|  | @@ -1,8 +1,50 @@
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +@inproceedings{kesdogan:pet2002,
 | 
	
		
			
				|  |  | +  title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
 | 
	
		
			
				|  |  | +        alternative to the MIX based Approach?}, 
 | 
	
		
			
				|  |  | +  author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, 
 | 
	
		
			
				|  |  | +  booktitle = {Privacy Enhancing Technologies (PET 2002)},
 | 
	
		
			
				|  |  | +  year = {2002}, 
 | 
	
		
			
				|  |  | +  month = {April}, 
 | 
	
		
			
				|  |  | +  editor = {Roger Dingledine and Paul Syverson}, 
 | 
	
		
			
				|  |  | +  publisher = {Springer-Verlag, LNCS 2482}, 
 | 
	
		
			
				|  |  | +}
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +@inproceedings{statistical-disclosure,
 | 
	
		
			
				|  |  | +  title = {Statistical Disclosure Attacks}, 
 | 
	
		
			
				|  |  | +  author = {George Danezis}, 
 | 
	
		
			
				|  |  | +  booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})}, 
 | 
	
		
			
				|  |  | +  organization = {{IFIP TC11}}, 
 | 
	
		
			
				|  |  | +  year = {2003}, 
 | 
	
		
			
				|  |  | +  month = {May}, 
 | 
	
		
			
				|  |  | +  address = {Athens}, 
 | 
	
		
			
				|  |  | +  pages = {421--426}, 
 | 
	
		
			
				|  |  | +  publisher = {Kluwer}, 
 | 
	
		
			
				|  |  | +}
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +@inproceedings{limits-open,
 | 
	
		
			
				|  |  | +  title = {Limits of Anonymity in Open Environments}, 
 | 
	
		
			
				|  |  | +  author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, 
 | 
	
		
			
				|  |  | +  booktitle = {Information Hiding Workshop (IH 2002)}, 
 | 
	
		
			
				|  |  | +  year = {2002}, 
 | 
	
		
			
				|  |  | +  month = {October}, 
 | 
	
		
			
				|  |  | +  editor = {Fabien Petitcolas}, 
 | 
	
		
			
				|  |  | +  publisher = {Springer-Verlag, LNCS 2578}, 
 | 
	
		
			
				|  |  | +}
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +@inproceedings{isdn-mixes,
 | 
	
		
			
				|  |  | +  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, 
 | 
	
		
			
				|  |  | +  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, 
 | 
	
		
			
				|  |  | +  booktitle = {GI/ITG Conference on Communication in Distributed Systems}, 
 | 
	
		
			
				|  |  | +  year = {1991}, 
 | 
	
		
			
				|  |  | +  month = {February}, 
 | 
	
		
			
				|  |  | +  pages = {451-463}, 
 | 
	
		
			
				|  |  | +}
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  @inproceedings{tarzan:ccs02,
 | 
	
		
			
				|  |  |    title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, 
 | 
	
		
			
				|  |  |    author = {Michael J. Freedman and Robert Morris}, 
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of the 9th {ACM} {C}onference on {C}omputer and {C}ommunications
 | 
	
		
			
				|  |  | +  booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
 | 
	
		
			
				|  |  |          {S}ecurity ({CCS 2002})}, 
 | 
	
		
			
				|  |  |    year = {2002}, 
 | 
	
		
			
				|  |  |    month = {November}, 
 | 
	
	
		
			
				|  | @@ -12,7 +54,7 @@
 | 
	
		
			
				|  |  |  @inproceedings{cebolla,
 | 
	
		
			
				|  |  |    title = {{Cebolla: Pragmatic IP Anonymity}}, 
 | 
	
		
			
				|  |  |    author = {Zach Brown}, 
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, 
 | 
	
		
			
				|  |  | +  booktitle = {Ottawa Linux Symposium}, 
 | 
	
		
			
				|  |  |    year = {2002}, 
 | 
	
		
			
				|  |  |    month = {June}, 
 | 
	
		
			
				|  |  |  }
 | 
	
	
		
			
				|  | @@ -43,11 +85,11 @@
 | 
	
		
			
				|  |  |    note =         {\url{http://www.privoxy.org/}}
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -@inproceedings{RRMPH02-1,
 | 
	
		
			
				|  |  | +@inproceedings{anonnet,
 | 
	
		
			
				|  |  |    title = {{Analysis of an Anonymity Network for Web Browsing}}, 
 | 
	
		
			
				|  |  |    author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
 | 
	
		
			
				|  |  |          David Hutchison}, 
 | 
	
		
			
				|  |  | -  booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
 | 
	
		
			
				|  |  | +  booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
 | 
	
		
			
				|  |  |          2002)}}, 
 | 
	
		
			
				|  |  |    year = {2002}, 
 | 
	
		
			
				|  |  |    month = {June}, 
 | 
	
	
		
			
				|  | @@ -55,34 +97,27 @@
 | 
	
		
			
				|  |  |    pages = {49--54}, 
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -@Misc{anonnet,
 | 
	
		
			
				|  |  | -  key =          {anonnet},
 | 
	
		
			
				|  |  | -  title =        {{AnonNet}},
 | 
	
		
			
				|  |  | -  note =         {\url{http://www.authnet.org/anonnet/}}
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -% can somebody track down the rest of this? -RD
 | 
	
		
			
				|  |  | -@Misc{castro-liskov,
 | 
	
		
			
				|  |  | +@inproceedings{castro-liskov,
 | 
	
		
			
				|  |  |     author = {Miguel Castro and Barbara Liskov}, 
 | 
	
		
			
				|  |  |     title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
 | 
	
		
			
				|  |  | -   howpublished = {
 | 
	
		
			
				|  |  | -     $<$http://www.pmg.lcs.mit.edu/$\tilde{\hspace{5pt}}$castro/application/recovery.pdf$>$},
 | 
	
		
			
				|  |  | +   booktitle = {Fourth Symposium on Operating Systems Design and Implementation},
 | 
	
		
			
				|  |  | +   month = {October},
 | 
	
		
			
				|  |  | +   year = {2000},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @inproceedings{econymics,
 | 
	
		
			
				|  |  |    title = {On the Economics of Anonymity}, 
 | 
	
		
			
				|  |  |    author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}, 
 | 
	
		
			
				|  |  | -  booktitle = {Financial Cryptography, FC 2003}, 
 | 
	
		
			
				|  |  | +  booktitle = {Financial Cryptography}, 
 | 
	
		
			
				|  |  |    year = {2003}, 
 | 
	
		
			
				|  |  |    editor = {Rebecca N. Wright}, 
 | 
	
		
			
				|  |  |    publisher = {Springer-Verlag, LNCS 2742}, 
 | 
	
		
			
				|  |  | -  note = {\url{http://freehaven.net/doc/fc03/econymics.pdf}}, 
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @inproceedings{defensive-dropping,
 | 
	
		
			
				|  |  |    title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
 | 
	
		
			
				|  |  |    author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
 | 
	
		
			
				|  |  | -  booktitle = {Financial Cryptography, FC 2004},
 | 
	
		
			
				|  |  | +  booktitle = {Financial Cryptography},
 | 
	
		
			
				|  |  |    year = {2004}, 
 | 
	
		
			
				|  |  |    editor = {Ari Juels},
 | 
	
		
			
				|  |  |    publisher = {Springer-Verlag, LNCS (forthcoming)}, 
 | 
	
	
		
			
				|  | @@ -91,7 +126,7 @@
 | 
	
		
			
				|  |  |  @inproceedings{morphmix:fc04,
 | 
	
		
			
				|  |  |    title = {Practical Anonymity for the Masses with MorphMix},
 | 
	
		
			
				|  |  |    author = {Marc Rennhard and Bernhard Plattner},
 | 
	
		
			
				|  |  | -  booktitle = {Financial Cryptography, FC 2004},
 | 
	
		
			
				|  |  | +  booktitle = {Financial Cryptography},
 | 
	
		
			
				|  |  |    year = {2004}, 
 | 
	
		
			
				|  |  |    editor = {Ari Juels},
 | 
	
		
			
				|  |  |    publisher = {Springer-Verlag, LNCS (forthcoming)}, 
 | 
	
	
		
			
				|  | @@ -100,10 +135,10 @@
 | 
	
		
			
				|  |  |  @inproceedings{eternity,
 | 
	
		
			
				|  |  |    title = {The Eternity Service}, 
 | 
	
		
			
				|  |  |    author = {Ross Anderson}, 
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of Pragocrypt '96}, 
 | 
	
		
			
				|  |  | +  booktitle = {Pragocrypt '96}, 
 | 
	
		
			
				|  |  |    year = {1996}, 
 | 
	
		
			
				|  |  | -  note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}}, 
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}}, 
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @inproceedings{minion-design,
 | 
	
	
		
			
				|  | @@ -114,10 +149,8 @@
 | 
	
		
			
				|  |  |    month = {May},
 | 
	
		
			
				|  |  |    publisher = {IEEE CS},
 | 
	
		
			
				|  |  |    pages = {2--15}, 
 | 
	
		
			
				|  |  | -  note = {\url{http://mixminion.net/minion-design.pdf}}, 
 | 
	
		
			
				|  |  | -  www_important = {1}, 
 | 
	
		
			
				|  |  | -  www_section = {Anonymous communication}, 
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note = {\url{http://mixminion.net/minion-design.pdf}}, 
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @inproceedings{ rao-pseudonymity,
 | 
	
		
			
				|  |  |      author = "Josyula R. Rao and Pankaj Rohatgi",
 | 
	
	
		
			
				|  | @@ -127,9 +160,9 @@
 | 
	
		
			
				|  |  |      month = Aug,
 | 
	
		
			
				|  |  |      publisher = {USENIX},
 | 
	
		
			
				|  |  |      pages = "85--96",
 | 
	
		
			
				|  |  | -    note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
 | 
	
		
			
				|  |  | -full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +    %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
 | 
	
		
			
				|  |  | +%full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{pfitzmann90how,
 | 
	
		
			
				|  |  |      author = "Birgit Pfitzmann and Andreas Pfitzmann",
 | 
	
	
		
			
				|  | @@ -155,18 +188,6 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    year =         2003,
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -% Would a more recent reference for SPRPs be more useful?
 | 
	
		
			
				|  |  | -@Article{sprp,
 | 
	
		
			
				|  |  | -   author =      {Michael Luby and Charles Rackoff},
 | 
	
		
			
				|  |  | -   title =       {How to Construct Pseudorandom Permutations from
 | 
	
		
			
				|  |  | -                  Pseudorandom Functions},
 | 
	
		
			
				|  |  | -   journal =     {SIAM Journal on Computing},
 | 
	
		
			
				|  |  | -   year =        {1988},
 | 
	
		
			
				|  |  | -   volume =      {17},
 | 
	
		
			
				|  |  | -   number =      {2},
 | 
	
		
			
				|  |  | -   pages =       {373--386},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  |  @InProceedings{back01,
 | 
	
		
			
				|  |  |    author =       {Adam Back and Ulf M\"oller and Anton Stiglic},
 | 
	
		
			
				|  |  |    title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
 | 
	
	
		
			
				|  | @@ -175,8 +196,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    year =         2001,
 | 
	
		
			
				|  |  |    editor =       {Ira S. Moskowitz},
 | 
	
		
			
				|  |  |    publisher =    {Springer-Verlag, LNCS 2137},
 | 
	
		
			
				|  |  | -  note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{rackoff93cryptographic,
 | 
	
		
			
				|  |  |     author =      {Charles Rackoff and Daniel R. Simon},
 | 
	
	
		
			
				|  | @@ -184,8 +205,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     booktitle =   {{ACM} Symposium on Theory of Computing},
 | 
	
		
			
				|  |  |     pages =       {672--681},
 | 
	
		
			
				|  |  |     year =        {1993},
 | 
	
		
			
				|  |  | -   note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{freehaven-berk,
 | 
	
		
			
				|  |  |     author =      {Roger Dingledine and Michael J. Freedman and David Molnar},
 | 
	
	
		
			
				|  | @@ -196,8 +217,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     month =       {July},
 | 
	
		
			
				|  |  |     editor =      {H. Federrath},
 | 
	
		
			
				|  |  |     publisher =   {Springer-Verlag, LNCS 2009},
 | 
	
		
			
				|  |  | -   note =        {\url{http://freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\url{http://freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{raymond00,
 | 
	
		
			
				|  |  |    author =       {J. F. Raymond},
 | 
	
	
		
			
				|  | @@ -240,8 +261,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     publisher =   {IEEE CS Press},
 | 
	
		
			
				|  |  |     pages =       {34--40},
 | 
	
		
			
				|  |  |     volume =      {1},
 | 
	
		
			
				|  |  | -   note =        {\newline \url{http://www.onion-router.net/Publications.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\newline \url{http://www.onion-router.net/Publications.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Inproceedings{or-pet00,
 | 
	
		
			
				|  |  |    title =        {{Towards an Analysis of Onion Routing Security}},
 | 
	
	
		
			
				|  | @@ -254,8 +275,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    pages =        {96--114},
 | 
	
		
			
				|  |  |    editor =       {H. Federrath},
 | 
	
		
			
				|  |  |    publisher =    {Springer-Verlag, LNCS 2009},
 | 
	
		
			
				|  |  | -  note =         {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Inproceedings{freenet-pets00,
 | 
	
		
			
				|  |  |    title =        {Freenet: A Distributed Anonymous Information Storage
 | 
	
	
		
			
				|  | @@ -269,9 +290,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    pages =        {46--66},
 | 
	
		
			
				|  |  |    editor =       {H. Federrath},
 | 
	
		
			
				|  |  |    publisher =    {Springer-Verlag, LNCS 2009},
 | 
	
		
			
				|  |  | -  note =         {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | +  %note =         {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{or-ih96,
 | 
	
		
			
				|  |  |    author =       {David M. Goldschlag and Michael G. Reed and Paul
 | 
	
	
		
			
				|  | @@ -283,8 +303,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    editor =       {R. Anderson},
 | 
	
		
			
				|  |  |    month =        {May},
 | 
	
		
			
				|  |  |    publisher =    {Springer-Verlag, LNCS 1174},
 | 
	
		
			
				|  |  | -  note =         {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Article{or-jsac98,
 | 
	
		
			
				|  |  |    author =       {Michael G. Reed and Paul F. Syverson and David
 | 
	
	
		
			
				|  | @@ -296,8 +316,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    number =       4,
 | 
	
		
			
				|  |  |    pages =        {482--494},
 | 
	
		
			
				|  |  |    month =        {May},
 | 
	
		
			
				|  |  | -  note =         {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Misc{TLS,
 | 
	
		
			
				|  |  |     author =      {T. Dierks and C. Allen},
 | 
	
	
		
			
				|  | @@ -357,9 +377,9 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     editor =      {P. Samarati},
 | 
	
		
			
				|  |  |     month =       {November},
 | 
	
		
			
				|  |  |     publisher =   {ACM Press},
 | 
	
		
			
				|  |  | -   note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/
 | 
	
		
			
				|  |  | -                       technicaldocs/shuffle.pdf}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/
 | 
	
		
			
				|  |  | +   %                    technicaldocs/shuffle.pdf}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{dolev91,
 | 
	
		
			
				|  |  |     author =      {Danny Dolev and Cynthia Dwork and Moni Naor},
 | 
	
	
		
			
				|  | @@ -390,7 +410,7 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     editor =       {H. Federrath},
 | 
	
		
			
				|  |  |     publisher =    {Springer-Verlag, LNCS 2009},
 | 
	
		
			
				|  |  |     pages =       {115--129},
 | 
	
		
			
				|  |  | -   year =        2000,
 | 
	
		
			
				|  |  | +   year =        {2000},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{disad-free-routes,
 | 
	
	
		
			
				|  | @@ -403,9 +423,9 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     year =        2000,
 | 
	
		
			
				|  |  |     editor =       {H. Federrath},
 | 
	
		
			
				|  |  |     publisher =    {Springer-Verlag, LNCS 2009},
 | 
	
		
			
				|  |  | -   note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
 | 
	
		
			
				|  |  | -                       disadvantages_berthold.pdf}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
 | 
	
		
			
				|  |  | +   %                    disadvantages_berthold.pdf}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{boneh00,
 | 
	
		
			
				|  |  |     author =      {Dan Boneh and Moni Naor},
 | 
	
	
		
			
				|  | @@ -421,7 +441,7 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     author =      {David M. Goldschlag and Stuart G. Stubblebine},
 | 
	
		
			
				|  |  |     title =       {Publicly Verifiable Lotteries: Applications of
 | 
	
		
			
				|  |  |                    Delaying Functions},
 | 
	
		
			
				|  |  | -   booktitle =   {Financial Cryptography, FC'98},
 | 
	
		
			
				|  |  | +   booktitle =   {Financial Cryptography},
 | 
	
		
			
				|  |  |     pages =       {214--226},
 | 
	
		
			
				|  |  |     year =        1998,
 | 
	
		
			
				|  |  |     publisher =   {Springer-Verlag, LNCS 1465},
 | 
	
	
		
			
				|  | @@ -483,16 +503,6 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     note =        {\url{http://www.abditum.com/mixmaster-spec.txt}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -@Article{mitzenm-loss,
 | 
	
		
			
				|  |  | -   author =      {G. Louth and M. Mitzenmacher and F.P. Kelly},
 | 
	
		
			
				|  |  | -   title =       {Computational Complexity of Loss Networks},
 | 
	
		
			
				|  |  | -   journal =     {Theoretical Computer Science},
 | 
	
		
			
				|  |  | -   year =        {1994},
 | 
	
		
			
				|  |  | -   volume =      {125},
 | 
	
		
			
				|  |  | -   pages =       {45-59},
 | 
	
		
			
				|  |  | -   note =        {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  |  @Misc{hashcash,
 | 
	
		
			
				|  |  |     author =      {Adam Back},
 | 
	
		
			
				|  |  |     title =       {Hash cash},
 | 
	
	
		
			
				|  | @@ -588,10 +598,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     booktitle =   {Information Hiding (IH 1998)},
 | 
	
		
			
				|  |  |     year =        {1998},
 | 
	
		
			
				|  |  |     publisher =   {Springer-Verlag, LNCS 1525},
 | 
	
		
			
				|  |  | -   note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | +   %note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{socks4,
 | 
	
		
			
				|  |  |    author =       {David Koblas and Michelle R. Koblas},
 | 
	
	
		
			
				|  | @@ -633,25 +641,13 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  @inproceedings{babel,
 | 
	
		
			
				|  |  |    title = {Mixing {E}-mail With {B}abel}, 
 | 
	
		
			
				|  |  |    author = {Ceki G\"ulc\"u and Gene Tsudik}, 
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96}, 
 | 
	
		
			
				|  |  | +  booktitle = {{Network and Distributed Security Symposium (NDSS 96)}}, 
 | 
	
		
			
				|  |  |    year = 1996, 
 | 
	
		
			
				|  |  |    month = {February}, 
 | 
	
		
			
				|  |  |    pages = {2--16}, 
 | 
	
		
			
				|  |  |    publisher = {IEEE}, 
 | 
	
		
			
				|  |  | -  www_important = 1, 
 | 
	
		
			
				|  |  | -  note = {\url{http://citeseer.nj.nec.com/2254.html}}, 
 | 
	
		
			
				|  |  | -  www_section = {Anonymous communication}, 
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -@InProceedings{freenet,
 | 
	
		
			
				|  |  | -   author =      {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
 | 
	
		
			
				|  |  | -   title =       {Freenet: {A} Distributed Anonymous Information Storage and Retrieval 
 | 
	
		
			
				|  |  | -                  System},
 | 
	
		
			
				|  |  | -   booktitle =   {Workshop on Design Issues in Anonymity and Unobservability},
 | 
	
		
			
				|  |  | -   pages =       {46--66},
 | 
	
		
			
				|  |  | -   year =        {2000},
 | 
	
		
			
				|  |  | -   note =        {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note = {\url{http://citeseer.nj.nec.com/2254.html}}, 
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Misc{rprocess,
 | 
	
		
			
				|  |  |     author =      {RProcess},
 | 
	
	
		
			
				|  | @@ -678,8 +674,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     volume =      {4},
 | 
	
		
			
				|  |  |     number =      {2},
 | 
	
		
			
				|  |  |     month =       {February},
 | 
	
		
			
				|  |  | -   note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{nym-alias-net,
 | 
	
		
			
				|  |  |    author =       {David Mazi\`{e}res and M. Frans Kaashoek}, 
 | 
	
	
		
			
				|  | @@ -689,10 +685,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |                    Communications Security (CCS'98)},
 | 
	
		
			
				|  |  |    year =         1998,
 | 
	
		
			
				|  |  |    publisher =    {ACM Press},
 | 
	
		
			
				|  |  | -  note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | +  %note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{tangler,
 | 
	
		
			
				|  |  |    author =       {Marc Waldman and David Mazi\`{e}res},
 | 
	
	
		
			
				|  | @@ -703,8 +697,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    pages =        {86--135},
 | 
	
		
			
				|  |  |    year =         2001,
 | 
	
		
			
				|  |  |    publisher =    {ACM Press},
 | 
	
		
			
				|  |  | -  note =         {\url{http://www.scs.cs.nyu.edu/~dm/}}
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\url{http://www.scs.cs.nyu.edu/~dm/}}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @misc{neochaum,
 | 
	
		
			
				|  |  |     author =      {Tim May},
 | 
	
	
		
			
				|  | @@ -762,8 +756,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    number =       1,
 | 
	
		
			
				|  |  |    pages =        {66--92},
 | 
	
		
			
				|  |  |    month =        {November},
 | 
	
		
			
				|  |  | -  note =         {\url{http://citeseer.nj.nec.com/284739.html}}
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =         {\url{http://citeseer.nj.nec.com/284739.html}}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Article{crowds-dimacs,
 | 
	
		
			
				|  |  |     author =      {Michael K. Reiter and Aviel D. Rubin},
 | 
	
	
		
			
				|  | @@ -789,8 +783,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     pages =       {59--72},
 | 
	
		
			
				|  |  |     year =        {2000},
 | 
	
		
			
				|  |  |     month =       {August},
 | 
	
		
			
				|  |  | -   note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +   %note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Misc{freedom-nyms,
 | 
	
		
			
				|  |  |     author =      {Russell Samuels},
 | 
	
	
		
			
				|  | @@ -823,7 +817,7 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  @inproceedings{cfs:sosp01,
 | 
	
		
			
				|  |  |    title = {Wide-area cooperative storage with {CFS}},
 | 
	
		
			
				|  |  |    author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of the 18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
 | 
	
		
			
				|  |  | +  booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
 | 
	
		
			
				|  |  |    year = {2001},
 | 
	
		
			
				|  |  |    month = {October},
 | 
	
		
			
				|  |  |    address = {Chateau Lake Louise, Banff, Canada},
 | 
	
	
		
			
				|  | @@ -836,27 +830,8 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    publisher =   {Springer-Verlag, LNCS (forthcoming)},
 | 
	
		
			
				|  |  |    year = {2003}, 
 | 
	
		
			
				|  |  |    month = {October}, 
 | 
	
		
			
				|  |  | -  note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -@Article{raghavan87randomized,
 | 
	
		
			
				|  |  | -   author =      {P. Raghavan and C. Thompson},
 | 
	
		
			
				|  |  | -   title =       {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
 | 
	
		
			
				|  |  | -   journal =     {Combinatorica},
 | 
	
		
			
				|  |  | -   volume =      {7},
 | 
	
		
			
				|  |  | -   pages =       {365--374},
 | 
	
		
			
				|  |  | -   year =        {1987},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -@InProceedings{leighton91fast,
 | 
	
		
			
				|  |  | -   author =      {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
 | 
	
		
			
				|  |  | -                  Clifford Stein and Eva Tardos and Spyros Tragoudas},
 | 
	
		
			
				|  |  | -   title =       {Fast Approximation Algorithms for Multicommodity Flow Problems},
 | 
	
		
			
				|  |  | -   booktitle =   {{ACM} Symposium on Theory of Computing},
 | 
	
		
			
				|  |  | -   pages =       {101-111},
 | 
	
		
			
				|  |  | -   year =        {1991},
 | 
	
		
			
				|  |  | -   note =        {\newline \url{http://citeseer.nj.nec.com/91073.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @Misc{pk-relations,
 | 
	
		
			
				|  |  |     author =      {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
 | 
	
	
		
			
				|  | @@ -879,18 +854,18 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |    year =        2001,
 | 
	
		
			
				|  |  |    editor =      {Ira S. Moskowitz},
 | 
	
		
			
				|  |  |    publisher =   {Springer-Verlag, LNCS 2137},
 | 
	
		
			
				|  |  | -  note =        {\url{http://www.freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =        {\url{http://www.freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{casc-rep,
 | 
	
		
			
				|  |  |     author =      {Roger Dingledine and Paul Syverson},
 | 
	
		
			
				|  |  |     title =       {{Reliable MIX Cascade Networks through Reputation}},
 | 
	
		
			
				|  |  | -  booktitle =    {Financial Cryptography (FC '02)},
 | 
	
		
			
				|  |  | +  booktitle =    {Financial Cryptography},
 | 
	
		
			
				|  |  |    year =         2002,
 | 
	
		
			
				|  |  |    editor =       {Matt Blaze},
 | 
	
		
			
				|  |  |    publisher =    {Springer-Verlag, LNCS 2357},
 | 
	
		
			
				|  |  | -  note =        {\newline \url{http://www.freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | +  %note =        {\newline \url{http://www.freehaven.net/papers.html}},
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  @InProceedings{zhou96certified,
 | 
	
		
			
				|  |  |     author =      {Zhou and Gollmann},
 | 
	
	
		
			
				|  | @@ -910,22 +885,6 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |     note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -@InProceedings{BEAR-LIONESS,
 | 
	
		
			
				|  |  | -    author =     {Ross Anderson and Eli Biham},
 | 
	
		
			
				|  |  | -    title =      {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
 | 
	
		
			
				|  |  | -    booktitle =  {International Workshop on Fast Software Encryption},
 | 
	
		
			
				|  |  | -    year =       {1996},
 | 
	
		
			
				|  |  | -    publisher =  {Springer-Verlag},
 | 
	
		
			
				|  |  | -    note =       {\url{http://citeseer.nj.nec.com/anderson96two.html}},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -@Misc{SPC,
 | 
	
		
			
				|  |  | -    author =     {Daniel Bleichenbacher and Anand Desai},
 | 
	
		
			
				|  |  | -    title =      {A Construction of a Super-Pseudorandom Cipher},
 | 
	
		
			
				|  |  | -    howpublished = {Manuscript},
 | 
	
		
			
				|  |  | -}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  |  @InProceedings{danezis-pets03,
 | 
	
		
			
				|  |  |    author =       {George Danezis},
 | 
	
		
			
				|  |  |    title =        {Mix-networks with Restricted Routes},
 | 
	
	
		
			
				|  | @@ -1003,7 +962,7 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  @inproceedings{wright02,
 | 
	
		
			
				|  |  |    title = {An Analysis of the Degradation of Anonymous Protocols}, 
 | 
	
		
			
				|  |  |    author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, 
 | 
	
		
			
				|  |  | -  booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02}, 
 | 
	
		
			
				|  |  | +  booktitle = {{Network and Distributed Security Symposium (NDSS 02)}}, 
 | 
	
		
			
				|  |  |    year = {2002}, 
 | 
	
		
			
				|  |  |    month = {February}, 
 | 
	
		
			
				|  |  |    publisher = {IEEE}, 
 | 
	
	
		
			
				|  | @@ -1012,7 +971,7 @@ full_papers/rao/rao.pdf}},
 | 
	
		
			
				|  |  |  @inproceedings{wright03,
 | 
	
		
			
				|  |  |    title = {Defending Anonymous Communication Against Passive Logging Attacks}, 
 | 
	
		
			
				|  |  |    author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, 
 | 
	
		
			
				|  |  | -  booktitle = {2003 IEEE Symposium on Security and Privacy}, 
 | 
	
		
			
				|  |  | +  booktitle = {IEEE Symposium on Security and Privacy}, 
 | 
	
		
			
				|  |  |    pages= {28--41},
 | 
	
		
			
				|  |  |    year = {2003}, 
 | 
	
		
			
				|  |  |    month = {May}, 
 |