tor-design.bib 34 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034
  1. @article{ meadows96,
  2. author = "Catherine Meadows",
  3. title = "The {NRL} Protocol Analyzer: An Overview",
  4. journal = "Journal of Logic Programming",
  5. volume = "26",
  6. number = "2",
  7. pages = "113--131",
  8. year = "1996",
  9. }
  10. @inproceedings{kesdogan:pet2002,
  11. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  12. alternative to the MIX based Approach?},
  13. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  14. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  15. year = {2002},
  16. month = {April},
  17. editor = {Roger Dingledine and Paul Syverson},
  18. publisher = {Springer-Verlag, LNCS 2482},
  19. }
  20. @inproceedings{statistical-disclosure,
  21. title = {Statistical Disclosure Attacks},
  22. author = {George Danezis},
  23. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  24. organization = {{IFIP TC11}},
  25. year = {2003},
  26. month = {May},
  27. address = {Athens},
  28. pages = {421--426},
  29. publisher = {Kluwer},
  30. }
  31. @inproceedings{limits-open,
  32. title = {Limits of Anonymity in Open Environments},
  33. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  34. booktitle = {Information Hiding Workshop (IH 2002)},
  35. year = {2002},
  36. month = {October},
  37. editor = {Fabien Petitcolas},
  38. publisher = {Springer-Verlag, LNCS 2578},
  39. }
  40. @inproceedings{isdn-mixes,
  41. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  42. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  43. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  44. year = {1991},
  45. month = {February},
  46. pages = {451-463},
  47. }
  48. @inproceedings{tarzan:ccs02,
  49. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  50. author = {Michael J. Freedman and Robert Morris},
  51. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  52. {S}ecurity ({CCS 2002})},
  53. year = {2002},
  54. month = {November},
  55. address = {Washington, DC},
  56. }
  57. @inproceedings{cebolla,
  58. title = {{Cebolla: Pragmatic IP Anonymity}},
  59. author = {Zach Brown},
  60. booktitle = {Ottawa Linux Symposium},
  61. year = {2002},
  62. month = {June},
  63. }
  64. @misc{eax,
  65. author = "M. Bellare and P. Rogaway and D. Wagner",
  66. title = "A conventional authenticated-encryption mode",
  67. howpublished = {Manuscript},
  68. month = {April},
  69. year = {2003},
  70. }
  71. @misc{darkside,
  72. title = {{The Dark Side of the Web: An Open Proxy's View}},
  73. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  74. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  75. }
  76. @Misc{anonymizer,
  77. key = {anonymizer},
  78. title = {The {Anonymizer}},
  79. note = {\url{http://anonymizer.com/}}
  80. }
  81. @Misc{privoxy,
  82. key = {privoxy},
  83. title = {{Privoxy}},
  84. note = {\url{http://www.privoxy.org/}}
  85. }
  86. @inproceedings{anonnet,
  87. title = {{Analysis of an Anonymity Network for Web Browsing}},
  88. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  89. David Hutchison},
  90. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  91. 2002)}},
  92. year = {2002},
  93. month = {June},
  94. address = {Pittsburgh, USA},
  95. pages = {49--54},
  96. }
  97. @inproceedings{econymics,
  98. title = {On the Economics of Anonymity},
  99. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  100. booktitle = {Financial Cryptography},
  101. year = {2003},
  102. editor = {Rebecca N. Wright},
  103. publisher = {Springer-Verlag, LNCS 2742},
  104. }
  105. @inproceedings{defensive-dropping,
  106. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  107. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  108. booktitle = {Financial Cryptography},
  109. year = {2004},
  110. editor = {Ari Juels},
  111. publisher = {Springer-Verlag, LNCS (forthcoming)},
  112. }
  113. @inproceedings{morphmix:fc04,
  114. title = {Practical Anonymity for the Masses with MorphMix},
  115. author = {Marc Rennhard and Bernhard Plattner},
  116. booktitle = {Financial Cryptography},
  117. year = {2004},
  118. editor = {Ari Juels},
  119. publisher = {Springer-Verlag, LNCS (forthcoming)},
  120. }
  121. @inproceedings{eternity,
  122. title = {The Eternity Service},
  123. author = {Ross Anderson},
  124. booktitle = {Pragocrypt '96},
  125. year = {1996},
  126. }
  127. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  128. @inproceedings{minion-design,
  129. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  130. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  131. booktitle = {2003 IEEE Symposium on Security and Privacy},
  132. year = {2003},
  133. month = {May},
  134. publisher = {IEEE CS},
  135. pages = {2--15},
  136. }
  137. %note = {\url{http://mixminion.net/minion-design.pdf}},
  138. @inproceedings{ rao-pseudonymity,
  139. author = "Josyula R. Rao and Pankaj Rohatgi",
  140. title = "Can Pseudonymity Really Guarantee Privacy?",
  141. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  142. year = {2000},
  143. month = Aug,
  144. publisher = {USENIX},
  145. pages = "85--96",
  146. }
  147. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  148. %full_papers/rao/rao.pdf}},
  149. @InProceedings{pfitzmann90how,
  150. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  151. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  152. booktitle = {Eurocrypt 89},
  153. publisher = {Springer-Verlag, LNCS 434},
  154. year = {1990},
  155. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  156. }
  157. % author = {Roger Dingledine and Nick Mathewson},
  158. @Misc{tor-spec,
  159. author = {Anonymized},
  160. title = {Tor Protocol Specifications},
  161. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  162. }
  163. @InProceedings{BM:mixencrypt,
  164. author = {M{\"o}ller, Bodo},
  165. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  166. booktitle = {{CT-RSA} 2003},
  167. publisher = {Springer-Verlag, LNCS 2612},
  168. year = 2003,
  169. }
  170. @InProceedings{back01,
  171. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  172. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  173. booktitle = {Information Hiding (IH 2001)},
  174. pages = {245--257},
  175. year = 2001,
  176. editor = {Ira S. Moskowitz},
  177. publisher = {Springer-Verlag, LNCS 2137},
  178. }
  179. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  180. @InProceedings{rackoff93cryptographic,
  181. author = {Charles Rackoff and Daniel R. Simon},
  182. title = {Cryptographic Defense Against Traffic Analysis},
  183. booktitle = {{ACM} Symposium on Theory of Computing},
  184. pages = {672--681},
  185. year = {1993},
  186. }
  187. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  188. @InProceedings{freehaven-berk,
  189. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  190. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  191. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  192. on Design Issue in Anonymity and Unobservability},
  193. year = {2000},
  194. month = {July},
  195. editor = {H. Federrath},
  196. publisher = {Springer-Verlag, LNCS 2009},
  197. }
  198. %note = {\url{http://freehaven.net/papers.html}},
  199. @InProceedings{raymond00,
  200. author = {J. F. Raymond},
  201. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  202. and Open Problems}},
  203. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  204. on Design Issue in Anonymity and Unobservability},
  205. year = 2000,
  206. month = {July},
  207. pages = {10-29},
  208. editor = {H. Federrath},
  209. publisher = {Springer-Verlag, LNCS 2009},
  210. }
  211. @InProceedings{sybil,
  212. author = "John Douceur",
  213. title = {{The Sybil Attack}},
  214. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
  215. month = Mar,
  216. year = 2002,
  217. }
  218. @InProceedings{trickle02,
  219. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  220. title = {From a Trickle to a Flood: Active Attacks on Several
  221. Mix Types},
  222. booktitle = {Information Hiding (IH 2002)},
  223. year = {2002},
  224. editor = {Fabien Petitcolas},
  225. publisher = {Springer-Verlag, LNCS 2578},
  226. }
  227. @InProceedings{langos02,
  228. author = {Oliver Berthold and Heinrich Langos},
  229. title = {Dummy Traffic Against Long Term Intersection Attacks},
  230. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  231. year = {2002},
  232. editor = {Roger Dingledine and Paul Syverson},
  233. publisher = {Springer-Verlag, LNCS 2482}
  234. }
  235. @InProceedings{hintz-pet02,
  236. author = {Andrew Hintz},
  237. title = {Fingerprinting Websites Using Traffic Analysis},
  238. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  239. pages = {171--178},
  240. year = 2002,
  241. editor = {Roger Dingledine and Paul Syverson},
  242. publisher = {Springer-Verlag, LNCS 2482}
  243. }
  244. @InProceedings{or-discex00,
  245. author = {Paul Syverson and Michael Reed and David Goldschlag},
  246. title = {{O}nion {R}outing Access Configurations},
  247. booktitle = {DARPA Information Survivability Conference and
  248. Exposition (DISCEX 2000)},
  249. year = {2000},
  250. publisher = {IEEE CS Press},
  251. pages = {34--40},
  252. volume = {1},
  253. }
  254. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  255. @Inproceedings{or-pet00,
  256. title = {{Towards an Analysis of Onion Routing Security}},
  257. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  258. Carl Landwehr},
  259. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  260. on Design Issue in Anonymity and Unobservability},
  261. year = 2000,
  262. month = {July},
  263. pages = {96--114},
  264. editor = {H. Federrath},
  265. publisher = {Springer-Verlag, LNCS 2009},
  266. }
  267. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  268. @Inproceedings{freenet-pets00,
  269. title = {Freenet: A Distributed Anonymous Information Storage
  270. and Retrieval System},
  271. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  272. Theodore W. Hong},
  273. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  274. on Design Issue in Anonymity and Unobservability},
  275. year = 2000,
  276. month = {July},
  277. pages = {46--66},
  278. editor = {H. Federrath},
  279. publisher = {Springer-Verlag, LNCS 2009},
  280. }
  281. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  282. @InProceedings{or-ih96,
  283. author = {David M. Goldschlag and Michael G. Reed and Paul
  284. F. Syverson},
  285. title = {Hiding Routing Information},
  286. booktitle = {Information Hiding, First International Workshop},
  287. pages = {137--150},
  288. year = 1996,
  289. editor = {R. Anderson},
  290. month = {May},
  291. publisher = {Springer-Verlag, LNCS 1174},
  292. }
  293. %note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  294. @Article{or-jsac98,
  295. author = {Michael G. Reed and Paul F. Syverson and David
  296. M. Goldschlag},
  297. title = {Anonymous Connections and Onion Routing},
  298. journal = {IEEE Journal on Selected Areas in Communications},
  299. year = 1998,
  300. volume = 16,
  301. number = 4,
  302. pages = {482--494},
  303. month = {May},
  304. }
  305. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  306. @Misc{TLS,
  307. author = {T. Dierks and C. Allen},
  308. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  309. howpublished = {IETF RFC 2246},
  310. month = {January},
  311. year = {1999},
  312. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  313. }
  314. @Misc{SMTP,
  315. author = {J. Postel},
  316. title = {Simple {M}ail {T}ransfer {P}rotocol},
  317. howpublished = {IETF RFC 2821 (also STD0010)},
  318. month = {April},
  319. year = {2001},
  320. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  321. }
  322. @Misc{IMAP,
  323. author = {M. Crispin},
  324. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  325. howpublished = {IETF RFC 2060},
  326. month = {December},
  327. year = {1996},
  328. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  329. }
  330. @misc{pipenet,
  331. title = {PipeNet 1.1},
  332. author = {Wei Dai},
  333. year = 1996,
  334. month = {August},
  335. howpublished = {Usenet post},
  336. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  337. in a post to the cypherpunks list, Feb.\ 1995.},
  338. }
  339. @Misc{POP3,
  340. author = {J. Myers and M. Rose},
  341. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  342. howpublished = {IETF RFC 1939 (also STD0053)},
  343. month = {May},
  344. year = {1996},
  345. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  346. }
  347. @InProceedings{shuffle,
  348. author = {C. Andrew Neff},
  349. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  350. booktitle = {8th ACM Conference on Computer and Communications
  351. Security (CCS-8)},
  352. pages = {116--125},
  353. year = 2001,
  354. editor = {P. Samarati},
  355. month = {November},
  356. publisher = {ACM Press},
  357. }
  358. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  359. % technicaldocs/shuffle.pdf}},
  360. @InProceedings{dolev91,
  361. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  362. title = {Non-Malleable Cryptography},
  363. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  364. pages = {542--552},
  365. year = 1991,
  366. note = {Updated version at
  367. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  368. }
  369. @TechReport{rsw96,
  370. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  371. title = {Time-lock puzzles and timed-release Crypto},
  372. year = 1996,
  373. type = {MIT LCS technical memo},
  374. number = {MIT/LCS/TR-684},
  375. month = {February},
  376. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  377. }
  378. @InProceedings{web-mix,
  379. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  380. title = {Web {MIX}es: A system for anonymous and unobservable
  381. {I}nternet access},
  382. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  383. on Design Issue in Anonymity and Unobservability},
  384. editor = {H. Federrath},
  385. publisher = {Springer-Verlag, LNCS 2009},
  386. pages = {115--129},
  387. year = {2000},
  388. }
  389. @InProceedings{disad-free-routes,
  390. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  391. title = {The disadvantages of free {MIX} routes and how to overcome
  392. them},
  393. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  394. on Design Issue in Anonymity and Unobservability},
  395. pages = {30--45},
  396. year = 2000,
  397. editor = {H. Federrath},
  398. publisher = {Springer-Verlag, LNCS 2009},
  399. }
  400. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  401. % disadvantages_berthold.pdf}},
  402. @InProceedings{boneh00,
  403. author = {Dan Boneh and Moni Naor},
  404. title = {Timed Commitments},
  405. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  406. pages = {236--254},
  407. year = 2000,
  408. publisher = {Springer-Verlag, LNCS 1880},
  409. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  410. }
  411. @InProceedings{goldschlag98,
  412. author = {David M. Goldschlag and Stuart G. Stubblebine},
  413. title = {Publicly Verifiable Lotteries: Applications of
  414. Delaying Functions},
  415. booktitle = {Financial Cryptography},
  416. pages = {214--226},
  417. year = 1998,
  418. publisher = {Springer-Verlag, LNCS 1465},
  419. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  420. }
  421. @InProceedings{syverson98,
  422. author = {Paul Syverson},
  423. title = {Weakly Secret Bit Commitment: Applications to
  424. Lotteries and Fair Exchange},
  425. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  426. pages = {2--13},
  427. year = 1998,
  428. address = {Rockport Massachusetts},
  429. month = {June},
  430. publisher = {IEEE CS Press},
  431. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  432. }
  433. @Misc{shoup-iso,
  434. author = {Victor Shoup},
  435. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  436. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  437. }
  438. @Misc{shoup-oaep,
  439. author = {Victor Shoup},
  440. title = {{OAEP} Reconsidered},
  441. howpublished = {{IACR} e-print 2000/060},
  442. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  443. }
  444. @Misc{oaep-still-alive,
  445. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  446. title = {{RSA}-{OAEP} is Still Alive!},
  447. howpublished = {{IACR} e-print 2000/061},
  448. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  449. }
  450. @misc{echolot,
  451. author = {Peter Palfrader},
  452. title = {Echolot: a pinger for anonymous remailers},
  453. note = {\url{http://www.palfrader.org/echolot/}},
  454. }
  455. @Misc{mixmaster-attacks,
  456. author = {Lance Cottrell},
  457. title = {Mixmaster and Remailer Attacks},
  458. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  459. }
  460. @Misc{mixmaster-spec,
  461. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  462. Palfrader and Len Sassaman},
  463. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  464. year = {2003},
  465. month = {July},
  466. howpublished = {Draft},
  467. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  468. }
  469. @InProceedings{puzzles-tls,
  470. author = "Drew Dean and Adam Stubblefield",
  471. title = {{Using Client Puzzles to Protect TLS}},
  472. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  473. year = {2001},
  474. month = Aug,
  475. publisher = {USENIX},
  476. }
  477. @InProceedings{breadpudding,
  478. author = {Markus Jakobsson and Ari Juels},
  479. title = {Proofs of Work and Bread Pudding Protocols},
  480. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  481. Conference on Communications and Multimedia Security
  482. (CMS '99)},
  483. year = 1999,
  484. month = {September},
  485. publisher = {Kluwer}
  486. }
  487. @Misc{hashcash,
  488. author = {Adam Back},
  489. title = {Hash cash},
  490. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  491. }
  492. @InProceedings{oreilly-acc,
  493. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  494. title = {Accountability},
  495. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  496. Technology},
  497. year = {2001},
  498. publisher = {O'Reilly and Associates},
  499. }
  500. @InProceedings{han,
  501. author = {Yongfei Han},
  502. title = {Investigation of non-repudiation protocols},
  503. booktitle = {ACISP '96},
  504. year = 1996,
  505. publisher = {Springer-Verlag},
  506. }
  507. @Misc{socks5,
  508. key = {socks5},
  509. title = {{SOCKS} {P}rotocol {V}ersion 5},
  510. howpublished= {IETF RFC 1928},
  511. month = {March},
  512. year = 1996,
  513. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  514. }
  515. @InProceedings{abe,
  516. author = {Masayuki Abe},
  517. title = {Universally Verifiable {MIX} With Verification Work Independent of
  518. The Number of {MIX} Servers},
  519. booktitle = {{EUROCRYPT} 1998},
  520. year = {1998},
  521. publisher = {Springer-Verlag, LNCS 1403},
  522. }
  523. @InProceedings{desmedt,
  524. author = {Yvo Desmedt and Kaoru Kurosawa},
  525. title = {How To Break a Practical {MIX} and Design a New One},
  526. booktitle = {{EUROCRYPT} 2000},
  527. year = {2000},
  528. publisher = {Springer-Verlag, LNCS 1803},
  529. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  530. }
  531. @InProceedings{mitkuro,
  532. author = {M. Mitomo and K. Kurosawa},
  533. title = {{Attack for Flash MIX}},
  534. booktitle = {{ASIACRYPT} 2000},
  535. year = {2000},
  536. publisher = {Springer-Verlag, LNCS 1976},
  537. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  538. }
  539. @InProceedings{hybrid-mix,
  540. author = {M. Ohkubo and M. Abe},
  541. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  542. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  543. year = {2000},
  544. publisher = {Springer-Verlag, LNCS 1976},
  545. }
  546. @InProceedings{PShuffle,
  547. author = {Jun Furukawa and Kazue Sako},
  548. title = {An Efficient Scheme for Proving a Shuffle},
  549. editor = {Joe Kilian},
  550. booktitle = {CRYPTO 2001},
  551. year = {2001},
  552. publisher = {Springer-Verlag, LNCS 2139},
  553. }
  554. @InProceedings{jakobsson-optimally,
  555. author = "Markus Jakobsson and Ari Juels",
  556. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  557. booktitle = {Principles of Distributed Computing - {PODC} '01},
  558. year = "2001",
  559. publisher = {ACM Press},
  560. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  561. }
  562. @InProceedings{kesdogan,
  563. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  564. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  565. System},
  566. booktitle = {Information Hiding (IH 1998)},
  567. year = {1998},
  568. publisher = {Springer-Verlag, LNCS 1525},
  569. }
  570. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  571. @InProceedings{socks4,
  572. author = {David Koblas and Michelle R. Koblas},
  573. title = {{SOCKS}},
  574. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  575. Symposium)},
  576. pages = {77--83},
  577. year = 1992,
  578. publisher = {USENIX},
  579. }
  580. @InProceedings{flash-mix,
  581. author = {Markus Jakobsson},
  582. title = {Flash {M}ixing},
  583. booktitle = {Principles of Distributed Computing - {PODC} '99},
  584. year = {1999},
  585. publisher = {ACM Press},
  586. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  587. }
  588. @InProceedings{SK,
  589. author = {Joe Kilian and Kazue Sako},
  590. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  591. the Implementation of a Voting Booth},
  592. booktitle = {EUROCRYPT '95},
  593. year = {1995},
  594. publisher = {Springer-Verlag},
  595. }
  596. @InProceedings{OAEP,
  597. author = {M. Bellare and P. Rogaway},
  598. year = {1994},
  599. booktitle = {EUROCRYPT '94},
  600. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  601. {RSA}},
  602. publisher = {Springer-Verlag},
  603. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  604. }
  605. @inproceedings{babel,
  606. title = {Mixing {E}-mail With {B}abel},
  607. author = {Ceki G\"ulc\"u and Gene Tsudik},
  608. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  609. year = 1996,
  610. month = {February},
  611. pages = {2--16},
  612. publisher = {IEEE},
  613. }
  614. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  615. @Misc{rprocess,
  616. author = {RProcess},
  617. title = {Selective Denial of Service Attacks},
  618. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  619. }
  620. @Article{remailer-history,
  621. author = {Sameer Parekh},
  622. title = {Prospects for Remailers},
  623. journal = {First Monday},
  624. volume = {1},
  625. number = {2},
  626. month = {August},
  627. year = {1996},
  628. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  629. }
  630. @Article{chaum-mix,
  631. author = {David Chaum},
  632. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  633. journal = {Communications of the ACM},
  634. year = {1981},
  635. volume = {4},
  636. number = {2},
  637. month = {February},
  638. }
  639. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  640. @InProceedings{nym-alias-net,
  641. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  642. title = {{The Design, Implementation and Operation of an Email
  643. Pseudonym Server}},
  644. booktitle = {$5^{th}$ ACM Conference on Computer and
  645. Communications Security (CCS'98)},
  646. year = 1998,
  647. publisher = {ACM Press},
  648. }
  649. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  650. @InProceedings{tangler,
  651. author = {Marc Waldman and David Mazi\`{e}res},
  652. title = {Tangler: A Censorship-Resistant Publishing System
  653. Based on Document Entanglements},
  654. booktitle = {$8^{th}$ ACM Conference on Computer and
  655. Communications Security (CCS-8)},
  656. pages = {86--135},
  657. year = 2001,
  658. publisher = {ACM Press},
  659. }
  660. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  661. @misc{neochaum,
  662. author = {Tim May},
  663. title = {Payment mixes for anonymity},
  664. howpublished = {E-mail archived at
  665. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  666. }
  667. @misc{helsingius,
  668. author = {J. Helsingius},
  669. title = {{\tt anon.penet.fi} press release},
  670. note = {\newline \url{http://www.penet.fi/press-english.html}},
  671. }
  672. @InProceedings{garay97secure,
  673. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  674. title = {Secure distributed storage and retrieval},
  675. booktitle = {11th International Workshop, WDAG '97},
  676. pages = {275--289},
  677. year = {1997},
  678. publisher = {Springer-Verlag, LNCS 1320},
  679. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  680. }
  681. @InProceedings{PIK,
  682. author = {C. Park and K. Itoh and K. Kurosawa},
  683. title = {Efficient anonymous channel and all/nothing election scheme},
  684. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  685. pages = {248--259},
  686. publisher = {Springer-Verlag, LNCS 765},
  687. }
  688. @Misc{pgpfaq,
  689. key = {PGP},
  690. title = {{PGP} {FAQ}},
  691. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  692. }
  693. @Article{riordan-schneier,
  694. author = {James Riordan and Bruce Schneier},
  695. title = {A Certified E-mail Protocol with No Trusted Third Party},
  696. journal = {13th Annual Computer Security Applications Conference},
  697. month = {December},
  698. year = {1998},
  699. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  700. }
  701. @Article{crowds-tissec,
  702. author = {Michael K. Reiter and Aviel D. Rubin},
  703. title = {Crowds: Anonymity for Web Transactions},
  704. journal = {ACM TISSEC},
  705. year = 1998,
  706. volume = 1,
  707. number = 1,
  708. pages = {66--92},
  709. month = {November},
  710. }
  711. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  712. @Article{crowds-dimacs,
  713. author = {Michael K. Reiter and Aviel D. Rubin},
  714. title = {Crowds: Anonymity for Web Transactions},
  715. journal = {{DIMACS} Technical Report (Revised)},
  716. volume = {97},
  717. number = {15},
  718. month = {August},
  719. year = {1997},
  720. }
  721. @Misc{advogato,
  722. author = {Raph Levien},
  723. title = {Advogato's Trust Metric},
  724. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  725. }
  726. @InProceedings{publius,
  727. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  728. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  729. source-anonymous web publishing system},
  730. booktitle = {Proc. 9th USENIX Security Symposium},
  731. pages = {59--72},
  732. year = {2000},
  733. month = {August},
  734. }
  735. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  736. @Misc{freedom-nyms,
  737. author = {Russell Samuels},
  738. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  739. year = {1999},
  740. month = {November},
  741. day = {21},
  742. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  743. }
  744. @techreport{freedom2-arch,
  745. title = {Freedom Systems 2.0 Architecture},
  746. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  747. institution = {Zero Knowledge Systems, {Inc.}},
  748. year = {2000},
  749. month = {December},
  750. type = {White Paper},
  751. day = {18},
  752. }
  753. @techreport{freedom21-security,
  754. title = {Freedom Systems 2.1 Security Issues and Analysis},
  755. author = {Adam Back and Ian Goldberg and Adam Shostack},
  756. institution = {Zero Knowledge Systems, {Inc.}},
  757. year = {2001},
  758. month = {May},
  759. type = {White Paper},
  760. }
  761. @inproceedings{cfs:sosp01,
  762. title = {Wide-area cooperative storage with {CFS}},
  763. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  764. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  765. year = {2001},
  766. month = {October},
  767. address = {Chateau Lake Louise, Banff, Canada},
  768. }
  769. @inproceedings{SS03,
  770. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  771. author = {Andrei Serjantov and Peter Sewell},
  772. booktitle = {Computer Security -- ESORICS 2003},
  773. publisher = {Springer-Verlag, LNCS (forthcoming)},
  774. year = {2003},
  775. month = {October},
  776. }
  777. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  778. @Misc{pk-relations,
  779. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  780. title = {Relations Among Notions of Security for Public-Key Encryption
  781. Schemes},
  782. howpublished = {
  783. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  784. Springer-Verlag, 1998.
  785. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  786. }
  787. @InProceedings{mix-acc,
  788. author = {Roger Dingledine and Michael J. Freedman and David
  789. Hopwood and David Molnar},
  790. title = {{A Reputation System to Increase MIX-net
  791. Reliability}},
  792. booktitle = {Information Hiding (IH 2001)},
  793. pages = {126--141},
  794. year = 2001,
  795. editor = {Ira S. Moskowitz},
  796. publisher = {Springer-Verlag, LNCS 2137},
  797. }
  798. %note = {\url{http://www.freehaven.net/papers.html}},
  799. @InProceedings{casc-rep,
  800. author = {Roger Dingledine and Paul Syverson},
  801. title = {{Reliable MIX Cascade Networks through Reputation}},
  802. booktitle = {Financial Cryptography},
  803. year = 2002,
  804. editor = {Matt Blaze},
  805. publisher = {Springer-Verlag, LNCS 2357},
  806. }
  807. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  808. @InProceedings{zhou96certified,
  809. author = {Zhou and Gollmann},
  810. title = {Certified Electronic Mail},
  811. booktitle = {{ESORICS: European Symposium on Research in Computer
  812. Security}},
  813. publisher = {Springer-Verlag, LNCS 1146},
  814. year = {1996},
  815. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  816. }
  817. @Misc{realtime-mix,
  818. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  819. Birgit Pfitzmann and Michael Waidner},
  820. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  821. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  822. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  823. }
  824. @InProceedings{danezis-pets03,
  825. author = {George Danezis},
  826. title = {Mix-networks with Restricted Routes},
  827. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  828. year = 2003,
  829. editor = {Roger Dingledine},
  830. publisher = {Springer-Verlag LNCS 2760}
  831. }
  832. @InProceedings{gap-pets03,
  833. author = {Krista Bennett and Christian Grothoff},
  834. title = {{GAP} -- practical anonymous networking},
  835. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  836. year = 2003,
  837. editor = {Roger Dingledine},
  838. publisher = {Springer-Verlag LNCS 2760}
  839. }
  840. @Article{hordes-jcs,
  841. author = {Brian Neal Levine and Clay Shields},
  842. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  843. journal = {Journal of Computer Security},
  844. year = 2002,
  845. volume = 10,
  846. number = 3,
  847. pages = {213--240}
  848. }
  849. @TechReport{herbivore,
  850. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  851. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  852. institution = {Cornell University Computing and Information Science},
  853. year = 2003,
  854. type = {Technical Report},
  855. number = {TR2003-1890},
  856. month = {February}
  857. }
  858. @InProceedings{p5,
  859. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  860. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  861. booktitle = {2002 IEEE Symposium on Security and Privacy},
  862. pages = {58--70},
  863. year = 2002,
  864. publisher = {IEEE CS}
  865. }
  866. @phdthesis{ian-thesis,
  867. title = {A Pseudonymous Communications Infrastructure for the Internet},
  868. author = {Ian Goldberg},
  869. school = {UC Berkeley},
  870. year = {2000},
  871. month = {December},
  872. }
  873. @Article{taz,
  874. author = {Ian Goldberg and David Wagner},
  875. title = {TAZ Servers and the Rewebber Network: Enabling
  876. Anonymous Publishing on the World Wide Web},
  877. journal = {First Monday},
  878. year = 1998,
  879. volume = 3,
  880. number = 4,
  881. month = {August},
  882. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  883. }
  884. @Misc{tcp-over-tcp-is-bad,
  885. key = {tcp-over-tcp-is-bad},
  886. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  887. author = {Olaf Titz},
  888. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  889. }
  890. @inproceedings{wright02,
  891. title = {An Analysis of the Degradation of Anonymous Protocols},
  892. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  893. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  894. year = {2002},
  895. month = {February},
  896. publisher = {IEEE},
  897. }
  898. @inproceedings{wright03,
  899. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  900. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  901. booktitle = {IEEE Symposium on Security and Privacy},
  902. pages= {28--41},
  903. year = {2003},
  904. month = {May},
  905. publisher = {IEEE CS},
  906. }
  907. @Misc{jap-backdoor,
  908. author={The AN.ON Project},
  909. howpublished={Press release},
  910. year={2003},
  911. month={September},
  912. day={2},
  913. title={German Police proceeds against anonymity service},
  914. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  915. }
  916. %%% Local Variables:
  917. %%% mode: latex
  918. %%% TeX-master: "tor-design"
  919. %%% End: