tor-design.bib 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011
  1. @article{ meadows96,
  2. author = "Catherine Meadows",
  3. title = "The {NRL} Protocol Analyzer: An Overview",
  4. journal = "Journal of Logic Programming",
  5. volume = "26",
  6. number = "2",
  7. pages = "113--131",
  8. year = "1996",
  9. }
  10. @inproceedings{kesdogan:pet2002,
  11. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  12. alternative to the MIX based Approach?},
  13. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  14. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  15. year = {2002},
  16. month = {April},
  17. editor = {Roger Dingledine and Paul Syverson},
  18. publisher = {Springer-Verlag, LNCS 2482},
  19. }
  20. @inproceedings{statistical-disclosure,
  21. title = {Statistical Disclosure Attacks},
  22. author = {George Danezis},
  23. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  24. organization = {{IFIP TC11}},
  25. year = {2003},
  26. month = {May},
  27. address = {Athens},
  28. pages = {421--426},
  29. publisher = {Kluwer},
  30. }
  31. @inproceedings{limits-open,
  32. title = {Limits of Anonymity in Open Environments},
  33. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  34. booktitle = {Information Hiding Workshop (IH 2002)},
  35. year = {2002},
  36. month = {October},
  37. editor = {Fabien Petitcolas},
  38. publisher = {Springer-Verlag, LNCS 2578},
  39. }
  40. @inproceedings{isdn-mixes,
  41. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  42. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  43. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  44. year = {1991},
  45. month = {February},
  46. pages = {451-463},
  47. }
  48. @inproceedings{tarzan:ccs02,
  49. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  50. author = {Michael J. Freedman and Robert Morris},
  51. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  52. {S}ecurity ({CCS 2002})},
  53. year = {2002},
  54. month = {November},
  55. address = {Washington, DC},
  56. }
  57. @inproceedings{cebolla,
  58. title = {{Cebolla: Pragmatic IP Anonymity}},
  59. author = {Zach Brown},
  60. booktitle = {Ottawa Linux Symposium},
  61. year = {2002},
  62. month = {June},
  63. }
  64. @misc{eax,
  65. author = "M. Bellare and P. Rogaway and D. Wagner",
  66. title = "A conventional authenticated-encryption mode",
  67. howpublished = {Manuscript},
  68. month = {April},
  69. year = {2003},
  70. }
  71. @misc{darkside,
  72. title = {{The Dark Side of the Web: An Open Proxy's View}},
  73. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  74. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  75. }
  76. @Misc{anonymizer,
  77. key = {anonymizer},
  78. title = {The {Anonymizer}},
  79. note = {\url{http://anonymizer.com/}}
  80. }
  81. @Misc{privoxy,
  82. key = {privoxy},
  83. title = {{Privoxy}},
  84. note = {\url{http://www.privoxy.org/}}
  85. }
  86. @inproceedings{anonnet,
  87. title = {{Analysis of an Anonymity Network for Web Browsing}},
  88. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  89. David Hutchison},
  90. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  91. 2002)}},
  92. year = {2002},
  93. month = {June},
  94. address = {Pittsburgh, USA},
  95. pages = {49--54},
  96. }
  97. @inproceedings{castro-liskov,
  98. author = {Miguel Castro and Barbara Liskov},
  99. title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
  100. booktitle = {Fourth Symposium on Operating Systems Design and Implementation},
  101. month = {October},
  102. year = {2000},
  103. }
  104. @inproceedings{econymics,
  105. title = {On the Economics of Anonymity},
  106. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  107. booktitle = {Financial Cryptography},
  108. year = {2003},
  109. editor = {Rebecca N. Wright},
  110. publisher = {Springer-Verlag, LNCS 2742},
  111. }
  112. @inproceedings{defensive-dropping,
  113. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  114. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  115. booktitle = {Financial Cryptography},
  116. year = {2004},
  117. editor = {Ari Juels},
  118. publisher = {Springer-Verlag, LNCS (forthcoming)},
  119. }
  120. @inproceedings{morphmix:fc04,
  121. title = {Practical Anonymity for the Masses with MorphMix},
  122. author = {Marc Rennhard and Bernhard Plattner},
  123. booktitle = {Financial Cryptography},
  124. year = {2004},
  125. editor = {Ari Juels},
  126. publisher = {Springer-Verlag, LNCS (forthcoming)},
  127. }
  128. @inproceedings{eternity,
  129. title = {The Eternity Service},
  130. author = {Ross Anderson},
  131. booktitle = {Pragocrypt '96},
  132. year = {1996},
  133. }
  134. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  135. @inproceedings{minion-design,
  136. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  137. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  138. booktitle = {2003 IEEE Symposium on Security and Privacy},
  139. year = {2003},
  140. month = {May},
  141. publisher = {IEEE CS},
  142. pages = {2--15},
  143. }
  144. %note = {\url{http://mixminion.net/minion-design.pdf}},
  145. @inproceedings{ rao-pseudonymity,
  146. author = "Josyula R. Rao and Pankaj Rohatgi",
  147. title = "Can Pseudonymity Really Guarantee Privacy?",
  148. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  149. year = {2000},
  150. month = Aug,
  151. publisher = {USENIX},
  152. pages = "85--96",
  153. }
  154. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  155. %full_papers/rao/rao.pdf}},
  156. @InProceedings{pfitzmann90how,
  157. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  158. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  159. booktitle = {Eurocrypt 89},
  160. publisher = {Springer-Verlag, LNCS 434},
  161. year = {1990},
  162. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  163. }
  164. % author = {Roger Dingledine and Nick Mathewson},
  165. @Misc{tor-spec,
  166. author = {Anonymized},
  167. title = {Tor Protocol Specifications},
  168. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  169. }
  170. @InProceedings{BM:mixencrypt,
  171. author = {M{\"o}ller, Bodo},
  172. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  173. booktitle = {{CT-RSA} 2003},
  174. publisher = {Springer-Verlag, LNCS 2612},
  175. year = 2003,
  176. }
  177. @InProceedings{back01,
  178. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  179. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  180. booktitle = {Information Hiding (IH 2001)},
  181. pages = {245--257},
  182. year = 2001,
  183. editor = {Ira S. Moskowitz},
  184. publisher = {Springer-Verlag, LNCS 2137},
  185. }
  186. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  187. @InProceedings{rackoff93cryptographic,
  188. author = {Charles Rackoff and Daniel R. Simon},
  189. title = {Cryptographic Defense Against Traffic Analysis},
  190. booktitle = {{ACM} Symposium on Theory of Computing},
  191. pages = {672--681},
  192. year = {1993},
  193. }
  194. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  195. @InProceedings{freehaven-berk,
  196. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  197. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  198. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  199. on Design Issue in Anonymity and Unobservability},
  200. year = {2000},
  201. month = {July},
  202. editor = {H. Federrath},
  203. publisher = {Springer-Verlag, LNCS 2009},
  204. }
  205. %note = {\url{http://freehaven.net/papers.html}},
  206. @InProceedings{raymond00,
  207. author = {J. F. Raymond},
  208. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  209. and Open Problems}},
  210. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  211. on Design Issue in Anonymity and Unobservability},
  212. year = 2000,
  213. month = {July},
  214. pages = {10-29},
  215. editor = {H. Federrath},
  216. publisher = {Springer-Verlag, LNCS 2009},
  217. }
  218. @InProceedings{sybil,
  219. author = "John Douceur",
  220. title = {{The Sybil Attack}},
  221. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
  222. month = Mar,
  223. year = 2002,
  224. }
  225. @InProceedings{trickle02,
  226. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  227. title = {From a Trickle to a Flood: Active Attacks on Several
  228. Mix Types},
  229. booktitle = {Information Hiding (IH 2002)},
  230. year = {2002},
  231. editor = {Fabien Petitcolas},
  232. publisher = {Springer-Verlag, LNCS 2578},
  233. }
  234. @InProceedings{langos02,
  235. author = {Oliver Berthold and Heinrich Langos},
  236. title = {Dummy Traffic Against Long Term Intersection Attacks},
  237. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  238. year = {2002},
  239. editor = {Roger Dingledine and Paul Syverson},
  240. publisher = {Springer-Verlag, LNCS 2482}
  241. }
  242. @InProceedings{hintz-pet02,
  243. author = {Andrew Hintz},
  244. title = {Fingerprinting Websites Using Traffic Analysis},
  245. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  246. pages = {171--178},
  247. year = 2002,
  248. editor = {Roger Dingledine and Paul Syverson},
  249. publisher = {Springer-Verlag, LNCS 2482}
  250. }
  251. @InProceedings{or-discex00,
  252. author = {Paul Syverson and Michael Reed and David Goldschlag},
  253. title = {{O}nion {R}outing Access Configurations},
  254. booktitle = {DARPA Information Survivability Conference and
  255. Exposition (DISCEX 2000)},
  256. year = {2000},
  257. publisher = {IEEE CS Press},
  258. pages = {34--40},
  259. volume = {1},
  260. }
  261. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  262. @Inproceedings{or-pet00,
  263. title = {{Towards an Analysis of Onion Routing Security}},
  264. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  265. Carl Landwehr},
  266. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  267. on Design Issue in Anonymity and Unobservability},
  268. year = 2000,
  269. month = {July},
  270. pages = {96--114},
  271. editor = {H. Federrath},
  272. publisher = {Springer-Verlag, LNCS 2009},
  273. }
  274. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  275. @Inproceedings{freenet-pets00,
  276. title = {Freenet: A Distributed Anonymous Information Storage
  277. and Retrieval System},
  278. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  279. Theodore W. Hong},
  280. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  281. on Design Issue in Anonymity and Unobservability},
  282. year = 2000,
  283. month = {July},
  284. pages = {46--66},
  285. editor = {H. Federrath},
  286. publisher = {Springer-Verlag, LNCS 2009},
  287. }
  288. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  289. @InProceedings{or-ih96,
  290. author = {David M. Goldschlag and Michael G. Reed and Paul
  291. F. Syverson},
  292. title = {Hiding Routing Information},
  293. booktitle = {Information Hiding, First International Workshop},
  294. pages = {137--150},
  295. year = 1996,
  296. editor = {R. Anderson},
  297. month = {May},
  298. publisher = {Springer-Verlag, LNCS 1174},
  299. }
  300. %note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  301. @Article{or-jsac98,
  302. author = {Michael G. Reed and Paul F. Syverson and David
  303. M. Goldschlag},
  304. title = {Anonymous Connections and Onion Routing},
  305. journal = {IEEE Journal on Selected Areas in Communications},
  306. year = 1998,
  307. volume = 16,
  308. number = 4,
  309. pages = {482--494},
  310. month = {May},
  311. }
  312. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  313. @Misc{TLS,
  314. author = {T. Dierks and C. Allen},
  315. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  316. howpublished = {IETF RFC 2246},
  317. month = {January},
  318. year = {1999},
  319. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  320. }
  321. @Misc{SMTP,
  322. author = {J. Postel},
  323. title = {Simple {M}ail {T}ransfer {P}rotocol},
  324. howpublished = {IETF RFC 2821 (also STD0010)},
  325. month = {April},
  326. year = {2001},
  327. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  328. }
  329. @Misc{IMAP,
  330. author = {M. Crispin},
  331. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  332. howpublished = {IETF RFC 2060},
  333. month = {December},
  334. year = {1996},
  335. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  336. }
  337. @misc{pipenet,
  338. title = {PipeNet 1.1},
  339. author = {Wei Dai},
  340. year = 1996,
  341. month = {August},
  342. howpublished = {Usenet post},
  343. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  344. in a post to the cypherpunks list, Feb.\ 1995.},
  345. }
  346. @Misc{POP3,
  347. author = {J. Myers and M. Rose},
  348. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  349. howpublished = {IETF RFC 1939 (also STD0053)},
  350. month = {May},
  351. year = {1996},
  352. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  353. }
  354. @InProceedings{shuffle,
  355. author = {C. Andrew Neff},
  356. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  357. booktitle = {8th ACM Conference on Computer and Communications
  358. Security (CCS-8)},
  359. pages = {116--125},
  360. year = 2001,
  361. editor = {P. Samarati},
  362. month = {November},
  363. publisher = {ACM Press},
  364. }
  365. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  366. % technicaldocs/shuffle.pdf}},
  367. @InProceedings{dolev91,
  368. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  369. title = {Non-Malleable Cryptography},
  370. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  371. pages = {542--552},
  372. year = 1991,
  373. note = {Updated version at
  374. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  375. }
  376. @TechReport{rsw96,
  377. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  378. title = {Time-lock puzzles and timed-release Crypto},
  379. year = 1996,
  380. type = {MIT LCS technical memo},
  381. number = {MIT/LCS/TR-684},
  382. month = {February},
  383. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  384. }
  385. @InProceedings{web-mix,
  386. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  387. title = {Web {MIX}es: A system for anonymous and unobservable
  388. {I}nternet access},
  389. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  390. on Design Issue in Anonymity and Unobservability},
  391. editor = {H. Federrath},
  392. publisher = {Springer-Verlag, LNCS 2009},
  393. pages = {115--129},
  394. year = {2000},
  395. }
  396. @InProceedings{disad-free-routes,
  397. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  398. title = {The disadvantages of free {MIX} routes and how to overcome
  399. them},
  400. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  401. on Design Issue in Anonymity and Unobservability},
  402. pages = {30--45},
  403. year = 2000,
  404. editor = {H. Federrath},
  405. publisher = {Springer-Verlag, LNCS 2009},
  406. }
  407. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  408. % disadvantages_berthold.pdf}},
  409. @InProceedings{boneh00,
  410. author = {Dan Boneh and Moni Naor},
  411. title = {Timed Commitments},
  412. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  413. pages = {236--254},
  414. year = 2000,
  415. publisher = {Springer-Verlag, LNCS 1880},
  416. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  417. }
  418. @InProceedings{goldschlag98,
  419. author = {David M. Goldschlag and Stuart G. Stubblebine},
  420. title = {Publicly Verifiable Lotteries: Applications of
  421. Delaying Functions},
  422. booktitle = {Financial Cryptography},
  423. pages = {214--226},
  424. year = 1998,
  425. publisher = {Springer-Verlag, LNCS 1465},
  426. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  427. }
  428. @InProceedings{syverson98,
  429. author = {Paul Syverson},
  430. title = {Weakly Secret Bit Commitment: Applications to
  431. Lotteries and Fair Exchange},
  432. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  433. pages = {2--13},
  434. year = 1998,
  435. address = {Rockport Massachusetts},
  436. month = {June},
  437. publisher = {IEEE CS Press},
  438. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  439. }
  440. @Misc{shoup-iso,
  441. author = {Victor Shoup},
  442. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  443. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  444. }
  445. @Misc{shoup-oaep,
  446. author = {Victor Shoup},
  447. title = {{OAEP} Reconsidered},
  448. howpublished = {{IACR} e-print 2000/060},
  449. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  450. }
  451. @Misc{oaep-still-alive,
  452. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  453. title = {{RSA}-{OAEP} is Still Alive!},
  454. howpublished = {{IACR} e-print 2000/061},
  455. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  456. }
  457. @misc{echolot,
  458. author = {Peter Palfrader},
  459. title = {Echolot: a pinger for anonymous remailers},
  460. note = {\url{http://www.palfrader.org/echolot/}},
  461. }
  462. @Misc{mixmaster-attacks,
  463. author = {Lance Cottrell},
  464. title = {Mixmaster and Remailer Attacks},
  465. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  466. }
  467. @Misc{mixmaster-spec,
  468. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  469. Palfrader and Len Sassaman},
  470. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  471. year = {2003},
  472. month = {July},
  473. howpublished = {Draft},
  474. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  475. }
  476. @Misc{hashcash,
  477. author = {Adam Back},
  478. title = {Hash cash},
  479. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  480. }
  481. @InProceedings{oreilly-acc,
  482. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  483. title = {Accountability},
  484. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  485. Technology},
  486. year = {2001},
  487. publisher = {O'Reilly and Associates},
  488. }
  489. @InProceedings{han,
  490. author = {Yongfei Han},
  491. title = {Investigation of non-repudiation protocols},
  492. booktitle = {ACISP '96},
  493. year = 1996,
  494. publisher = {Springer-Verlag},
  495. }
  496. @Misc{socks5,
  497. key = {socks5},
  498. title = {{SOCKS} {P}rotocol {V}ersion 5},
  499. howpublished= {IETF RFC 1928},
  500. month = {March},
  501. year = 1996,
  502. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  503. }
  504. @InProceedings{abe,
  505. author = {Masayuki Abe},
  506. title = {Universally Verifiable {MIX} With Verification Work Independent of
  507. The Number of {MIX} Servers},
  508. booktitle = {{EUROCRYPT} 1998},
  509. year = {1998},
  510. publisher = {Springer-Verlag, LNCS 1403},
  511. }
  512. @InProceedings{desmedt,
  513. author = {Yvo Desmedt and Kaoru Kurosawa},
  514. title = {How To Break a Practical {MIX} and Design a New One},
  515. booktitle = {{EUROCRYPT} 2000},
  516. year = {2000},
  517. publisher = {Springer-Verlag, LNCS 1803},
  518. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  519. }
  520. @InProceedings{mitkuro,
  521. author = {M. Mitomo and K. Kurosawa},
  522. title = {{Attack for Flash MIX}},
  523. booktitle = {{ASIACRYPT} 2000},
  524. year = {2000},
  525. publisher = {Springer-Verlag, LNCS 1976},
  526. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  527. }
  528. @InProceedings{hybrid-mix,
  529. author = {M. Ohkubo and M. Abe},
  530. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  531. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  532. year = {2000},
  533. publisher = {Springer-Verlag, LNCS 1976},
  534. }
  535. @InProceedings{PShuffle,
  536. author = {Jun Furukawa and Kazue Sako},
  537. title = {An Efficient Scheme for Proving a Shuffle},
  538. editor = {Joe Kilian},
  539. booktitle = {CRYPTO 2001},
  540. year = {2001},
  541. publisher = {Springer-Verlag, LNCS 2139},
  542. }
  543. @InProceedings{jakobsson-optimally,
  544. author = "Markus Jakobsson and Ari Juels",
  545. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  546. booktitle = {Principles of Distributed Computing - {PODC} '01},
  547. year = "2001",
  548. publisher = {ACM Press},
  549. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  550. }
  551. @InProceedings{kesdogan,
  552. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  553. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  554. System},
  555. booktitle = {Information Hiding (IH 1998)},
  556. year = {1998},
  557. publisher = {Springer-Verlag, LNCS 1525},
  558. }
  559. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  560. @InProceedings{socks4,
  561. author = {David Koblas and Michelle R. Koblas},
  562. title = {{SOCKS}},
  563. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  564. Symposium)},
  565. pages = {77--83},
  566. year = 1992,
  567. publisher = {USENIX},
  568. }
  569. @InProceedings{flash-mix,
  570. author = {Markus Jakobsson},
  571. title = {Flash {M}ixing},
  572. booktitle = {Principles of Distributed Computing - {PODC} '99},
  573. year = {1999},
  574. publisher = {ACM Press},
  575. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  576. }
  577. @InProceedings{SK,
  578. author = {Joe Kilian and Kazue Sako},
  579. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  580. the Implementation of a Voting Booth},
  581. booktitle = {EUROCRYPT '95},
  582. year = {1995},
  583. publisher = {Springer-Verlag},
  584. }
  585. @InProceedings{OAEP,
  586. author = {M. Bellare and P. Rogaway},
  587. year = {1994},
  588. booktitle = {EUROCRYPT '94},
  589. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  590. {RSA}},
  591. publisher = {Springer-Verlag},
  592. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  593. }
  594. @inproceedings{babel,
  595. title = {Mixing {E}-mail With {B}abel},
  596. author = {Ceki G\"ulc\"u and Gene Tsudik},
  597. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  598. year = 1996,
  599. month = {February},
  600. pages = {2--16},
  601. publisher = {IEEE},
  602. }
  603. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  604. @Misc{rprocess,
  605. author = {RProcess},
  606. title = {Selective Denial of Service Attacks},
  607. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  608. }
  609. @Article{remailer-history,
  610. author = {Sameer Parekh},
  611. title = {Prospects for Remailers},
  612. journal = {First Monday},
  613. volume = {1},
  614. number = {2},
  615. month = {August},
  616. year = {1996},
  617. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  618. }
  619. @Article{chaum-mix,
  620. author = {David Chaum},
  621. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  622. journal = {Communications of the ACM},
  623. year = {1981},
  624. volume = {4},
  625. number = {2},
  626. month = {February},
  627. }
  628. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  629. @InProceedings{nym-alias-net,
  630. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  631. title = {{The Design, Implementation and Operation of an Email
  632. Pseudonym Server}},
  633. booktitle = {$5^{th}$ ACM Conference on Computer and
  634. Communications Security (CCS'98)},
  635. year = 1998,
  636. publisher = {ACM Press},
  637. }
  638. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  639. @InProceedings{tangler,
  640. author = {Marc Waldman and David Mazi\`{e}res},
  641. title = {Tangler: A Censorship-Resistant Publishing System
  642. Based on Document Entanglements},
  643. booktitle = {$8^{th}$ ACM Conference on Computer and
  644. Communications Security (CCS-8)},
  645. pages = {86--135},
  646. year = 2001,
  647. publisher = {ACM Press},
  648. }
  649. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  650. @misc{neochaum,
  651. author = {Tim May},
  652. title = {Payment mixes for anonymity},
  653. howpublished = {E-mail archived at
  654. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  655. }
  656. @misc{helsingius,
  657. author = {J. Helsingius},
  658. title = {{\tt anon.penet.fi} press release},
  659. note = {\newline \url{http://www.penet.fi/press-english.html}},
  660. }
  661. @InProceedings{garay97secure,
  662. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  663. title = {Secure distributed storage and retrieval},
  664. booktitle = {11th International Workshop, WDAG '97},
  665. pages = {275--289},
  666. year = {1997},
  667. publisher = {Springer-Verlag, LNCS 1320},
  668. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  669. }
  670. @InProceedings{PIK,
  671. author = {C. Park and K. Itoh and K. Kurosawa},
  672. title = {Efficient anonymous channel and all/nothing election scheme},
  673. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  674. pages = {248--259},
  675. publisher = {Springer-Verlag, LNCS 765},
  676. }
  677. @Misc{pgpfaq,
  678. key = {PGP},
  679. title = {{PGP} {FAQ}},
  680. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  681. }
  682. @Article{riordan-schneier,
  683. author = {James Riordan and Bruce Schneier},
  684. title = {A Certified E-mail Protocol with No Trusted Third Party},
  685. journal = {13th Annual Computer Security Applications Conference},
  686. month = {December},
  687. year = {1998},
  688. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  689. }
  690. @Article{crowds-tissec,
  691. author = {Michael K. Reiter and Aviel D. Rubin},
  692. title = {Crowds: Anonymity for Web Transactions},
  693. journal = {ACM TISSEC},
  694. year = 1998,
  695. volume = 1,
  696. number = 1,
  697. pages = {66--92},
  698. month = {November},
  699. }
  700. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  701. @Article{crowds-dimacs,
  702. author = {Michael K. Reiter and Aviel D. Rubin},
  703. title = {Crowds: Anonymity for Web Transactions},
  704. journal = {{DIMACS} Technical Report (Revised)},
  705. volume = {97},
  706. number = {15},
  707. month = {August},
  708. year = {1997},
  709. }
  710. @Misc{advogato,
  711. author = {Raph Levien},
  712. title = {Advogato's Trust Metric},
  713. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  714. }
  715. @InProceedings{publius,
  716. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  717. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  718. source-anonymous web publishing system},
  719. booktitle = {Proc. 9th USENIX Security Symposium},
  720. pages = {59--72},
  721. year = {2000},
  722. month = {August},
  723. }
  724. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  725. @Misc{freedom-nyms,
  726. author = {Russell Samuels},
  727. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  728. year = {1999},
  729. month = {November},
  730. day = {21},
  731. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  732. }
  733. @techreport{freedom2-arch,
  734. title = {Freedom Systems 2.0 Architecture},
  735. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  736. institution = {Zero Knowledge Systems, {Inc.}},
  737. year = {2000},
  738. month = {December},
  739. type = {White Paper},
  740. day = {18},
  741. }
  742. @techreport{freedom21-security,
  743. title = {Freedom Systems 2.1 Security Issues and Analysis},
  744. author = {Adam Back and Ian Goldberg and Adam Shostack},
  745. institution = {Zero Knowledge Systems, {Inc.}},
  746. year = {2001},
  747. month = {May},
  748. type = {White Paper},
  749. }
  750. @inproceedings{cfs:sosp01,
  751. title = {Wide-area cooperative storage with {CFS}},
  752. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  753. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  754. year = {2001},
  755. month = {October},
  756. address = {Chateau Lake Louise, Banff, Canada},
  757. }
  758. @inproceedings{SS03,
  759. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  760. author = {Andrei Serjantov and Peter Sewell},
  761. booktitle = {Computer Security -- ESORICS 2003},
  762. publisher = {Springer-Verlag, LNCS (forthcoming)},
  763. year = {2003},
  764. month = {October},
  765. }
  766. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  767. @Misc{pk-relations,
  768. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  769. title = {Relations Among Notions of Security for Public-Key Encryption
  770. Schemes},
  771. howpublished = {
  772. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  773. Springer-Verlag, 1998.
  774. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  775. }
  776. @InProceedings{mix-acc,
  777. author = {Roger Dingledine and Michael J. Freedman and David
  778. Hopwood and David Molnar},
  779. title = {{A Reputation System to Increase MIX-net
  780. Reliability}},
  781. booktitle = {Information Hiding (IH 2001)},
  782. pages = {126--141},
  783. year = 2001,
  784. editor = {Ira S. Moskowitz},
  785. publisher = {Springer-Verlag, LNCS 2137},
  786. }
  787. %note = {\url{http://www.freehaven.net/papers.html}},
  788. @InProceedings{casc-rep,
  789. author = {Roger Dingledine and Paul Syverson},
  790. title = {{Reliable MIX Cascade Networks through Reputation}},
  791. booktitle = {Financial Cryptography},
  792. year = 2002,
  793. editor = {Matt Blaze},
  794. publisher = {Springer-Verlag, LNCS 2357},
  795. }
  796. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  797. @InProceedings{zhou96certified,
  798. author = {Zhou and Gollmann},
  799. title = {Certified Electronic Mail},
  800. booktitle = {{ESORICS: European Symposium on Research in Computer
  801. Security}},
  802. publisher = {Springer-Verlag, LNCS 1146},
  803. year = {1996},
  804. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  805. }
  806. @Misc{realtime-mix,
  807. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  808. Birgit Pfitzmann and Michael Waidner},
  809. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  810. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  811. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  812. }
  813. @InProceedings{danezis-pets03,
  814. author = {George Danezis},
  815. title = {Mix-networks with Restricted Routes},
  816. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  817. year = 2003,
  818. editor = {Roger Dingledine},
  819. publisher = {Springer-Verlag LNCS 2760}
  820. }
  821. @InProceedings{gap-pets03,
  822. author = {Krista Bennett and Christian Grothoff},
  823. title = {{GAP} -- practical anonymous networking},
  824. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  825. year = 2003,
  826. editor = {Roger Dingledine},
  827. publisher = {Springer-Verlag LNCS 2760}
  828. }
  829. @Article{hordes-jcs,
  830. author = {Brian Neal Levine and Clay Shields},
  831. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  832. journal = {Journal of Computer Security},
  833. year = 2002,
  834. volume = 10,
  835. number = 3,
  836. pages = {213--240}
  837. }
  838. @TechReport{herbivore,
  839. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  840. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  841. institution = {Cornell University Computing and Information Science},
  842. year = 2003,
  843. type = {Technical Report},
  844. number = {TR2003-1890},
  845. month = {February}
  846. }
  847. @InProceedings{p5,
  848. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  849. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  850. booktitle = {2002 IEEE Symposium on Security and Privacy},
  851. pages = {58--70},
  852. year = 2002,
  853. publisher = {IEEE CS}
  854. }
  855. @phdthesis{ian-thesis,
  856. title = {A Pseudonymous Communications Infrastructure for the Internet},
  857. author = {Ian Goldberg},
  858. school = {UC Berkeley},
  859. year = {2000},
  860. month = {December},
  861. }
  862. @Article{taz,
  863. author = {Ian Goldberg and David Wagner},
  864. title = {TAZ Servers and the Rewebber Network: Enabling
  865. Anonymous Publishing on the World Wide Web},
  866. journal = {First Monday},
  867. year = 1998,
  868. volume = 3,
  869. number = 4,
  870. month = {August},
  871. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  872. }
  873. @Misc{tcp-over-tcp-is-bad,
  874. key = {tcp-over-tcp-is-bad},
  875. title = {Why TCP Over TCP Is A Bad Idea},
  876. author = {Olaf Titz},
  877. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  878. }
  879. @inproceedings{wright02,
  880. title = {An Analysis of the Degradation of Anonymous Protocols},
  881. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  882. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  883. year = {2002},
  884. month = {February},
  885. publisher = {IEEE},
  886. }
  887. @inproceedings{wright03,
  888. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  889. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  890. booktitle = {IEEE Symposium on Security and Privacy},
  891. pages= {28--41},
  892. year = {2003},
  893. month = {May},
  894. publisher = {IEEE CS},
  895. }
  896. %%% Local Variables:
  897. %%% mode: latex
  898. %%% TeX-master: "tor-design"
  899. %%% End: