| 
					
				 | 
			
			
				@@ -18,44 +18,44 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{kesdogan:pet2002, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-        alternative to the MIX based Approach?},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+        alternative to the MIX based Approach?}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle = {Privacy Enhancing Technologies (PET 2002)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {April},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  editor = {Roger Dingledine and Paul Syverson},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {Springer-Verlag, LNCS 2482},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {April}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  editor = {Roger Dingledine and Paul Syverson}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {Springer-Verlag, LNCS 2482}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{statistical-disclosure, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Statistical Disclosure Attacks},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {George Danezis},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  organization = {{IFIP TC11}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {May},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  address = {Athens},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  pages = {421--426},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {Kluwer},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Statistical Disclosure Attacks}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {George Danezis}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  organization = {{IFIP TC11}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {May}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  address = {Athens}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  pages = {421--426}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {Kluwer}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{limits-open, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Limits of Anonymity in Open Environments},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Information Hiding Workshop (IH 2002)},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {October},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  editor = {Fabien Petitcolas},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {Springer-Verlag, LNCS 2578},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Limits of Anonymity in Open Environments}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Information Hiding Workshop (IH 2002)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {October}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  editor = {Fabien Petitcolas}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {Springer-Verlag, LNCS 2578}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{isdn-mixes, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {GI/ITG Conference on Communication in Distributed Systems},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {1991},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {February},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  pages = {451-463},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {GI/ITG Conference on Communication in Distributed Systems}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {1991}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {February}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  pages = {451-463}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -72,21 +72,21 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{tarzan:ccs02, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Michael J. Freedman and Robert Morris},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Michael J. Freedman and Robert Morris}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-        {S}ecurity ({CCS 2002})},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {November},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  address = {Washington, DC},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+        {S}ecurity ({CCS 2002})}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {November}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  address = {Washington, DC}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{cebolla, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {{Cebolla: Pragmatic IP Anonymity}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Zach Brown},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Ottawa Linux Symposium},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {June},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {{Cebolla: Pragmatic IP Anonymity}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Zach Brown}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Ottawa Linux Symposium}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {June}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{eax, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -117,24 +117,24 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{anonnet, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {{Analysis of an Anonymity Network for Web Browsing}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {{Analysis of an Anonymity Network for Web Browsing}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-        David Hutchison},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+        David Hutchison}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-        2002)}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {June},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  address = {Pittsburgh, USA},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+        2002)}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {June}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  address = {Pittsburgh, USA}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-%  pages = {49--54},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+%  pages = {49--54}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{econymics, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {On the Economics of Anonymity},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Financial Cryptography},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  editor = {Rebecca N. Wright},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {Springer-Verlag, LNCS 2742},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {On the Economics of Anonymity}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Financial Cryptography}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  editor = {Rebecca N. Wright}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {Springer-Verlag, LNCS 2742}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{defensive-dropping, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -156,24 +156,24 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{eternity, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {The Eternity Service},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Ross Anderson},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Pragocrypt '96},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {1996},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {The Eternity Service}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Ross Anderson}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Pragocrypt '96}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {1996}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{minion-design, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {George Danezis and Roger Dingledine and Nick Mathewson},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {2003 IEEE Symposium on Security and Privacy},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {George Danezis and Roger Dingledine and Nick Mathewson}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {2003 IEEE Symposium on Security and Privacy}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   month = {May}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   publisher = {IEEE CS}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  pages = {2--15},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  pages = {2--15}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  %note = {\url{http://mixminion.net/minion-design.pdf}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  %note = {\url{http://mixminion.net/minion-design.pdf}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{ rao-pseudonymity, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     author = "Josyula R. Rao and Pankaj Rohatgi", 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -245,9 +245,9 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{raymond00, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {J. F. Raymond}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {{Traffic Analysis: Protocols, Attacks, Design Issues, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  and Open Problems}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  and Open Problems}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Designing Privacy Enhancing Technologies: Workshop 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  on Design Issue in Anonymity and Unobservability},   
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  on Design Issue in Anonymity and Unobservability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         2000, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   month =        {July}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =        {10-29}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -310,7 +310,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Paul Syverson and Michael Reed and David Goldschlag}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {{O}nion {R}outing Access Configurations}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    booktitle =   {DARPA Information Survivability Conference and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Exposition (DISCEX 2000)},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Exposition (DISCEX 2000)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    year =        {2000}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    publisher =   {IEEE CS Press}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    pages =       {34--40}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -321,7 +321,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Inproceedings{or-pet00, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {{Towards an Analysis of Onion Routing Security}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {Paul Syverson and Gene Tsudik and Michael Reed and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Carl Landwehr},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Carl Landwehr}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Designing Privacy Enhancing Technologies: Workshop 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   on Design Issue in Anonymity and Unobservability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         2000, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -334,9 +334,9 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Inproceedings{freenet-pets00, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {Freenet: A Distributed Anonymous Information Storage 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-    and Retrieval System},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    and Retrieval System}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {Ian Clarke and Oskar Sandberg and Brandon Wiley and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-    Theodore W. Hong},   
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    Theodore W. Hong}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Designing Privacy Enhancing Technologies: Workshop 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   on Design Issue in Anonymity and Unobservability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         2000, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -349,7 +349,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{or-ih96, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {David M. Goldschlag and Michael G. Reed and Paul 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  F. Syverson},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  F. Syverson}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {Hiding Routing Information}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Information Hiding, First International Workshop}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =        {137--150}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -362,7 +362,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{federrath-ih96, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author = 	 {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title = 	 {{MIXes} in Mobile Communication Systems: Location 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Management with Privacy},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Management with Privacy}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Information Hiding, First International Workshop}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =        {121--135}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         1996, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -374,7 +374,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{reed-protocols97, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author = 	 {Michael G. Reed and Paul F. Syverson and David 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  M. Goldschlag},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  M. Goldschlag}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title = 	 {Protocols Using Anonymous Connections: Mobile Applications}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle = 	 {Security Protocols: 5th International Workshop}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =	 {13--23}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -389,7 +389,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Article{or-jsac98, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {Michael G. Reed and Paul F. Syverson and David 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  M. Goldschlag},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  M. Goldschlag}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {Anonymous Connections and Onion Routing}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   journal =      {IEEE Journal on Selected Areas in Communications}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         1998, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -428,13 +428,13 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @misc{pipenet, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {PipeNet 1.1},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Wei Dai},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = 1996,  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {August},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  howpublished = {Usenet post},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {PipeNet 1.1}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Wei Dai}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = 1996, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {August}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  howpublished = {Usenet post}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-      in a post to the cypherpunks list, Feb.\ 1995.},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+      in a post to the cypherpunks list, Feb.\ 1995.}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -485,7 +485,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{web-mix, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {Web {MIX}es: A system for anonymous and unobservable 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  {I}nternet access},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  {I}nternet access}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {Designing Privacy Enhancing Technologies: Workshop 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   on Design Issue in Anonymity and Unobservability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    editor =       {H. Federrath}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -497,7 +497,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{disad-free-routes, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {The disadvantages of free {MIX} routes and how to overcome 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  them},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  them}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    booktitle =   {Designing Privacy Enhancing Technologies: Workshop 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   on Design Issue in Anonymity and Unobservability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    pages =       {30--45}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -576,7 +576,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Misc{mixmaster-spec, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Ulf M{\"o}ller and Lance Cottrell and Peter 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Palfrader and Len Sassaman},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Palfrader and Len Sassaman}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {Mixmaster {P}rotocol --- {V}ersion 2}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    year =        {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    month =       {July}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -613,7 +613,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{oreilly-acc, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Roger Dingledine and Michael J. Freedman and David Molnar}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {Accountability}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   Technology}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    year =        {2001}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    publisher =   {O'Reilly and Associates}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -694,7 +694,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{kesdogan, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {D. Kesdogan and M. Egner and T. B\"uschkes}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   System}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    booktitle =   {Information Hiding (IH 1998)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    year =        {1998}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -706,7 +706,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {David Koblas and Michelle R. Koblas}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {{SOCKS}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {UNIX Security III Symposium (1992 USENIX Security 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Symposium)},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Symposium)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =        {77--83}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   year =         1992, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   publisher =    {USENIX}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -740,15 +740,15 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    note =        {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{babel, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Mixing {E}-mail With {B}abel},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Ceki G\"ulc\"u and Gene Tsudik},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = 1996,  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {February},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  pages = {2--16},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {IEEE},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Mixing {E}-mail With {B}abel}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Ceki G\"ulc\"u and Gene Tsudik}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {{Network and Distributed Security Symposium (NDSS 96)}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = 1996, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {February}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  pages = {2--16}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {IEEE}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  %note = {\url{http://citeseer.nj.nec.com/2254.html}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  %note = {\url{http://citeseer.nj.nec.com/2254.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Misc{rprocess, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {RProcess}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -779,7 +779,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    %note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{nym-alias-net, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author =       {David Mazi\`{e}res and M. Frans Kaashoek},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author =       {David Mazi\`{e}res and M. Frans Kaashoek}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {{The Design, Implementation and Operation of an Email 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   Pseudonym Server}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {$5^{th}$ ACM Conference on Computer and 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -792,7 +792,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{tangler, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =       {Marc Waldman and David Mazi\`{e}res}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =        {Tangler: A Censorship-Resistant Publishing System 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Based on Document Entanglements},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Based on Document Entanglements}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   booktitle =    {$8^{th}$ ACM Conference on Computer and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   Communications Security (CCS-8)}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages =        {86--135}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -803,14 +803,14 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @misc{neochaum, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Tim May}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   title =       {Payment mixes for anonymity},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   title =       {Payment mixes for anonymity}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    howpublished = {E-mail archived at 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-@misc{helsingius,  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+@misc{helsingius, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {J. Helsingius}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   title =       {{\tt anon.penet.fi} press release},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   title =       {{\tt anon.penet.fi} press release}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    note =        {\newline \url{http://www.penet.fi/press-english.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -871,13 +871,13 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Misc{advogato, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   author =      {Raph Levien},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   author =      {Raph Levien}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {Advogato's Trust Metric}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    note =        {\newline \url{http://www.advogato.org/trust-metric.html}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @InProceedings{publius, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {Publius: {A} robust, tamper-evident, censorship-resistant and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   source-anonymous web publishing system}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    booktitle =   {Proc. 9th USENIX Security Symposium}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -897,22 +897,22 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @techreport{freedom2-arch, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Freedom Systems 2.0 Architecture},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Philippe Boucher and Adam Shostack and Ian Goldberg},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  institution = {Zero Knowledge Systems, {Inc.}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2000},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {December},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  type = {White Paper},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  day = {18},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Freedom Systems 2.0 Architecture}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Philippe Boucher and Adam Shostack and Ian Goldberg}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  institution = {Zero Knowledge Systems, {Inc.}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2000}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {December}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  type = {White Paper}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  day = {18}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @techreport{freedom21-security, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Freedom Systems 2.1 Security Issues and Analysis},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Adam Back and Ian Goldberg and Adam Shostack},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  institution = {Zero Knowledge Systems, {Inc.}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2001},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {May},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  type = {White Paper},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Freedom Systems 2.1 Security Issues and Analysis}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Adam Back and Ian Goldberg and Adam Shostack}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  institution = {Zero Knowledge Systems, {Inc.}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2001}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {May}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  type = {White Paper}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{cfs:sosp01, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -925,12 +925,12 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{SS03, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Andrei Serjantov and Peter Sewell},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {Computer Security -- ESORICS 2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Andrei Serjantov and Peter Sewell}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {Computer Security -- ESORICS 2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   publisher =   {Springer-Verlag, LNCS 2808}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {October},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {October}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -945,7 +945,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-@InProceedings{mix-acc,  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+@InProceedings{mix-acc, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   author =      {Roger Dingledine and Michael J. Freedman and David 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				                   Hopwood and David Molnar}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   title =       {{A Reputation System to Increase MIX-net 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -980,7 +980,7 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Misc{realtime-mix, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    author =      {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-                  Birgit Pfitzmann and Michael Waidner},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+                  Birgit Pfitzmann and Michael Waidner}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    title =       {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    howpublished = {IEEE Journal on Selected Areas in Communications, 1998.}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}}, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1034,11 +1034,11 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @phdthesis{ian-thesis, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {A Pseudonymous Communications Infrastructure for the Internet},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Ian Goldberg},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  school = {UC Berkeley},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2000},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {Dec},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {A Pseudonymous Communications Infrastructure for the Internet}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Ian Goldberg}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  school = {UC Berkeley}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2000}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {Dec}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @Article{taz, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1061,22 +1061,22 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{wright02, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {An Analysis of the Degradation of Anonymous Protocols},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2002},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {February},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {IEEE},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {An Analysis of the Degradation of Anonymous Protocols}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {{Network and Distributed Security Symposium (NDSS 02)}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2002}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {February}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {IEEE}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{wright03, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Defending Anonymous Communication Against Passive Logging Attacks},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  booktitle = {IEEE Symposium on Security and Privacy},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Defending Anonymous Communication Against Passive Logging Attacks}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  booktitle = {IEEE Symposium on Security and Privacy}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   pages= {28--41}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {May},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  publisher = {IEEE CS},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {May}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  publisher = {IEEE CS}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1099,15 +1099,15 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @article{shsm03, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  title = {Using Caching for Browsing Anonymity},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  author = {Anna Shubina and Sean Smith},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  journal = {ACM SIGEcom Exchanges},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  volume = {4},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  number = {2},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  year = {2003},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  month = {Sept},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  www_section = {Anonymous communication},  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title = {Using Caching for Browsing Anonymity}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  author = {Anna Shubina and Sean Smith}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  journal = {ACM SIGEcom Exchanges}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  volume = {4}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  number = {2}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  year = {2003}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  month = {Sept}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  www_section = {Anonymous communication}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 @inproceedings{tor-design, 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1199,7 +1199,13 @@ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    publisher = {O'Reilly Media}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 } 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-%%% Local Variables:  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+@Misc{six-four, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  key =          {six-four}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  title =        {{The Six/Four System}}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  note =         {\url{http://sourceforge.net/projects/sixfour/}} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+%%% Local Variables: 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 %%% mode: latex 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 %%% TeX-master: "tor-design" 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-%%% End:  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+%%% End: 
			 |