tor-design.bib 40 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211
  1. % fix me
  2. @misc{tannenbaum96,
  3. author = "Andrew Tannenbaum",
  4. title = "Computer Networks",
  5. year = "1996",
  6. publisher = "Prentice Hall, 3rd edition",
  7. }
  8. @article{ meadows96,
  9. author = "Catherine Meadows",
  10. title = "The {NRL} Protocol Analyzer: An Overview",
  11. journal = "Journal of Logic Programming",
  12. volume = "26",
  13. number = "2",
  14. pages = "113--131",
  15. year = "1996",
  16. }
  17. @inproceedings{kesdogan:pet2002,
  18. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  19. alternative to the MIX based Approach?},
  20. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  21. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  22. year = {2002},
  23. month = {April},
  24. editor = {Roger Dingledine and Paul Syverson},
  25. publisher = {Springer-Verlag, LNCS 2482},
  26. }
  27. @inproceedings{statistical-disclosure,
  28. title = {Statistical Disclosure Attacks},
  29. author = {George Danezis},
  30. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  31. organization = {{IFIP TC11}},
  32. year = {2003},
  33. month = {May},
  34. address = {Athens},
  35. pages = {421--426},
  36. publisher = {Kluwer},
  37. }
  38. @inproceedings{limits-open,
  39. title = {Limits of Anonymity in Open Environments},
  40. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  41. booktitle = {Information Hiding Workshop (IH 2002)},
  42. year = {2002},
  43. month = {October},
  44. editor = {Fabien Petitcolas},
  45. publisher = {Springer-Verlag, LNCS 2578},
  46. }
  47. @inproceedings{isdn-mixes,
  48. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  49. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  50. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  51. year = {1991},
  52. month = {February},
  53. pages = {451-463},
  54. }
  55. @Article{jerichow-jsac98,
  56. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  57. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  58. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  59. journal = {IEEE Journal on Selected Areas in Communications},
  60. year = 1998,
  61. volume = 16,
  62. number = 4,
  63. pages = {495--509},
  64. month = {May}
  65. }
  66. @inproceedings{tarzan:ccs02,
  67. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  68. author = {Michael J. Freedman and Robert Morris},
  69. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  70. {S}ecurity ({CCS 2002})},
  71. year = {2002},
  72. month = {November},
  73. address = {Washington, DC},
  74. }
  75. @inproceedings{cebolla,
  76. title = {{Cebolla: Pragmatic IP Anonymity}},
  77. author = {Zach Brown},
  78. booktitle = {Ottawa Linux Symposium},
  79. year = {2002},
  80. month = {June},
  81. }
  82. @inproceedings{eax,
  83. author = "M. Bellare and P. Rogaway and D. Wagner",
  84. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  85. booktitle = {Fast Software Encryption 2004},
  86. month = {February},
  87. year = {2004},
  88. }
  89. @misc{darkside,
  90. title = {{The Dark Side of the Web: An Open Proxy's View}},
  91. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  92. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  93. }
  94. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  95. @Misc{anonymizer,
  96. key = {anonymizer},
  97. title = {The {Anonymizer}},
  98. note = {\url{http://anonymizer.com/}}
  99. }
  100. @Misc{privoxy,
  101. key = {privoxy},
  102. title = {{Privoxy}},
  103. note = {\url{http://www.privoxy.org/}}
  104. }
  105. @inproceedings{anonnet,
  106. title = {{Analysis of an Anonymity Network for Web Browsing}},
  107. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  108. David Hutchison},
  109. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  110. 2002)}},
  111. year = {2002},
  112. month = {June},
  113. address = {Pittsburgh, USA},
  114. }
  115. % pages = {49--54},
  116. @inproceedings{econymics,
  117. title = {On the Economics of Anonymity},
  118. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  119. booktitle = {Financial Cryptography},
  120. year = {2003},
  121. editor = {Rebecca N. Wright},
  122. publisher = {Springer-Verlag, LNCS 2742},
  123. }
  124. @inproceedings{defensive-dropping,
  125. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  126. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  127. booktitle = {Financial Cryptography},
  128. year = {2004},
  129. editor = {Ari Juels},
  130. publisher = {Springer-Verlag, LNCS (forthcoming)},
  131. }
  132. @inproceedings{morphmix:fc04,
  133. title = {Practical Anonymity for the Masses with MorphMix},
  134. author = {Marc Rennhard and Bernhard Plattner},
  135. booktitle = {Financial Cryptography},
  136. year = {2004},
  137. editor = {Ari Juels},
  138. publisher = {Springer-Verlag, LNCS (forthcoming)},
  139. }
  140. @inproceedings{eternity,
  141. title = {The Eternity Service},
  142. author = {Ross Anderson},
  143. booktitle = {Pragocrypt '96},
  144. year = {1996},
  145. }
  146. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  147. @inproceedings{minion-design,
  148. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  149. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  150. booktitle = {2003 IEEE Symposium on Security and Privacy},
  151. year = {2003},
  152. month = {May},
  153. publisher = {IEEE CS},
  154. pages = {2--15},
  155. }
  156. %note = {\url{http://mixminion.net/minion-design.pdf}},
  157. @inproceedings{ rao-pseudonymity,
  158. author = "Josyula R. Rao and Pankaj Rohatgi",
  159. title = "Can Pseudonymity Really Guarantee Privacy?",
  160. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  161. year = {2000},
  162. month = Aug,
  163. publisher = {USENIX},
  164. pages = "85--96",
  165. }
  166. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  167. %full_papers/rao/rao.pdf}},
  168. @InProceedings{pfitzmann90how,
  169. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  170. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  171. booktitle = {Eurocrypt 89},
  172. publisher = {Springer-Verlag, LNCS 434},
  173. year = {1990},
  174. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  175. }
  176. @Misc{tor-spec,
  177. author = {Roger Dingledine and Nick Mathewson},
  178. title = {Tor Protocol Specifications},
  179. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  180. }
  181. @InProceedings{BM:mixencrypt,
  182. author = {M{\"o}ller, Bodo},
  183. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  184. booktitle = {{CT-RSA} 2003},
  185. publisher = {Springer-Verlag, LNCS 2612},
  186. year = 2003,
  187. }
  188. @InProceedings{back01,
  189. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  190. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  191. booktitle = {Information Hiding (IH 2001)},
  192. pages = {245--257},
  193. year = 2001,
  194. editor = {Ira S. Moskowitz},
  195. publisher = {Springer-Verlag, LNCS 2137},
  196. }
  197. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  198. @InProceedings{rackoff93cryptographic,
  199. author = {Charles Rackoff and Daniel R. Simon},
  200. title = {Cryptographic Defense Against Traffic Analysis},
  201. booktitle = {{ACM} Symposium on Theory of Computing},
  202. pages = {672--681},
  203. year = {1993},
  204. }
  205. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  206. @InProceedings{freehaven-berk,
  207. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  208. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  209. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  210. on Design Issue in Anonymity and Unobservability},
  211. year = {2000},
  212. month = {July},
  213. editor = {H. Federrath},
  214. publisher = {Springer-Verlag, LNCS 2009},
  215. }
  216. %note = {\url{http://freehaven.net/papers.html}},
  217. @InProceedings{raymond00,
  218. author = {J. F. Raymond},
  219. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  220. and Open Problems}},
  221. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  222. on Design Issue in Anonymity and Unobservability},
  223. year = 2000,
  224. month = {July},
  225. pages = {10-29},
  226. editor = {H. Federrath},
  227. publisher = {Springer-Verlag, LNCS 2009},
  228. }
  229. @InProceedings{sybil,
  230. author = "John Douceur",
  231. title = {{The Sybil Attack}},
  232. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  233. month = Mar,
  234. year = 2002,
  235. }
  236. @InCollection{price-privacy,
  237. author = {Paul Syverson and Adam Shostack},
  238. editor = {L. Jean Camp and Stephen Lewis},
  239. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  240. booktitle = {Economics of Information Security},
  241. chapter = 10,
  242. publisher = {Kluwer},
  243. year = 2004,
  244. pages = {129--142}
  245. }
  246. @InProceedings{trickle02,
  247. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  248. title = {From a Trickle to a Flood: Active Attacks on Several
  249. Mix Types},
  250. booktitle = {Information Hiding (IH 2002)},
  251. year = {2002},
  252. editor = {Fabien Petitcolas},
  253. publisher = {Springer-Verlag, LNCS 2578},
  254. }
  255. @InProceedings{langos02,
  256. author = {Oliver Berthold and Heinrich Langos},
  257. title = {Dummy Traffic Against Long Term Intersection Attacks},
  258. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  259. year = {2002},
  260. editor = {Roger Dingledine and Paul Syverson},
  261. publisher = {Springer-Verlag, LNCS 2482}
  262. }
  263. @InProceedings{hintz-pet02,
  264. author = {Andrew Hintz},
  265. title = {Fingerprinting Websites Using Traffic Analysis},
  266. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  267. pages = {171--178},
  268. year = 2002,
  269. editor = {Roger Dingledine and Paul Syverson},
  270. publisher = {Springer-Verlag, LNCS 2482}
  271. }
  272. @InProceedings{or-discex00,
  273. author = {Paul Syverson and Michael Reed and David Goldschlag},
  274. title = {{O}nion {R}outing Access Configurations},
  275. booktitle = {DARPA Information Survivability Conference and
  276. Exposition (DISCEX 2000)},
  277. year = {2000},
  278. publisher = {IEEE CS Press},
  279. pages = {34--40},
  280. volume = {1},
  281. }
  282. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  283. @Inproceedings{or-pet00,
  284. title = {{Towards an Analysis of Onion Routing Security}},
  285. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  286. Carl Landwehr},
  287. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  288. on Design Issue in Anonymity and Unobservability},
  289. year = 2000,
  290. month = {July},
  291. pages = {96--114},
  292. editor = {H. Federrath},
  293. publisher = {Springer-Verlag, LNCS 2009},
  294. }
  295. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  296. @Inproceedings{freenet-pets00,
  297. title = {Freenet: A Distributed Anonymous Information Storage
  298. and Retrieval System},
  299. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  300. Theodore W. Hong},
  301. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  302. on Design Issue in Anonymity and Unobservability},
  303. year = 2000,
  304. month = {July},
  305. pages = {46--66},
  306. editor = {H. Federrath},
  307. publisher = {Springer-Verlag, LNCS 2009},
  308. }
  309. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  310. @InProceedings{or-ih96,
  311. author = {David M. Goldschlag and Michael G. Reed and Paul
  312. F. Syverson},
  313. title = {Hiding Routing Information},
  314. booktitle = {Information Hiding, First International Workshop},
  315. pages = {137--150},
  316. year = 1996,
  317. editor = {R. Anderson},
  318. month = {May},
  319. publisher = {Springer-Verlag, LNCS 1174},
  320. }
  321. @InProceedings{federrath-ih96,
  322. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  323. title = {{MIXes} in Mobile Communication Systems: Location
  324. Management with Privacy},
  325. booktitle = {Information Hiding, First International Workshop},
  326. pages = {121--135},
  327. year = 1996,
  328. editor = {R. Anderson},
  329. month = {May},
  330. publisher = {Springer-Verlag, LNCS 1174},
  331. }
  332. @InProceedings{reed-protocols97,
  333. author = {Michael G. Reed and Paul F. Syverson and David
  334. M. Goldschlag},
  335. title = {Protocols Using Anonymous Connections: Mobile Applications},
  336. booktitle = {Security Protocols: 5th International Workshop},
  337. pages = {13--23},
  338. year = 1997,
  339. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  340. and Michael Roe},
  341. month = {April},
  342. publisher = {Springer-Verlag, LNCS 1361}
  343. }
  344. @Article{or-jsac98,
  345. author = {Michael G. Reed and Paul F. Syverson and David
  346. M. Goldschlag},
  347. title = {Anonymous Connections and Onion Routing},
  348. journal = {IEEE Journal on Selected Areas in Communications},
  349. year = 1998,
  350. volume = 16,
  351. number = 4,
  352. pages = {482--494},
  353. month = {May},
  354. }
  355. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  356. @Misc{TLS,
  357. author = {T. Dierks and C. Allen},
  358. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  359. howpublished = {IETF RFC 2246},
  360. month = {January},
  361. year = {1999},
  362. }
  363. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  364. @Misc{SMTP,
  365. author = {J. Postel},
  366. title = {Simple {M}ail {T}ransfer {P}rotocol},
  367. howpublished = {IETF RFC 2821 (also STD0010)},
  368. month = {April},
  369. year = {2001},
  370. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  371. }
  372. @Misc{IMAP,
  373. author = {M. Crispin},
  374. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  375. howpublished = {IETF RFC 2060},
  376. month = {December},
  377. year = {1996},
  378. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  379. }
  380. @misc{pipenet,
  381. title = {PipeNet 1.1},
  382. author = {Wei Dai},
  383. year = 1996,
  384. month = {August},
  385. howpublished = {Usenet post},
  386. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  387. in a post to the cypherpunks list, Feb.\ 1995.},
  388. }
  389. @Misc{POP3,
  390. author = {J. Myers and M. Rose},
  391. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  392. howpublished = {IETF RFC 1939 (also STD0053)},
  393. month = {May},
  394. year = {1996},
  395. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  396. }
  397. @InProceedings{shuffle,
  398. author = {C. Andrew Neff},
  399. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  400. booktitle = {8th ACM Conference on Computer and Communications
  401. Security (CCS-8)},
  402. pages = {116--125},
  403. year = 2001,
  404. editor = {P. Samarati},
  405. month = {November},
  406. publisher = {ACM Press},
  407. }
  408. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  409. % technicaldocs/shuffle.pdf}},
  410. @InProceedings{dolev91,
  411. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  412. title = {Non-Malleable Cryptography},
  413. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  414. pages = {542--552},
  415. year = 1991,
  416. note = {Updated version at
  417. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  418. }
  419. @TechReport{rsw96,
  420. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  421. title = {Time-lock puzzles and timed-release Crypto},
  422. year = 1996,
  423. type = {MIT LCS technical memo},
  424. number = {MIT/LCS/TR-684},
  425. month = {February},
  426. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  427. }
  428. @InProceedings{web-mix,
  429. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  430. title = {Web {MIX}es: A system for anonymous and unobservable
  431. {I}nternet access},
  432. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  433. on Design Issue in Anonymity and Unobservability},
  434. editor = {H. Federrath},
  435. publisher = {Springer-Verlag, LNCS 2009},
  436. year = {2000},
  437. }
  438. % pages = {115--129},
  439. @InProceedings{disad-free-routes,
  440. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  441. title = {The disadvantages of free {MIX} routes and how to overcome
  442. them},
  443. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  444. on Design Issue in Anonymity and Unobservability},
  445. pages = {30--45},
  446. year = 2000,
  447. editor = {H. Federrath},
  448. publisher = {Springer-Verlag, LNCS 2009},
  449. }
  450. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  451. % disadvantages_berthold.pdf}},
  452. @InProceedings{boneh00,
  453. author = {Dan Boneh and Moni Naor},
  454. title = {Timed Commitments},
  455. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  456. pages = {236--254},
  457. year = 2000,
  458. publisher = {Springer-Verlag, LNCS 1880},
  459. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  460. }
  461. @InProceedings{goldschlag98,
  462. author = {David M. Goldschlag and Stuart G. Stubblebine},
  463. title = {Publicly Verifiable Lotteries: Applications of
  464. Delaying Functions},
  465. booktitle = {Financial Cryptography},
  466. pages = {214--226},
  467. year = 1998,
  468. publisher = {Springer-Verlag, LNCS 1465},
  469. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  470. }
  471. @InProceedings{syverson98,
  472. author = {Paul Syverson},
  473. title = {Weakly Secret Bit Commitment: Applications to
  474. Lotteries and Fair Exchange},
  475. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  476. pages = {2--13},
  477. year = 1998,
  478. address = {Rockport Massachusetts},
  479. month = {June},
  480. publisher = {IEEE CS Press},
  481. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  482. }
  483. @Misc{shoup-iso,
  484. author = {Victor Shoup},
  485. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  486. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  487. }
  488. @Misc{shoup-oaep,
  489. author = {Victor Shoup},
  490. title = {{OAEP} Reconsidered},
  491. howpublished = {{IACR} e-print 2000/060},
  492. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  493. }
  494. @Misc{oaep-still-alive,
  495. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  496. title = {{RSA}-{OAEP} is Still Alive!},
  497. howpublished = {{IACR} e-print 2000/061},
  498. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  499. }
  500. @misc{echolot,
  501. author = {Peter Palfrader},
  502. title = {Echolot: a pinger for anonymous remailers},
  503. note = {\url{http://www.palfrader.org/echolot/}},
  504. }
  505. @Misc{mixmaster-attacks,
  506. author = {Lance Cottrell},
  507. title = {Mixmaster and Remailer Attacks},
  508. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  509. }
  510. @Misc{mixmaster-spec,
  511. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  512. Palfrader and Len Sassaman},
  513. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  514. year = {2003},
  515. month = {July},
  516. howpublished = {Draft},
  517. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  518. }
  519. @InProceedings{puzzles-tls,
  520. author = "Drew Dean and Adam Stubblefield",
  521. title = {{Using Client Puzzles to Protect TLS}},
  522. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  523. year = {2001},
  524. month = Aug,
  525. publisher = {USENIX},
  526. }
  527. @InProceedings{breadpudding,
  528. author = {Markus Jakobsson and Ari Juels},
  529. title = {Proofs of Work and Bread Pudding Protocols},
  530. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  531. Conference on Communications and Multimedia Security
  532. (CMS '99)},
  533. year = 1999,
  534. month = {September},
  535. publisher = {Kluwer}
  536. }
  537. @Misc{hashcash,
  538. author = {Adam Back},
  539. title = {Hash cash},
  540. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  541. }
  542. @InProceedings{oreilly-acc,
  543. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  544. title = {Accountability},
  545. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  546. Technology},
  547. year = {2001},
  548. publisher = {O'Reilly and Associates},
  549. }
  550. @InProceedings{han,
  551. author = {Yongfei Han},
  552. title = {Investigation of non-repudiation protocols},
  553. booktitle = {ACISP '96},
  554. year = 1996,
  555. publisher = {Springer-Verlag},
  556. }
  557. @Misc{socks5,
  558. key = {socks5},
  559. title = {{SOCKS} {P}rotocol {V}ersion 5},
  560. howpublished= {IETF RFC 1928},
  561. month = {March},
  562. year = 1996,
  563. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  564. }
  565. @InProceedings{abe,
  566. author = {Masayuki Abe},
  567. title = {Universally Verifiable {MIX} With Verification Work Independent of
  568. The Number of {MIX} Servers},
  569. booktitle = {{EUROCRYPT} 1998},
  570. year = {1998},
  571. publisher = {Springer-Verlag, LNCS 1403},
  572. }
  573. @InProceedings{desmedt,
  574. author = {Yvo Desmedt and Kaoru Kurosawa},
  575. title = {How To Break a Practical {MIX} and Design a New One},
  576. booktitle = {{EUROCRYPT} 2000},
  577. year = {2000},
  578. publisher = {Springer-Verlag, LNCS 1803},
  579. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  580. }
  581. @InProceedings{mitkuro,
  582. author = {M. Mitomo and K. Kurosawa},
  583. title = {{Attack for Flash MIX}},
  584. booktitle = {{ASIACRYPT} 2000},
  585. year = {2000},
  586. publisher = {Springer-Verlag, LNCS 1976},
  587. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  588. }
  589. @InProceedings{hybrid-mix,
  590. author = {M. Ohkubo and M. Abe},
  591. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  592. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  593. year = {2000},
  594. publisher = {Springer-Verlag, LNCS 1976},
  595. }
  596. @InProceedings{PShuffle,
  597. author = {Jun Furukawa and Kazue Sako},
  598. title = {An Efficient Scheme for Proving a Shuffle},
  599. editor = {Joe Kilian},
  600. booktitle = {CRYPTO 2001},
  601. year = {2001},
  602. publisher = {Springer-Verlag, LNCS 2139},
  603. }
  604. @InProceedings{jakobsson-optimally,
  605. author = "Markus Jakobsson and Ari Juels",
  606. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  607. booktitle = {Principles of Distributed Computing - {PODC} '01},
  608. year = "2001",
  609. publisher = {ACM Press},
  610. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  611. }
  612. @InProceedings{kesdogan,
  613. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  614. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  615. System},
  616. booktitle = {Information Hiding (IH 1998)},
  617. year = {1998},
  618. publisher = {Springer-Verlag, LNCS 1525},
  619. }
  620. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  621. @InProceedings{socks4,
  622. author = {David Koblas and Michelle R. Koblas},
  623. title = {{SOCKS}},
  624. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  625. Symposium)},
  626. pages = {77--83},
  627. year = 1992,
  628. publisher = {USENIX},
  629. }
  630. @InProceedings{flash-mix,
  631. author = {Markus Jakobsson},
  632. title = {Flash {M}ixing},
  633. booktitle = {Principles of Distributed Computing - {PODC} '99},
  634. year = {1999},
  635. publisher = {ACM Press},
  636. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  637. }
  638. @InProceedings{SK,
  639. author = {Joe Kilian and Kazue Sako},
  640. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  641. the Implementation of a Voting Booth},
  642. booktitle = {EUROCRYPT '95},
  643. year = {1995},
  644. publisher = {Springer-Verlag},
  645. }
  646. @InProceedings{OAEP,
  647. author = {M. Bellare and P. Rogaway},
  648. year = {1994},
  649. booktitle = {EUROCRYPT '94},
  650. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  651. {RSA}},
  652. publisher = {Springer-Verlag},
  653. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  654. }
  655. @inproceedings{babel,
  656. title = {Mixing {E}-mail With {B}abel},
  657. author = {Ceki G\"ulc\"u and Gene Tsudik},
  658. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  659. year = 1996,
  660. month = {February},
  661. pages = {2--16},
  662. publisher = {IEEE},
  663. }
  664. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  665. @Misc{rprocess,
  666. author = {RProcess},
  667. title = {Selective Denial of Service Attacks},
  668. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  669. }
  670. @Article{remailer-history,
  671. author = {Sameer Parekh},
  672. title = {Prospects for Remailers},
  673. journal = {First Monday},
  674. volume = {1},
  675. number = {2},
  676. month = {August},
  677. year = {1996},
  678. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  679. }
  680. @Article{chaum-mix,
  681. author = {David Chaum},
  682. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  683. journal = {Communications of the ACM},
  684. year = {1981},
  685. volume = {4},
  686. number = {2},
  687. month = {February},
  688. }
  689. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  690. @InProceedings{nym-alias-net,
  691. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  692. title = {{The Design, Implementation and Operation of an Email
  693. Pseudonym Server}},
  694. booktitle = {$5^{th}$ ACM Conference on Computer and
  695. Communications Security (CCS'98)},
  696. year = 1998,
  697. publisher = {ACM Press},
  698. }
  699. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  700. @InProceedings{tangler,
  701. author = {Marc Waldman and David Mazi\`{e}res},
  702. title = {Tangler: A Censorship-Resistant Publishing System
  703. Based on Document Entanglements},
  704. booktitle = {$8^{th}$ ACM Conference on Computer and
  705. Communications Security (CCS-8)},
  706. pages = {86--135},
  707. year = 2001,
  708. publisher = {ACM Press},
  709. }
  710. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  711. @misc{neochaum,
  712. author = {Tim May},
  713. title = {Payment mixes for anonymity},
  714. howpublished = {E-mail archived at
  715. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  716. }
  717. @misc{helsingius,
  718. author = {J. Helsingius},
  719. title = {{\tt anon.penet.fi} press release},
  720. note = {\newline \url{http://www.penet.fi/press-english.html}},
  721. }
  722. @InProceedings{garay97secure,
  723. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  724. title = {Secure distributed storage and retrieval},
  725. booktitle = {11th International Workshop, WDAG '97},
  726. pages = {275--289},
  727. year = {1997},
  728. publisher = {Springer-Verlag, LNCS 1320},
  729. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  730. }
  731. @InProceedings{PIK,
  732. author = {C. Park and K. Itoh and K. Kurosawa},
  733. title = {Efficient anonymous channel and all/nothing election scheme},
  734. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  735. pages = {248--259},
  736. publisher = {Springer-Verlag, LNCS 765},
  737. }
  738. @Misc{pgpfaq,
  739. key = {PGP},
  740. title = {{PGP} {FAQ}},
  741. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  742. }
  743. @Article{riordan-schneier,
  744. author = {James Riordan and Bruce Schneier},
  745. title = {A Certified E-mail Protocol with No Trusted Third Party},
  746. journal = {13th Annual Computer Security Applications Conference},
  747. month = {December},
  748. year = {1998},
  749. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  750. }
  751. @Article{crowds-tissec,
  752. author = {Michael K. Reiter and Aviel D. Rubin},
  753. title = {Crowds: Anonymity for Web Transactions},
  754. journal = {ACM TISSEC},
  755. year = 1998,
  756. volume = 1,
  757. number = 1,
  758. pages = {66--92},
  759. month = {June},
  760. }
  761. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  762. @Article{crowds-dimacs,
  763. author = {Michael K. Reiter and Aviel D. Rubin},
  764. title = {Crowds: Anonymity for Web Transactions},
  765. journal = {{DIMACS} Technical Report (Revised)},
  766. volume = {97},
  767. number = {15},
  768. month = {August},
  769. year = {1997},
  770. }
  771. @Misc{advogato,
  772. author = {Raph Levien},
  773. title = {Advogato's Trust Metric},
  774. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  775. }
  776. @InProceedings{publius,
  777. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  778. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  779. source-anonymous web publishing system},
  780. booktitle = {Proc. 9th USENIX Security Symposium},
  781. pages = {59--72},
  782. year = {2000},
  783. month = {August},
  784. }
  785. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  786. @Misc{freedom-nyms,
  787. author = {Russell Samuels},
  788. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  789. year = {1999},
  790. month = {November},
  791. day = {21},
  792. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  793. }
  794. @techreport{freedom2-arch,
  795. title = {Freedom Systems 2.0 Architecture},
  796. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  797. institution = {Zero Knowledge Systems, {Inc.}},
  798. year = {2000},
  799. month = {December},
  800. type = {White Paper},
  801. day = {18},
  802. }
  803. @techreport{freedom21-security,
  804. title = {Freedom Systems 2.1 Security Issues and Analysis},
  805. author = {Adam Back and Ian Goldberg and Adam Shostack},
  806. institution = {Zero Knowledge Systems, {Inc.}},
  807. year = {2001},
  808. month = {May},
  809. type = {White Paper},
  810. }
  811. @inproceedings{cfs:sosp01,
  812. title = {Wide-area cooperative storage with {CFS}},
  813. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  814. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  815. year = {2001},
  816. month = {October},
  817. address = {Chateau Lake Louise, Banff, Canada},
  818. }
  819. @inproceedings{SS03,
  820. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  821. author = {Andrei Serjantov and Peter Sewell},
  822. booktitle = {Computer Security -- ESORICS 2003},
  823. publisher = {Springer-Verlag, LNCS 2808},
  824. year = {2003},
  825. month = {October},
  826. }
  827. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  828. @Misc{pk-relations,
  829. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  830. title = {Relations Among Notions of Security for Public-Key Encryption
  831. Schemes},
  832. howpublished = {
  833. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  834. Springer-Verlag, 1998.
  835. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  836. }
  837. @InProceedings{mix-acc,
  838. author = {Roger Dingledine and Michael J. Freedman and David
  839. Hopwood and David Molnar},
  840. title = {{A Reputation System to Increase MIX-net
  841. Reliability}},
  842. booktitle = {Information Hiding (IH 2001)},
  843. pages = {126--141},
  844. year = 2001,
  845. editor = {Ira S. Moskowitz},
  846. publisher = {Springer-Verlag, LNCS 2137},
  847. }
  848. %note = {\url{http://www.freehaven.net/papers.html}},
  849. @InProceedings{casc-rep,
  850. author = {Roger Dingledine and Paul Syverson},
  851. title = {{Reliable MIX Cascade Networks through Reputation}},
  852. booktitle = {Financial Cryptography},
  853. year = 2002,
  854. editor = {Matt Blaze},
  855. publisher = {Springer-Verlag, LNCS 2357},
  856. }
  857. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  858. @InProceedings{zhou96certified,
  859. author = {Zhou and Gollmann},
  860. title = {Certified Electronic Mail},
  861. booktitle = {{ESORICS: European Symposium on Research in Computer
  862. Security}},
  863. publisher = {Springer-Verlag, LNCS 1146},
  864. year = {1996},
  865. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  866. }
  867. @Misc{realtime-mix,
  868. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  869. Birgit Pfitzmann and Michael Waidner},
  870. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  871. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  872. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  873. }
  874. @InProceedings{danezis-pets03,
  875. author = {George Danezis},
  876. title = {Mix-networks with Restricted Routes},
  877. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  878. year = 2003,
  879. editor = {Roger Dingledine},
  880. publisher = {Springer-Verlag LNCS 2760}
  881. }
  882. @InProceedings{gap-pets03,
  883. author = {Krista Bennett and Christian Grothoff},
  884. title = {{GAP} -- practical anonymous networking},
  885. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  886. year = 2003,
  887. editor = {Roger Dingledine},
  888. publisher = {Springer-Verlag LNCS 2760}
  889. }
  890. @Article{hordes-jcs,
  891. author = {Brian Neal Levine and Clay Shields},
  892. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  893. journal = {Journal of Computer Security},
  894. year = 2002,
  895. volume = 10,
  896. number = 3,
  897. pages = {213--240}
  898. }
  899. @TechReport{herbivore,
  900. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  901. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  902. institution = {Cornell University Computing and Information Science},
  903. year = 2003,
  904. type = {Technical Report},
  905. number = {TR2003-1890},
  906. month = {February}
  907. }
  908. @InProceedings{p5,
  909. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  910. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  911. booktitle = {IEEE Symposium on Security and Privacy},
  912. pages = {58--70},
  913. year = 2002,
  914. publisher = {IEEE CS}
  915. }
  916. @phdthesis{ian-thesis,
  917. title = {A Pseudonymous Communications Infrastructure for the Internet},
  918. author = {Ian Goldberg},
  919. school = {UC Berkeley},
  920. year = {2000},
  921. month = {Dec},
  922. }
  923. @Article{taz,
  924. author = {Ian Goldberg and David Wagner},
  925. title = {TAZ Servers and the Rewebber Network: Enabling
  926. Anonymous Publishing on the World Wide Web},
  927. journal = {First Monday},
  928. year = 1998,
  929. volume = 3,
  930. number = 4,
  931. month = {August},
  932. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  933. }
  934. @Misc{tcp-over-tcp-is-bad,
  935. key = {tcp-over-tcp-is-bad},
  936. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  937. author = {Olaf Titz},
  938. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  939. }
  940. @inproceedings{wright02,
  941. title = {An Analysis of the Degradation of Anonymous Protocols},
  942. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  943. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  944. year = {2002},
  945. month = {February},
  946. publisher = {IEEE},
  947. }
  948. @inproceedings{wright03,
  949. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  950. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  951. booktitle = {IEEE Symposium on Security and Privacy},
  952. pages= {28--41},
  953. year = {2003},
  954. month = {May},
  955. publisher = {IEEE CS},
  956. }
  957. @InProceedings{attack-tor-oak05,
  958. author = {Steven J. Murdoch and George Danezis},
  959. title = {Low-cost Traffic Analysis of Tor},
  960. booktitle = {IEEE Symposium on Security and Privacy},
  961. year = 2005,
  962. month = {May},
  963. publisher = {IEEE CS}
  964. }
  965. @Misc{jap-backdoor,
  966. author={{The AN.ON Project}},
  967. howpublished={Press release},
  968. year={2003},
  969. month={September},
  970. title={German Police proceeds against anonymity service},
  971. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  972. }
  973. @article{shsm03,
  974. title = {Using Caching for Browsing Anonymity},
  975. author = {Anna Shubina and Sean Smith},
  976. journal = {ACM SIGEcom Exchanges},
  977. volume = {4},
  978. number = {2},
  979. year = {2003},
  980. month = {Sept},
  981. www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
  982. www_section = {Anonymous communication},
  983. }
  984. @inproceedings{tor-design,
  985. title = {Tor: The Second-Generation Onion Router},
  986. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  987. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  988. year = {2004},
  989. month = {August},
  990. note = {\url{http://tor.eff.org/tor-design.pdf}}
  991. }
  992. @inproceedings{flow-correlation04,
  993. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  994. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  995. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  996. year = {2004},
  997. month = {May},
  998. series = {LNCS},
  999. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1000. }
  1001. @InProceedings{danezis-pet2004,
  1002. author = "George Danezis",
  1003. title = "The Traffic Analysis of Continuous-Time Mixes",
  1004. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1005. editor = {David Martin and Andrei Serjantov},
  1006. month = {May},
  1007. year = {2004},
  1008. series = {LNCS},
  1009. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1010. }
  1011. @inproceedings{feamster:wpes2004,
  1012. title = {Location Diversity in Anonymity Networks},
  1013. author = {Nick Feamster and Roger Dingledine},
  1014. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1015. year = {2004},
  1016. month = {October},
  1017. address = {Washington, DC, USA},
  1018. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1019. }
  1020. @inproceedings{koepsell:wpes2004,
  1021. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1022. author = {Stefan K\"opsell and Ulf Hilling},
  1023. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1024. year = {2004},
  1025. month = {October},
  1026. address = {Washington, DC, USA},
  1027. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1028. }
  1029. @inproceedings{sync-batching,
  1030. title = {Synchronous Batching: From Cascades to Free Routes},
  1031. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1032. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1033. editor = {David Martin and Andrei Serjantov},
  1034. year = {2004},
  1035. month = {May},
  1036. series = {LNCS},
  1037. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1038. }
  1039. @InProceedings{e2e-traffic,
  1040. author = "Nick Mathewson and Roger Dingledine",
  1041. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1042. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1043. editor = {David Martin and Andrei Serjantov},
  1044. month = {May},
  1045. year = {2004},
  1046. series = {LNCS},
  1047. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1048. }
  1049. @Misc{dtls,
  1050. author = {E. Rescorla and N. Modadugu},
  1051. title = {{Datagram Transport Layer Security}},
  1052. howpublished = {IETF Draft},
  1053. month = {December},
  1054. year = {2003},
  1055. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1056. }
  1057. @InProceedings{usability-network-effect,
  1058. author={Roger Dingledine and Nick Mathewson},
  1059. title={Anonymity Loves Company: Usability and the Network Effect},
  1060. booktitle = {Designing Security Systems That People Can Use},
  1061. year = {2005},
  1062. publisher = {O'Reilly Media},
  1063. }
  1064. @Misc{six-four,
  1065. key = {six-four},
  1066. title = {{The Six/Four System}},
  1067. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1068. }
  1069. %%% Local Variables:
  1070. %%% mode: latex
  1071. %%% TeX-master: "tor-design"
  1072. %%% End: