tor-design.bib 36 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075
  1. @article{ meadows96,
  2. author = "Catherine Meadows",
  3. title = "The {NRL} Protocol Analyzer: An Overview",
  4. journal = "Journal of Logic Programming",
  5. volume = "26",
  6. number = "2",
  7. pages = "113--131",
  8. year = "1996",
  9. }
  10. @inproceedings{kesdogan:pet2002,
  11. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  12. alternative to the MIX based Approach?},
  13. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  14. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  15. year = {2002},
  16. month = {April},
  17. editor = {Roger Dingledine and Paul Syverson},
  18. publisher = {Springer-Verlag, LNCS 2482},
  19. }
  20. @inproceedings{statistical-disclosure,
  21. title = {Statistical Disclosure Attacks},
  22. author = {George Danezis},
  23. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  24. organization = {{IFIP TC11}},
  25. year = {2003},
  26. month = {May},
  27. address = {Athens},
  28. pages = {421--426},
  29. publisher = {Kluwer},
  30. }
  31. @inproceedings{limits-open,
  32. title = {Limits of Anonymity in Open Environments},
  33. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  34. booktitle = {Information Hiding Workshop (IH 2002)},
  35. year = {2002},
  36. month = {October},
  37. editor = {Fabien Petitcolas},
  38. publisher = {Springer-Verlag, LNCS 2578},
  39. }
  40. @inproceedings{isdn-mixes,
  41. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  42. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  43. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  44. year = {1991},
  45. month = {February},
  46. pages = {451-463},
  47. }
  48. @Article{jerichow-jsac98,
  49. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  50. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  51. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  52. journal = {IEEE Journal on Selected Areas in Communications},
  53. year = 1998,
  54. volume = 16,
  55. number = 4,
  56. pages = {495--509},
  57. month = {May}
  58. }
  59. @inproceedings{tarzan:ccs02,
  60. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  61. author = {Michael J. Freedman and Robert Morris},
  62. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  63. {S}ecurity ({CCS 2002})},
  64. year = {2002},
  65. month = {November},
  66. address = {Washington, DC},
  67. }
  68. @inproceedings{cebolla,
  69. title = {{Cebolla: Pragmatic IP Anonymity}},
  70. author = {Zach Brown},
  71. booktitle = {Ottawa Linux Symposium},
  72. year = {2002},
  73. month = {June},
  74. }
  75. @misc{eax,
  76. author = "M. Bellare and P. Rogaway and D. Wagner",
  77. title = "A conventional authenticated-encryption mode",
  78. howpublished = {Manuscript},
  79. month = {April},
  80. year = {2003},
  81. }
  82. @misc{darkside,
  83. title = {{The Dark Side of the Web: An Open Proxy's View}},
  84. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  85. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  86. }
  87. @Misc{anonymizer,
  88. key = {anonymizer},
  89. title = {The {Anonymizer}},
  90. note = {\url{http://anonymizer.com/}}
  91. }
  92. @Misc{privoxy,
  93. key = {privoxy},
  94. title = {{Privoxy}},
  95. note = {\url{http://www.privoxy.org/}}
  96. }
  97. @inproceedings{anonnet,
  98. title = {{Analysis of an Anonymity Network for Web Browsing}},
  99. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  100. David Hutchison},
  101. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  102. 2002)}},
  103. year = {2002},
  104. month = {June},
  105. address = {Pittsburgh, USA},
  106. pages = {49--54},
  107. }
  108. @inproceedings{econymics,
  109. title = {On the Economics of Anonymity},
  110. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  111. booktitle = {Financial Cryptography},
  112. year = {2003},
  113. editor = {Rebecca N. Wright},
  114. publisher = {Springer-Verlag, LNCS 2742},
  115. }
  116. @inproceedings{defensive-dropping,
  117. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  118. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  119. booktitle = {Financial Cryptography},
  120. year = {2004},
  121. editor = {Ari Juels},
  122. publisher = {Springer-Verlag, LNCS (forthcoming)},
  123. }
  124. @inproceedings{morphmix:fc04,
  125. title = {Practical Anonymity for the Masses with MorphMix},
  126. author = {Marc Rennhard and Bernhard Plattner},
  127. booktitle = {Financial Cryptography},
  128. year = {2004},
  129. editor = {Ari Juels},
  130. publisher = {Springer-Verlag, LNCS (forthcoming)},
  131. }
  132. @inproceedings{eternity,
  133. title = {The Eternity Service},
  134. author = {Ross Anderson},
  135. booktitle = {Pragocrypt '96},
  136. year = {1996},
  137. }
  138. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  139. @inproceedings{minion-design,
  140. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  141. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  142. booktitle = {2003 IEEE Symposium on Security and Privacy},
  143. year = {2003},
  144. month = {May},
  145. publisher = {IEEE CS},
  146. pages = {2--15},
  147. }
  148. %note = {\url{http://mixminion.net/minion-design.pdf}},
  149. @inproceedings{ rao-pseudonymity,
  150. author = "Josyula R. Rao and Pankaj Rohatgi",
  151. title = "Can Pseudonymity Really Guarantee Privacy?",
  152. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  153. year = {2000},
  154. month = Aug,
  155. publisher = {USENIX},
  156. pages = "85--96",
  157. }
  158. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  159. %full_papers/rao/rao.pdf}},
  160. @InProceedings{pfitzmann90how,
  161. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  162. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  163. booktitle = {Eurocrypt 89},
  164. publisher = {Springer-Verlag, LNCS 434},
  165. year = {1990},
  166. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  167. }
  168. % author = {Roger Dingledine and Nick Mathewson},
  169. @Misc{tor-spec,
  170. author = {Anonymized},
  171. title = {Tor Protocol Specifications},
  172. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  173. }
  174. @InProceedings{BM:mixencrypt,
  175. author = {M{\"o}ller, Bodo},
  176. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  177. booktitle = {{CT-RSA} 2003},
  178. publisher = {Springer-Verlag, LNCS 2612},
  179. year = 2003,
  180. }
  181. @InProceedings{back01,
  182. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  183. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  184. booktitle = {Information Hiding (IH 2001)},
  185. pages = {245--257},
  186. year = 2001,
  187. editor = {Ira S. Moskowitz},
  188. publisher = {Springer-Verlag, LNCS 2137},
  189. }
  190. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  191. @InProceedings{rackoff93cryptographic,
  192. author = {Charles Rackoff and Daniel R. Simon},
  193. title = {Cryptographic Defense Against Traffic Analysis},
  194. booktitle = {{ACM} Symposium on Theory of Computing},
  195. pages = {672--681},
  196. year = {1993},
  197. }
  198. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  199. @InProceedings{freehaven-berk,
  200. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  201. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  202. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  203. on Design Issue in Anonymity and Unobservability},
  204. year = {2000},
  205. month = {July},
  206. editor = {H. Federrath},
  207. publisher = {Springer-Verlag, LNCS 2009},
  208. }
  209. %note = {\url{http://freehaven.net/papers.html}},
  210. @InProceedings{raymond00,
  211. author = {J. F. Raymond},
  212. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  213. and Open Problems}},
  214. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  215. on Design Issue in Anonymity and Unobservability},
  216. year = 2000,
  217. month = {July},
  218. pages = {10-29},
  219. editor = {H. Federrath},
  220. publisher = {Springer-Verlag, LNCS 2009},
  221. }
  222. @InProceedings{sybil,
  223. author = "John Douceur",
  224. title = {{The Sybil Attack}},
  225. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
  226. month = Mar,
  227. year = 2002,
  228. }
  229. @InProceedings{trickle02,
  230. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  231. title = {From a Trickle to a Flood: Active Attacks on Several
  232. Mix Types},
  233. booktitle = {Information Hiding (IH 2002)},
  234. year = {2002},
  235. editor = {Fabien Petitcolas},
  236. publisher = {Springer-Verlag, LNCS 2578},
  237. }
  238. @InProceedings{langos02,
  239. author = {Oliver Berthold and Heinrich Langos},
  240. title = {Dummy Traffic Against Long Term Intersection Attacks},
  241. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  242. year = {2002},
  243. editor = {Roger Dingledine and Paul Syverson},
  244. publisher = {Springer-Verlag, LNCS 2482}
  245. }
  246. @InProceedings{hintz-pet02,
  247. author = {Andrew Hintz},
  248. title = {Fingerprinting Websites Using Traffic Analysis},
  249. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  250. pages = {171--178},
  251. year = 2002,
  252. editor = {Roger Dingledine and Paul Syverson},
  253. publisher = {Springer-Verlag, LNCS 2482}
  254. }
  255. @InProceedings{or-discex00,
  256. author = {Paul Syverson and Michael Reed and David Goldschlag},
  257. title = {{O}nion {R}outing Access Configurations},
  258. booktitle = {DARPA Information Survivability Conference and
  259. Exposition (DISCEX 2000)},
  260. year = {2000},
  261. publisher = {IEEE CS Press},
  262. pages = {34--40},
  263. volume = {1},
  264. }
  265. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  266. @Inproceedings{or-pet00,
  267. title = {{Towards an Analysis of Onion Routing Security}},
  268. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  269. Carl Landwehr},
  270. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  271. on Design Issue in Anonymity and Unobservability},
  272. year = 2000,
  273. month = {July},
  274. pages = {96--114},
  275. editor = {H. Federrath},
  276. publisher = {Springer-Verlag, LNCS 2009},
  277. }
  278. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  279. @Inproceedings{freenet-pets00,
  280. title = {Freenet: A Distributed Anonymous Information Storage
  281. and Retrieval System},
  282. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  283. Theodore W. Hong},
  284. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  285. on Design Issue in Anonymity and Unobservability},
  286. year = 2000,
  287. month = {July},
  288. pages = {46--66},
  289. editor = {H. Federrath},
  290. publisher = {Springer-Verlag, LNCS 2009},
  291. }
  292. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  293. @InProceedings{or-ih96,
  294. author = {David M. Goldschlag and Michael G. Reed and Paul
  295. F. Syverson},
  296. title = {Hiding Routing Information},
  297. booktitle = {Information Hiding, First International Workshop},
  298. pages = {137--150},
  299. year = 1996,
  300. editor = {R. Anderson},
  301. month = {May},
  302. publisher = {Springer-Verlag, LNCS 1174},
  303. }
  304. @InProceedings{federrath-ih96,
  305. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  306. title = {{MIXes} in Mobile Communication Systems: Location
  307. Management with Privacy},
  308. title = {Hiding Routing Information},
  309. booktitle = {Information Hiding, First International Workshop},
  310. pages = {121--135},
  311. year = 1996,
  312. editor = {R. Anderson},
  313. month = {May},
  314. publisher = {Springer-Verlag, LNCS 1174},
  315. }
  316. @InProceedings{reed-protocols97,
  317. author = {Michael G. Reed and Paul F. Syverson and David
  318. M. Goldschlag},
  319. title = {Protocols Using Anonymous Connections: Mobile Applications},
  320. booktitle = {Security Protocols: 5th International Workshop},
  321. pages = {13--23},
  322. year = 1997,
  323. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  324. and Michael Roe},
  325. month = {April},
  326. publisher = {Springer-Verlag, LNCS 1361}
  327. }
  328. @Article{or-jsac98,
  329. author = {Michael G. Reed and Paul F. Syverson and David
  330. M. Goldschlag},
  331. title = {Anonymous Connections and Onion Routing},
  332. journal = {IEEE Journal on Selected Areas in Communications},
  333. year = 1998,
  334. volume = 16,
  335. number = 4,
  336. pages = {482--494},
  337. month = {May},
  338. }
  339. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  340. @Misc{TLS,
  341. author = {T. Dierks and C. Allen},
  342. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  343. howpublished = {IETF RFC 2246},
  344. month = {January},
  345. year = {1999},
  346. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  347. }
  348. @Misc{SMTP,
  349. author = {J. Postel},
  350. title = {Simple {M}ail {T}ransfer {P}rotocol},
  351. howpublished = {IETF RFC 2821 (also STD0010)},
  352. month = {April},
  353. year = {2001},
  354. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  355. }
  356. @Misc{IMAP,
  357. author = {M. Crispin},
  358. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  359. howpublished = {IETF RFC 2060},
  360. month = {December},
  361. year = {1996},
  362. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  363. }
  364. @misc{pipenet,
  365. title = {PipeNet 1.1},
  366. author = {Wei Dai},
  367. year = 1996,
  368. month = {August},
  369. howpublished = {Usenet post},
  370. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  371. in a post to the cypherpunks list, Feb.\ 1995.},
  372. }
  373. @Misc{POP3,
  374. author = {J. Myers and M. Rose},
  375. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  376. howpublished = {IETF RFC 1939 (also STD0053)},
  377. month = {May},
  378. year = {1996},
  379. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  380. }
  381. @InProceedings{shuffle,
  382. author = {C. Andrew Neff},
  383. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  384. booktitle = {8th ACM Conference on Computer and Communications
  385. Security (CCS-8)},
  386. pages = {116--125},
  387. year = 2001,
  388. editor = {P. Samarati},
  389. month = {November},
  390. publisher = {ACM Press},
  391. }
  392. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  393. % technicaldocs/shuffle.pdf}},
  394. @InProceedings{dolev91,
  395. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  396. title = {Non-Malleable Cryptography},
  397. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  398. pages = {542--552},
  399. year = 1991,
  400. note = {Updated version at
  401. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  402. }
  403. @TechReport{rsw96,
  404. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  405. title = {Time-lock puzzles and timed-release Crypto},
  406. year = 1996,
  407. type = {MIT LCS technical memo},
  408. number = {MIT/LCS/TR-684},
  409. month = {February},
  410. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  411. }
  412. @InProceedings{web-mix,
  413. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  414. title = {Web {MIX}es: A system for anonymous and unobservable
  415. {I}nternet access},
  416. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  417. on Design Issue in Anonymity and Unobservability},
  418. editor = {H. Federrath},
  419. publisher = {Springer-Verlag, LNCS 2009},
  420. pages = {115--129},
  421. year = {2000},
  422. }
  423. @InProceedings{disad-free-routes,
  424. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  425. title = {The disadvantages of free {MIX} routes and how to overcome
  426. them},
  427. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  428. on Design Issue in Anonymity and Unobservability},
  429. pages = {30--45},
  430. year = 2000,
  431. editor = {H. Federrath},
  432. publisher = {Springer-Verlag, LNCS 2009},
  433. }
  434. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  435. % disadvantages_berthold.pdf}},
  436. @InProceedings{boneh00,
  437. author = {Dan Boneh and Moni Naor},
  438. title = {Timed Commitments},
  439. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  440. pages = {236--254},
  441. year = 2000,
  442. publisher = {Springer-Verlag, LNCS 1880},
  443. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  444. }
  445. @InProceedings{goldschlag98,
  446. author = {David M. Goldschlag and Stuart G. Stubblebine},
  447. title = {Publicly Verifiable Lotteries: Applications of
  448. Delaying Functions},
  449. booktitle = {Financial Cryptography},
  450. pages = {214--226},
  451. year = 1998,
  452. publisher = {Springer-Verlag, LNCS 1465},
  453. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  454. }
  455. @InProceedings{syverson98,
  456. author = {Paul Syverson},
  457. title = {Weakly Secret Bit Commitment: Applications to
  458. Lotteries and Fair Exchange},
  459. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  460. pages = {2--13},
  461. year = 1998,
  462. address = {Rockport Massachusetts},
  463. month = {June},
  464. publisher = {IEEE CS Press},
  465. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  466. }
  467. @Misc{shoup-iso,
  468. author = {Victor Shoup},
  469. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  470. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  471. }
  472. @Misc{shoup-oaep,
  473. author = {Victor Shoup},
  474. title = {{OAEP} Reconsidered},
  475. howpublished = {{IACR} e-print 2000/060},
  476. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  477. }
  478. @Misc{oaep-still-alive,
  479. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  480. title = {{RSA}-{OAEP} is Still Alive!},
  481. howpublished = {{IACR} e-print 2000/061},
  482. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  483. }
  484. @misc{echolot,
  485. author = {Peter Palfrader},
  486. title = {Echolot: a pinger for anonymous remailers},
  487. note = {\url{http://www.palfrader.org/echolot/}},
  488. }
  489. @Misc{mixmaster-attacks,
  490. author = {Lance Cottrell},
  491. title = {Mixmaster and Remailer Attacks},
  492. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  493. }
  494. @Misc{mixmaster-spec,
  495. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  496. Palfrader and Len Sassaman},
  497. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  498. year = {2003},
  499. month = {July},
  500. howpublished = {Draft},
  501. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  502. }
  503. @InProceedings{puzzles-tls,
  504. author = "Drew Dean and Adam Stubblefield",
  505. title = {{Using Client Puzzles to Protect TLS}},
  506. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  507. year = {2001},
  508. month = Aug,
  509. publisher = {USENIX},
  510. }
  511. @InProceedings{breadpudding,
  512. author = {Markus Jakobsson and Ari Juels},
  513. title = {Proofs of Work and Bread Pudding Protocols},
  514. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  515. Conference on Communications and Multimedia Security
  516. (CMS '99)},
  517. year = 1999,
  518. month = {September},
  519. publisher = {Kluwer}
  520. }
  521. @Misc{hashcash,
  522. author = {Adam Back},
  523. title = {Hash cash},
  524. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  525. }
  526. @InProceedings{oreilly-acc,
  527. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  528. title = {Accountability},
  529. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  530. Technology},
  531. year = {2001},
  532. publisher = {O'Reilly and Associates},
  533. }
  534. @InProceedings{han,
  535. author = {Yongfei Han},
  536. title = {Investigation of non-repudiation protocols},
  537. booktitle = {ACISP '96},
  538. year = 1996,
  539. publisher = {Springer-Verlag},
  540. }
  541. @Misc{socks5,
  542. key = {socks5},
  543. title = {{SOCKS} {P}rotocol {V}ersion 5},
  544. howpublished= {IETF RFC 1928},
  545. month = {March},
  546. year = 1996,
  547. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  548. }
  549. @InProceedings{abe,
  550. author = {Masayuki Abe},
  551. title = {Universally Verifiable {MIX} With Verification Work Independent of
  552. The Number of {MIX} Servers},
  553. booktitle = {{EUROCRYPT} 1998},
  554. year = {1998},
  555. publisher = {Springer-Verlag, LNCS 1403},
  556. }
  557. @InProceedings{desmedt,
  558. author = {Yvo Desmedt and Kaoru Kurosawa},
  559. title = {How To Break a Practical {MIX} and Design a New One},
  560. booktitle = {{EUROCRYPT} 2000},
  561. year = {2000},
  562. publisher = {Springer-Verlag, LNCS 1803},
  563. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  564. }
  565. @InProceedings{mitkuro,
  566. author = {M. Mitomo and K. Kurosawa},
  567. title = {{Attack for Flash MIX}},
  568. booktitle = {{ASIACRYPT} 2000},
  569. year = {2000},
  570. publisher = {Springer-Verlag, LNCS 1976},
  571. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  572. }
  573. @InProceedings{hybrid-mix,
  574. author = {M. Ohkubo and M. Abe},
  575. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  576. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  577. year = {2000},
  578. publisher = {Springer-Verlag, LNCS 1976},
  579. }
  580. @InProceedings{PShuffle,
  581. author = {Jun Furukawa and Kazue Sako},
  582. title = {An Efficient Scheme for Proving a Shuffle},
  583. editor = {Joe Kilian},
  584. booktitle = {CRYPTO 2001},
  585. year = {2001},
  586. publisher = {Springer-Verlag, LNCS 2139},
  587. }
  588. @InProceedings{jakobsson-optimally,
  589. author = "Markus Jakobsson and Ari Juels",
  590. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  591. booktitle = {Principles of Distributed Computing - {PODC} '01},
  592. year = "2001",
  593. publisher = {ACM Press},
  594. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  595. }
  596. @InProceedings{kesdogan,
  597. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  598. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  599. System},
  600. booktitle = {Information Hiding (IH 1998)},
  601. year = {1998},
  602. publisher = {Springer-Verlag, LNCS 1525},
  603. }
  604. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  605. @InProceedings{socks4,
  606. author = {David Koblas and Michelle R. Koblas},
  607. title = {{SOCKS}},
  608. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  609. Symposium)},
  610. pages = {77--83},
  611. year = 1992,
  612. publisher = {USENIX},
  613. }
  614. @InProceedings{flash-mix,
  615. author = {Markus Jakobsson},
  616. title = {Flash {M}ixing},
  617. booktitle = {Principles of Distributed Computing - {PODC} '99},
  618. year = {1999},
  619. publisher = {ACM Press},
  620. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  621. }
  622. @InProceedings{SK,
  623. author = {Joe Kilian and Kazue Sako},
  624. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  625. the Implementation of a Voting Booth},
  626. booktitle = {EUROCRYPT '95},
  627. year = {1995},
  628. publisher = {Springer-Verlag},
  629. }
  630. @InProceedings{OAEP,
  631. author = {M. Bellare and P. Rogaway},
  632. year = {1994},
  633. booktitle = {EUROCRYPT '94},
  634. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  635. {RSA}},
  636. publisher = {Springer-Verlag},
  637. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  638. }
  639. @inproceedings{babel,
  640. title = {Mixing {E}-mail With {B}abel},
  641. author = {Ceki G\"ulc\"u and Gene Tsudik},
  642. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  643. year = 1996,
  644. month = {February},
  645. pages = {2--16},
  646. publisher = {IEEE},
  647. }
  648. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  649. @Misc{rprocess,
  650. author = {RProcess},
  651. title = {Selective Denial of Service Attacks},
  652. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  653. }
  654. @Article{remailer-history,
  655. author = {Sameer Parekh},
  656. title = {Prospects for Remailers},
  657. journal = {First Monday},
  658. volume = {1},
  659. number = {2},
  660. month = {August},
  661. year = {1996},
  662. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  663. }
  664. @Article{chaum-mix,
  665. author = {David Chaum},
  666. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  667. journal = {Communications of the ACM},
  668. year = {1981},
  669. volume = {4},
  670. number = {2},
  671. month = {February},
  672. }
  673. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  674. @InProceedings{nym-alias-net,
  675. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  676. title = {{The Design, Implementation and Operation of an Email
  677. Pseudonym Server}},
  678. booktitle = {$5^{th}$ ACM Conference on Computer and
  679. Communications Security (CCS'98)},
  680. year = 1998,
  681. publisher = {ACM Press},
  682. }
  683. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  684. @InProceedings{tangler,
  685. author = {Marc Waldman and David Mazi\`{e}res},
  686. title = {Tangler: A Censorship-Resistant Publishing System
  687. Based on Document Entanglements},
  688. booktitle = {$8^{th}$ ACM Conference on Computer and
  689. Communications Security (CCS-8)},
  690. pages = {86--135},
  691. year = 2001,
  692. publisher = {ACM Press},
  693. }
  694. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  695. @misc{neochaum,
  696. author = {Tim May},
  697. title = {Payment mixes for anonymity},
  698. howpublished = {E-mail archived at
  699. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  700. }
  701. @misc{helsingius,
  702. author = {J. Helsingius},
  703. title = {{\tt anon.penet.fi} press release},
  704. note = {\newline \url{http://www.penet.fi/press-english.html}},
  705. }
  706. @InProceedings{garay97secure,
  707. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  708. title = {Secure distributed storage and retrieval},
  709. booktitle = {11th International Workshop, WDAG '97},
  710. pages = {275--289},
  711. year = {1997},
  712. publisher = {Springer-Verlag, LNCS 1320},
  713. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  714. }
  715. @InProceedings{PIK,
  716. author = {C. Park and K. Itoh and K. Kurosawa},
  717. title = {Efficient anonymous channel and all/nothing election scheme},
  718. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  719. pages = {248--259},
  720. publisher = {Springer-Verlag, LNCS 765},
  721. }
  722. @Misc{pgpfaq,
  723. key = {PGP},
  724. title = {{PGP} {FAQ}},
  725. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  726. }
  727. @Article{riordan-schneier,
  728. author = {James Riordan and Bruce Schneier},
  729. title = {A Certified E-mail Protocol with No Trusted Third Party},
  730. journal = {13th Annual Computer Security Applications Conference},
  731. month = {December},
  732. year = {1998},
  733. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  734. }
  735. @Article{crowds-tissec,
  736. author = {Michael K. Reiter and Aviel D. Rubin},
  737. title = {Crowds: Anonymity for Web Transactions},
  738. journal = {ACM TISSEC},
  739. year = 1998,
  740. volume = 1,
  741. number = 1,
  742. pages = {66--92},
  743. month = {November},
  744. }
  745. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  746. @Article{crowds-dimacs,
  747. author = {Michael K. Reiter and Aviel D. Rubin},
  748. title = {Crowds: Anonymity for Web Transactions},
  749. journal = {{DIMACS} Technical Report (Revised)},
  750. volume = {97},
  751. number = {15},
  752. month = {August},
  753. year = {1997},
  754. }
  755. @Misc{advogato,
  756. author = {Raph Levien},
  757. title = {Advogato's Trust Metric},
  758. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  759. }
  760. @InProceedings{publius,
  761. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  762. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  763. source-anonymous web publishing system},
  764. booktitle = {Proc. 9th USENIX Security Symposium},
  765. pages = {59--72},
  766. year = {2000},
  767. month = {August},
  768. }
  769. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  770. @Misc{freedom-nyms,
  771. author = {Russell Samuels},
  772. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  773. year = {1999},
  774. month = {November},
  775. day = {21},
  776. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  777. }
  778. @techreport{freedom2-arch,
  779. title = {Freedom Systems 2.0 Architecture},
  780. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  781. institution = {Zero Knowledge Systems, {Inc.}},
  782. year = {2000},
  783. month = {December},
  784. type = {White Paper},
  785. day = {18},
  786. }
  787. @techreport{freedom21-security,
  788. title = {Freedom Systems 2.1 Security Issues and Analysis},
  789. author = {Adam Back and Ian Goldberg and Adam Shostack},
  790. institution = {Zero Knowledge Systems, {Inc.}},
  791. year = {2001},
  792. month = {May},
  793. type = {White Paper},
  794. }
  795. @inproceedings{cfs:sosp01,
  796. title = {Wide-area cooperative storage with {CFS}},
  797. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  798. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  799. year = {2001},
  800. month = {October},
  801. address = {Chateau Lake Louise, Banff, Canada},
  802. }
  803. @inproceedings{SS03,
  804. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  805. author = {Andrei Serjantov and Peter Sewell},
  806. booktitle = {Computer Security -- ESORICS 2003},
  807. publisher = {Springer-Verlag, LNCS (forthcoming)},
  808. year = {2003},
  809. month = {October},
  810. }
  811. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  812. @Misc{pk-relations,
  813. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  814. title = {Relations Among Notions of Security for Public-Key Encryption
  815. Schemes},
  816. howpublished = {
  817. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  818. Springer-Verlag, 1998.
  819. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  820. }
  821. @InProceedings{mix-acc,
  822. author = {Roger Dingledine and Michael J. Freedman and David
  823. Hopwood and David Molnar},
  824. title = {{A Reputation System to Increase MIX-net
  825. Reliability}},
  826. booktitle = {Information Hiding (IH 2001)},
  827. pages = {126--141},
  828. year = 2001,
  829. editor = {Ira S. Moskowitz},
  830. publisher = {Springer-Verlag, LNCS 2137},
  831. }
  832. %note = {\url{http://www.freehaven.net/papers.html}},
  833. @InProceedings{casc-rep,
  834. author = {Roger Dingledine and Paul Syverson},
  835. title = {{Reliable MIX Cascade Networks through Reputation}},
  836. booktitle = {Financial Cryptography},
  837. year = 2002,
  838. editor = {Matt Blaze},
  839. publisher = {Springer-Verlag, LNCS 2357},
  840. }
  841. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  842. @InProceedings{zhou96certified,
  843. author = {Zhou and Gollmann},
  844. title = {Certified Electronic Mail},
  845. booktitle = {{ESORICS: European Symposium on Research in Computer
  846. Security}},
  847. publisher = {Springer-Verlag, LNCS 1146},
  848. year = {1996},
  849. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  850. }
  851. @Misc{realtime-mix,
  852. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  853. Birgit Pfitzmann and Michael Waidner},
  854. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  855. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  856. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  857. }
  858. @InProceedings{danezis-pets03,
  859. author = {George Danezis},
  860. title = {Mix-networks with Restricted Routes},
  861. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  862. year = 2003,
  863. editor = {Roger Dingledine},
  864. publisher = {Springer-Verlag LNCS 2760}
  865. }
  866. @InProceedings{gap-pets03,
  867. author = {Krista Bennett and Christian Grothoff},
  868. title = {{GAP} -- practical anonymous networking},
  869. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  870. year = 2003,
  871. editor = {Roger Dingledine},
  872. publisher = {Springer-Verlag LNCS 2760}
  873. }
  874. @Article{hordes-jcs,
  875. author = {Brian Neal Levine and Clay Shields},
  876. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  877. journal = {Journal of Computer Security},
  878. year = 2002,
  879. volume = 10,
  880. number = 3,
  881. pages = {213--240}
  882. }
  883. @TechReport{herbivore,
  884. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  885. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  886. institution = {Cornell University Computing and Information Science},
  887. year = 2003,
  888. type = {Technical Report},
  889. number = {TR2003-1890},
  890. month = {February}
  891. }
  892. @InProceedings{p5,
  893. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  894. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  895. booktitle = {2002 IEEE Symposium on Security and Privacy},
  896. pages = {58--70},
  897. year = 2002,
  898. publisher = {IEEE CS}
  899. }
  900. @phdthesis{ian-thesis,
  901. title = {A Pseudonymous Communications Infrastructure for the Internet},
  902. author = {Ian Goldberg},
  903. school = {UC Berkeley},
  904. year = {2000},
  905. month = {December},
  906. }
  907. @Article{taz,
  908. author = {Ian Goldberg and David Wagner},
  909. title = {TAZ Servers and the Rewebber Network: Enabling
  910. Anonymous Publishing on the World Wide Web},
  911. journal = {First Monday},
  912. year = 1998,
  913. volume = 3,
  914. number = 4,
  915. month = {August},
  916. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  917. }
  918. @Misc{tcp-over-tcp-is-bad,
  919. key = {tcp-over-tcp-is-bad},
  920. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  921. author = {Olaf Titz},
  922. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  923. }
  924. @inproceedings{wright02,
  925. title = {An Analysis of the Degradation of Anonymous Protocols},
  926. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  927. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  928. year = {2002},
  929. month = {February},
  930. publisher = {IEEE},
  931. }
  932. @inproceedings{wright03,
  933. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  934. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  935. booktitle = {IEEE Symposium on Security and Privacy},
  936. pages= {28--41},
  937. year = {2003},
  938. month = {May},
  939. publisher = {IEEE CS},
  940. }
  941. @Misc{jap-backdoor,
  942. author={The AN.ON Project},
  943. howpublished={Press release},
  944. year={2003},
  945. month={September},
  946. day={2},
  947. title={German Police proceeds against anonymity service},
  948. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  949. }
  950. %%% Local Variables:
  951. %%% mode: latex
  952. %%% TeX-master: "tor-design"
  953. %%% End: