tor-design.bib 47 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433
  1. % hs-attack
  2. @inproceedings{hs-attack,
  3. title = {Locating Hidden Servers},
  4. author = {Lasse {\O}verlier and Paul Syverson},
  5. booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
  6. year = {2006},
  7. month = {May},
  8. publisher = {IEEE CS},
  9. }
  10. % fix me
  11. @misc{tannenbaum96,
  12. author = "Andrew Tannenbaum",
  13. title = "Computer Networks",
  14. year = "1996",
  15. publisher = "Prentice Hall, 3rd edition",
  16. }
  17. @article{ meadows96,
  18. author = "Catherine Meadows",
  19. title = "The {NRL} Protocol Analyzer: An Overview",
  20. journal = "Journal of Logic Programming",
  21. volume = "26",
  22. number = "2",
  23. pages = "113--131",
  24. year = "1996",
  25. }
  26. @inproceedings{kesdogan:pet2002,
  27. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  28. alternative to the MIX based Approach?},
  29. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  30. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  31. year = {2002},
  32. month = {April},
  33. editor = {Roger Dingledine and Paul Syverson},
  34. publisher = {Springer-Verlag, LNCS 2482},
  35. }
  36. @inproceedings{statistical-disclosure,
  37. title = {Statistical Disclosure Attacks},
  38. author = {George Danezis},
  39. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  40. organization = {{IFIP TC11}},
  41. year = {2003},
  42. month = {May},
  43. address = {Athens},
  44. pages = {421--426},
  45. publisher = {Kluwer},
  46. }
  47. @inproceedings{limits-open,
  48. title = {Limits of Anonymity in Open Environments},
  49. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  50. booktitle = {Information Hiding Workshop (IH 2002)},
  51. year = {2002},
  52. month = {October},
  53. editor = {Fabien Petitcolas},
  54. publisher = {Springer-Verlag, LNCS 2578},
  55. }
  56. @inproceedings{isdn-mixes,
  57. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  58. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  59. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  60. year = {1991},
  61. month = {February},
  62. pages = {451-463},
  63. }
  64. @Article{jerichow-jsac98,
  65. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  66. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  67. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  68. journal = {IEEE Journal on Selected Areas in Communications},
  69. year = 1998,
  70. volume = 16,
  71. number = 4,
  72. pages = {495--509},
  73. month = {May}
  74. }
  75. @inproceedings{tarzan:ccs02,
  76. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  77. author = {Michael J. Freedman and Robert Morris},
  78. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  79. {S}ecurity ({CCS 2002})},
  80. year = {2002},
  81. month = {November},
  82. address = {Washington, DC},
  83. }
  84. @inproceedings{cebolla,
  85. title = {{Cebolla: Pragmatic IP Anonymity}},
  86. author = {Zach Brown},
  87. booktitle = {Ottawa Linux Symposium},
  88. year = {2002},
  89. month = {June},
  90. }
  91. @inproceedings{eax,
  92. author = "M. Bellare and P. Rogaway and D. Wagner",
  93. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  94. booktitle = {Fast Software Encryption 2004},
  95. month = {February},
  96. year = {2004},
  97. }
  98. @misc{darkside,
  99. title = {{The Dark Side of the Web: An Open Proxy's View}},
  100. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  101. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  102. }
  103. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  104. @Misc{anonymizer,
  105. key = {anonymizer},
  106. title = {The {Anonymizer}},
  107. note = {\url{http://anonymizer.com/}}
  108. }
  109. @Misc{privoxy,
  110. key = {privoxy},
  111. title = {{Privoxy}},
  112. note = {\url{http://www.privoxy.org/}}
  113. }
  114. @Misc{i2p,
  115. key = {i2p},
  116. title = {{I2P}},
  117. note = {\url{http://www.i2p.net/}}
  118. }
  119. @Misc{nym,
  120. author = {Jason Holt},
  121. title = {nym: practical pseudonymity for anonymous networks},
  122. note = {Paper and source code at \url{http://www.lunkwill.org/src/nym/}}
  123. }
  124. @InProceedings{nymble,
  125. author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
  126. title = {Nymble: Anonymous IP-address Blocking},
  127. booktitle = {Privacy Enhancing Technologies (PET 2007)},
  128. year = 2007,
  129. publisher = {Springer-Verlag, LNCS (forthcoming)}
  130. }
  131. @inproceedings{anonnet,
  132. title = {{Analysis of an Anonymity Network for Web Browsing}},
  133. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  134. David Hutchison},
  135. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  136. 2002)}},
  137. year = {2002},
  138. month = {June},
  139. address = {Pittsburgh, USA},
  140. }
  141. % pages = {49--54},
  142. @inproceedings{econymics,
  143. title = {On the Economics of Anonymity},
  144. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  145. booktitle = {Financial Cryptography},
  146. year = {2003},
  147. editor = {Rebecca N. Wright},
  148. publisher = {Springer-Verlag, LNCS 2742},
  149. }
  150. @inproceedings{defensive-dropping,
  151. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  152. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  153. booktitle = {Financial Cryptography},
  154. year = {2004},
  155. editor = {Ari Juels},
  156. publisher = {Springer-Verlag, LNCS (forthcoming)},
  157. }
  158. @inproceedings{morphmix:fc04,
  159. title = {Practical Anonymity for the Masses with MorphMix},
  160. author = {Marc Rennhard and Bernhard Plattner},
  161. booktitle = {Financial Cryptography},
  162. year = {2004},
  163. editor = {Ari Juels},
  164. publisher = {Springer-Verlag, LNCS (forthcoming)},
  165. }
  166. @inproceedings{eternity,
  167. title = {The Eternity Service},
  168. author = {Ross Anderson},
  169. booktitle = {Pragocrypt '96},
  170. year = {1996},
  171. }
  172. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  173. @inproceedings{minion-design,
  174. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  175. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  176. booktitle = {2003 IEEE Symposium on Security and Privacy},
  177. year = {2003},
  178. month = {May},
  179. publisher = {IEEE CS},
  180. pages = {2--15},
  181. }
  182. %note = {\url{http://mixminion.net/minion-design.pdf}},
  183. @inproceedings{ rao-pseudonymity,
  184. author = "Josyula R. Rao and Pankaj Rohatgi",
  185. title = "Can Pseudonymity Really Guarantee Privacy?",
  186. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  187. year = {2000},
  188. month = Aug,
  189. publisher = {USENIX},
  190. pages = "85--96",
  191. }
  192. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  193. %full_papers/rao/rao.pdf}},
  194. @InProceedings{pfitzmann90how,
  195. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  196. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  197. booktitle = {Eurocrypt 89},
  198. publisher = {Springer-Verlag, LNCS 434},
  199. year = {1990},
  200. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  201. }
  202. @Misc{tor-spec,
  203. author = {Roger Dingledine and Nick Mathewson},
  204. title = {Tor Protocol Specifications},
  205. note = {\url{http://tor.eff.org/svn/trunk/doc/tor-spec.txt}},
  206. }
  207. @Misc{incentives-txt,
  208. author = {Roger Dingledine and Nick Mathewson},
  209. title = {Tor Incentives Design Brainstorms},
  210. note = {\url{http://tor.eff.org/svn/trunk/doc/incentives.txt}},
  211. }
  212. @InProceedings{BM:mixencrypt,
  213. author = {M{\"o}ller, Bodo},
  214. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  215. booktitle = {{CT-RSA} 2003},
  216. publisher = {Springer-Verlag, LNCS 2612},
  217. year = 2003,
  218. }
  219. @InProceedings{back01,
  220. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  221. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  222. booktitle = {Information Hiding (IH 2001)},
  223. pages = {245--257},
  224. year = 2001,
  225. editor = {Ira S. Moskowitz},
  226. publisher = {Springer-Verlag, LNCS 2137},
  227. }
  228. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  229. @InProceedings{rackoff93cryptographic,
  230. author = {Charles Rackoff and Daniel R. Simon},
  231. title = {Cryptographic Defense Against Traffic Analysis},
  232. booktitle = {{ACM} Symposium on Theory of Computing},
  233. pages = {672--681},
  234. year = {1993},
  235. }
  236. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  237. @InProceedings{freehaven-berk,
  238. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  239. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  240. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  241. on Design Issue in Anonymity and Unobservability},
  242. year = 2000,
  243. month = {July},
  244. editor = {H. Federrath},
  245. publisher = {Springer-Verlag, LNCS 2009},
  246. }
  247. @InProceedings{move-ndss05,
  248. author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  249. title = {MOVE: An End-to-End Solution To Network Denial of Service},
  250. booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  251. year = 2005,
  252. month = {February},
  253. publisher = {Internet Society}
  254. }
  255. %note = {\url{http://freehaven.net/papers.html}},
  256. @InProceedings{raymond00,
  257. author = {J. F. Raymond},
  258. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  259. and Open Problems}},
  260. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  261. on Design Issue in Anonymity and Unobservability},
  262. year = 2000,
  263. month = {July},
  264. pages = {10-29},
  265. editor = {H. Federrath},
  266. publisher = {Springer-Verlag, LNCS 2009},
  267. }
  268. @InProceedings{sybil,
  269. author = "John Douceur",
  270. title = {{The Sybil Attack}},
  271. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  272. month = Mar,
  273. year = 2002,
  274. }
  275. @InCollection{price-privacy,
  276. author = {Paul Syverson and Adam Shostack},
  277. editor = {L. Jean Camp and Stephen Lewis},
  278. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  279. booktitle = {Economics of Information Security},
  280. chapter = 10,
  281. publisher = {Kluwer},
  282. year = 2004,
  283. pages = {129--142}
  284. }
  285. @InProceedings{trickle02,
  286. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  287. title = {From a Trickle to a Flood: Active Attacks on Several
  288. Mix Types},
  289. booktitle = {Information Hiding (IH 2002)},
  290. year = {2002},
  291. editor = {Fabien Petitcolas},
  292. publisher = {Springer-Verlag, LNCS 2578},
  293. }
  294. @InProceedings{langos02,
  295. author = {Oliver Berthold and Heinrich Langos},
  296. title = {Dummy Traffic Against Long Term Intersection Attacks},
  297. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  298. year = {2002},
  299. editor = {Roger Dingledine and Paul Syverson},
  300. publisher = {Springer-Verlag, LNCS 2482}
  301. }
  302. @InProceedings{hintz-pet02,
  303. author = {Andrew Hintz},
  304. title = {Fingerprinting Websites Using Traffic Analysis},
  305. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  306. pages = {171--178},
  307. year = 2002,
  308. editor = {Roger Dingledine and Paul Syverson},
  309. publisher = {Springer-Verlag, LNCS 2482}
  310. }
  311. @InProceedings{or-discex00,
  312. author = {Paul Syverson and Michael Reed and David Goldschlag},
  313. title = {{O}nion {R}outing Access Configurations},
  314. booktitle = {DARPA Information Survivability Conference and
  315. Exposition (DISCEX 2000)},
  316. year = {2000},
  317. publisher = {IEEE CS Press},
  318. pages = {34--40},
  319. volume = {1},
  320. }
  321. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  322. @Inproceedings{or-pet00,
  323. title = {{Towards an Analysis of Onion Routing Security}},
  324. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  325. Carl Landwehr},
  326. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  327. on Design Issue in Anonymity and Unobservability},
  328. year = 2000,
  329. month = {July},
  330. pages = {96--114},
  331. editor = {H. Federrath},
  332. publisher = {Springer-Verlag, LNCS 2009},
  333. }
  334. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  335. @Inproceedings{freenet-pets00,
  336. title = {Freenet: A Distributed Anonymous Information Storage
  337. and Retrieval System},
  338. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  339. Theodore W. Hong},
  340. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  341. on Design Issue in Anonymity and Unobservability},
  342. year = 2000,
  343. month = {July},
  344. pages = {46--66},
  345. editor = {H. Federrath},
  346. publisher = {Springer-Verlag, LNCS 2009},
  347. }
  348. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  349. @InProceedings{or-ih96,
  350. author = {David M. Goldschlag and Michael G. Reed and Paul
  351. F. Syverson},
  352. title = {Hiding Routing Information},
  353. booktitle = {Information Hiding, First International Workshop},
  354. pages = {137--150},
  355. year = 1996,
  356. editor = {R. Anderson},
  357. month = {May},
  358. publisher = {Springer-Verlag, LNCS 1174},
  359. }
  360. @InProceedings{federrath-ih96,
  361. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  362. title = {{MIXes} in Mobile Communication Systems: Location
  363. Management with Privacy},
  364. booktitle = {Information Hiding, First International Workshop},
  365. pages = {121--135},
  366. year = 1996,
  367. editor = {R. Anderson},
  368. month = {May},
  369. publisher = {Springer-Verlag, LNCS 1174},
  370. }
  371. @InProceedings{reed-protocols97,
  372. author = {Michael G. Reed and Paul F. Syverson and David
  373. M. Goldschlag},
  374. title = {Protocols Using Anonymous Connections: Mobile Applications},
  375. booktitle = {Security Protocols: 5th International Workshop},
  376. pages = {13--23},
  377. year = 1997,
  378. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  379. and Michael Roe},
  380. month = {April},
  381. publisher = {Springer-Verlag, LNCS 1361}
  382. }
  383. @Article{or-jsac98,
  384. author = {Michael G. Reed and Paul F. Syverson and David
  385. M. Goldschlag},
  386. title = {Anonymous Connections and Onion Routing},
  387. journal = {IEEE Journal on Selected Areas in Communications},
  388. year = 1998,
  389. volume = 16,
  390. number = 4,
  391. pages = {482--494},
  392. month = {May},
  393. }
  394. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  395. @Misc{TLS,
  396. author = {T. Dierks and C. Allen},
  397. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  398. howpublished = {IETF RFC 2246},
  399. month = {January},
  400. year = {1999},
  401. }
  402. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  403. @Misc{SMTP,
  404. author = {J. Postel},
  405. title = {Simple {M}ail {T}ransfer {P}rotocol},
  406. howpublished = {IETF RFC 2821 (also STD0010)},
  407. month = {April},
  408. year = {2001},
  409. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  410. }
  411. @Misc{IMAP,
  412. author = {M. Crispin},
  413. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  414. howpublished = {IETF RFC 2060},
  415. month = {December},
  416. year = {1996},
  417. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  418. }
  419. @misc{pipenet,
  420. title = {PipeNet 1.1},
  421. author = {Wei Dai},
  422. year = 1996,
  423. month = {August},
  424. howpublished = {Usenet post},
  425. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  426. in a post to the cypherpunks list, Feb.\ 1995.},
  427. }
  428. @Misc{POP3,
  429. author = {J. Myers and M. Rose},
  430. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  431. howpublished = {IETF RFC 1939 (also STD0053)},
  432. month = {May},
  433. year = {1996},
  434. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  435. }
  436. @InProceedings{shuffle,
  437. author = {C. Andrew Neff},
  438. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  439. booktitle = {8th ACM Conference on Computer and Communications
  440. Security (CCS-8)},
  441. pages = {116--125},
  442. year = 2001,
  443. editor = {P. Samarati},
  444. month = {November},
  445. publisher = {ACM Press},
  446. }
  447. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  448. % technicaldocs/shuffle.pdf}},
  449. @InProceedings{dolev91,
  450. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  451. title = {Non-Malleable Cryptography},
  452. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  453. pages = {542--552},
  454. year = 1991,
  455. note = {Updated version at
  456. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  457. }
  458. @TechReport{rsw96,
  459. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  460. title = {Time-lock puzzles and timed-release Crypto},
  461. year = 1996,
  462. type = {MIT LCS technical memo},
  463. number = {MIT/LCS/TR-684},
  464. month = {February},
  465. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  466. }
  467. @InProceedings{web-mix,
  468. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  469. title = {Web {MIX}es: A system for anonymous and unobservable
  470. {I}nternet access},
  471. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  472. on Design Issue in Anonymity and Unobservability},
  473. editor = {H. Federrath},
  474. publisher = {Springer-Verlag, LNCS 2009},
  475. year = {2000},
  476. }
  477. % pages = {115--129},
  478. @InProceedings{disad-free-routes,
  479. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  480. title = {The disadvantages of free {MIX} routes and how to overcome
  481. them},
  482. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  483. on Design Issue in Anonymity and Unobservability},
  484. pages = {30--45},
  485. year = 2000,
  486. editor = {H. Federrath},
  487. publisher = {Springer-Verlag, LNCS 2009},
  488. }
  489. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  490. % disadvantages_berthold.pdf}},
  491. @InProceedings{boneh00,
  492. author = {Dan Boneh and Moni Naor},
  493. title = {Timed Commitments},
  494. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  495. pages = {236--254},
  496. year = 2000,
  497. publisher = {Springer-Verlag, LNCS 1880},
  498. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  499. }
  500. @InProceedings{goldschlag98,
  501. author = {David M. Goldschlag and Stuart G. Stubblebine},
  502. title = {Publicly Verifiable Lotteries: Applications of
  503. Delaying Functions},
  504. booktitle = {Financial Cryptography},
  505. pages = {214--226},
  506. year = 1998,
  507. publisher = {Springer-Verlag, LNCS 1465},
  508. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  509. }
  510. @InProceedings{syverson98,
  511. author = {Paul Syverson},
  512. title = {Weakly Secret Bit Commitment: Applications to
  513. Lotteries and Fair Exchange},
  514. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  515. pages = {2--13},
  516. year = 1998,
  517. address = {Rockport Massachusetts},
  518. month = {June},
  519. publisher = {IEEE CS Press},
  520. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  521. }
  522. @Misc{shoup-iso,
  523. author = {Victor Shoup},
  524. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  525. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  526. }
  527. @Misc{shoup-oaep,
  528. author = {Victor Shoup},
  529. title = {{OAEP} Reconsidered},
  530. howpublished = {{IACR} e-print 2000/060},
  531. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  532. }
  533. @Misc{oaep-still-alive,
  534. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  535. title = {{RSA}-{OAEP} is Still Alive!},
  536. howpublished = {{IACR} e-print 2000/061},
  537. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  538. }
  539. @misc{echolot,
  540. author = {Peter Palfrader},
  541. title = {Echolot: a pinger for anonymous remailers},
  542. note = {\url{http://www.palfrader.org/echolot/}},
  543. }
  544. @Misc{mixmaster-attacks,
  545. author = {Lance Cottrell},
  546. title = {Mixmaster and Remailer Attacks},
  547. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  548. }
  549. @Misc{mixmaster-spec,
  550. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  551. Palfrader and Len Sassaman},
  552. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  553. year = {2003},
  554. month = {July},
  555. howpublished = {Draft},
  556. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  557. }
  558. @InProceedings{puzzles-tls,
  559. author = "Drew Dean and Adam Stubblefield",
  560. title = {{Using Client Puzzles to Protect TLS}},
  561. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  562. year = {2001},
  563. month = Aug,
  564. publisher = {USENIX},
  565. }
  566. @InProceedings{breadpudding,
  567. author = {Markus Jakobsson and Ari Juels},
  568. title = {Proofs of Work and Bread Pudding Protocols},
  569. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  570. Conference on Communications and Multimedia Security
  571. (CMS '99)},
  572. year = 1999,
  573. month = {September},
  574. publisher = {Kluwer}
  575. }
  576. @Misc{hashcash,
  577. author = {Adam Back},
  578. title = {Hash cash},
  579. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  580. }
  581. @InProceedings{oreilly-acc,
  582. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  583. title = {Accountability},
  584. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  585. Technology},
  586. year = {2001},
  587. publisher = {O'Reilly and Associates},
  588. }
  589. @InProceedings{han,
  590. author = {Yongfei Han},
  591. title = {Investigation of non-repudiation protocols},
  592. booktitle = {ACISP '96},
  593. year = 1996,
  594. publisher = {Springer-Verlag},
  595. }
  596. @Misc{socks5,
  597. key = {socks5},
  598. title = {{SOCKS} {P}rotocol {V}ersion 5},
  599. howpublished= {IETF RFC 1928},
  600. month = {March},
  601. year = 1996,
  602. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  603. }
  604. @InProceedings{abe,
  605. author = {Masayuki Abe},
  606. title = {Universally Verifiable {MIX} With Verification Work Independent of
  607. The Number of {MIX} Servers},
  608. booktitle = {{EUROCRYPT} 1998},
  609. year = {1998},
  610. publisher = {Springer-Verlag, LNCS 1403},
  611. }
  612. @InProceedings{desmedt,
  613. author = {Yvo Desmedt and Kaoru Kurosawa},
  614. title = {How To Break a Practical {MIX} and Design a New One},
  615. booktitle = {{EUROCRYPT} 2000},
  616. year = {2000},
  617. publisher = {Springer-Verlag, LNCS 1803},
  618. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  619. }
  620. @InProceedings{mitkuro,
  621. author = {M. Mitomo and K. Kurosawa},
  622. title = {{Attack for Flash MIX}},
  623. booktitle = {{ASIACRYPT} 2000},
  624. year = {2000},
  625. publisher = {Springer-Verlag, LNCS 1976},
  626. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  627. }
  628. @InProceedings{hybrid-mix,
  629. author = {M. Ohkubo and M. Abe},
  630. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  631. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  632. year = {2000},
  633. publisher = {Springer-Verlag, LNCS 1976},
  634. }
  635. @InProceedings{PShuffle,
  636. author = {Jun Furukawa and Kazue Sako},
  637. title = {An Efficient Scheme for Proving a Shuffle},
  638. editor = {Joe Kilian},
  639. booktitle = {CRYPTO 2001},
  640. year = {2001},
  641. publisher = {Springer-Verlag, LNCS 2139},
  642. }
  643. @InProceedings{jakobsson-optimally,
  644. author = "Markus Jakobsson and Ari Juels",
  645. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  646. booktitle = {Principles of Distributed Computing - {PODC} '01},
  647. year = "2001",
  648. publisher = {ACM Press},
  649. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  650. }
  651. @InProceedings{kesdogan,
  652. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  653. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  654. System},
  655. booktitle = {Information Hiding (IH 1998)},
  656. year = {1998},
  657. publisher = {Springer-Verlag, LNCS 1525},
  658. }
  659. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  660. @InProceedings{socks4,
  661. author = {David Koblas and Michelle R. Koblas},
  662. title = {{SOCKS}},
  663. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  664. Symposium)},
  665. pages = {77--83},
  666. year = 1992,
  667. publisher = {USENIX},
  668. }
  669. @InProceedings{flash-mix,
  670. author = {Markus Jakobsson},
  671. title = {Flash {M}ixing},
  672. booktitle = {Principles of Distributed Computing - {PODC} '99},
  673. year = {1999},
  674. publisher = {ACM Press},
  675. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  676. }
  677. @InProceedings{SK,
  678. author = {Joe Kilian and Kazue Sako},
  679. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  680. the Implementation of a Voting Booth},
  681. booktitle = {EUROCRYPT '95},
  682. year = {1995},
  683. publisher = {Springer-Verlag},
  684. }
  685. @InProceedings{OAEP,
  686. author = {M. Bellare and P. Rogaway},
  687. year = {1994},
  688. booktitle = {EUROCRYPT '94},
  689. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  690. {RSA}},
  691. publisher = {Springer-Verlag},
  692. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  693. }
  694. @inproceedings{babel,
  695. title = {Mixing {E}-mail With {B}abel},
  696. author = {Ceki G\"ulc\"u and Gene Tsudik},
  697. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  698. year = 1996,
  699. month = {February},
  700. pages = {2--16},
  701. publisher = {IEEE},
  702. }
  703. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  704. @Misc{rprocess,
  705. author = {RProcess},
  706. title = {Selective Denial of Service Attacks},
  707. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  708. }
  709. @Article{remailer-history,
  710. author = {Sameer Parekh},
  711. title = {Prospects for Remailers},
  712. journal = {First Monday},
  713. volume = {1},
  714. number = {2},
  715. month = {August},
  716. year = {1996},
  717. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  718. }
  719. @Article{chaum-mix,
  720. author = {David Chaum},
  721. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  722. journal = {Communications of the ACM},
  723. year = {1981},
  724. volume = {4},
  725. number = {2},
  726. month = {February},
  727. }
  728. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  729. @InProceedings{nym-alias-net,
  730. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  731. title = {{The Design, Implementation and Operation of an Email
  732. Pseudonym Server}},
  733. booktitle = {$5^{th}$ ACM Conference on Computer and
  734. Communications Security (CCS'98)},
  735. year = 1998,
  736. publisher = {ACM Press},
  737. }
  738. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  739. @InProceedings{tangler,
  740. author = {Marc Waldman and David Mazi\`{e}res},
  741. title = {Tangler: A Censorship-Resistant Publishing System
  742. Based on Document Entanglements},
  743. booktitle = {$8^{th}$ ACM Conference on Computer and
  744. Communications Security (CCS-8)},
  745. pages = {86--135},
  746. year = 2001,
  747. publisher = {ACM Press},
  748. }
  749. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  750. @misc{neochaum,
  751. author = {Tim May},
  752. title = {Payment mixes for anonymity},
  753. howpublished = {E-mail archived at
  754. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  755. }
  756. @misc{helsingius,
  757. author = {J. Helsingius},
  758. title = {{\tt anon.penet.fi} press release},
  759. note = {\newline \url{http://www.penet.fi/press-english.html}},
  760. }
  761. @InProceedings{garay97secure,
  762. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  763. title = {Secure distributed storage and retrieval},
  764. booktitle = {11th International Workshop, WDAG '97},
  765. pages = {275--289},
  766. year = {1997},
  767. publisher = {Springer-Verlag, LNCS 1320},
  768. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  769. }
  770. @InProceedings{PIK,
  771. author = {C. Park and K. Itoh and K. Kurosawa},
  772. title = {Efficient anonymous channel and all/nothing election scheme},
  773. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  774. pages = {248--259},
  775. publisher = {Springer-Verlag, LNCS 765},
  776. }
  777. @Misc{pgpfaq,
  778. key = {PGP},
  779. title = {{PGP} {FAQ}},
  780. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  781. }
  782. @Article{riordan-schneier,
  783. author = {James Riordan and Bruce Schneier},
  784. title = {A Certified E-mail Protocol with No Trusted Third Party},
  785. journal = {13th Annual Computer Security Applications Conference},
  786. month = {December},
  787. year = {1998},
  788. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  789. }
  790. @Article{crowds-tissec,
  791. author = {Michael K. Reiter and Aviel D. Rubin},
  792. title = {Crowds: Anonymity for Web Transactions},
  793. journal = {ACM TISSEC},
  794. year = 1998,
  795. volume = 1,
  796. number = 1,
  797. pages = {66--92},
  798. month = {June},
  799. }
  800. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  801. @Article{crowds-dimacs,
  802. author = {Michael K. Reiter and Aviel D. Rubin},
  803. title = {Crowds: Anonymity for Web Transactions},
  804. journal = {{DIMACS} Technical Report (Revised)},
  805. volume = {97},
  806. number = {15},
  807. month = {August},
  808. year = {1997},
  809. }
  810. @Misc{advogato,
  811. author = {Raph Levien},
  812. title = {Advogato's Trust Metric},
  813. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  814. }
  815. @InProceedings{publius,
  816. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  817. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  818. source-anonymous web publishing system},
  819. booktitle = {Proc. 9th USENIX Security Symposium},
  820. pages = {59--72},
  821. year = {2000},
  822. month = {August},
  823. }
  824. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  825. @Misc{freedom-nyms,
  826. author = {Russell Samuels},
  827. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  828. year = {1999},
  829. month = {November},
  830. day = {21},
  831. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  832. }
  833. @techreport{freedom2-arch,
  834. title = {Freedom Systems 2.0 Architecture},
  835. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  836. institution = {Zero Knowledge Systems, {Inc.}},
  837. year = {2000},
  838. month = {December},
  839. type = {White Paper},
  840. day = {18},
  841. }
  842. @techreport{freedom21-security,
  843. title = {Freedom Systems 2.1 Security Issues and Analysis},
  844. author = {Adam Back and Ian Goldberg and Adam Shostack},
  845. institution = {Zero Knowledge Systems, {Inc.}},
  846. year = {2001},
  847. month = {May},
  848. type = {White Paper},
  849. }
  850. @inproceedings{cfs:sosp01,
  851. title = {Wide-area cooperative storage with {CFS}},
  852. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  853. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  854. year = {2001},
  855. month = {October},
  856. address = {Chateau Lake Louise, Banff, Canada},
  857. }
  858. @inproceedings{SS03,
  859. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  860. author = {Andrei Serjantov and Peter Sewell},
  861. booktitle = {Computer Security -- ESORICS 2003},
  862. publisher = {Springer-Verlag, LNCS 2808},
  863. year = {2003},
  864. month = {October},
  865. }
  866. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  867. @Misc{pk-relations,
  868. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  869. title = {Relations Among Notions of Security for Public-Key Encryption
  870. Schemes},
  871. howpublished = {
  872. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  873. Springer-Verlag, 1998.
  874. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  875. }
  876. @InProceedings{mix-acc,
  877. author = {Roger Dingledine and Michael J. Freedman and David
  878. Hopwood and David Molnar},
  879. title = {{A Reputation System to Increase MIX-net
  880. Reliability}},
  881. booktitle = {Information Hiding (IH 2001)},
  882. pages = {126--141},
  883. year = 2001,
  884. editor = {Ira S. Moskowitz},
  885. publisher = {Springer-Verlag, LNCS 2137},
  886. }
  887. %note = {\url{http://www.freehaven.net/papers.html}},
  888. @InProceedings{casc-rep,
  889. author = {Roger Dingledine and Paul Syverson},
  890. title = {{Reliable MIX Cascade Networks through Reputation}},
  891. booktitle = {Financial Cryptography},
  892. year = 2002,
  893. editor = {Matt Blaze},
  894. publisher = {Springer-Verlag, LNCS 2357},
  895. }
  896. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  897. @InProceedings{zhou96certified,
  898. author = {Zhou and Gollmann},
  899. title = {Certified Electronic Mail},
  900. booktitle = {{ESORICS: European Symposium on Research in Computer
  901. Security}},
  902. publisher = {Springer-Verlag, LNCS 1146},
  903. year = {1996},
  904. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  905. }
  906. @Misc{realtime-mix,
  907. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  908. Birgit Pfitzmann and Michael Waidner},
  909. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  910. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  911. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  912. }
  913. @InProceedings{danezis:pet2003,
  914. author = {George Danezis},
  915. title = {Mix-networks with Restricted Routes},
  916. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  917. year = 2003,
  918. editor = {Roger Dingledine},
  919. publisher = {Springer-Verlag LNCS 2760}
  920. }
  921. @InProceedings{gap-pets03,
  922. author = {Krista Bennett and Christian Grothoff},
  923. title = {{GAP} -- practical anonymous networking},
  924. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  925. year = 2003,
  926. editor = {Roger Dingledine},
  927. publisher = {Springer-Verlag LNCS 2760}
  928. }
  929. @Article{hordes-jcs,
  930. author = {Brian Neal Levine and Clay Shields},
  931. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  932. journal = {Journal of Computer Security},
  933. year = 2002,
  934. volume = 10,
  935. number = 3,
  936. pages = {213--240}
  937. }
  938. @TechReport{herbivore,
  939. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  940. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  941. institution = {Cornell University Computing and Information Science},
  942. year = 2003,
  943. type = {Technical Report},
  944. number = {TR2003-1890},
  945. month = {February}
  946. }
  947. @InProceedings{p5,
  948. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  949. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  950. booktitle = {IEEE Symposium on Security and Privacy},
  951. pages = {58--70},
  952. year = 2002,
  953. publisher = {IEEE CS}
  954. }
  955. @phdthesis{ian-thesis,
  956. title = {A Pseudonymous Communications Infrastructure for the Internet},
  957. author = {Ian Goldberg},
  958. school = {UC Berkeley},
  959. year = {2000},
  960. month = {Dec},
  961. }
  962. @Article{taz,
  963. author = {Ian Goldberg and David Wagner},
  964. title = {TAZ Servers and the Rewebber Network: Enabling
  965. Anonymous Publishing on the World Wide Web},
  966. journal = {First Monday},
  967. year = 1998,
  968. volume = 3,
  969. number = 4,
  970. month = {August},
  971. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  972. }
  973. @Misc{tcp-over-tcp-is-bad,
  974. key = {tcp-over-tcp-is-bad},
  975. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  976. author = {Olaf Titz},
  977. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  978. }
  979. @inproceedings{wright02,
  980. title = {An Analysis of the Degradation of Anonymous Protocols},
  981. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  982. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  983. year = {2002},
  984. month = {February},
  985. publisher = {IEEE},
  986. }
  987. @inproceedings{wright03,
  988. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  989. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  990. booktitle = {IEEE Symposium on Security and Privacy},
  991. pages= {28--41},
  992. year = {2003},
  993. month = {May},
  994. publisher = {IEEE CS},
  995. }
  996. @InProceedings{attack-tor-oak05,
  997. author = {Steven J. Murdoch and George Danezis},
  998. title = {Low-cost Traffic Analysis of Tor},
  999. booktitle = {IEEE Symposium on Security and Privacy},
  1000. year = 2005,
  1001. month = {May},
  1002. publisher = {IEEE CS}
  1003. }
  1004. @Misc{jap-backdoor,
  1005. author={{The AN.ON Project}},
  1006. howpublished={Press release},
  1007. year={2003},
  1008. month={September},
  1009. title={German Police proceeds against anonymity service},
  1010. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  1011. }
  1012. @article{shsm03,
  1013. title = {Using Caching for Browsing Anonymity},
  1014. author = {Anna Shubina and Sean Smith},
  1015. journal = {ACM SIGEcom Exchanges},
  1016. volume = {4},
  1017. number = {2},
  1018. year = {2003},
  1019. month = {Sept},
  1020. note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
  1021. }
  1022. @inproceedings{tor-design,
  1023. title = {Tor: The Second-Generation Onion Router},
  1024. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1025. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  1026. year = {2004},
  1027. month = {August},
  1028. note = {\url{http://tor.eff.org/tor-design.pdf}}
  1029. }
  1030. @inproceedings{flow-correlation04,
  1031. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  1032. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  1033. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1034. year = {2004},
  1035. month = {May},
  1036. series = {LNCS},
  1037. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1038. }
  1039. @InProceedings{danezis:pet2004,
  1040. author = "George Danezis",
  1041. title = "The Traffic Analysis of Continuous-Time Mixes",
  1042. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1043. editor = {David Martin and Andrei Serjantov},
  1044. month = {May},
  1045. year = {2004},
  1046. series = {LNCS},
  1047. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1048. }
  1049. @inproceedings{feamster:wpes2004,
  1050. title = {Location Diversity in Anonymity Networks},
  1051. author = {Nick Feamster and Roger Dingledine},
  1052. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1053. year = {2004},
  1054. month = {October},
  1055. address = {Washington, DC, USA},
  1056. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1057. }
  1058. @inproceedings{koepsell:wpes2004,
  1059. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1060. author = {Stefan K\"opsell and Ulf Hilling},
  1061. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1062. year = {2004},
  1063. month = {October},
  1064. address = {Washington, DC, USA},
  1065. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1066. }
  1067. @inproceedings{sync-batching,
  1068. title = {Synchronous Batching: From Cascades to Free Routes},
  1069. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1070. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1071. editor = {David Martin and Andrei Serjantov},
  1072. year = {2004},
  1073. month = {May},
  1074. series = {LNCS},
  1075. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1076. }
  1077. @InProceedings{e2e-traffic,
  1078. author = "Nick Mathewson and Roger Dingledine",
  1079. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1080. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1081. editor = {David Martin and Andrei Serjantov},
  1082. month = {May},
  1083. year = {2004},
  1084. series = {LNCS},
  1085. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1086. }
  1087. @Misc{dtls,
  1088. author = {E. Rescorla and N. Modadugu},
  1089. title = {{Datagram Transport Layer Security}},
  1090. howpublished = {IETF Draft},
  1091. month = {December},
  1092. year = {2003},
  1093. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1094. }
  1095. @InProceedings{usability-network-effect,
  1096. author={Roger Dingledine and Nick Mathewson},
  1097. title={Anonymity Loves Company: Usability and the Network Effect},
  1098. booktitle = {Designing Security Systems That People Can Use},
  1099. year = {2005},
  1100. publisher = {O'Reilly Media},
  1101. }
  1102. @inproceedings{usability:weis2006,
  1103. title = {Anonymity Loves Company: Usability and the Network Effect},
  1104. author = {Roger Dingledine and Nick Mathewson},
  1105. booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
  1106. (WEIS 2006)},
  1107. year = {2006},
  1108. month = {June},
  1109. address = {Cambridge, UK},
  1110. bookurl = {http://weis2006.econinfosec.org/},
  1111. note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
  1112. }
  1113. @Misc{six-four,
  1114. key = {six-four},
  1115. title = {{The Six/Four System}},
  1116. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1117. }
  1118. @inproceedings{clayton:pet2006,
  1119. title = {Ignoring the Great Firewall of China},
  1120. author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  1121. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1122. year = {2006},
  1123. month = {June},
  1124. address = {Cambridge, UK},
  1125. publisher = {Springer},
  1126. bookurl = {http://petworkshop.org/2006/},
  1127. note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
  1128. }
  1129. @Misc{zuckerman-threatmodels,
  1130. key = {zuckerman-threatmodels},
  1131. title = {We've got to adjust some of our threat models},
  1132. author = {Ethan Zuckerman},
  1133. note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
  1134. }
  1135. @Misc{cgiproxy,
  1136. key = {cgiproxy},
  1137. title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
  1138. author = {James Marshall},
  1139. note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
  1140. }
  1141. @Misc{circumventor,
  1142. key = {circumventor},
  1143. title = {{How to install the Circumventor program}},
  1144. author = {Bennett Haselton},
  1145. note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
  1146. }
  1147. @Misc{psiphon,
  1148. key = {psiphon},
  1149. title = {Psiphon},
  1150. author = {Ronald Deibert et al},
  1151. note = {\url{http://psiphon.civisec.org/}}
  1152. }
  1153. @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
  1154. title = {Embedding Covert Channels into {TCP/IP}},
  1155. booktitle = {Information Hiding: 7th International Workshop},
  1156. pages = {247--261},
  1157. year = {2005},
  1158. editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
  1159. Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
  1160. volume = {3727},
  1161. series = {LNCS},
  1162. address = {Barcelona, Catalonia (Spain)},
  1163. month = {June},
  1164. publisher = {Springer-Verlag},
  1165. url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
  1166. }
  1167. @phdthesis{blossom-thesis,
  1168. title = {Perspective Access Networks},
  1169. author = {Geoffrey Goodell},
  1170. school = {Harvard University},
  1171. year = {2006},
  1172. month = {July},
  1173. note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
  1174. }
  1175. @inproceedings{tap:pet2006,
  1176. title = {On the Security of the Tor Authentication Protocol},
  1177. author = {Ian Goldberg},
  1178. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1179. year = {2006},
  1180. month = {June},
  1181. address = {Cambridge, UK},
  1182. publisher = {Springer},
  1183. bookurl = {http://petworkshop.org/2006/},
  1184. note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
  1185. }
  1186. @inproceedings{rep-anon,
  1187. title = {{Reputation in P2P Anonymity Systems}},
  1188. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1189. booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
  1190. year = {2003},
  1191. month = {June},
  1192. note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
  1193. }
  1194. @misc{tor-challenges,
  1195. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1196. title = {Challenges in deploying low-latency anonymity},
  1197. year = {2005},
  1198. note = {Manuscript}
  1199. }
  1200. @InProceedings{chaum-blind,
  1201. author = {David Chaum},
  1202. title = {Blind Signatures for Untraceable Payments},
  1203. booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
  1204. pages = {199--203},
  1205. year = 1983,
  1206. editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
  1207. publisher = {Plenum Press}
  1208. }
  1209. @Article{netauth,
  1210. author = {Geoffrey Goodell and Paul Syverson},
  1211. title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},
  1212. journal = {Communications of the ACM},
  1213. year = 2007,
  1214. volume = 50,
  1215. number = 5,
  1216. pages = {113--117},
  1217. month = {May}
  1218. }
  1219. @misc{ip-to-country,
  1220. key = {ip-to-country},
  1221. title = {IP-to-country database},
  1222. note = {\url{http://ip-to-country.webhosting.info/}},
  1223. }
  1224. @misc{mackinnon-personal,
  1225. author = {Rebecca MacKinnon},
  1226. title = {Private communication},
  1227. year = {2006},
  1228. }
  1229. @inproceedings{pet05-bissias,
  1230. title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
  1231. author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
  1232. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  1233. year = {2005},
  1234. month = {May},
  1235. note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
  1236. }
  1237. @InProceedings{infranet,
  1238. author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
  1239. title = {Infranet: Circumventing Web Censorship and Surveillance},
  1240. booktitle = {Proceedings of the 11th USENIX Security Symposium},
  1241. year = {2002},
  1242. month = {August},
  1243. note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
  1244. }
  1245. @techreport{ ptacek98insertion,
  1246. author = "Thomas H. Ptacek and Timothy N. Newsham",
  1247. title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
  1248. institution = "Secure Networks, Inc.",
  1249. address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
  1250. year = "1998",
  1251. url = "citeseer.ist.psu.edu/ptacek98insertion.html",
  1252. }
  1253. @inproceedings{active-wardens,
  1254. author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
  1255. title = "Eliminating Steganography in Internet Traffic with Active Wardens",
  1256. booktitle = {Information Hiding Workshop (IH 2002)},
  1257. year = {2002},
  1258. month = {October},
  1259. editor = {Fabien Petitcolas},
  1260. publisher = {Springer-Verlag, LNCS 2578},
  1261. }
  1262. %%% Local Variables:
  1263. %%% mode: latex
  1264. %%% TeX-master: "tor-design"
  1265. %%% End: