|
@@ -18,44 +18,44 @@
|
|
|
}
|
|
|
@inproceedings{kesdogan:pet2002,
|
|
|
title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
|
|
|
- alternative to the MIX based Approach?},
|
|
|
- author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
|
|
|
+ alternative to the MIX based Approach?},
|
|
|
+ author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
|
|
|
booktitle = {Privacy Enhancing Technologies (PET 2002)},
|
|
|
- year = {2002},
|
|
|
- month = {April},
|
|
|
- editor = {Roger Dingledine and Paul Syverson},
|
|
|
- publisher = {Springer-Verlag, LNCS 2482},
|
|
|
+ year = {2002},
|
|
|
+ month = {April},
|
|
|
+ editor = {Roger Dingledine and Paul Syverson},
|
|
|
+ publisher = {Springer-Verlag, LNCS 2482},
|
|
|
}
|
|
|
|
|
|
@inproceedings{statistical-disclosure,
|
|
|
- title = {Statistical Disclosure Attacks},
|
|
|
- author = {George Danezis},
|
|
|
- booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
|
|
|
- organization = {{IFIP TC11}},
|
|
|
- year = {2003},
|
|
|
- month = {May},
|
|
|
- address = {Athens},
|
|
|
- pages = {421--426},
|
|
|
- publisher = {Kluwer},
|
|
|
+ title = {Statistical Disclosure Attacks},
|
|
|
+ author = {George Danezis},
|
|
|
+ booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
|
|
|
+ organization = {{IFIP TC11}},
|
|
|
+ year = {2003},
|
|
|
+ month = {May},
|
|
|
+ address = {Athens},
|
|
|
+ pages = {421--426},
|
|
|
+ publisher = {Kluwer},
|
|
|
}
|
|
|
|
|
|
@inproceedings{limits-open,
|
|
|
- title = {Limits of Anonymity in Open Environments},
|
|
|
- author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
|
|
|
- booktitle = {Information Hiding Workshop (IH 2002)},
|
|
|
- year = {2002},
|
|
|
- month = {October},
|
|
|
- editor = {Fabien Petitcolas},
|
|
|
- publisher = {Springer-Verlag, LNCS 2578},
|
|
|
+ title = {Limits of Anonymity in Open Environments},
|
|
|
+ author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
|
|
|
+ booktitle = {Information Hiding Workshop (IH 2002)},
|
|
|
+ year = {2002},
|
|
|
+ month = {October},
|
|
|
+ editor = {Fabien Petitcolas},
|
|
|
+ publisher = {Springer-Verlag, LNCS 2578},
|
|
|
}
|
|
|
|
|
|
@inproceedings{isdn-mixes,
|
|
|
- title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
|
|
|
- author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
|
|
|
- booktitle = {GI/ITG Conference on Communication in Distributed Systems},
|
|
|
- year = {1991},
|
|
|
- month = {February},
|
|
|
- pages = {451-463},
|
|
|
+ title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
|
|
|
+ author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
|
|
|
+ booktitle = {GI/ITG Conference on Communication in Distributed Systems},
|
|
|
+ year = {1991},
|
|
|
+ month = {February},
|
|
|
+ pages = {451-463},
|
|
|
}
|
|
|
|
|
|
|
|
@@ -72,21 +72,21 @@
|
|
|
}
|
|
|
|
|
|
@inproceedings{tarzan:ccs02,
|
|
|
- title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
|
|
|
- author = {Michael J. Freedman and Robert Morris},
|
|
|
+ title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
|
|
|
+ author = {Michael J. Freedman and Robert Morris},
|
|
|
booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
|
|
|
- {S}ecurity ({CCS 2002})},
|
|
|
- year = {2002},
|
|
|
- month = {November},
|
|
|
- address = {Washington, DC},
|
|
|
+ {S}ecurity ({CCS 2002})},
|
|
|
+ year = {2002},
|
|
|
+ month = {November},
|
|
|
+ address = {Washington, DC},
|
|
|
}
|
|
|
|
|
|
@inproceedings{cebolla,
|
|
|
- title = {{Cebolla: Pragmatic IP Anonymity}},
|
|
|
- author = {Zach Brown},
|
|
|
- booktitle = {Ottawa Linux Symposium},
|
|
|
- year = {2002},
|
|
|
- month = {June},
|
|
|
+ title = {{Cebolla: Pragmatic IP Anonymity}},
|
|
|
+ author = {Zach Brown},
|
|
|
+ booktitle = {Ottawa Linux Symposium},
|
|
|
+ year = {2002},
|
|
|
+ month = {June},
|
|
|
}
|
|
|
|
|
|
@inproceedings{eax,
|
|
@@ -117,24 +117,24 @@
|
|
|
}
|
|
|
|
|
|
@inproceedings{anonnet,
|
|
|
- title = {{Analysis of an Anonymity Network for Web Browsing}},
|
|
|
+ title = {{Analysis of an Anonymity Network for Web Browsing}},
|
|
|
author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
|
|
|
- David Hutchison},
|
|
|
+ David Hutchison},
|
|
|
booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
|
|
|
- 2002)}},
|
|
|
- year = {2002},
|
|
|
- month = {June},
|
|
|
- address = {Pittsburgh, USA},
|
|
|
+ 2002)}},
|
|
|
+ year = {2002},
|
|
|
+ month = {June},
|
|
|
+ address = {Pittsburgh, USA},
|
|
|
}
|
|
|
-% pages = {49--54},
|
|
|
+% pages = {49--54},
|
|
|
|
|
|
@inproceedings{econymics,
|
|
|
- title = {On the Economics of Anonymity},
|
|
|
- author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
|
|
|
- booktitle = {Financial Cryptography},
|
|
|
- year = {2003},
|
|
|
- editor = {Rebecca N. Wright},
|
|
|
- publisher = {Springer-Verlag, LNCS 2742},
|
|
|
+ title = {On the Economics of Anonymity},
|
|
|
+ author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
|
|
|
+ booktitle = {Financial Cryptography},
|
|
|
+ year = {2003},
|
|
|
+ editor = {Rebecca N. Wright},
|
|
|
+ publisher = {Springer-Verlag, LNCS 2742},
|
|
|
}
|
|
|
|
|
|
@inproceedings{defensive-dropping,
|
|
@@ -156,24 +156,24 @@
|
|
|
}
|
|
|
|
|
|
@inproceedings{eternity,
|
|
|
- title = {The Eternity Service},
|
|
|
- author = {Ross Anderson},
|
|
|
- booktitle = {Pragocrypt '96},
|
|
|
- year = {1996},
|
|
|
+ title = {The Eternity Service},
|
|
|
+ author = {Ross Anderson},
|
|
|
+ booktitle = {Pragocrypt '96},
|
|
|
+ year = {1996},
|
|
|
}
|
|
|
- %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
|
|
|
+ %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
|
|
|
|
|
|
|
|
|
@inproceedings{minion-design,
|
|
|
- title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
|
|
|
- author = {George Danezis and Roger Dingledine and Nick Mathewson},
|
|
|
- booktitle = {2003 IEEE Symposium on Security and Privacy},
|
|
|
- year = {2003},
|
|
|
+ title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
|
|
|
+ author = {George Danezis and Roger Dingledine and Nick Mathewson},
|
|
|
+ booktitle = {2003 IEEE Symposium on Security and Privacy},
|
|
|
+ year = {2003},
|
|
|
month = {May},
|
|
|
publisher = {IEEE CS},
|
|
|
- pages = {2--15},
|
|
|
+ pages = {2--15},
|
|
|
}
|
|
|
- %note = {\url{http://mixminion.net/minion-design.pdf}},
|
|
|
+ %note = {\url{http://mixminion.net/minion-design.pdf}},
|
|
|
|
|
|
@inproceedings{ rao-pseudonymity,
|
|
|
author = "Josyula R. Rao and Pankaj Rohatgi",
|
|
@@ -245,9 +245,9 @@
|
|
|
@InProceedings{raymond00,
|
|
|
author = {J. F. Raymond},
|
|
|
title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
|
|
|
- and Open Problems}},
|
|
|
+ and Open Problems}},
|
|
|
booktitle = {Designing Privacy Enhancing Technologies: Workshop
|
|
|
- on Design Issue in Anonymity and Unobservability},
|
|
|
+ on Design Issue in Anonymity and Unobservability},
|
|
|
year = 2000,
|
|
|
month = {July},
|
|
|
pages = {10-29},
|
|
@@ -310,7 +310,7 @@
|
|
|
author = {Paul Syverson and Michael Reed and David Goldschlag},
|
|
|
title = {{O}nion {R}outing Access Configurations},
|
|
|
booktitle = {DARPA Information Survivability Conference and
|
|
|
- Exposition (DISCEX 2000)},
|
|
|
+ Exposition (DISCEX 2000)},
|
|
|
year = {2000},
|
|
|
publisher = {IEEE CS Press},
|
|
|
pages = {34--40},
|
|
@@ -321,7 +321,7 @@
|
|
|
@Inproceedings{or-pet00,
|
|
|
title = {{Towards an Analysis of Onion Routing Security}},
|
|
|
author = {Paul Syverson and Gene Tsudik and Michael Reed and
|
|
|
- Carl Landwehr},
|
|
|
+ Carl Landwehr},
|
|
|
booktitle = {Designing Privacy Enhancing Technologies: Workshop
|
|
|
on Design Issue in Anonymity and Unobservability},
|
|
|
year = 2000,
|
|
@@ -334,9 +334,9 @@
|
|
|
|
|
|
@Inproceedings{freenet-pets00,
|
|
|
title = {Freenet: A Distributed Anonymous Information Storage
|
|
|
- and Retrieval System},
|
|
|
+ and Retrieval System},
|
|
|
author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
|
|
|
- Theodore W. Hong},
|
|
|
+ Theodore W. Hong},
|
|
|
booktitle = {Designing Privacy Enhancing Technologies: Workshop
|
|
|
on Design Issue in Anonymity and Unobservability},
|
|
|
year = 2000,
|
|
@@ -349,7 +349,7 @@
|
|
|
|
|
|
@InProceedings{or-ih96,
|
|
|
author = {David M. Goldschlag and Michael G. Reed and Paul
|
|
|
- F. Syverson},
|
|
|
+ F. Syverson},
|
|
|
title = {Hiding Routing Information},
|
|
|
booktitle = {Information Hiding, First International Workshop},
|
|
|
pages = {137--150},
|
|
@@ -362,7 +362,7 @@
|
|
|
@InProceedings{federrath-ih96,
|
|
|
author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
|
|
|
title = {{MIXes} in Mobile Communication Systems: Location
|
|
|
- Management with Privacy},
|
|
|
+ Management with Privacy},
|
|
|
booktitle = {Information Hiding, First International Workshop},
|
|
|
pages = {121--135},
|
|
|
year = 1996,
|
|
@@ -374,7 +374,7 @@
|
|
|
|
|
|
@InProceedings{reed-protocols97,
|
|
|
author = {Michael G. Reed and Paul F. Syverson and David
|
|
|
- M. Goldschlag},
|
|
|
+ M. Goldschlag},
|
|
|
title = {Protocols Using Anonymous Connections: Mobile Applications},
|
|
|
booktitle = {Security Protocols: 5th International Workshop},
|
|
|
pages = {13--23},
|
|
@@ -389,7 +389,7 @@
|
|
|
|
|
|
@Article{or-jsac98,
|
|
|
author = {Michael G. Reed and Paul F. Syverson and David
|
|
|
- M. Goldschlag},
|
|
|
+ M. Goldschlag},
|
|
|
title = {Anonymous Connections and Onion Routing},
|
|
|
journal = {IEEE Journal on Selected Areas in Communications},
|
|
|
year = 1998,
|
|
@@ -428,13 +428,13 @@
|
|
|
}
|
|
|
|
|
|
@misc{pipenet,
|
|
|
- title = {PipeNet 1.1},
|
|
|
- author = {Wei Dai},
|
|
|
- year = 1996,
|
|
|
- month = {August},
|
|
|
- howpublished = {Usenet post},
|
|
|
+ title = {PipeNet 1.1},
|
|
|
+ author = {Wei Dai},
|
|
|
+ year = 1996,
|
|
|
+ month = {August},
|
|
|
+ howpublished = {Usenet post},
|
|
|
note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
|
|
|
- in a post to the cypherpunks list, Feb.\ 1995.},
|
|
|
+ in a post to the cypherpunks list, Feb.\ 1995.},
|
|
|
}
|
|
|
|
|
|
|
|
@@ -485,7 +485,7 @@
|
|
|
@InProceedings{web-mix,
|
|
|
author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
|
|
|
title = {Web {MIX}es: A system for anonymous and unobservable
|
|
|
- {I}nternet access},
|
|
|
+ {I}nternet access},
|
|
|
booktitle = {Designing Privacy Enhancing Technologies: Workshop
|
|
|
on Design Issue in Anonymity and Unobservability},
|
|
|
editor = {H. Federrath},
|
|
@@ -497,7 +497,7 @@
|
|
|
@InProceedings{disad-free-routes,
|
|
|
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
|
|
|
title = {The disadvantages of free {MIX} routes and how to overcome
|
|
|
- them},
|
|
|
+ them},
|
|
|
booktitle = {Designing Privacy Enhancing Technologies: Workshop
|
|
|
on Design Issue in Anonymity and Unobservability},
|
|
|
pages = {30--45},
|
|
@@ -576,7 +576,7 @@
|
|
|
|
|
|
@Misc{mixmaster-spec,
|
|
|
author = {Ulf M{\"o}ller and Lance Cottrell and Peter
|
|
|
- Palfrader and Len Sassaman},
|
|
|
+ Palfrader and Len Sassaman},
|
|
|
title = {Mixmaster {P}rotocol --- {V}ersion 2},
|
|
|
year = {2003},
|
|
|
month = {July},
|
|
@@ -613,7 +613,7 @@
|
|
|
@InProceedings{oreilly-acc,
|
|
|
author = {Roger Dingledine and Michael J. Freedman and David Molnar},
|
|
|
title = {Accountability},
|
|
|
- booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
|
|
|
+ booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
|
|
|
Technology},
|
|
|
year = {2001},
|
|
|
publisher = {O'Reilly and Associates},
|
|
@@ -694,7 +694,7 @@
|
|
|
|
|
|
@InProceedings{kesdogan,
|
|
|
author = {D. Kesdogan and M. Egner and T. B\"uschkes},
|
|
|
- title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
|
|
|
+ title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
|
|
|
System},
|
|
|
booktitle = {Information Hiding (IH 1998)},
|
|
|
year = {1998},
|
|
@@ -706,7 +706,7 @@
|
|
|
author = {David Koblas and Michelle R. Koblas},
|
|
|
title = {{SOCKS}},
|
|
|
booktitle = {UNIX Security III Symposium (1992 USENIX Security
|
|
|
- Symposium)},
|
|
|
+ Symposium)},
|
|
|
pages = {77--83},
|
|
|
year = 1992,
|
|
|
publisher = {USENIX},
|
|
@@ -740,15 +740,15 @@
|
|
|
note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
|
|
|
}
|
|
|
@inproceedings{babel,
|
|
|
- title = {Mixing {E}-mail With {B}abel},
|
|
|
- author = {Ceki G\"ulc\"u and Gene Tsudik},
|
|
|
- booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
|
|
|
- year = 1996,
|
|
|
- month = {February},
|
|
|
- pages = {2--16},
|
|
|
- publisher = {IEEE},
|
|
|
+ title = {Mixing {E}-mail With {B}abel},
|
|
|
+ author = {Ceki G\"ulc\"u and Gene Tsudik},
|
|
|
+ booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
|
|
|
+ year = 1996,
|
|
|
+ month = {February},
|
|
|
+ pages = {2--16},
|
|
|
+ publisher = {IEEE},
|
|
|
}
|
|
|
- %note = {\url{http://citeseer.nj.nec.com/2254.html}},
|
|
|
+ %note = {\url{http://citeseer.nj.nec.com/2254.html}},
|
|
|
|
|
|
@Misc{rprocess,
|
|
|
author = {RProcess},
|
|
@@ -779,7 +779,7 @@
|
|
|
%note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
|
|
|
|
|
|
@InProceedings{nym-alias-net,
|
|
|
- author = {David Mazi\`{e}res and M. Frans Kaashoek},
|
|
|
+ author = {David Mazi\`{e}res and M. Frans Kaashoek},
|
|
|
title = {{The Design, Implementation and Operation of an Email
|
|
|
Pseudonym Server}},
|
|
|
booktitle = {$5^{th}$ ACM Conference on Computer and
|
|
@@ -792,7 +792,7 @@
|
|
|
@InProceedings{tangler,
|
|
|
author = {Marc Waldman and David Mazi\`{e}res},
|
|
|
title = {Tangler: A Censorship-Resistant Publishing System
|
|
|
- Based on Document Entanglements},
|
|
|
+ Based on Document Entanglements},
|
|
|
booktitle = {$8^{th}$ ACM Conference on Computer and
|
|
|
Communications Security (CCS-8)},
|
|
|
pages = {86--135},
|
|
@@ -803,14 +803,14 @@
|
|
|
|
|
|
@misc{neochaum,
|
|
|
author = {Tim May},
|
|
|
- title = {Payment mixes for anonymity},
|
|
|
+ title = {Payment mixes for anonymity},
|
|
|
howpublished = {E-mail archived at
|
|
|
\url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
|
|
|
}
|
|
|
|
|
|
-@misc{helsingius,
|
|
|
+@misc{helsingius,
|
|
|
author = {J. Helsingius},
|
|
|
- title = {{\tt anon.penet.fi} press release},
|
|
|
+ title = {{\tt anon.penet.fi} press release},
|
|
|
note = {\newline \url{http://www.penet.fi/press-english.html}},
|
|
|
}
|
|
|
|
|
@@ -871,13 +871,13 @@
|
|
|
}
|
|
|
|
|
|
@Misc{advogato,
|
|
|
- author = {Raph Levien},
|
|
|
+ author = {Raph Levien},
|
|
|
title = {Advogato's Trust Metric},
|
|
|
note = {\newline \url{http://www.advogato.org/trust-metric.html}},
|
|
|
}
|
|
|
|
|
|
@InProceedings{publius,
|
|
|
- author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
|
|
|
+ author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
|
|
|
title = {Publius: {A} robust, tamper-evident, censorship-resistant and
|
|
|
source-anonymous web publishing system},
|
|
|
booktitle = {Proc. 9th USENIX Security Symposium},
|
|
@@ -897,22 +897,22 @@
|
|
|
}
|
|
|
|
|
|
@techreport{freedom2-arch,
|
|
|
- title = {Freedom Systems 2.0 Architecture},
|
|
|
- author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
|
|
|
- institution = {Zero Knowledge Systems, {Inc.}},
|
|
|
- year = {2000},
|
|
|
- month = {December},
|
|
|
- type = {White Paper},
|
|
|
- day = {18},
|
|
|
+ title = {Freedom Systems 2.0 Architecture},
|
|
|
+ author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
|
|
|
+ institution = {Zero Knowledge Systems, {Inc.}},
|
|
|
+ year = {2000},
|
|
|
+ month = {December},
|
|
|
+ type = {White Paper},
|
|
|
+ day = {18},
|
|
|
}
|
|
|
|
|
|
@techreport{freedom21-security,
|
|
|
- title = {Freedom Systems 2.1 Security Issues and Analysis},
|
|
|
- author = {Adam Back and Ian Goldberg and Adam Shostack},
|
|
|
- institution = {Zero Knowledge Systems, {Inc.}},
|
|
|
- year = {2001},
|
|
|
- month = {May},
|
|
|
- type = {White Paper},
|
|
|
+ title = {Freedom Systems 2.1 Security Issues and Analysis},
|
|
|
+ author = {Adam Back and Ian Goldberg and Adam Shostack},
|
|
|
+ institution = {Zero Knowledge Systems, {Inc.}},
|
|
|
+ year = {2001},
|
|
|
+ month = {May},
|
|
|
+ type = {White Paper},
|
|
|
}
|
|
|
|
|
|
@inproceedings{cfs:sosp01,
|
|
@@ -925,12 +925,12 @@
|
|
|
}
|
|
|
|
|
|
@inproceedings{SS03,
|
|
|
- title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
|
|
|
- author = {Andrei Serjantov and Peter Sewell},
|
|
|
- booktitle = {Computer Security -- ESORICS 2003},
|
|
|
+ title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
|
|
|
+ author = {Andrei Serjantov and Peter Sewell},
|
|
|
+ booktitle = {Computer Security -- ESORICS 2003},
|
|
|
publisher = {Springer-Verlag, LNCS 2808},
|
|
|
- year = {2003},
|
|
|
- month = {October},
|
|
|
+ year = {2003},
|
|
|
+ month = {October},
|
|
|
}
|
|
|
%note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
|
|
|
|
|
@@ -945,7 +945,7 @@
|
|
|
}
|
|
|
|
|
|
|
|
|
-@InProceedings{mix-acc,
|
|
|
+@InProceedings{mix-acc,
|
|
|
author = {Roger Dingledine and Michael J. Freedman and David
|
|
|
Hopwood and David Molnar},
|
|
|
title = {{A Reputation System to Increase MIX-net
|
|
@@ -980,7 +980,7 @@
|
|
|
|
|
|
@Misc{realtime-mix,
|
|
|
author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
|
|
|
- Birgit Pfitzmann and Michael Waidner},
|
|
|
+ Birgit Pfitzmann and Michael Waidner},
|
|
|
title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
|
|
|
howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
|
|
|
note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
|
|
@@ -1034,11 +1034,11 @@
|
|
|
}
|
|
|
|
|
|
@phdthesis{ian-thesis,
|
|
|
- title = {A Pseudonymous Communications Infrastructure for the Internet},
|
|
|
- author = {Ian Goldberg},
|
|
|
- school = {UC Berkeley},
|
|
|
- year = {2000},
|
|
|
- month = {Dec},
|
|
|
+ title = {A Pseudonymous Communications Infrastructure for the Internet},
|
|
|
+ author = {Ian Goldberg},
|
|
|
+ school = {UC Berkeley},
|
|
|
+ year = {2000},
|
|
|
+ month = {Dec},
|
|
|
}
|
|
|
|
|
|
@Article{taz,
|
|
@@ -1061,22 +1061,22 @@
|
|
|
}
|
|
|
|
|
|
@inproceedings{wright02,
|
|
|
- title = {An Analysis of the Degradation of Anonymous Protocols},
|
|
|
- author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
|
|
|
- booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
|
|
|
- year = {2002},
|
|
|
- month = {February},
|
|
|
- publisher = {IEEE},
|
|
|
+ title = {An Analysis of the Degradation of Anonymous Protocols},
|
|
|
+ author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
|
|
|
+ booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
|
|
|
+ year = {2002},
|
|
|
+ month = {February},
|
|
|
+ publisher = {IEEE},
|
|
|
}
|
|
|
|
|
|
@inproceedings{wright03,
|
|
|
- title = {Defending Anonymous Communication Against Passive Logging Attacks},
|
|
|
- author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
|
|
|
- booktitle = {IEEE Symposium on Security and Privacy},
|
|
|
+ title = {Defending Anonymous Communication Against Passive Logging Attacks},
|
|
|
+ author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
|
|
|
+ booktitle = {IEEE Symposium on Security and Privacy},
|
|
|
pages= {28--41},
|
|
|
- year = {2003},
|
|
|
- month = {May},
|
|
|
- publisher = {IEEE CS},
|
|
|
+ year = {2003},
|
|
|
+ month = {May},
|
|
|
+ publisher = {IEEE CS},
|
|
|
}
|
|
|
|
|
|
|
|
@@ -1099,15 +1099,15 @@
|
|
|
}
|
|
|
|
|
|
@article{shsm03,
|
|
|
- title = {Using Caching for Browsing Anonymity},
|
|
|
- author = {Anna Shubina and Sean Smith},
|
|
|
- journal = {ACM SIGEcom Exchanges},
|
|
|
- volume = {4},
|
|
|
- number = {2},
|
|
|
- year = {2003},
|
|
|
- month = {Sept},
|
|
|
- www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
|
|
|
- www_section = {Anonymous communication},
|
|
|
+ title = {Using Caching for Browsing Anonymity},
|
|
|
+ author = {Anna Shubina and Sean Smith},
|
|
|
+ journal = {ACM SIGEcom Exchanges},
|
|
|
+ volume = {4},
|
|
|
+ number = {2},
|
|
|
+ year = {2003},
|
|
|
+ month = {Sept},
|
|
|
+ www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
|
|
|
+ www_section = {Anonymous communication},
|
|
|
}
|
|
|
|
|
|
@inproceedings{tor-design,
|
|
@@ -1199,7 +1199,13 @@
|
|
|
publisher = {O'Reilly Media},
|
|
|
}
|
|
|
|
|
|
-%%% Local Variables:
|
|
|
+@Misc{six-four,
|
|
|
+ key = {six-four},
|
|
|
+ title = {{The Six/Four System}},
|
|
|
+ note = {\url{http://sourceforge.net/projects/sixfour/}}
|
|
|
+}
|
|
|
+
|
|
|
+%%% Local Variables:
|
|
|
%%% mode: latex
|
|
|
%%% TeX-master: "tor-design"
|
|
|
-%%% End:
|
|
|
+%%% End:
|