @inproceedings
{econymics
,
132 title = {On the Economics of Anonymity
},
133 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson
},
134 booktitle = {Financial Cryptography
},
136 editor = {Rebecca N. Wright
},
137 publisher = {Springer
-Verlag
, LNCS
2742},
140 @inproceedings
{defensive
-dropping
,
141 title = {Timing Analysis in Low
-Latency Mix
-Based Systems
},
142 author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright
},
143 booktitle = {Financial Cryptography
},
145 editor = {Ari Juels
},
146 publisher = {Springer
-Verlag
, LNCS
(forthcoming
)},
149 @inproceedings
{morphmix
:fc04
,
150 title = {Practical Anonymity for the Masses with MorphMix
},
151 author = {Marc Rennhard and Bernhard Plattner
},
152 booktitle = {Financial Cryptography
},
154 editor = {Ari Juels
},
155 publisher = {Springer
-Verlag
, LNCS
(forthcoming
)},
158 @inproceedings
{eternity
,
159 title = {The Eternity Service
},
160 author = {Ross Anderson
},
161 booktitle = {Pragocrypt '
96},
164 %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
167 @inproceedings
{minion
-design
,
168 title = {Mixminion
: Design of a Type
{III
} Anonymous Remailer Protocol
},
169 author = {George Danezis and Roger Dingledine and Nick Mathewson
},
170 booktitle = {2003 IEEE Symposium on Security and Privacy
},
173 publisher = {IEEE CS
},
176 %note = {\url{http://mixminion.net/minion-design.pdf}},
178 @inproceedings
{ rao
-pseudonymity
,
179 author = "Josyula R. Rao and Pankaj Rohatgi"
,
180 title = "Can Pseudonymity Really Guarantee Privacy?"
,
181 booktitle = "Proceedings of the Ninth USENIX Security Symposium"
,
184 publisher = {USENIX
},
187 %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
188 %full_papers/rao/rao.pdf}},
190 @InProceedings
{pfitzmann90how
,
191 author = "Birgit Pfitzmann and Andreas Pfitzmann"
,
192 title = "How to Break the Direct
{RSA
}-Implementation of
{MIXes
}"
,
193 booktitle = {Eurocrypt
89},
194 publisher = {Springer
-Verlag
, LNCS
434},
196 note = {\url
{http
://citeseer.nj.nec.com
/pfitzmann90how.html
}},
200 author = {Roger Dingledine and Nick Mathewson
},
201 title = {Tor Protocol Specifications
},
202 note = {\url
{http
://freehaven.net
/tor
/tor
-spec.txt
}},
205 @InProceedings
{BM
:mixencrypt
,
206 author = {M
{\"o
}ller
, Bodo
},
207 title = {Provably Secure Public
-Key Encryption for Length
-Preserving Chaumian Mixes
},
208 booktitle = {{CT
-RSA
} 2003},
209 publisher = {Springer
-Verlag
, LNCS
2612},
213 @InProceedings
{back01
,
214 author = {Adam Back and Ulf M\"oller and Anton Stiglic
},
215 title = {Traffic Analysis Attacks and Trade
-Offs in Anonymity Providing Systems
},
216 booktitle = {Information Hiding
(IH
2001)},
219 editor = {Ira S. Moskowitz
},
220 publisher = {Springer
-Verlag
, LNCS
2137},
222 %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
224 @InProceedings
{rackoff93cryptographic
,
225 author = {Charles Rackoff and Daniel R. Simon
},
226 title = {Cryptographic Defense Against Traffic Analysis
},
227 booktitle = {{ACM
} Symposium on Theory of Computing
},
231 %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
233 @InProceedings
{freehaven
-berk
,
234 author = {Roger Dingledine and Michael J. Freedman and David Molnar
},
235 title = {The Free Haven Project
: Distributed Anonymous Storage Service
},
236 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
237 on Design Issue in Anonymity and Unobservability
},
240 editor = {H. Federrath
},
241 publisher = {Springer
-Verlag
, LNCS
2009},
244 @InProceedings
{move
-ndss05
,
245 author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein
},
246 title = {MOVE
: An End
-to
-End Solution To Network Denial of Service
},
247 booktitle = {{ISOC Network and Distributed System Security Symposium
(NDSS05
)}},
250 publisher = {Internet Society
}
253 %note = {\url{http://freehaven.net/papers.html}},
258 @InProceedings
{raymond00
,
259 author = {J. F. Raymond
},
260 title = {{Traffic Analysis
: Protocols
, Attacks
, Design Issues
,
262 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
263 on Design Issue in Anonymity and Unobservability
},
267 editor = {H. Federrath
},
268 publisher = {Springer
-Verlag
, LNCS
2009},
271 @InProceedings
{sybil
,
272 author = "John Douceur"
,
273 title = {{The Sybil Attack
}},
274 booktitle = "Proceedings of the
1st International Peer To Peer Systems Workshop
(IPTPS
)"
,
280 @InCollection
{price
-privacy
,
281 author = {Paul Syverson and Adam Shostack
},
282 editor = {L. Jean Camp and Stephen Lewis
},
283 title = {What Price Privacy?
(and why identity theft is about neither identity nor theft
)},
284 booktitle = {Economics of Information Security
},
286 publisher = {Kluwer
},
292 @InProceedings
{trickle02
,
293 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson
},
294 title = {From a Trickle to a Flood
: Active Attacks on Several
296 booktitle = {Information Hiding
(IH
2002)},
298 editor = {Fabien Petitcolas
},
299 publisher = {Springer
-Verlag
, LNCS
2578},
302 @InProceedings
{langos02
,
303 author = {Oliver Berthold and Heinrich Langos
},
304 title = {Dummy Traffic Against Long Term Intersection Attacks
},
305 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
307 editor = {Roger Dingledine and Paul Syverson
},
308 publisher = {Springer
-Verlag
, LNCS
2482}
312 @InProceedings
{hintz
-pet02
,
313 author = {Andrew Hintz
},
314 title = {Fingerprinting Websites Using Traffic Analysis
},
315 booktitle = {Privacy Enhancing Technologies
(PET
2002)},
318 editor = {Roger Dingledine and Paul Syverson
},
319 publisher = {Springer
-Verlag
, LNCS
2482}
322 @InProceedings
{or
-discex00
,
323 author = {Paul Syverson and Michael Reed and David Goldschlag
},
324 title = {{O
}nion
{R
}outing Access Configurations
},
325 booktitle = {DARPA Information Survivability Conference and
326 Exposition
(DISCEX
2000)},
328 publisher = {IEEE CS Press
},
332 %note = {\newline \url{http://www.onion-router.net/Publications.html}},
334 @Inproceedings
{or
-pet00
,
335 title = {{Towards an Analysis of Onion Routing Security
}},
336 author = {Paul Syverson and Gene Tsudik and Michael Reed and
338 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
339 on Design Issue in Anonymity and Unobservability
},
343 editor = {H. Federrath
},
344 publisher = {Springer
-Verlag
, LNCS
2009},
346 %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
348 @Inproceedings
{freenet
-pets00
,
349 title = {Freenet
: A Distributed Anonymous Information Storage
350 and Retrieval System
},
351 author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
353 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
354 on Design Issue in Anonymity and Unobservability
},
358 editor = {H. Federrath
},
359 publisher = {Springer
-Verlag
, LNCS
2009},
361 %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
363 @InProceedings
{or
-ih96
,
364 author = {David M. Goldschlag and Michael G. Reed and Paul
366 title = {Hiding Routing Information
},
367 booktitle = {Information Hiding
, First International Workshop
},
370 editor = {R. Anderson
},
372 publisher = {Springer
-Verlag
, LNCS
1174},
375 @InProceedings
{federrath
-ih96
,
376 author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann
},
377 title = {{MIXes
} in Mobile Communication Systems
: Location
378 Management with Privacy
},
379 booktitle = {Information Hiding
, First International Workshop
},
382 editor = {R. Anderson
},
384 publisher = {Springer
-Verlag
, LNCS
1174},
388 @InProceedings
{reed
-protocols97
,
389 author = {Michael G. Reed and Paul F. Syverson and David
391 title = {Protocols Using Anonymous Connections
: Mobile Applications
},
392 booktitle = {Security Protocols
: 5th International Workshop
},
395 editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
398 publisher = {Springer
-Verlag
, LNCS
1361}
404 author = {Michael G. Reed and Paul F. Syverson and David
406 title = {Anonymous Connections and Onion Routing
},
407 journal = {IEEE Journal on Selected Areas in Communications
},
414 %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
417 author = {T. Dierks and C. Allen
},
418 title = {The
{TLS
} {P
}rotocol
--- {V
}ersion
1.0},
419 howpublished = {IETF RFC
2246},
423 %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
426 author = {J. Postel
},
427 title = {Simple
{M
}ail
{T
}ransfer
{P
}rotocol
},
428 howpublished = {IETF RFC
2821 (also STD0010
)},
431 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc2821.txt
}},
435 author = {M. Crispin
},
436 title = {Internet
{M
}essage
{A
}ccess
{P
}rotocol
--- {V
}ersion
4rev1
},
437 howpublished = {IETF RFC
2060},
440 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc2060.txt
}},
444 title = {PipeNet
1.1},
448 howpublished = {Usenet post
},
449 note = {\url
{http
://www.eskimo.com
/~weidai
/pipenet.txt
} First mentioned
450 in a post to the cypherpunks list
, Feb.\
1995.
},
455 author = {J. Myers and M. Rose
},
456 title = {Post
{O
}ffice
{P
}rotocol
--- {V
}ersion
3},
457 howpublished = {IETF RFC
1939 (also STD0053
)},
460 note = {\url
{http
://www.rfc
-editor.org
/rfc
/rfc1939.txt
}},
464 @InProceedings
{shuffle
,
465 author = {C. Andrew Neff
},
466 title = {A Verifiable Secret Shuffle and its Application to E
-Voting
},
467 booktitle = {8th ACM Conference on Computer and Communications
471 editor = {P. Samarati
},
473 publisher = {ACM Press
},
475 %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
476 % technicaldocs/shuffle.pdf}},
478 @InProceedings
{dolev91
,
479 author = {Danny Dolev and Cynthia Dwork and Moni Naor
},
480 title = {Non
-Malleable Cryptography
},
481 booktitle = {23rd ACM Symposium on the Theory of Computing
(STOC
)},
484 note = {Updated version at
485 \url
{http
://citeseer.nj.nec.com
/dolev00nonmalleable.html
}},
489 author = {Ronald L. Rivest and Adi Shamir and David A. Wagner
},
490 title = {Time
-lock puzzles and timed
-release Crypto
},
492 type = {MIT LCS technical memo
},
493 number = {MIT
/LCS
/TR
-684},
495 note = {\newline \url
{http
://citeseer.nj.nec.com
/rivest96timelock.html
}},
498 @InProceedings
{web
-mix
,
499 author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell
},
500 title = {Web
{MIX
}es
: A system for anonymous and unobservable
502 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
503 on Design Issue in Anonymity and Unobservability
},
504 editor = {H. Federrath
},
505 publisher = {Springer
-Verlag
, LNCS
2009},
508 % pages = {115--129},
510 @InProceedings
{disad
-free
-routes
,
511 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke
},
512 title = {The disadvantages of free
{MIX
} routes and how to overcome
514 booktitle = {Designing Privacy Enhancing Technologies
: Workshop
515 on Design Issue in Anonymity and Unobservability
},
518 editor = {H. Federrath
},
519 publisher = {Springer
-Verlag
, LNCS
2009},
521 %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
522 % disadvantages_berthold.pdf}},
524 @InProceedings
{boneh00
,
525 author = {Dan Boneh and Moni Naor
},
526 title = {Timed Commitments
},
527 booktitle = {Advances in Cryptology
-- {CRYPTO
} 2000},
530 publisher = {Springer
-Verlag
, LNCS
1880},
531 note = {\newline \url
{http
://crypto.stanford.edu
/~dabo
/abstracts
/timedcommit.html
}},
534 @InProceedings
{goldschlag98
,
535 author = {David M. Goldschlag and Stuart G. Stubblebine
},
536 title = {Publicly Verifiable Lotteries
: Applications of
538 booktitle = {Financial Cryptography
},
541 publisher = {Springer
-Verlag
, LNCS
1465},
542 note = {\newline \url
{http
://citeseer.nj.nec.com
/goldschlag98publicly.html
}},
545 @InProceedings
{syverson98
,
546 author = {Paul Syverson
},
547 title = {Weakly Secret Bit Commitment
: Applications to
548 Lotteries and Fair Exchange
},
549 booktitle = {Computer Security Foundations Workshop
(CSFW11
)},
552 address = {Rockport Massachusetts
},
554 publisher = {IEEE CS Press
},
555 note = {\newline \url
{http
://chacs.nrl.navy.mil
/publications
/CHACS
/1998/}},
559 author = {Victor Shoup
},
560 title = {A Proposal for an
{ISO
} {S
}tandard for Public Key Encryption
(version
2.1)},
561 note = {Revised December
20, 2001. \url
{http
://www.shoup.net
/papers
/}},
565 author = {Victor Shoup
},
566 title = {{OAEP
} Reconsidered
},
567 howpublished = {{IACR
} e
-print
2000/060},
568 note = {\newline \url
{http
://eprint.iacr.org
/2000/060/}},
571 @Misc
{oaep
-still
-alive
,
572 author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern
},
573 title = {{RSA
}-{OAEP
} is Still Alive
!},
574 howpublished = {{IACR
} e
-print
2000/061},
575 note = {\newline \url
{http
://eprint.iacr.org
/2000/061/}},
579 author = {Peter Palfrader
},
580 title = {Echolot
: a pinger for anonymous remailers
},
581 note = {\url
{http
://www.palfrader.org
/echolot
/}},
584 @Misc
{mixmaster
-attacks
,
585 author = {Lance Cottrell
},
586 title = {Mixmaster and Remailer Attacks
},
587 note = {\url
{http
://www.obscura.com
/~loki
/remailer
/remailer
-essay.html
}},
590 @Misc
{mixmaster
-spec
,
591 author = {Ulf M
{\"o
}ller and Lance Cottrell and Peter
592 Palfrader and Len Sassaman
},
593 title = {Mixmaster
{P
}rotocol
--- {V
}ersion
2},
596 howpublished = {Draft
},
597 note = {\url
{http
://www.abditum.com
/mixmaster
-spec.txt
}},
600 @InProceedings
{puzzles
-tls
,
601 author = "Drew Dean and Adam Stubblefield"
,
602 title = {{Using Client Puzzles to Protect TLS
}},
603 booktitle = "Proceedings of the
10th USENIX Security Symposium"
,
606 publisher = {USENIX
},
609 @InProceedings
{breadpudding
,
610 author = {Markus Jakobsson and Ari Juels
},
611 title = {Proofs of Work and Bread Pudding Protocols
},
612 booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
613 Conference on Communications and Multimedia Security
621 author = {Adam Back
},
623 note = {\newline \url
{http
://www.cypherspace.org
/~adam
/hashcash
/}},
626 @InProceedings
{oreilly
-acc
,
627 author = {Roger Dingledine and Michael J. Freedman and David Molnar
},
628 title = {Accountability
},
629 booktitle = {Peer
-to
-peer
: Harnessing the Benefits of a Disruptive
632 publisher = {O'Reilly and Associates
},
637 author = {Yongfei Han
},
638 title = {Investigation of non
-repudiation protocols
},
639 booktitle = {ACISP '
96},
641 publisher = {Springer
-Verlag
},
647 title = {{SOCKS
} {P
}rotocol
{V
}ersion
5},
648 howpublished= {IETF RFC
1928},
651 note = {\url
{http
://www.ietf.org
/rfc
/rfc1928.txt
}}
655 author = {Masayuki Abe
},
656 title = {Universally Verifiable
{MIX
} With Verification Work Independent of
657 The Number of
{MIX
} Servers
},
658 booktitle = {{EUROCRYPT
} 1998},
660 publisher = {Springer
-Verlag
, LNCS
1403},
663 @InProceedings
{desmedt
,
664 author = {Yvo Desmedt and Kaoru Kurosawa
},
665 title = {How To Break a Practical
{MIX
} and Design a New One
},
666 booktitle = {{EUROCRYPT
} 2000},
668 publisher = {Springer
-Verlag
, LNCS
1803},
669 note = {\url
{http
://citeseer.nj.nec.com
/447709.html
}},
672 @InProceedings
{mitkuro
,
673 author = {M. Mitomo and K. Kurosawa
},
674 title = {{Attack for Flash MIX
}},
675 booktitle = {{ASIACRYPT
} 2000},
677 publisher = {Springer
-Verlag
, LNCS
1976},
678 note = {\newline \url
{http
://citeseer.nj.nec.com
/450148.html
}},
681 @InProceedings
{hybrid
-mix
,
682 author = {M. Ohkubo and M. Abe
},
683 title = {A
{L
}ength
-{I
}nvariant
{H
}ybrid
{MIX
}},
684 booktitle = {Advances in Cryptology
- {ASIACRYPT
} 2000},
686 publisher = {Springer
-Verlag
, LNCS
1976},
689 @InProceedings
{PShuffle
,
690 author = {Jun Furukawa and Kazue Sako
},
691 title = {An Efficient Scheme for Proving a Shuffle
},
692 editor = {Joe Kilian
},
693 booktitle = {CRYPTO
2001},
695 publisher = {Springer
-Verlag
, LNCS
2139},
699 @InProceedings
{jakobsson
-optimally
,
700 author = "Markus Jakobsson and Ari Juels"
,
701 title = "An Optimally Robust Hybrid Mix Network
(Extended Abstract
)"
,
702 booktitle = {Principles of Distributed Computing
- {PODC
} '
01},
704 publisher = {ACM Press
},
705 note = {\url
{http
://citeseer.nj.nec.com
/492015.html
}},
708 @InProceedings
{kesdogan
,
709 author = {D. Kesdogan and M. Egner and T. B\"uschkes
},
710 title = {Stop
-and
-Go
{MIX
}es Providing Probabilistic Anonymity in an Open
712 booktitle = {Information Hiding
(IH
1998)},
714 publisher = {Springer
-Verlag
, LNCS
1525},
716 %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
718 @InProceedings
{socks4
,
719 author = {David Koblas and Michelle R. Koblas
},
721 booktitle = {UNIX Security III Symposium
(1992 USENIX Security
725 publisher = {USENIX
},
728 @InProceedings
{flash
-mix
,
729 author = {Markus Jakobsson
},
730 title = {Flash
{M
}ixing
},
731 booktitle = {Principles of Distributed Computing
- {PODC
} '
99},
733 publisher = {ACM Press
},
734 note = {\newline \url
{http
://citeseer.nj.nec.com
/jakobsson99flash.html
}},
738 author = {Joe Kilian and Kazue Sako
},
739 title = {Receipt
-Free
{MIX
}-Type Voting Scheme
- A Practical Solution to
740 the Implementation of a Voting Booth
},
741 booktitle = {EUROCRYPT '
95},
743 publisher = {Springer
-Verlag
},
747 author = {M. Bellare and P. Rogaway
},
749 booktitle = {EUROCRYPT '
94},
750 title = {Optimal
{A
}symmetric
{E
}ncryption
{P
}adding
: How To Encrypt With
752 publisher = {Springer
-Verlag
},
753 note = {\newline \url
{http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/oaep.html
}},
755 @inproceedings
{babel
,
756 title = {Mixing
{E
}-mail With
{B
}abel
},
757 author = {Ceki G\"ulc\"u and Gene Tsudik
},
758 booktitle = {{Network and Distributed Security Symposium
(NDSS
96)}},
764 %note = {\url{http://citeseer.nj.nec.com/2254.html}},
768 title = {Selective Denial of Service Attacks
},
769 note = {\newline \url
{http
://www.eff.org
/pub
/Privacy
/Anonymity
/1999\_09\_DoS\_remail\_vuln.html
}},
772 @Article
{remailer
-history
,
773 author = {Sameer Parekh
},
774 title = {Prospects for Remailers
},
775 journal = {First Monday
},
780 note = {\url
{http
://www.firstmonday.dk
/issues
/issue2
/remailers
/}},
784 author = {David Chaum
},
785 title = {Untraceable electronic mail
, return addresses
, and digital pseudo
-nyms
},
786 journal = {Communications of the ACM
},
792 %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
794 @InProceedings
{nym
-alias
-net
,
795 author = {David Mazi\`
{e
}res and M. Frans Kaashoek
},
796 title = {{The Design
, Implementation and Operation of an Email
798 booktitle = {$
5^
{th
}$ ACM Conference on Computer and
799 Communications Security
(CCS'
98)},
801 publisher = {ACM Press
},
803 %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
805 @InProceedings
{tangler
,
806 author = {Marc Waldman and David Mazi\`
{e
}res
},
807 title = {Tangler
: A Censorship
-Resistant Publishing System
808 Based on Document Entanglements
},
809 booktitle = {$
8^
{th
}$ ACM Conference on Computer and
810 Communications Security
(CCS
-8)},
813 publisher = {ACM Press
},
815 %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
819 title = {Payment mixes for anonymity
},
820 howpublished = {E
-mail archived at
821 \url
{http
://\newline www.inet
-one.com
/cypherpunks
/dir
.2000.02.28-2000.03.05/msg00334.html
}},
825 author = {J. Helsingius
},
826 title = {{\tt anon.penet.fi
} press release
},
827 note = {\newline \url
{http
://www.penet.fi
/press
-english.html
}},
830 @InProceedings
{garay97secure
,
831 author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin
},
832 title = {Secure distributed storage and retrieval
},
833 booktitle = {11th International Workshop
, WDAG '
97},
836 publisher = {Springer
-Verlag
, LNCS
1320},
837 note = {\newline \url
{http
://citeseer.nj.nec.com
/garay97secure.html
}},
841 author = {C. Park and K. Itoh and K. Kurosawa
},
842 title = {Efficient anonymous channel and all
/nothing election scheme
},
843 booktitle = {Advances in Cryptology
-- {EUROCRYPT
} '
93},
845 publisher = {Springer
-Verlag
, LNCS
765},
850 title = {{PGP
} {FAQ
}},
851 note = {\newline \url
{http
://www.faqs.org
/faqs
/pgp
-faq
/}},
854 @Article
{riordan
-schneier
,
855 author = {James Riordan and Bruce Schneier
},
856 title = {A Certified E
-mail Protocol with No Trusted Third Party
},
857 journal = {13th Annual Computer Security Applications Conference
},
860 note = {\newline \url
{http
://www.counterpane.com
/certified
-email.html
}},
864 @Article
{crowds
-tissec
,
865 author = {Michael K. Reiter and Aviel D. Rubin
},
866 title = {Crowds
: Anonymity for Web Transactions
},
867 journal = {ACM TISSEC
},
874 %note = {\url{http://citeseer.nj.nec.com/284739.html}}
876 @Article
{crowds
-dimacs
,
877 author = {Michael K. Reiter and Aviel D. Rubin
},
878 title = {Crowds
: Anonymity for Web Transactions
},
879 journal = {{DIMACS
} Technical Report
(Revised
)},
887 author = {Raph Levien
},
888 title = {Advogato's Trust Metric
},
889 note = {\newline \url
{http
://www.advogato.org
/trust
-metric.html
}},
892 @InProceedings
{publius
,
893 author = {Marc Waldman and Aviel Rubin and Lorrie Cranor
},
894 title = {Publius
: {A
} robust
, tamper
-evident
, censorship
-resistant and
895 source
-anonymous web publishing system
},
896 booktitle = {Proc.
9th USENIX Security Symposium
},
901 %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
904 author = {Russell Samuels
},
905 title = {Untraceable Nym Creation on the
{F
}reedom
{N
}etwork
},
909 note = {\newline \url
{http
://www.freedom.net
/products
/whitepapers
/white11.html
}},
912 @techreport
{freedom2
-arch
,
913 title = {Freedom Systems
2.0 Architecture
},
914 author = {Philippe Boucher and Adam Shostack and Ian Goldberg
},
915 institution = {Zero Knowledge Systems
, {Inc.
}},
918 type = {White Paper
},
922 @techreport
{freedom21
-security
,
923 title = {Freedom Systems
2.1 Security Issues and Analysis
},
924 author = {Adam Back and Ian Goldberg and Adam Shostack
},
925 institution = {Zero Knowledge Systems
, {Inc.
}},
928 type = {White Paper
},
931 @inproceedings
{cfs
:sosp01
,
932 title = {Wide
-area cooperative storage with
{CFS
}},
933 author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
},
934 booktitle = {18th
{ACM
} {S
}ymposium on
{O
}perating
{S
}ystems
{P
}rinciples
({SOSP
} '
01)},
937 address = {Chateau Lake Louise
, Banff
, Canada
},
941 title = {Passive Attack Analysis for Connection
-Based Anonymity Systems
},
942 author = {Andrei Serjantov and Peter Sewell
},
943 booktitle = {Computer Security
-- ESORICS
2003},
944 publisher = {Springer
-Verlag
, LNCS
2808},
948 %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
951 author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway
},
952 title = {Relations Among Notions of Security for Public
-Key Encryption
955 Extended
abstract in
{\em Advances in Cryptology
- CRYPTO '
98}, LNCS Vol.
1462.
956 Springer
-Verlag
, 1998.
957 Full version available from \newline \url
{http
://www
-cse.ucsd.edu
/users
/mihir
/}},
961 @InProceedings
{mix
-acc
,
962 author = {Roger Dingledine and Michael J. Freedman and David
963 Hopwood and David Molnar
},
964 title = {{A Reputation System to Increase MIX
-net
966 booktitle = {Information Hiding
(IH
2001)},
969 editor = {Ira S. Moskowitz
},
970 publisher = {Springer
-Verlag
, LNCS
2137},
972 %note = {\url{http://www.freehaven.net/papers.html}},
974 @InProceedings
{casc
-rep
,
975 author = {Roger Dingledine and Paul Syverson
},
976 title = {{Reliable MIX Cascade Networks through Reputation
}},
977 booktitle = {Financial Cryptography
},
979 editor = {Matt Blaze
},
980 publisher = {Springer
-Verlag
, LNCS
2357},
982 %note = {\newline \url{http://www.freehaven.net/papers.html}},
984 @InProceedings
{zhou96certified
,
985 author = {Zhou and Gollmann
},
986 title = {Certified Electronic Mail
},
987 booktitle = {{ESORICS
: European Symposium on Research in Computer
989 publisher = {Springer
-Verlag
, LNCS
1146},
991 note = {\newline \url
{http
://citeseer.nj.nec.com
/zhou96certified.html
}},
995 author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
996 Birgit Pfitzmann and Michael Waidner
},
997 title = {{Real
-Time MIXes
: A Bandwidth
-Efficient Anonymity Protocol
}},
998 howpublished = {IEEE Journal on Selected Areas in Communications
, 1998.
},
999 note = {\url
{http
://www.zurich.ibm.com
/security
/publications
/1998.html
}},
1002 @InProceedings
{danezis
-pets03
,
1003 author = {George Danezis
},
1004 title = {Mix
-networks with Restricted Routes
},
1005 booktitle = {Privacy Enhancing Technologies
(PET
2003)},
1007 editor = {Roger Dingledine
},
1008 publisher = {Springer
-Verlag LNCS
2760}
1011 @InProceedings
{gap
-pets03
,
1012 author = {Krista Bennett and Christian Grothoff
},
1013 title = {{GAP
} -- practical anonymous networking
},
1014 booktitle = {Privacy Enhancing Technologies
(PET
2003)},
1016 editor = {Roger Dingledine
},
1017 publisher = {Springer
-Verlag LNCS
2760}
1020 @Article
{hordes
-jcs
,
1021 author = {Brian Neal Levine and Clay Shields
},
1022 title = {Hordes
: A Multicast
-Based Protocol for Anonymity
},
1023 journal = {Journal of Computer Security
},
1030 @TechReport
{herbivore
,
1031 author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"
{u
}n Sirer
},
1032 title = {Herbivore
: A Scalable and Efficient Protocol for Anonymous Communication
},
1033 institution = {Cornell University Computing and Information Science
},
1035 type = {Technical Report
},
1036 number = {TR2003
-1890},
1041 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan
},
1042 title = {$P^
5$
: A Protocol for Scalable Anonymous Communication
},
1043 booktitle = {IEEE Symposium on Security and Privacy
},
1046 publisher = {IEEE CS
}
1049 @phdthesis
{ian
-thesis
,
1050 title = {A Pseudonymous Communications Infrastructure for the Internet
},
1051 author = {Ian Goldberg
},
1052 school = {UC Berkeley
},
1058 author = {Ian Goldberg and David Wagner
},
1059 title = {TAZ Servers and the Rewebber Network
: Enabling
1060 Anonymous Publishing on the World Wide Web
},
1061 journal = {First Monday
},
1066 note = {\url
{http
://www.firstmonday.dk
/issues
/issue3_4
/goldberg
/}}
1069 @Misc
{tcp
-over
-tcp
-is
-bad
,
1070 key = {tcp
-over
-tcp
-is
-bad
},
1071 title = {Why
{TCP
} Over
{TCP
} Is A Bad Idea
},
1072 author = {Olaf Titz
},
1073 note = {\url
{http
://sites.inka.de
/sites
/bigred
/devel
/tcp
-tcp.html
}}
1076 @inproceedings
{wright02
,
1077 title = {An Analysis of the Degradation of Anonymous Protocols
},
1078 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields
},
1079 booktitle = {{Network and Distributed Security Symposium
(NDSS
02)}},
1085 @inproceedings
{wright03
,
1086 title = {Defending Anonymous Communication Against Passive Logging Attacks
},
1087 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields
},
1088 booktitle = {IEEE Symposium on Security and Privacy
},
1092 publisher = {IEEE CS
},
1096 @InProceedings
{attack
-tor
-oak05
,
1097 author = {Steven J. Murdoch and George Danezis
},
1098 title = {Low
-cost Traffic Analysis of Tor
},
1099 booktitle = {IEEE Symposium on Security and Privacy
},
1102 publisher = {IEEE CS
}
1106 author={{The AN.ON Project
}},
1107 howpublished={Press release
},
1110 title={German Police proceeds against anonymity service
},
1111 note={\url
{http
://www.datenschutzzentrum.de
/material
/themen
/presse
/anon
-bka_e.htm
}}
1115 title = {Using Caching for Browsing Anonymity
},
1116 author = {Anna Shubina and Sean Smith
},
1117 journal = {ACM SIGEcom Exchanges
},
1122 www_pdf_url
= {http
://www.acm.org
/sigs
/sigecom
/exchanges
/volume_4_
(03)/4.2-Shubina.pdf
},
1123 www_section
= {Anonymous communication
},
1126 @inproceedings
{tor
-design
,
1127 title = {Tor
: The Second
-Generation Onion Router
},
1128 author = {Roger Dingledine and Nick Mathewson and Paul Syverson
},
1129 booktitle = {Proceedings of the
13th USENIX Security Symposium
},
1132 note = {\url
{http
://tor.eff.org
/tor
-design.pdf
}}
1135 @inproceedings
{flow
-correlation04
,
1136 title = {On Flow Correlation Attacks and Countermeasures in Mix Networks
},
1137 author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao
},
1138 booktitle = {Proceedings of Privacy Enhancing Technologies workshop
(PET
2004)},
1142 note = {\url
{http
://students.cs.tamu.edu
/xinwenfu
/paper
/PET04.pdf
}},
1145 @InProceedings
{danezis
-pet2004
,
1146 author = "George Danezis"
,
1147 title = "The Traffic Analysis of Continuous
-Time Mixes"
,
1148 booktitle= {Privacy Enhancing Technologies
(PET
2004)},
1149 editor = {David Martin and Andrei Serjantov
},
1153 note = {\url
{http
://www.cl.cam.ac.uk
/users
/gd216
/cmm2.pdf
}},
1156 @inproceedings
{feamster
:wpes2004
,
1157 title = {Location Diversity in Anonymity Networks
},
1158 author = {Nick Feamster and Roger Dingledine
},
1159 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society
(WPES
2004)}},
1162 address = {Washington
, DC
, USA
},
1163 note = {\url
{http
://freehaven.net
/doc
/routing
-zones
/routing
-zones.ps
}},
1166 @inproceedings
{koepsell
:wpes2004
,
1167 title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
},
1168 author = {Stefan K\"opsell and Ulf Hilling
},
1169 booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society
(WPES
2004)}},
1172 address = {Washington
, DC
, USA
},
1173 note = {\url
{http
://freehaven.net
/anonbib
/papers
/p103
-koepsell.pdf
}},
1176 @inproceedings
{sync
-batching
,
1177 title = {Synchronous Batching
: From Cascades to Free Routes
},
1178 author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson
},
1179 booktitle = {Proceedings of Privacy Enhancing Technologies workshop
(PET
2004)},
1180 editor = {David Martin and Andrei Serjantov
},
1184 note = {\url
{http
://freehaven.net
/doc
/sync
-batching
/sync
-batching.pdf
}},
1187 @InProceedings
{e2e
-traffic
,
1188 author = "Nick Mathewson and Roger Dingledine"
,
1189 title = "Practical Traffic Analysis
: Extending and Resisting Statistical Disclosure"
,
1190 booktitle= {Privacy Enhancing Technologies
(PET
2004)},
1191 editor = {David Martin and Andrei Serjantov
},
1195 note = {\url
{http
://freehaven.net
/doc
/e2e
-traffic
/e2e
-traffic.pdf
}},
1199 author = {E. Rescorla and N. Modadugu
},
1200 title = {{Datagram Transport Layer Security
}},
1201 howpublished = {IETF Draft
},
1204 note = {\url
{http
://www.ietf.org
/internet
-drafts
/draft
-rescorla
-dtls
-02.txt
}},
1207 @InProceedings
{usability
-network
-effect
,
1208 author={Roger Dingledine and Nick Mathewson
},
1209 title={Anonymity Loves Company
: Usability and the Network Effect
},
1210 booktitle = {Designing Security Systems That People Can Use
},
1212 publisher = {O'Reilly Media
},
1217 title = {{The Six
/Four System
}},
1218 note = {\url
{http
://sourceforge.net
/projects
/sixfour
/}}
1221 %%% Local Variables:
1223 %%% TeX-master: "tor-design"