tor-design.bib 46 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399
  1. % fix me
  2. @misc{tannenbaum96,
  3. author = "Andrew Tannenbaum",
  4. title = "Computer Networks",
  5. year = "1996",
  6. publisher = "Prentice Hall, 3rd edition",
  7. }
  8. @article{ meadows96,
  9. author = "Catherine Meadows",
  10. title = "The {NRL} Protocol Analyzer: An Overview",
  11. journal = "Journal of Logic Programming",
  12. volume = "26",
  13. number = "2",
  14. pages = "113--131",
  15. year = "1996",
  16. }
  17. @inproceedings{kesdogan:pet2002,
  18. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  19. alternative to the MIX based Approach?},
  20. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  21. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  22. year = {2002},
  23. month = {April},
  24. editor = {Roger Dingledine and Paul Syverson},
  25. publisher = {Springer-Verlag, LNCS 2482},
  26. }
  27. @inproceedings{statistical-disclosure,
  28. title = {Statistical Disclosure Attacks},
  29. author = {George Danezis},
  30. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  31. organization = {{IFIP TC11}},
  32. year = {2003},
  33. month = {May},
  34. address = {Athens},
  35. pages = {421--426},
  36. publisher = {Kluwer},
  37. }
  38. @inproceedings{limits-open,
  39. title = {Limits of Anonymity in Open Environments},
  40. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  41. booktitle = {Information Hiding Workshop (IH 2002)},
  42. year = {2002},
  43. month = {October},
  44. editor = {Fabien Petitcolas},
  45. publisher = {Springer-Verlag, LNCS 2578},
  46. }
  47. @inproceedings{isdn-mixes,
  48. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  49. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  50. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  51. year = {1991},
  52. month = {February},
  53. pages = {451-463},
  54. }
  55. @Article{jerichow-jsac98,
  56. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  57. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  58. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  59. journal = {IEEE Journal on Selected Areas in Communications},
  60. year = 1998,
  61. volume = 16,
  62. number = 4,
  63. pages = {495--509},
  64. month = {May}
  65. }
  66. @inproceedings{tarzan:ccs02,
  67. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  68. author = {Michael J. Freedman and Robert Morris},
  69. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  70. {S}ecurity ({CCS 2002})},
  71. year = {2002},
  72. month = {November},
  73. address = {Washington, DC},
  74. }
  75. @inproceedings{cebolla,
  76. title = {{Cebolla: Pragmatic IP Anonymity}},
  77. author = {Zach Brown},
  78. booktitle = {Ottawa Linux Symposium},
  79. year = {2002},
  80. month = {June},
  81. }
  82. @inproceedings{eax,
  83. author = "M. Bellare and P. Rogaway and D. Wagner",
  84. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  85. booktitle = {Fast Software Encryption 2004},
  86. month = {February},
  87. year = {2004},
  88. }
  89. @misc{darkside,
  90. title = {{The Dark Side of the Web: An Open Proxy's View}},
  91. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  92. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  93. }
  94. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  95. @Misc{anonymizer,
  96. key = {anonymizer},
  97. title = {The {Anonymizer}},
  98. note = {\url{http://anonymizer.com/}}
  99. }
  100. @Misc{privoxy,
  101. key = {privoxy},
  102. title = {{Privoxy}},
  103. note = {\url{http://www.privoxy.org/}}
  104. }
  105. @inproceedings{anonnet,
  106. title = {{Analysis of an Anonymity Network for Web Browsing}},
  107. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  108. David Hutchison},
  109. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  110. 2002)}},
  111. year = {2002},
  112. month = {June},
  113. address = {Pittsburgh, USA},
  114. }
  115. % pages = {49--54},
  116. @inproceedings{econymics,
  117. title = {On the Economics of Anonymity},
  118. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  119. booktitle = {Financial Cryptography},
  120. year = {2003},
  121. editor = {Rebecca N. Wright},
  122. publisher = {Springer-Verlag, LNCS 2742},
  123. }
  124. @inproceedings{defensive-dropping,
  125. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  126. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  127. booktitle = {Financial Cryptography},
  128. year = {2004},
  129. editor = {Ari Juels},
  130. publisher = {Springer-Verlag, LNCS (forthcoming)},
  131. }
  132. @inproceedings{morphmix:fc04,
  133. title = {Practical Anonymity for the Masses with MorphMix},
  134. author = {Marc Rennhard and Bernhard Plattner},
  135. booktitle = {Financial Cryptography},
  136. year = {2004},
  137. editor = {Ari Juels},
  138. publisher = {Springer-Verlag, LNCS (forthcoming)},
  139. }
  140. @inproceedings{eternity,
  141. title = {The Eternity Service},
  142. author = {Ross Anderson},
  143. booktitle = {Pragocrypt '96},
  144. year = {1996},
  145. }
  146. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  147. @inproceedings{minion-design,
  148. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  149. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  150. booktitle = {2003 IEEE Symposium on Security and Privacy},
  151. year = {2003},
  152. month = {May},
  153. publisher = {IEEE CS},
  154. pages = {2--15},
  155. }
  156. %note = {\url{http://mixminion.net/minion-design.pdf}},
  157. @inproceedings{ rao-pseudonymity,
  158. author = "Josyula R. Rao and Pankaj Rohatgi",
  159. title = "Can Pseudonymity Really Guarantee Privacy?",
  160. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  161. year = {2000},
  162. month = Aug,
  163. publisher = {USENIX},
  164. pages = "85--96",
  165. }
  166. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  167. %full_papers/rao/rao.pdf}},
  168. @InProceedings{pfitzmann90how,
  169. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  170. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  171. booktitle = {Eurocrypt 89},
  172. publisher = {Springer-Verlag, LNCS 434},
  173. year = {1990},
  174. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  175. }
  176. @Misc{tor-spec,
  177. author = {Roger Dingledine and Nick Mathewson},
  178. title = {Tor Protocol Specifications},
  179. note = {\url{http://tor.eff.org/svn/trunk/doc/tor-spec.txt}},
  180. }
  181. @Misc{incentives-txt,
  182. author = {Roger Dingledine and Nick Mathewson},
  183. title = {Tor Incentives Design Brainstorms},
  184. note = {\url{http://tor.eff.org/svn/trunk/doc/incentives.txt}},
  185. }
  186. @InProceedings{BM:mixencrypt,
  187. author = {M{\"o}ller, Bodo},
  188. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  189. booktitle = {{CT-RSA} 2003},
  190. publisher = {Springer-Verlag, LNCS 2612},
  191. year = 2003,
  192. }
  193. @InProceedings{back01,
  194. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  195. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  196. booktitle = {Information Hiding (IH 2001)},
  197. pages = {245--257},
  198. year = 2001,
  199. editor = {Ira S. Moskowitz},
  200. publisher = {Springer-Verlag, LNCS 2137},
  201. }
  202. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  203. @InProceedings{rackoff93cryptographic,
  204. author = {Charles Rackoff and Daniel R. Simon},
  205. title = {Cryptographic Defense Against Traffic Analysis},
  206. booktitle = {{ACM} Symposium on Theory of Computing},
  207. pages = {672--681},
  208. year = {1993},
  209. }
  210. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  211. @InProceedings{freehaven-berk,
  212. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  213. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  214. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  215. on Design Issue in Anonymity and Unobservability},
  216. year = 2000,
  217. month = {July},
  218. editor = {H. Federrath},
  219. publisher = {Springer-Verlag, LNCS 2009},
  220. }
  221. @InProceedings{move-ndss05,
  222. author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  223. title = {MOVE: An End-to-End Solution To Network Denial of Service},
  224. booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  225. year = 2005,
  226. month = {February},
  227. publisher = {Internet Society}
  228. }
  229. %note = {\url{http://freehaven.net/papers.html}},
  230. @InProceedings{raymond00,
  231. author = {J. F. Raymond},
  232. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  233. and Open Problems}},
  234. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  235. on Design Issue in Anonymity and Unobservability},
  236. year = 2000,
  237. month = {July},
  238. pages = {10-29},
  239. editor = {H. Federrath},
  240. publisher = {Springer-Verlag, LNCS 2009},
  241. }
  242. @InProceedings{sybil,
  243. author = "John Douceur",
  244. title = {{The Sybil Attack}},
  245. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  246. month = Mar,
  247. year = 2002,
  248. }
  249. @InCollection{price-privacy,
  250. author = {Paul Syverson and Adam Shostack},
  251. editor = {L. Jean Camp and Stephen Lewis},
  252. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  253. booktitle = {Economics of Information Security},
  254. chapter = 10,
  255. publisher = {Kluwer},
  256. year = 2004,
  257. pages = {129--142}
  258. }
  259. @InProceedings{trickle02,
  260. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  261. title = {From a Trickle to a Flood: Active Attacks on Several
  262. Mix Types},
  263. booktitle = {Information Hiding (IH 2002)},
  264. year = {2002},
  265. editor = {Fabien Petitcolas},
  266. publisher = {Springer-Verlag, LNCS 2578},
  267. }
  268. @InProceedings{langos02,
  269. author = {Oliver Berthold and Heinrich Langos},
  270. title = {Dummy Traffic Against Long Term Intersection Attacks},
  271. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  272. year = {2002},
  273. editor = {Roger Dingledine and Paul Syverson},
  274. publisher = {Springer-Verlag, LNCS 2482}
  275. }
  276. @InProceedings{hintz-pet02,
  277. author = {Andrew Hintz},
  278. title = {Fingerprinting Websites Using Traffic Analysis},
  279. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  280. pages = {171--178},
  281. year = 2002,
  282. editor = {Roger Dingledine and Paul Syverson},
  283. publisher = {Springer-Verlag, LNCS 2482}
  284. }
  285. @InProceedings{or-discex00,
  286. author = {Paul Syverson and Michael Reed and David Goldschlag},
  287. title = {{O}nion {R}outing Access Configurations},
  288. booktitle = {DARPA Information Survivability Conference and
  289. Exposition (DISCEX 2000)},
  290. year = {2000},
  291. publisher = {IEEE CS Press},
  292. pages = {34--40},
  293. volume = {1},
  294. }
  295. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  296. @Inproceedings{or-pet00,
  297. title = {{Towards an Analysis of Onion Routing Security}},
  298. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  299. Carl Landwehr},
  300. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  301. on Design Issue in Anonymity and Unobservability},
  302. year = 2000,
  303. month = {July},
  304. pages = {96--114},
  305. editor = {H. Federrath},
  306. publisher = {Springer-Verlag, LNCS 2009},
  307. }
  308. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  309. @Inproceedings{freenet-pets00,
  310. title = {Freenet: A Distributed Anonymous Information Storage
  311. and Retrieval System},
  312. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  313. Theodore W. Hong},
  314. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  315. on Design Issue in Anonymity and Unobservability},
  316. year = 2000,
  317. month = {July},
  318. pages = {46--66},
  319. editor = {H. Federrath},
  320. publisher = {Springer-Verlag, LNCS 2009},
  321. }
  322. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  323. @InProceedings{or-ih96,
  324. author = {David M. Goldschlag and Michael G. Reed and Paul
  325. F. Syverson},
  326. title = {Hiding Routing Information},
  327. booktitle = {Information Hiding, First International Workshop},
  328. pages = {137--150},
  329. year = 1996,
  330. editor = {R. Anderson},
  331. month = {May},
  332. publisher = {Springer-Verlag, LNCS 1174},
  333. }
  334. @InProceedings{federrath-ih96,
  335. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  336. title = {{MIXes} in Mobile Communication Systems: Location
  337. Management with Privacy},
  338. booktitle = {Information Hiding, First International Workshop},
  339. pages = {121--135},
  340. year = 1996,
  341. editor = {R. Anderson},
  342. month = {May},
  343. publisher = {Springer-Verlag, LNCS 1174},
  344. }
  345. @InProceedings{reed-protocols97,
  346. author = {Michael G. Reed and Paul F. Syverson and David
  347. M. Goldschlag},
  348. title = {Protocols Using Anonymous Connections: Mobile Applications},
  349. booktitle = {Security Protocols: 5th International Workshop},
  350. pages = {13--23},
  351. year = 1997,
  352. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  353. and Michael Roe},
  354. month = {April},
  355. publisher = {Springer-Verlag, LNCS 1361}
  356. }
  357. @Article{or-jsac98,
  358. author = {Michael G. Reed and Paul F. Syverson and David
  359. M. Goldschlag},
  360. title = {Anonymous Connections and Onion Routing},
  361. journal = {IEEE Journal on Selected Areas in Communications},
  362. year = 1998,
  363. volume = 16,
  364. number = 4,
  365. pages = {482--494},
  366. month = {May},
  367. }
  368. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  369. @Misc{TLS,
  370. author = {T. Dierks and C. Allen},
  371. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  372. howpublished = {IETF RFC 2246},
  373. month = {January},
  374. year = {1999},
  375. }
  376. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  377. @Misc{SMTP,
  378. author = {J. Postel},
  379. title = {Simple {M}ail {T}ransfer {P}rotocol},
  380. howpublished = {IETF RFC 2821 (also STD0010)},
  381. month = {April},
  382. year = {2001},
  383. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  384. }
  385. @Misc{IMAP,
  386. author = {M. Crispin},
  387. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  388. howpublished = {IETF RFC 2060},
  389. month = {December},
  390. year = {1996},
  391. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  392. }
  393. @misc{pipenet,
  394. title = {PipeNet 1.1},
  395. author = {Wei Dai},
  396. year = 1996,
  397. month = {August},
  398. howpublished = {Usenet post},
  399. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  400. in a post to the cypherpunks list, Feb.\ 1995.},
  401. }
  402. @Misc{POP3,
  403. author = {J. Myers and M. Rose},
  404. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  405. howpublished = {IETF RFC 1939 (also STD0053)},
  406. month = {May},
  407. year = {1996},
  408. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  409. }
  410. @InProceedings{shuffle,
  411. author = {C. Andrew Neff},
  412. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  413. booktitle = {8th ACM Conference on Computer and Communications
  414. Security (CCS-8)},
  415. pages = {116--125},
  416. year = 2001,
  417. editor = {P. Samarati},
  418. month = {November},
  419. publisher = {ACM Press},
  420. }
  421. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  422. % technicaldocs/shuffle.pdf}},
  423. @InProceedings{dolev91,
  424. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  425. title = {Non-Malleable Cryptography},
  426. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  427. pages = {542--552},
  428. year = 1991,
  429. note = {Updated version at
  430. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  431. }
  432. @TechReport{rsw96,
  433. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  434. title = {Time-lock puzzles and timed-release Crypto},
  435. year = 1996,
  436. type = {MIT LCS technical memo},
  437. number = {MIT/LCS/TR-684},
  438. month = {February},
  439. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  440. }
  441. @InProceedings{web-mix,
  442. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  443. title = {Web {MIX}es: A system for anonymous and unobservable
  444. {I}nternet access},
  445. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  446. on Design Issue in Anonymity and Unobservability},
  447. editor = {H. Federrath},
  448. publisher = {Springer-Verlag, LNCS 2009},
  449. year = {2000},
  450. }
  451. % pages = {115--129},
  452. @InProceedings{disad-free-routes,
  453. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  454. title = {The disadvantages of free {MIX} routes and how to overcome
  455. them},
  456. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  457. on Design Issue in Anonymity and Unobservability},
  458. pages = {30--45},
  459. year = 2000,
  460. editor = {H. Federrath},
  461. publisher = {Springer-Verlag, LNCS 2009},
  462. }
  463. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  464. % disadvantages_berthold.pdf}},
  465. @InProceedings{boneh00,
  466. author = {Dan Boneh and Moni Naor},
  467. title = {Timed Commitments},
  468. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  469. pages = {236--254},
  470. year = 2000,
  471. publisher = {Springer-Verlag, LNCS 1880},
  472. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  473. }
  474. @InProceedings{goldschlag98,
  475. author = {David M. Goldschlag and Stuart G. Stubblebine},
  476. title = {Publicly Verifiable Lotteries: Applications of
  477. Delaying Functions},
  478. booktitle = {Financial Cryptography},
  479. pages = {214--226},
  480. year = 1998,
  481. publisher = {Springer-Verlag, LNCS 1465},
  482. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  483. }
  484. @InProceedings{syverson98,
  485. author = {Paul Syverson},
  486. title = {Weakly Secret Bit Commitment: Applications to
  487. Lotteries and Fair Exchange},
  488. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  489. pages = {2--13},
  490. year = 1998,
  491. address = {Rockport Massachusetts},
  492. month = {June},
  493. publisher = {IEEE CS Press},
  494. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  495. }
  496. @Misc{shoup-iso,
  497. author = {Victor Shoup},
  498. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  499. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  500. }
  501. @Misc{shoup-oaep,
  502. author = {Victor Shoup},
  503. title = {{OAEP} Reconsidered},
  504. howpublished = {{IACR} e-print 2000/060},
  505. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  506. }
  507. @Misc{oaep-still-alive,
  508. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  509. title = {{RSA}-{OAEP} is Still Alive!},
  510. howpublished = {{IACR} e-print 2000/061},
  511. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  512. }
  513. @misc{echolot,
  514. author = {Peter Palfrader},
  515. title = {Echolot: a pinger for anonymous remailers},
  516. note = {\url{http://www.palfrader.org/echolot/}},
  517. }
  518. @Misc{mixmaster-attacks,
  519. author = {Lance Cottrell},
  520. title = {Mixmaster and Remailer Attacks},
  521. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  522. }
  523. @Misc{mixmaster-spec,
  524. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  525. Palfrader and Len Sassaman},
  526. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  527. year = {2003},
  528. month = {July},
  529. howpublished = {Draft},
  530. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  531. }
  532. @InProceedings{puzzles-tls,
  533. author = "Drew Dean and Adam Stubblefield",
  534. title = {{Using Client Puzzles to Protect TLS}},
  535. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  536. year = {2001},
  537. month = Aug,
  538. publisher = {USENIX},
  539. }
  540. @InProceedings{breadpudding,
  541. author = {Markus Jakobsson and Ari Juels},
  542. title = {Proofs of Work and Bread Pudding Protocols},
  543. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  544. Conference on Communications and Multimedia Security
  545. (CMS '99)},
  546. year = 1999,
  547. month = {September},
  548. publisher = {Kluwer}
  549. }
  550. @Misc{hashcash,
  551. author = {Adam Back},
  552. title = {Hash cash},
  553. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  554. }
  555. @InProceedings{oreilly-acc,
  556. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  557. title = {Accountability},
  558. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  559. Technology},
  560. year = {2001},
  561. publisher = {O'Reilly and Associates},
  562. }
  563. @InProceedings{han,
  564. author = {Yongfei Han},
  565. title = {Investigation of non-repudiation protocols},
  566. booktitle = {ACISP '96},
  567. year = 1996,
  568. publisher = {Springer-Verlag},
  569. }
  570. @Misc{socks5,
  571. key = {socks5},
  572. title = {{SOCKS} {P}rotocol {V}ersion 5},
  573. howpublished= {IETF RFC 1928},
  574. month = {March},
  575. year = 1996,
  576. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  577. }
  578. @InProceedings{abe,
  579. author = {Masayuki Abe},
  580. title = {Universally Verifiable {MIX} With Verification Work Independent of
  581. The Number of {MIX} Servers},
  582. booktitle = {{EUROCRYPT} 1998},
  583. year = {1998},
  584. publisher = {Springer-Verlag, LNCS 1403},
  585. }
  586. @InProceedings{desmedt,
  587. author = {Yvo Desmedt and Kaoru Kurosawa},
  588. title = {How To Break a Practical {MIX} and Design a New One},
  589. booktitle = {{EUROCRYPT} 2000},
  590. year = {2000},
  591. publisher = {Springer-Verlag, LNCS 1803},
  592. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  593. }
  594. @InProceedings{mitkuro,
  595. author = {M. Mitomo and K. Kurosawa},
  596. title = {{Attack for Flash MIX}},
  597. booktitle = {{ASIACRYPT} 2000},
  598. year = {2000},
  599. publisher = {Springer-Verlag, LNCS 1976},
  600. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  601. }
  602. @InProceedings{hybrid-mix,
  603. author = {M. Ohkubo and M. Abe},
  604. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  605. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  606. year = {2000},
  607. publisher = {Springer-Verlag, LNCS 1976},
  608. }
  609. @InProceedings{PShuffle,
  610. author = {Jun Furukawa and Kazue Sako},
  611. title = {An Efficient Scheme for Proving a Shuffle},
  612. editor = {Joe Kilian},
  613. booktitle = {CRYPTO 2001},
  614. year = {2001},
  615. publisher = {Springer-Verlag, LNCS 2139},
  616. }
  617. @InProceedings{jakobsson-optimally,
  618. author = "Markus Jakobsson and Ari Juels",
  619. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  620. booktitle = {Principles of Distributed Computing - {PODC} '01},
  621. year = "2001",
  622. publisher = {ACM Press},
  623. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  624. }
  625. @InProceedings{kesdogan,
  626. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  627. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  628. System},
  629. booktitle = {Information Hiding (IH 1998)},
  630. year = {1998},
  631. publisher = {Springer-Verlag, LNCS 1525},
  632. }
  633. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  634. @InProceedings{socks4,
  635. author = {David Koblas and Michelle R. Koblas},
  636. title = {{SOCKS}},
  637. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  638. Symposium)},
  639. pages = {77--83},
  640. year = 1992,
  641. publisher = {USENIX},
  642. }
  643. @InProceedings{flash-mix,
  644. author = {Markus Jakobsson},
  645. title = {Flash {M}ixing},
  646. booktitle = {Principles of Distributed Computing - {PODC} '99},
  647. year = {1999},
  648. publisher = {ACM Press},
  649. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  650. }
  651. @InProceedings{SK,
  652. author = {Joe Kilian and Kazue Sako},
  653. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  654. the Implementation of a Voting Booth},
  655. booktitle = {EUROCRYPT '95},
  656. year = {1995},
  657. publisher = {Springer-Verlag},
  658. }
  659. @InProceedings{OAEP,
  660. author = {M. Bellare and P. Rogaway},
  661. year = {1994},
  662. booktitle = {EUROCRYPT '94},
  663. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  664. {RSA}},
  665. publisher = {Springer-Verlag},
  666. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  667. }
  668. @inproceedings{babel,
  669. title = {Mixing {E}-mail With {B}abel},
  670. author = {Ceki G\"ulc\"u and Gene Tsudik},
  671. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  672. year = 1996,
  673. month = {February},
  674. pages = {2--16},
  675. publisher = {IEEE},
  676. }
  677. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  678. @Misc{rprocess,
  679. author = {RProcess},
  680. title = {Selective Denial of Service Attacks},
  681. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  682. }
  683. @Article{remailer-history,
  684. author = {Sameer Parekh},
  685. title = {Prospects for Remailers},
  686. journal = {First Monday},
  687. volume = {1},
  688. number = {2},
  689. month = {August},
  690. year = {1996},
  691. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  692. }
  693. @Article{chaum-mix,
  694. author = {David Chaum},
  695. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  696. journal = {Communications of the ACM},
  697. year = {1981},
  698. volume = {4},
  699. number = {2},
  700. month = {February},
  701. }
  702. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  703. @InProceedings{nym-alias-net,
  704. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  705. title = {{The Design, Implementation and Operation of an Email
  706. Pseudonym Server}},
  707. booktitle = {$5^{th}$ ACM Conference on Computer and
  708. Communications Security (CCS'98)},
  709. year = 1998,
  710. publisher = {ACM Press},
  711. }
  712. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  713. @InProceedings{tangler,
  714. author = {Marc Waldman and David Mazi\`{e}res},
  715. title = {Tangler: A Censorship-Resistant Publishing System
  716. Based on Document Entanglements},
  717. booktitle = {$8^{th}$ ACM Conference on Computer and
  718. Communications Security (CCS-8)},
  719. pages = {86--135},
  720. year = 2001,
  721. publisher = {ACM Press},
  722. }
  723. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  724. @misc{neochaum,
  725. author = {Tim May},
  726. title = {Payment mixes for anonymity},
  727. howpublished = {E-mail archived at
  728. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  729. }
  730. @misc{helsingius,
  731. author = {J. Helsingius},
  732. title = {{\tt anon.penet.fi} press release},
  733. note = {\newline \url{http://www.penet.fi/press-english.html}},
  734. }
  735. @InProceedings{garay97secure,
  736. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  737. title = {Secure distributed storage and retrieval},
  738. booktitle = {11th International Workshop, WDAG '97},
  739. pages = {275--289},
  740. year = {1997},
  741. publisher = {Springer-Verlag, LNCS 1320},
  742. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  743. }
  744. @InProceedings{PIK,
  745. author = {C. Park and K. Itoh and K. Kurosawa},
  746. title = {Efficient anonymous channel and all/nothing election scheme},
  747. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  748. pages = {248--259},
  749. publisher = {Springer-Verlag, LNCS 765},
  750. }
  751. @Misc{pgpfaq,
  752. key = {PGP},
  753. title = {{PGP} {FAQ}},
  754. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  755. }
  756. @Article{riordan-schneier,
  757. author = {James Riordan and Bruce Schneier},
  758. title = {A Certified E-mail Protocol with No Trusted Third Party},
  759. journal = {13th Annual Computer Security Applications Conference},
  760. month = {December},
  761. year = {1998},
  762. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  763. }
  764. @Article{crowds-tissec,
  765. author = {Michael K. Reiter and Aviel D. Rubin},
  766. title = {Crowds: Anonymity for Web Transactions},
  767. journal = {ACM TISSEC},
  768. year = 1998,
  769. volume = 1,
  770. number = 1,
  771. pages = {66--92},
  772. month = {June},
  773. }
  774. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  775. @Article{crowds-dimacs,
  776. author = {Michael K. Reiter and Aviel D. Rubin},
  777. title = {Crowds: Anonymity for Web Transactions},
  778. journal = {{DIMACS} Technical Report (Revised)},
  779. volume = {97},
  780. number = {15},
  781. month = {August},
  782. year = {1997},
  783. }
  784. @Misc{advogato,
  785. author = {Raph Levien},
  786. title = {Advogato's Trust Metric},
  787. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  788. }
  789. @InProceedings{publius,
  790. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  791. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  792. source-anonymous web publishing system},
  793. booktitle = {Proc. 9th USENIX Security Symposium},
  794. pages = {59--72},
  795. year = {2000},
  796. month = {August},
  797. }
  798. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  799. @Misc{freedom-nyms,
  800. author = {Russell Samuels},
  801. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  802. year = {1999},
  803. month = {November},
  804. day = {21},
  805. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  806. }
  807. @techreport{freedom2-arch,
  808. title = {Freedom Systems 2.0 Architecture},
  809. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  810. institution = {Zero Knowledge Systems, {Inc.}},
  811. year = {2000},
  812. month = {December},
  813. type = {White Paper},
  814. day = {18},
  815. }
  816. @techreport{freedom21-security,
  817. title = {Freedom Systems 2.1 Security Issues and Analysis},
  818. author = {Adam Back and Ian Goldberg and Adam Shostack},
  819. institution = {Zero Knowledge Systems, {Inc.}},
  820. year = {2001},
  821. month = {May},
  822. type = {White Paper},
  823. }
  824. @inproceedings{cfs:sosp01,
  825. title = {Wide-area cooperative storage with {CFS}},
  826. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  827. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  828. year = {2001},
  829. month = {October},
  830. address = {Chateau Lake Louise, Banff, Canada},
  831. }
  832. @inproceedings{SS03,
  833. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  834. author = {Andrei Serjantov and Peter Sewell},
  835. booktitle = {Computer Security -- ESORICS 2003},
  836. publisher = {Springer-Verlag, LNCS 2808},
  837. year = {2003},
  838. month = {October},
  839. }
  840. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  841. @Misc{pk-relations,
  842. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  843. title = {Relations Among Notions of Security for Public-Key Encryption
  844. Schemes},
  845. howpublished = {
  846. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  847. Springer-Verlag, 1998.
  848. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  849. }
  850. @InProceedings{mix-acc,
  851. author = {Roger Dingledine and Michael J. Freedman and David
  852. Hopwood and David Molnar},
  853. title = {{A Reputation System to Increase MIX-net
  854. Reliability}},
  855. booktitle = {Information Hiding (IH 2001)},
  856. pages = {126--141},
  857. year = 2001,
  858. editor = {Ira S. Moskowitz},
  859. publisher = {Springer-Verlag, LNCS 2137},
  860. }
  861. %note = {\url{http://www.freehaven.net/papers.html}},
  862. @InProceedings{casc-rep,
  863. author = {Roger Dingledine and Paul Syverson},
  864. title = {{Reliable MIX Cascade Networks through Reputation}},
  865. booktitle = {Financial Cryptography},
  866. year = 2002,
  867. editor = {Matt Blaze},
  868. publisher = {Springer-Verlag, LNCS 2357},
  869. }
  870. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  871. @InProceedings{zhou96certified,
  872. author = {Zhou and Gollmann},
  873. title = {Certified Electronic Mail},
  874. booktitle = {{ESORICS: European Symposium on Research in Computer
  875. Security}},
  876. publisher = {Springer-Verlag, LNCS 1146},
  877. year = {1996},
  878. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  879. }
  880. @Misc{realtime-mix,
  881. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  882. Birgit Pfitzmann and Michael Waidner},
  883. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  884. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  885. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  886. }
  887. @InProceedings{danezis:pet2003,
  888. author = {George Danezis},
  889. title = {Mix-networks with Restricted Routes},
  890. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  891. year = 2003,
  892. editor = {Roger Dingledine},
  893. publisher = {Springer-Verlag LNCS 2760}
  894. }
  895. @InProceedings{gap-pets03,
  896. author = {Krista Bennett and Christian Grothoff},
  897. title = {{GAP} -- practical anonymous networking},
  898. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  899. year = 2003,
  900. editor = {Roger Dingledine},
  901. publisher = {Springer-Verlag LNCS 2760}
  902. }
  903. @Article{hordes-jcs,
  904. author = {Brian Neal Levine and Clay Shields},
  905. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  906. journal = {Journal of Computer Security},
  907. year = 2002,
  908. volume = 10,
  909. number = 3,
  910. pages = {213--240}
  911. }
  912. @TechReport{herbivore,
  913. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  914. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  915. institution = {Cornell University Computing and Information Science},
  916. year = 2003,
  917. type = {Technical Report},
  918. number = {TR2003-1890},
  919. month = {February}
  920. }
  921. @InProceedings{p5,
  922. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  923. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  924. booktitle = {IEEE Symposium on Security and Privacy},
  925. pages = {58--70},
  926. year = 2002,
  927. publisher = {IEEE CS}
  928. }
  929. @phdthesis{ian-thesis,
  930. title = {A Pseudonymous Communications Infrastructure for the Internet},
  931. author = {Ian Goldberg},
  932. school = {UC Berkeley},
  933. year = {2000},
  934. month = {Dec},
  935. }
  936. @Article{taz,
  937. author = {Ian Goldberg and David Wagner},
  938. title = {TAZ Servers and the Rewebber Network: Enabling
  939. Anonymous Publishing on the World Wide Web},
  940. journal = {First Monday},
  941. year = 1998,
  942. volume = 3,
  943. number = 4,
  944. month = {August},
  945. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  946. }
  947. @Misc{tcp-over-tcp-is-bad,
  948. key = {tcp-over-tcp-is-bad},
  949. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  950. author = {Olaf Titz},
  951. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  952. }
  953. @inproceedings{wright02,
  954. title = {An Analysis of the Degradation of Anonymous Protocols},
  955. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  956. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  957. year = {2002},
  958. month = {February},
  959. publisher = {IEEE},
  960. }
  961. @inproceedings{wright03,
  962. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  963. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  964. booktitle = {IEEE Symposium on Security and Privacy},
  965. pages= {28--41},
  966. year = {2003},
  967. month = {May},
  968. publisher = {IEEE CS},
  969. }
  970. @InProceedings{attack-tor-oak05,
  971. author = {Steven J. Murdoch and George Danezis},
  972. title = {Low-cost Traffic Analysis of Tor},
  973. booktitle = {IEEE Symposium on Security and Privacy},
  974. year = 2005,
  975. month = {May},
  976. publisher = {IEEE CS}
  977. }
  978. @Misc{jap-backdoor,
  979. author={{The AN.ON Project}},
  980. howpublished={Press release},
  981. year={2003},
  982. month={September},
  983. title={German Police proceeds against anonymity service},
  984. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  985. }
  986. @article{shsm03,
  987. title = {Using Caching for Browsing Anonymity},
  988. author = {Anna Shubina and Sean Smith},
  989. journal = {ACM SIGEcom Exchanges},
  990. volume = {4},
  991. number = {2},
  992. year = {2003},
  993. month = {Sept},
  994. note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
  995. }
  996. @inproceedings{tor-design,
  997. title = {Tor: The Second-Generation Onion Router},
  998. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  999. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  1000. year = {2004},
  1001. month = {August},
  1002. note = {\url{http://tor.eff.org/tor-design.pdf}}
  1003. }
  1004. @inproceedings{flow-correlation04,
  1005. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  1006. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  1007. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1008. year = {2004},
  1009. month = {May},
  1010. series = {LNCS},
  1011. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1012. }
  1013. @InProceedings{danezis:pet2004,
  1014. author = "George Danezis",
  1015. title = "The Traffic Analysis of Continuous-Time Mixes",
  1016. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1017. editor = {David Martin and Andrei Serjantov},
  1018. month = {May},
  1019. year = {2004},
  1020. series = {LNCS},
  1021. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1022. }
  1023. @inproceedings{feamster:wpes2004,
  1024. title = {Location Diversity in Anonymity Networks},
  1025. author = {Nick Feamster and Roger Dingledine},
  1026. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1027. year = {2004},
  1028. month = {October},
  1029. address = {Washington, DC, USA},
  1030. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1031. }
  1032. @inproceedings{koepsell:wpes2004,
  1033. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1034. author = {Stefan K\"opsell and Ulf Hilling},
  1035. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1036. year = {2004},
  1037. month = {October},
  1038. address = {Washington, DC, USA},
  1039. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1040. }
  1041. @inproceedings{sync-batching,
  1042. title = {Synchronous Batching: From Cascades to Free Routes},
  1043. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1044. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1045. editor = {David Martin and Andrei Serjantov},
  1046. year = {2004},
  1047. month = {May},
  1048. series = {LNCS},
  1049. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1050. }
  1051. @InProceedings{e2e-traffic,
  1052. author = "Nick Mathewson and Roger Dingledine",
  1053. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1054. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1055. editor = {David Martin and Andrei Serjantov},
  1056. month = {May},
  1057. year = {2004},
  1058. series = {LNCS},
  1059. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1060. }
  1061. @Misc{dtls,
  1062. author = {E. Rescorla and N. Modadugu},
  1063. title = {{Datagram Transport Layer Security}},
  1064. howpublished = {IETF Draft},
  1065. month = {December},
  1066. year = {2003},
  1067. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1068. }
  1069. @InProceedings{usability-network-effect,
  1070. author={Roger Dingledine and Nick Mathewson},
  1071. title={Anonymity Loves Company: Usability and the Network Effect},
  1072. booktitle = {Designing Security Systems That People Can Use},
  1073. year = {2005},
  1074. publisher = {O'Reilly Media},
  1075. }
  1076. @inproceedings{usability:weis2006,
  1077. title = {Anonymity Loves Company: Usability and the Network Effect},
  1078. author = {Roger Dingledine and Nick Mathewson},
  1079. booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
  1080. (WEIS 2006)},
  1081. year = {2006},
  1082. month = {June},
  1083. address = {Cambridge, UK},
  1084. bookurl = {http://weis2006.econinfosec.org/},
  1085. note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
  1086. }
  1087. @Misc{six-four,
  1088. key = {six-four},
  1089. title = {{The Six/Four System}},
  1090. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1091. }
  1092. @inproceedings{clayton:pet2006,
  1093. title = {Ignoring the Great Firewall of China},
  1094. author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  1095. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1096. year = {2006},
  1097. month = {June},
  1098. address = {Cambridge, UK},
  1099. publisher = {Springer},
  1100. bookurl = {http://petworkshop.org/2006/},
  1101. note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
  1102. }
  1103. @Misc{zuckerman-threatmodels,
  1104. key = {zuckerman-threatmodels},
  1105. title = {We've got to adjust some of our threat models},
  1106. author = {Ethan Zuckerman},
  1107. note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
  1108. }
  1109. @Misc{cgiproxy,
  1110. key = {cgiproxy},
  1111. title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
  1112. author = {James Marshall},
  1113. note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
  1114. }
  1115. @Misc{circumventor,
  1116. key = {circumventor},
  1117. title = {{How to install the Circumventor program}},
  1118. author = {Bennett Haselton},
  1119. note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
  1120. }
  1121. @Misc{psiphon,
  1122. key = {psiphon},
  1123. title = {Psiphon},
  1124. author = {Ronald Deibert et al},
  1125. note = {\url{http://psiphon.civisec.org/}}
  1126. }
  1127. @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
  1128. title = {Embedding Covert Channels into {TCP/IP}},
  1129. booktitle = {Information Hiding: 7th International Workshop},
  1130. pages = {247--261},
  1131. year = {2005},
  1132. editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
  1133. Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
  1134. volume = {3727},
  1135. series = {LNCS},
  1136. address = {Barcelona, Catalonia (Spain)},
  1137. month = {June},
  1138. publisher = {Springer-Verlag},
  1139. url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
  1140. }
  1141. @phdthesis{blossom-thesis,
  1142. title = {Perspective Access Networks},
  1143. author = {Geoffrey Goodell},
  1144. school = {Harvard University},
  1145. year = {2006},
  1146. month = {July},
  1147. note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
  1148. }
  1149. @inproceedings{tap:pet2006,
  1150. title = {On the Security of the Tor Authentication Protocol},
  1151. author = {Ian Goldberg},
  1152. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1153. year = {2006},
  1154. month = {June},
  1155. address = {Cambridge, UK},
  1156. publisher = {Springer},
  1157. bookurl = {http://petworkshop.org/2006/},
  1158. note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
  1159. }
  1160. @inproceedings{rep-anon,
  1161. title = {{Reputation in P2P Anonymity Systems}},
  1162. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1163. booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
  1164. year = {2003},
  1165. month = {June},
  1166. note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
  1167. }
  1168. @misc{tor-challenges,
  1169. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1170. title = {Challenges in deploying low-latency anonymity},
  1171. year = {2005},
  1172. note = {Manuscript}
  1173. }
  1174. @InProceedings{chaum-blind,
  1175. author = {David Chaum},
  1176. title = {Blind Signatures for Untraceable Payments},
  1177. booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
  1178. pages = {199--203},
  1179. year = 1983,
  1180. editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
  1181. publisher = {Plenum Press}
  1182. }
  1183. @misc{goodell-syverson06,
  1184. author = {Geoffrey Goodell and Paul Syverson},
  1185. title = {The Right Place at the Right Time: The Use of Network Location in Authentication and Abuse Prevention},
  1186. year = {2006},
  1187. note = {Submitted},
  1188. }
  1189. @misc{ip-to-country,
  1190. key = {ip-to-country},
  1191. title = {IP-to-country database},
  1192. note = {\url{http://ip-to-country.webhosting.info/}},
  1193. }
  1194. @misc{mackinnon-personal,
  1195. author = {Rebecca MacKinnon},
  1196. title = {Private communication},
  1197. year = {2006},
  1198. }
  1199. @inproceedings{pet05-bissias,
  1200. title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
  1201. author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
  1202. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  1203. year = {2005},
  1204. month = {May},
  1205. note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
  1206. }
  1207. @InProceedings{infranet,
  1208. author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
  1209. title = {Infranet: Circumventing Web Censorship and Surveillance},
  1210. booktitle = {Proceedings of the 11th USENIX Security Symposium},
  1211. year = {2002},
  1212. month = {August},
  1213. note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
  1214. }
  1215. @techreport{ ptacek98insertion,
  1216. author = "Thomas H. Ptacek and Timothy N. Newsham",
  1217. title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
  1218. institution = "Secure Networks, Inc.",
  1219. address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
  1220. year = "1998",
  1221. url = "citeseer.ist.psu.edu/ptacek98insertion.html",
  1222. }
  1223. @inproceedings{active-wardens,
  1224. author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
  1225. title = "Eliminating Steganography in Internet Traffic with Active Wardens",
  1226. booktitle = {Information Hiding Workshop (IH 2002)},
  1227. year = {2002},
  1228. month = {October},
  1229. editor = {Fabien Petitcolas},
  1230. publisher = {Springer-Verlag, LNCS 2578},
  1231. }
  1232. %%% Local Variables:
  1233. %%% mode: latex
  1234. %%% TeX-master: "tor-design"
  1235. %%% End: