| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493 | % hs-attack@inproceedings{hs-attack,  title = {Locating Hidden Servers},  author = {Lasse {\O}verlier and Paul Syverson},   booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},   year = {2006},   month = {May},   publisher = {IEEE CS},}@TechReport{bauer:tr2007,  author = 	 {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},  title = 	 {Low-Resource Routing Attacks Against Anonymous Systems},  institution =  {University of Colorado at Boulder},  year = 	 2007,  number = 	 {CU-CS-1025-07}}@inproceedings{bauer:wpes2007,  title = {Low-Resource Routing Attacks Against Tor},  author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}},  year = {2007},  month = {October},  address = {Washington, DC, USA},}% fix me@misc{tannenbaum96,  author = "Andrew Tannenbaum",  title = "Computer Networks",  year = "1996",  publisher = "Prentice Hall, 3rd edition",}@article{ meadows96,    author = "Catherine Meadows",    title = "The {NRL} Protocol Analyzer: An Overview",    journal = "Journal of Logic Programming",    volume = "26",    number = "2",    pages = "113--131",    year = "1996",}@inproceedings{kesdogan:pet2002,  title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an        alternative to the MIX based Approach?},  author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},  booktitle = {Privacy Enhancing Technologies (PET 2002)},  year = {2002},  month = {April},  editor = {Roger Dingledine and Paul Syverson},  publisher = {Springer-Verlag, LNCS 2482},}@inproceedings{statistical-disclosure,  title = {Statistical Disclosure Attacks},  author = {George Danezis},  booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},  organization = {{IFIP TC11}},  year = {2003},  month = {May},  address = {Athens},  pages = {421--426},  publisher = {Kluwer},}@inproceedings{limits-open,  title = {Limits of Anonymity in Open Environments},  author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},  booktitle = {Information Hiding Workshop (IH 2002)},  year = {2002},  month = {October},  editor = {Fabien Petitcolas},  publisher = {Springer-Verlag, LNCS 2578},}@inproceedings{isdn-mixes,  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},  booktitle = {GI/ITG Conference on Communication in Distributed Systems},  year = {1991},  month = {February},  pages = {451-463},}@Article{jerichow-jsac98,  author = 	 {Anja Jerichow and Jan M\"{u}ller and Andreas                  Pfitzmann and Birgit Pfitzmann and Michael Waidner},  title = 	 {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},  journal = 	 {IEEE Journal on Selected Areas in Communications},  year = 	 1998,  volume =	 16,  number =	 4,  pages =	 {495--509},  month =	 {May}}@inproceedings{tarzan:ccs02,  title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},  author = {Michael J. Freedman and Robert Morris},  booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications        {S}ecurity ({CCS 2002})},  year = {2002},  month = {November},  address = {Washington, DC},}@inproceedings{cebolla,  title = {{Cebolla: Pragmatic IP Anonymity}},  author = {Zach Brown},  booktitle = {Ottawa Linux Symposium},  year = {2002},  month = {June},}@inproceedings{eax,  author = "M. Bellare and P. Rogaway and D. Wagner",  title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},  booktitle = {Fast Software Encryption 2004},  month = {February},  year = {2004},}@misc{darkside,  title = {{The Dark Side of the Web: An Open Proxy's View}},  author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},  note = {\newline \url{http://codeen.cs.princeton.edu/}},}%  note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},@Misc{anonymizer,  key =          {anonymizer},  title =        {The {Anonymizer}},  note =         {\url{http://anonymizer.com/}}}@Misc{privoxy,  key =          {privoxy},  title =        {{Privoxy}},  note =         {\url{http://www.privoxy.org/}}}@Misc{i2p,  key =          {i2p},  title =        {{I2P}},  note =         {\url{http://www.i2p.net/}}}@Misc{nym,  author = 	 {Jason Holt},  title = 	 {nym: practical pseudonymity for anonymous networks},  note = 	 {Paper and source code at \url{http://www.lunkwill.org/src/nym/}}}@InProceedings{nymble,  author = 	 {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},  title = 	 {Nymble: Anonymous {IP}-address Blocking},  booktitle = {Privacy Enhancing Technologies (PET 2007)},  year = 	 2007,  publisher = {Springer-Verlag, LNCS 4776}}@inproceedings{anonnet,  title = {{Analysis of an Anonymity Network for Web Browsing}},  author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and        David Hutchison},  booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE        2002)}},  year = {2002},  month = {June},  address = {Pittsburgh, USA},}%  pages = {49--54},@inproceedings{econymics,  title = {On the Economics of Anonymity},  author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},  booktitle = {Financial Cryptography},  year = {2003},  editor = {Rebecca N. Wright},  publisher = {Springer-Verlag, LNCS 2742},}@inproceedings{defensive-dropping,  title = {Timing Analysis in Low-Latency Mix-Based Systems},  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},  booktitle = {Financial Cryptography},  year = {2004},  editor = {Ari Juels},  publisher = {Springer-Verlag, LNCS (forthcoming)},}@inproceedings{morphmix:fc04,  title = {Practical Anonymity for the Masses with MorphMix},  author = {Marc Rennhard and Bernhard Plattner},  booktitle = {Financial Cryptography},  year = {2004},  editor = {Ari Juels},  publisher = {Springer-Verlag, LNCS (forthcoming)},}@inproceedings{eternity,  title = {The Eternity Service},  author = {Ross Anderson},  booktitle = {Pragocrypt '96},  year = {1996},}  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},@inproceedings{minion-design,  title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},  author = {George Danezis and Roger Dingledine and Nick Mathewson},  booktitle = {2003 IEEE Symposium on Security and Privacy},  year = {2003},  month = {May},  publisher = {IEEE CS},  pages = {2--15},}  %note = {\url{http://mixminion.net/minion-design.pdf}},@inproceedings{ rao-pseudonymity,    author = "Josyula R. Rao and Pankaj Rohatgi",    title = "Can Pseudonymity Really Guarantee Privacy?",    booktitle = "Proceedings of the Ninth USENIX Security Symposium",    year = {2000},    month = Aug,    publisher = {USENIX},    pages = "85--96",}    %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/%full_papers/rao/rao.pdf}},@InProceedings{pfitzmann90how,    author = "Birgit Pfitzmann and Andreas Pfitzmann",    title = "How to Break the Direct {RSA}-Implementation of {MIXes}",    booktitle = {Eurocrypt 89},    publisher = {Springer-Verlag, LNCS 434},    year = {1990},    note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},}@Misc{tor-spec,   author =      {Roger Dingledine and Nick Mathewson},   title =       {Tor Protocol Specifications},   note =        {\url{https://www.torproject.org/svn/trunk/doc/tor-spec.txt}},}@Misc{incentives-txt,   author =      {Roger Dingledine and Nick Mathewson},   title =       {Tor Incentives Design Brainstorms},   note =        {\url{https://www.torproject.org/svn/trunk/doc/incentives.txt}},}@InProceedings{BM:mixencrypt,  author =       {M{\"o}ller, Bodo},  title =        {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},  booktitle =    {{CT-RSA} 2003},  publisher =    {Springer-Verlag, LNCS 2612},  year =         2003,}@InProceedings{back01,  author =       {Adam Back and Ulf M\"oller and Anton Stiglic},  title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},  booktitle =    {Information Hiding (IH 2001)},  pages =        {245--257},  year =         2001,  editor =       {Ira S. Moskowitz},  publisher =    {Springer-Verlag, LNCS 2137},}  %note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},@InProceedings{rackoff93cryptographic,   author =      {Charles Rackoff and Daniel R. Simon},   title =       {Cryptographic Defense Against Traffic Analysis},   booktitle =   {{ACM} Symposium on Theory of Computing},   pages =       {672--681},   year =        {1993},}   %note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},@InProceedings{freehaven-berk,   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},   title =       {The Free Haven Project: Distributed Anonymous Storage Service},   booktitle =   {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   year =        2000,   month =       {July},   editor =      {H. Federrath},   publisher =   {Springer-Verlag, LNCS 2009},}   @InProceedings{move-ndss05,  author = 	 {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},  title = 	 {MOVE: An End-to-End Solution To Network Denial of Service},  booktitle = 	 {{ISOC Network and Distributed System Security Symposium (NDSS05)}},  year =	 2005,  month =	 {February},  publisher =	 {Internet Society}}%note =        {\url{http://freehaven.net/papers.html}},@InProceedings{raymond00,  author =       {J. F. Raymond},  title =        {{Traffic Analysis: Protocols, Attacks, Design Issues,                  and Open Problems}},  booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},  year =         2000,  month =        {July},  pages =        {10-29},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}@InProceedings{sybil,  author = "John Douceur",  title = {{The Sybil Attack}},  booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",  month = Mar,  year = 2002,}@InCollection{price-privacy,  author =	 {Paul Syverson and Adam Shostack},  editor =	 {L. Jean Camp and Stephen Lewis},  title = 	 {What Price Privacy? (and why identity theft is about neither identity nor theft)},  booktitle =	 {Economics of Information Security},  chapter = 	 10,  publisher = 	 {Kluwer},  year = 	 2004,  pages =	 {129--142}}@InProceedings{trickle02,  author =       {Andrei Serjantov and Roger Dingledine and Paul Syverson},  title =        {From a Trickle to a Flood: Active Attacks on Several                  Mix Types},  booktitle =    {Information Hiding (IH 2002)},  year =         {2002},  editor =       {Fabien Petitcolas},  publisher =    {Springer-Verlag, LNCS 2578},}@InProceedings{langos02,  author =      {Oliver Berthold and Heinrich Langos},  title =       {Dummy Traffic Against Long Term Intersection Attacks},  booktitle =    {Privacy Enhancing Technologies (PET 2002)},  year =         {2002},  editor =       {Roger Dingledine and Paul Syverson},  publisher =    {Springer-Verlag, LNCS 2482}}@InProceedings{hintz-pet02,  author = 	 {Andrew Hintz},  title = 	 {Fingerprinting Websites Using Traffic Analysis},  booktitle = 	 {Privacy Enhancing Technologies (PET 2002)},  pages =	 {171--178},  year =	 2002,  editor =	 {Roger Dingledine and Paul Syverson},  publisher =	 {Springer-Verlag, LNCS 2482}}@InProceedings{or-discex00,   author =      {Paul Syverson and Michael Reed and David Goldschlag},   title =       {{O}nion {R}outing Access Configurations},   booktitle =   {DARPA Information Survivability Conference and                  Exposition (DISCEX 2000)},   year =        {2000},   publisher =   {IEEE CS Press},   pages =       {34--40},   volume =      {1},}   %note =        {\newline \url{http://www.onion-router.net/Publications.html}},@Inproceedings{or-pet00,  title =        {{Towards an Analysis of Onion Routing Security}},  author =       {Paul Syverson and Gene Tsudik and Michael Reed and                  Carl Landwehr},  booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},  year =         2000,  month =        {July},  pages =        {96--114},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}  %note =         {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},@Inproceedings{freenet-pets00,  title =        {Freenet: A Distributed Anonymous Information Storage    and Retrieval System},  author =       {Ian Clarke and Oskar Sandberg and Brandon Wiley and    Theodore W. Hong},  booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},  year =         2000,  month =        {July},  pages =        {46--66},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}  %note =         {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},@InProceedings{or-ih96,  author =       {David M. Goldschlag and Michael G. Reed and Paul                  F. Syverson},  title =        {Hiding Routing Information},  booktitle =    {Information Hiding, First International Workshop},  pages =        {137--150},  year =         1996,  editor =       {R. Anderson},  month =        {May},  publisher =    {Springer-Verlag, LNCS 1174},}@InProceedings{federrath-ih96,  author = 	 {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},  title = 	 {{MIXes} in Mobile Communication Systems: Location                  Management with Privacy},  booktitle =    {Information Hiding, First International Workshop},  pages =        {121--135},  year =         1996,  editor =       {R. Anderson},  month =        {May},  publisher =    {Springer-Verlag, LNCS 1174},}@InProceedings{reed-protocols97,  author = 	 {Michael G. Reed and Paul F. Syverson and David                  M. Goldschlag},  title = 	 {Protocols Using Anonymous Connections: Mobile Applications},  booktitle = 	 {Security Protocols: 5th International Workshop},  pages =	 {13--23},  year =	 1997,  editor =	 {Bruce Christianson and Bruno Crispo and Mark Lomas                  and Michael Roe},  month =	 {April},  publisher =	 {Springer-Verlag, LNCS 1361}}@Article{or-jsac98,  author =       {Michael G. Reed and Paul F. Syverson and David                  M. Goldschlag},  title =        {Anonymous Connections and Onion Routing},  journal =      {IEEE Journal on Selected Areas in Communications},  year =         1998,  volume =       16,  number =       4,  pages =        {482--494},  month =        {May},}  %note =         {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}@Misc{TLS,   author =      {T. Dierks and C. Allen},   title =       {The {TLS} {P}rotocol --- {V}ersion 1.0},   howpublished = {IETF RFC 2246},   month =       {January},   year =        {1999},}%note =        {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},@Misc{SMTP,   author =      {J. Postel},   title =       {Simple {M}ail {T}ransfer {P}rotocol},   howpublished = {IETF RFC 2821 (also STD0010)},   month =       {April},   year =        {2001},   note =        {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},}@Misc{IMAP,   author =      {M. Crispin},   title =       {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},   howpublished = {IETF RFC 2060},   month =       {December},   year =        {1996},   note =        {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},}@misc{pipenet,  title = {PipeNet 1.1},  author = {Wei Dai},  year = 1996,  month = {August},  howpublished = {Usenet post},  note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned      in a post to the cypherpunks list, Feb.\ 1995.},}@Misc{POP3,   author =      {J. Myers and M. Rose},   title =       {Post {O}ffice {P}rotocol --- {V}ersion 3},   howpublished = {IETF RFC 1939 (also STD0053)},   month =       {May},   year =        {1996},   note =        {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},}@InProceedings{shuffle,   author =      {C. Andrew Neff},   title =       {A Verifiable Secret Shuffle and its Application to E-Voting},   booktitle =    {8th ACM Conference on Computer and Communications                  Security (CCS-8)},   pages =       {116--125},   year =        2001,   editor =      {P. Samarati},   month =       {November},   publisher =   {ACM Press},}   %note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/   %                    technicaldocs/shuffle.pdf}},@InProceedings{dolev91,   author =      {Danny Dolev and Cynthia Dwork and Moni Naor},   title =       {Non-Malleable Cryptography},   booktitle =   {23rd ACM Symposium on the Theory of Computing (STOC)},   pages =       {542--552},   year =        1991,   note =        {Updated version at                  \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},}@TechReport{rsw96,   author =      {Ronald L. Rivest and Adi Shamir and David A. Wagner},   title =       {Time-lock puzzles and timed-release Crypto},   year =        1996,   type =        {MIT LCS technical memo},   number =      {MIT/LCS/TR-684},   month =       {February},   note =        {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},}@InProceedings{web-mix,   author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},   title =       {Web {MIX}es: A system for anonymous and unobservable                  {I}nternet access},  booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   editor =       {H. Federrath},   publisher =    {Springer-Verlag, LNCS 2009},   year =        {2000},}%   pages =       {115--129},@InProceedings{disad-free-routes,   author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},   title =       {The disadvantages of free {MIX} routes and how to overcome                  them},   booktitle =   {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   pages =       {30--45},   year =        2000,   editor =       {H. Federrath},   publisher =    {Springer-Verlag, LNCS 2009},}   %note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/   %                    disadvantages_berthold.pdf}},@InProceedings{boneh00,   author =      {Dan Boneh and Moni Naor},   title =       {Timed Commitments},   booktitle =   {Advances in Cryptology -- {CRYPTO} 2000},   pages =       {236--254},   year =        2000,   publisher =   {Springer-Verlag, LNCS 1880},   note =        {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},}@InProceedings{goldschlag98,   author =      {David M. Goldschlag and Stuart G. Stubblebine},   title =       {Publicly Verifiable Lotteries: Applications of                  Delaying Functions},   booktitle =   {Financial Cryptography},   pages =       {214--226},   year =        1998,   publisher =   {Springer-Verlag, LNCS 1465},   note =        {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},}@InProceedings{syverson98,   author =      {Paul Syverson},   title =       {Weakly Secret Bit Commitment: Applications to                  Lotteries and Fair Exchange},   booktitle =   {Computer Security Foundations Workshop (CSFW11)},   pages =       {2--13},   year =        1998,   address =     {Rockport Massachusetts},   month =       {June},   publisher =   {IEEE CS Press},   note =        {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},}@Misc{shoup-iso,   author =      {Victor Shoup},   title =       {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},   note =        {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},}@Misc{shoup-oaep,   author =      {Victor Shoup},   title =       {{OAEP} Reconsidered},   howpublished = {{IACR} e-print 2000/060},   note =        {\newline \url{http://eprint.iacr.org/2000/060/}},}@Misc{oaep-still-alive,   author =      {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},   title =       {{RSA}-{OAEP} is Still Alive!},   howpublished = {{IACR} e-print 2000/061},   note =        {\newline \url{http://eprint.iacr.org/2000/061/}},}@misc{echolot,  author = {Peter Palfrader},  title = {Echolot: a pinger for anonymous remailers},  note = {\url{http://www.palfrader.org/echolot/}},}@Misc{mixmaster-attacks,   author =      {Lance Cottrell},   title =       {Mixmaster and Remailer Attacks},   note =        {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},}@Misc{mixmaster-spec,   author =      {Ulf M{\"o}ller and Lance Cottrell and Peter                  Palfrader and Len Sassaman},   title =       {Mixmaster {P}rotocol --- {V}ersion 2},   year =        {2003},   month =       {July},   howpublished = {Draft},   note =        {\url{http://www.abditum.com/mixmaster-spec.txt}},}@InProceedings{puzzles-tls,    author = "Drew Dean and Adam Stubblefield",    title = {{Using Client Puzzles to Protect TLS}},    booktitle = "Proceedings of the 10th USENIX Security Symposium",    year = {2001},    month = Aug,    publisher = {USENIX},}@InProceedings{breadpudding,  author =       {Markus Jakobsson and Ari Juels},  title =        {Proofs of Work and Bread Pudding Protocols},  booktitle =    {Proceedings of the IFIP TC6 and TC11 Joint Working                  Conference on Communications and Multimedia Security                  (CMS '99)},  year =         1999,  month =        {September},  publisher =    {Kluwer}}@Misc{hashcash,   author =      {Adam Back},   title =       {Hash cash},   note =        {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},}@InProceedings{oreilly-acc,   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},   title =       {Accountability},   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive                  Technology},   year =        {2001},   publisher =   {O'Reilly and Associates},}@InProceedings{han,   author =      {Yongfei Han},   title =       {Investigation of non-repudiation protocols},   booktitle =   {ACISP '96},   year =        1996,   publisher =   {Springer-Verlag},}@Misc{socks5,  key =          {socks5},  title =        {{SOCKS} {P}rotocol {V}ersion 5},  howpublished=  {IETF RFC 1928},  month =        {March},  year =         1996,  note =         {\url{http://www.ietf.org/rfc/rfc1928.txt}}}@InProceedings{abe,   author =      {Masayuki Abe},   title =       {Universally Verifiable {MIX} With Verification Work Independent of                  The Number of {MIX} Servers},   booktitle =   {{EUROCRYPT} 1998},   year =        {1998},   publisher =   {Springer-Verlag, LNCS 1403},}@InProceedings{desmedt,   author =      {Yvo Desmedt and Kaoru Kurosawa},   title =       {How To Break a Practical {MIX} and Design a New One},   booktitle =   {{EUROCRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1803},   note =        {\url{http://citeseer.nj.nec.com/447709.html}},}@InProceedings{mitkuro,   author =      {M. Mitomo and K. Kurosawa},   title =       {{Attack for Flash MIX}},   booktitle =   {{ASIACRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1976},   note =        {\newline \url{http://citeseer.nj.nec.com/450148.html}},}@InProceedings{hybrid-mix,   author =      {M. Ohkubo and M. Abe},   title =       {A {L}ength-{I}nvariant {H}ybrid {MIX}},   booktitle =   {Advances in Cryptology - {ASIACRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1976},}@InProceedings{PShuffle,  author = {Jun Furukawa and Kazue Sako},  title = {An Efficient Scheme for Proving a Shuffle},  editor    = {Joe Kilian},  booktitle = {CRYPTO 2001},  year      = {2001},  publisher = {Springer-Verlag, LNCS 2139},}@InProceedings{jakobsson-optimally,  author = "Markus Jakobsson and Ari Juels",  title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",  booktitle =   {Principles of Distributed Computing - {PODC} '01},  year = "2001",  publisher =   {ACM Press},  note = {\url{http://citeseer.nj.nec.com/492015.html}},}@InProceedings{kesdogan,   author =      {D. Kesdogan and M. Egner and T. B\"uschkes},   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open                  System},   booktitle =   {Information Hiding (IH 1998)},   year =        {1998},   publisher =   {Springer-Verlag, LNCS 1525},}   %note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},@InProceedings{socks4,  author =       {David Koblas and Michelle R. Koblas},  title =        {{SOCKS}},  booktitle =    {UNIX Security III Symposium (1992 USENIX Security                  Symposium)},  pages =        {77--83},  year =         1992,  publisher =    {USENIX},}@InProceedings{flash-mix,   author =      {Markus Jakobsson},   title =       {Flash {M}ixing},   booktitle =   {Principles of Distributed Computing - {PODC} '99},   year =        {1999},   publisher =   {ACM Press},   note =        {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},}@InProceedings{SK,   author =      {Joe Kilian and Kazue Sako},   title =       {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to                  the Implementation of a Voting Booth},   booktitle =   {EUROCRYPT '95},   year =        {1995},   publisher =   {Springer-Verlag},}@InProceedings{OAEP,   author =      {M. Bellare and P. Rogaway},   year =        {1994},   booktitle =   {EUROCRYPT '94},   title =       {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With                  {RSA}},   publisher =   {Springer-Verlag},   note =        {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},}@inproceedings{babel,  title = {Mixing {E}-mail With {B}abel},  author = {Ceki G\"ulc\"u and Gene Tsudik},  booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},  year = 1996,  month = {February},  pages = {2--16},  publisher = {IEEE},}  %note = {\url{http://citeseer.nj.nec.com/2254.html}},@Misc{rprocess,   author =      {RProcess},   title =       {Selective Denial of Service Attacks},   note =        {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},}@Article{remailer-history,  author = {Sameer Parekh},  title = {Prospects for Remailers},  journal = {First Monday},  volume = {1},  number = {2},  month = {August},  year = {1996},  note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},}@Article{chaum-mix,   author =      {David Chaum},   title =       {Untraceable electronic mail, return addresses, and digital pseudo-nyms},   journal =     {Communications of the ACM},   year =        {1981},   volume =      {4},   number =      {2},   month =       {February},}   %note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},@InProceedings{nym-alias-net,  author =       {David Mazi\`{e}res and M. Frans Kaashoek},  title =        {{The Design, Implementation and Operation of an Email                  Pseudonym Server}},  booktitle =    {$5^{th}$ ACM Conference on Computer and                  Communications Security (CCS'98)},  year =         1998,  publisher =    {ACM Press},}  %note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},@InProceedings{tangler,  author =       {Marc Waldman and David Mazi\`{e}res},  title =        {Tangler: A Censorship-Resistant Publishing System                  Based on Document Entanglements},  booktitle =    {$8^{th}$ ACM Conference on Computer and                  Communications Security (CCS-8)},  pages =        {86--135},  year =         2001,  publisher =    {ACM Press},}  %note =         {\url{http://www.scs.cs.nyu.edu/~dm/}}@misc{neochaum,   author =      {Tim May},   title =       {Payment mixes for anonymity},   howpublished = {E-mail archived at                  \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},}@misc{helsingius,   author =      {J. Helsingius},   title =       {{\tt anon.penet.fi} press release},   note =        {\newline \url{http://www.penet.fi/press-english.html}},}@InProceedings{garay97secure,   author =      {J. Garay and R. Gennaro and C. Jutla and T. Rabin},   title =       {Secure distributed storage and retrieval},   booktitle =   {11th International Workshop, WDAG '97},   pages =       {275--289},   year =        {1997},   publisher =   {Springer-Verlag, LNCS 1320},   note =        {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},}@InProceedings{PIK,   author =      {C. Park and K. Itoh and K. Kurosawa},   title =       {Efficient anonymous channel and all/nothing election scheme},   booktitle =   {Advances in Cryptology -- {EUROCRYPT} '93},   pages =       {248--259},   publisher =   {Springer-Verlag, LNCS 765},}@Misc{pgpfaq,   key =         {PGP},   title =       {{PGP} {FAQ}},   note =        {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},}@Article{riordan-schneier,   author =      {James Riordan and Bruce Schneier},   title =       {A Certified E-mail Protocol with No Trusted Third Party},   journal =     {13th Annual Computer Security Applications Conference},   month =       {December},   year =        {1998},   note =        {\newline \url{http://www.counterpane.com/certified-email.html}},}@Article{crowds-tissec,  author =       {Michael K. Reiter and Aviel D. Rubin},  title =        {Crowds: Anonymity for Web Transactions},  journal =      {ACM TISSEC},  year =         1998,  volume =       1,  number =       1,  pages =        {66--92},  month =        {June},}  %note =         {\url{http://citeseer.nj.nec.com/284739.html}}@Article{crowds-dimacs,   author =      {Michael K. Reiter and Aviel D. Rubin},   title =       {Crowds: Anonymity for Web Transactions},   journal =     {{DIMACS} Technical Report (Revised)},   volume =      {97},   number =      {15},   month =       {August},   year =        {1997},}@Misc{advogato,   author =      {Raph Levien},   title =       {Advogato's Trust Metric},   note =        {\newline \url{http://www.advogato.org/trust-metric.html}},}@InProceedings{publius,   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor},   title =       {Publius: {A} robust, tamper-evident, censorship-resistant and                  source-anonymous web publishing system},   booktitle =   {Proc. 9th USENIX Security Symposium},   pages =       {59--72},   year =        {2000},   month =       {August},}   %note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},@Misc{freedom-nyms,   author =      {Russell Samuels},   title =       {Untraceable Nym Creation on the {F}reedom {N}etwork},   year =        {1999},   month =       {November},   day =         {21},   note =        {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},}@techreport{freedom2-arch,  title = {Freedom Systems 2.0 Architecture},  author = {Philippe Boucher and Adam Shostack and Ian Goldberg},  institution = {Zero Knowledge Systems, {Inc.}},  year = {2000},  month = {December},  type = {White Paper},  day = {18},}@techreport{freedom21-security,  title = {Freedom Systems 2.1 Security Issues and Analysis},  author = {Adam Back and Ian Goldberg and Adam Shostack},  institution = {Zero Knowledge Systems, {Inc.}},  year = {2001},  month = {May},  type = {White Paper},}@inproceedings{cfs:sosp01,  title = {Wide-area cooperative storage with {CFS}},  author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},  booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},  year = {2001},  month = {October},  address = {Chateau Lake Louise, Banff, Canada},}@inproceedings{SS03,  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},  author = {Andrei Serjantov and Peter Sewell},  booktitle = {Computer Security -- ESORICS 2003},  publisher =   {Springer-Verlag, LNCS 2808},  year = {2003},  month = {October},}  %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},@Misc{pk-relations,   author =      {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},   title =       {Relations Among Notions of Security for Public-Key Encryption                  Schemes},   howpublished = {                  Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.                  Springer-Verlag, 1998.                  Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},}@InProceedings{mix-acc,  author =      {Roger Dingledine and Michael J. Freedman and David                  Hopwood and David Molnar},  title =       {{A Reputation System to Increase MIX-net                  Reliability}},  booktitle =   {Information Hiding (IH 2001)},  pages =       {126--141},  year =        2001,  editor =      {Ira S. Moskowitz},  publisher =   {Springer-Verlag, LNCS 2137},}  %note =        {\url{http://www.freehaven.net/papers.html}},@InProceedings{casc-rep,   author =      {Roger Dingledine and Paul Syverson},   title =       {{Reliable MIX Cascade Networks through Reputation}},  booktitle =    {Financial Cryptography},  year =         2002,  editor =       {Matt Blaze},  publisher =    {Springer-Verlag, LNCS 2357},}  %note =        {\newline \url{http://www.freehaven.net/papers.html}},@InProceedings{zhou96certified,   author =      {Zhou and Gollmann},   title =       {Certified Electronic Mail},   booktitle =   {{ESORICS: European Symposium on Research in Computer                  Security}},   publisher =   {Springer-Verlag, LNCS 1146},   year =        {1996},   note =        {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},}@Misc{realtime-mix,   author =      {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and                  Birgit Pfitzmann and Michael Waidner},   title =       {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},   howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},   note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}},}@InProceedings{danezis:pet2003,  author =       {George Danezis},  title =        {Mix-networks with Restricted Routes},  booktitle =    {Privacy Enhancing Technologies (PET 2003)},  year =         2003,  editor =       {Roger Dingledine},  publisher =    {Springer-Verlag LNCS 2760}}@InProceedings{gap-pets03,  author =       {Krista Bennett and Christian Grothoff},  title =        {{GAP} -- practical anonymous networking},  booktitle =    {Privacy Enhancing Technologies (PET 2003)},  year =         2003,  editor =       {Roger Dingledine},  publisher =    {Springer-Verlag LNCS 2760}}@Article{hordes-jcs,  author =       {Brian Neal Levine and Clay Shields},  title =        {Hordes: A Multicast-Based Protocol for Anonymity},  journal =      {Journal of Computer Security},  year =         2002,  volume =       10,  number =       3,  pages =        {213--240}}@TechReport{herbivore,  author =       {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},  title =        {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},  institution =  {Cornell University Computing and Information Science},  year =         2003,  type =         {Technical Report},  number =       {TR2003-1890},  month =        {February}}@InProceedings{p5,  author =       {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},  title =        {$P^5$: A Protocol for Scalable Anonymous Communication},  booktitle =    {IEEE Symposium on Security and Privacy},  pages =        {58--70},  year =         2002,  publisher =    {IEEE CS}}@phdthesis{ian-thesis,  title = {A Pseudonymous Communications Infrastructure for the Internet},  author = {Ian Goldberg},  school = {UC Berkeley},  year = {2000},  month = {Dec},}@Article{taz,  author =       {Ian Goldberg and David Wagner},  title =        {TAZ Servers and the Rewebber Network: Enabling                  Anonymous Publishing on the World Wide Web},  journal =      {First Monday},  year =         1998,  volume =       3,  number =       4,  month =        {August},  note =         {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}}@Misc{tcp-over-tcp-is-bad,  key =          {tcp-over-tcp-is-bad},  title =        {Why {TCP} Over {TCP} Is A Bad Idea},  author =       {Olaf Titz},  note =         {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}}@inproceedings{wright02,  title = {An Analysis of the Degradation of Anonymous Protocols},  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},  booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},  year = {2002},  month = {February},  publisher = {IEEE},}@inproceedings{wright03,  title = {Defending Anonymous Communication Against Passive Logging Attacks},  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},  booktitle = {IEEE Symposium on Security and Privacy},  pages= {28--41},  year = {2003},  month = {May},  publisher = {IEEE CS},}@InProceedings{attack-tor-oak05,  author = 	 {Steven J. Murdoch and George Danezis},  title = 	 {Low-cost Traffic Analysis of {T}or},  booktitle = 	 {IEEE Symposium on Security and Privacy},  year =	 2005,  month =	 {May},  publisher =	 {IEEE CS}}@Misc{jap-backdoor,  author={{The AN.ON Project}},  howpublished={Press release},  year={2003},  month={September},  title={German Police proceeds against anonymity service},  note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}}@article{shsm03,  title = {Using Caching for Browsing Anonymity},  author = {Anna Shubina and Sean Smith},  journal = {ACM SIGEcom Exchanges},  volume = {4},  number = {2},  year = {2003},  month = {Sept},  note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},}@inproceedings{tor-design,  title = {Tor: The Second-Generation Onion Router},  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},  booktitle = {Proceedings of the 13th USENIX Security Symposium},  year = {2004},  month = {August},  note = {\url{https://www.torproject.org/tor-design.pdf}}}@inproceedings{flow-correlation04,  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},  year = {2004},  month = {May},  series = {LNCS},  note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},}@InProceedings{danezis:pet2004,  author = "George Danezis",  title = "The Traffic Analysis of Continuous-Time Mixes",  booktitle= {Privacy Enhancing Technologies (PET 2004)},  editor = {David Martin and Andrei Serjantov},  month = {May},  year = {2004},  series = {LNCS},  note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},}@inproceedings{feamster:wpes2004,  title = {Location Diversity in Anonymity Networks},  author = {Nick Feamster and Roger Dingledine},  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},  year = {2004},  month = {October},  address = {Washington, DC, USA},  note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},}@inproceedings{koepsell:wpes2004,  title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},  author = {Stefan K\"opsell and Ulf Hilling},  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},  year = {2004},  month = {October},  address = {Washington, DC, USA},  note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},}@inproceedings{sync-batching,  title = {Synchronous Batching: From Cascades to Free Routes},  author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},  editor = {David Martin and Andrei Serjantov},  year = {2004},  month = {May},  series = {LNCS},  note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},}@InProceedings{e2e-traffic,  author = "Nick Mathewson and Roger Dingledine",  title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",  booktitle= {Privacy Enhancing Technologies (PET 2004)},  editor = {David Martin and Andrei Serjantov},  month = {May},  year = {2004},  series = {LNCS},  note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},}@Misc{dtls,   author =      {E. Rescorla and N. Modadugu},   title =       {{Datagram Transport Layer Security}},   howpublished = {IETF Draft},   month =       {December},   year =        {2003},   note =        {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},}@InProceedings{usability-network-effect,   author={Roger Dingledine and Nick Mathewson},   title={Anonymity Loves Company: Usability and the Network Effect},   booktitle = {Designing Security Systems That People Can Use},   year = {2005},   publisher = {O'Reilly Media},}@inproceedings{usability:weis2006,  title = {Anonymity Loves Company: Usability and the Network Effect},  author = {Roger Dingledine and Nick Mathewson},  booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security        (WEIS 2006)},  year = {2006},  month = {June},  address = {Cambridge, UK},  bookurl = {http://weis2006.econinfosec.org/},  note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},}@Misc{six-four,  key =          {six-four},  title =        {{The Six/Four System}},  note =         {\url{http://sourceforge.net/projects/sixfour/}}}@inproceedings{clayton:pet2006,  title = {Ignoring the Great Firewall of China},  author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},  booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},  year = {2006},  month = {June},  address = {Cambridge, UK},  publisher = {Springer},  bookurl = {http://petworkshop.org/2006/},  note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},}@Misc{zuckerman-threatmodels,  key =          {zuckerman-threatmodels},  title =        {We've got to adjust some of our threat models},  author =       {Ethan Zuckerman},  note =         {\url{http://www.ethanzuckerman.com/blog/?p=1019}}}@Misc{cgiproxy,  key =          {cgiproxy},  title =        {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},  author =       {James Marshall},  note =         {\url{http://www.jmarshall.com/tools/cgiproxy/}}}@Misc{circumventor,  key =          {circumventor},  title =        {{How to install the Circumventor program}},  author =       {Bennett Haselton},  note =         {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}}@Misc{psiphon,  key =          {psiphon},  title =        {Psiphon},  author =       {Ronald Deibert et al},  note =         {\url{http://psiphon.civisec.org/}}}@InProceedings{tcpstego,                                                                    author =       {Steven J. Murdoch and Stephen Lewis},  title =        {Embedding Covert Channels into {TCP/IP}},  booktitle = {Information Hiding: 7th International Workshop},  pages  =       {247--261},  year =         {2005},  editor =       {Mauro Barni and Jordi Herrera-Joancomart\'{\i} andStefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},  volume =       {3727},  series =       {LNCS},  address =      {Barcelona, Catalonia (Spain)},  month =        {June},  publisher = {Springer-Verlag},  url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}}@phdthesis{blossom-thesis,  title = {Perspective Access Networks},  author = {Geoffrey Goodell},  school = {Harvard University},  year = {2006},  month = {July},  note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},}@inproceedings{tap:pet2006,  title = {On the Security of the Tor Authentication Protocol},  author = {Ian Goldberg},  booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},  year = {2006},  month = {June},  address = {Cambridge, UK},  publisher = {Springer},  bookurl = {http://petworkshop.org/2006/},  note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},}@inproceedings{rep-anon,  title = {{Reputation in P2P Anonymity Systems}},  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},  booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},  year = {2003},  month = {June},  note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},}@misc{tor-challenges,   author       = {Roger Dingledine and Nick Mathewson and Paul Syverson},   title        = {Challenges in deploying low-latency anonymity},   year         = {2005},   note         = {Manuscript}}@InProceedings{chaum-blind,  author =       {David Chaum},  title =        {Blind Signatures for Untraceable Payments},  booktitle =    {Advances in Cryptology: Proceedings of Crypto 82},  pages =        {199--203},  year =         1983,  editor =       {D. Chaum and R.L. Rivest and A.T. Sherman},  publisher =    {Plenum Press}}@Article{netauth,  author = {Geoffrey Goodell and Paul Syverson},  title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},  journal = 	 {Communications of the ACM},  year = 	 2007,  volume = 	 50,  number = 	 5,  pages = 	 {113--117},  month = 	 {May}}@misc{ip-to-country,  key = {ip-to-country},  title = {IP-to-country database},  note = {\url{http://ip-to-country.webhosting.info/}},}@misc{mackinnon-personal,  author = {Rebecca MacKinnon},  title = {Private communication},  year = {2006},}@inproceedings{pet05-bissias,  title = {Privacy Vulnerabilities in Encrypted HTTP Streams},  author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},  year = {2005},  month = {May},  note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},}@InProceedings{infranet,   author =      {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},   title =       {Infranet: Circumventing Web Censorship and Surveillance},   booktitle =   {Proceedings of the 11th USENIX Security Symposium},   year =        {2002},   month =       {August},   note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},}@techreport{ ptacek98insertion,  author = "Thomas H. Ptacek and Timothy N. Newsham",  title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",  institution = "Secure Networks, Inc.",  address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",  year = "1998",  url = "citeseer.ist.psu.edu/ptacek98insertion.html",}@inproceedings{active-wardens,  author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",  title = "Eliminating Steganography in Internet Traffic with Active Wardens",  booktitle = {Information Hiding Workshop (IH 2002)},  year = {2002},  month = {October},  editor = {Fabien Petitcolas},  publisher = {Springer-Verlag, LNCS 2578},}@inproceedings{clog-the-queue,  title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes},  author = {Jon McLachlan and Nicholas Hopper},  booktitle = {Proceedings of Financial Cryptography (FC '08)},  year = {2008},  month = {January},}@inproceedings{snader08,  title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},  author = {Robin Snader and Nikita Borisov},  booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},  year = {2008},  month = {February},  publisher = {Internet Society},}@inproceedings{murdoch-pet2008,  title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},  author = {Steven J. Murdoch and Robert N. M. Watson},  booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},  year = {2008},  month = {July},  address = {Leuven, Belgium},  pages = {115--132},  editor = {Nikita Borisov and Ian Goldberg},  publisher = {Springer},  bookurl = {http://petsymposium.org/2008/},}@inproceedings{danezis-pet2008,  title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},  author = {George Danezis and Paul Syverson},  booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},  year = {2008},  month = {July},  address = {Leuven, Belgium},  pages = {133--150},  editor = {Nikita Borisov and Ian Goldberg},  publisher = {Springer},  bookurl = {http://petsymposium.org/2008/},}%%% Local Variables:%%% mode: latex%%% TeX-master: "tor-design"%%% End:
 |