% hs-attack
@inproceedings{hs-attack,
  title = {Locating Hidden Servers},
  author = {Lasse {\O}verlier and Paul Syverson}, 
  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, 
  year = {2006}, 
  month = {May}, 
  publisher = {IEEE CS},
}


@TechReport{bauer:tr2007,
  author = 	 {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  title = 	 {Low-Resource Routing Attacks Against Anonymous Systems},
  institution =  {University of Colorado at Boulder},
  year = 	 2007,
  number = 	 {CU-CS-1025-07}
}

@inproceedings{bauer:wpes2007,
  title = {Low-Resource Routing Attacks Against Tor},
  author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}},
  year = {2007},
  month = {October},
  address = {Washington, DC, USA},
}

% fix me
@misc{tannenbaum96,
  author = "Andrew Tannenbaum",
  title = "Computer Networks",
  year = "1996",
  publisher = "Prentice Hall, 3rd edition",
}

@article{ meadows96,
    author = "Catherine Meadows",
    title = "The {NRL} Protocol Analyzer: An Overview",
    journal = "Journal of Logic Programming",
    volume = "26",
    number = "2",
    pages = "113--131",
    year = "1996",
}
@inproceedings{kesdogan:pet2002,
  title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
        alternative to the MIX based Approach?},
  author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  booktitle = {Privacy Enhancing Technologies (PET 2002)},
  year = {2002},
  month = {April},
  editor = {Roger Dingledine and Paul Syverson},
  publisher = {Springer-Verlag, LNCS 2482},
}

@inproceedings{statistical-disclosure,
  title = {Statistical Disclosure Attacks},
  author = {George Danezis},
  booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  organization = {{IFIP TC11}},
  year = {2003},
  month = {May},
  address = {Athens},
  pages = {421--426},
  publisher = {Kluwer},
}

@inproceedings{limits-open,
  title = {Limits of Anonymity in Open Environments},
  author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  booktitle = {Information Hiding Workshop (IH 2002)},
  year = {2002},
  month = {October},
  editor = {Fabien Petitcolas},
  publisher = {Springer-Verlag, LNCS 2578},
}

@inproceedings{isdn-mixes,
  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  year = {1991},
  month = {February},
  pages = {451-463},
}


@Article{jerichow-jsac98,
  author = 	 {Anja Jerichow and Jan M\"{u}ller and Andreas
                  Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  title = 	 {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  journal = 	 {IEEE Journal on Selected Areas in Communications},
  year = 	 1998,
  volume =	 16,
  number =	 4,
  pages =	 {495--509},
  month =	 {May}
}

@inproceedings{tarzan:ccs02,
  title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  author = {Michael J. Freedman and Robert Morris},
  booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
        {S}ecurity ({CCS 2002})},
  year = {2002},
  month = {November},
  address = {Washington, DC},
}

@inproceedings{cebolla,
  title = {{Cebolla: Pragmatic IP Anonymity}},
  author = {Zach Brown},
  booktitle = {Ottawa Linux Symposium},
  year = {2002},
  month = {June},
}

@inproceedings{eax,
  author = "M. Bellare and P. Rogaway and D. Wagner",
  title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  booktitle = {Fast Software Encryption 2004},
  month = {February},
  year = {2004},
}

@misc{darkside,
  title = {{The Dark Side of the Web: An Open Proxy's View}},
  author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  note = {\newline \url{http://codeen.cs.princeton.edu/}},
}
%  note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},

@Misc{anonymizer,
  key =          {anonymizer},
  title =        {The {Anonymizer}},
  note =         {\url{http://anonymizer.com/}}
}

@Misc{privoxy,
  key =          {privoxy},
  title =        {{Privoxy}},
  note =         {\url{http://www.privoxy.org/}}
}

@Misc{i2p,
  key =          {i2p},
  title =        {{I2P}},
  note =         {\url{http://www.i2p.net/}}
}

@Misc{nym,
  author = 	 {Jason Holt},
  title = 	 {nym: practical pseudonymity for anonymous networks},
  note = 	 {Paper and source code at \url{http://www.lunkwill.org/src/nym/}}
}

@InProceedings{nymble,
  author = 	 {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
  title = 	 {Nymble: Anonymous {IP}-address Blocking},
  booktitle = {Privacy Enhancing Technologies (PET 2007)},
  year = 	 2007,
  publisher = {Springer-Verlag, LNCS 4776}
}

@inproceedings{anonnet,
  title = {{Analysis of an Anonymity Network for Web Browsing}},
  author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
        David Hutchison},
  booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
        2002)}},
  year = {2002},
  month = {June},
  address = {Pittsburgh, USA},
}
%  pages = {49--54},

@inproceedings{econymics,
  title = {On the Economics of Anonymity},
  author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  booktitle = {Financial Cryptography},
  year = {2003},
  editor = {Rebecca N. Wright},
  publisher = {Springer-Verlag, LNCS 2742},
}

@inproceedings{defensive-dropping,
  title = {Timing Analysis in Low-Latency Mix-Based Systems},
  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  booktitle = {Financial Cryptography},
  year = {2004},
  editor = {Ari Juels},
  publisher = {Springer-Verlag, LNCS (forthcoming)},
}

@inproceedings{morphmix:fc04,
  title = {Practical Anonymity for the Masses with MorphMix},
  author = {Marc Rennhard and Bernhard Plattner},
  booktitle = {Financial Cryptography},
  year = {2004},
  editor = {Ari Juels},
  publisher = {Springer-Verlag, LNCS (forthcoming)},
}

@inproceedings{eternity,
  title = {The Eternity Service},
  author = {Ross Anderson},
  booktitle = {Pragocrypt '96},
  year = {1996},
}
  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},


@inproceedings{minion-design,
  title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  author = {George Danezis and Roger Dingledine and Nick Mathewson},
  booktitle = {2003 IEEE Symposium on Security and Privacy},
  year = {2003},
  month = {May},
  publisher = {IEEE CS},
  pages = {2--15},
}
  %note = {\url{http://mixminion.net/minion-design.pdf}},

@inproceedings{ rao-pseudonymity,
    author = "Josyula R. Rao and Pankaj Rohatgi",
    title = "Can Pseudonymity Really Guarantee Privacy?",
    booktitle = "Proceedings of the Ninth USENIX Security Symposium",
    year = {2000},
    month = Aug,
    publisher = {USENIX},
    pages = "85--96",
}
    %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
%full_papers/rao/rao.pdf}},

@InProceedings{pfitzmann90how,
    author = "Birgit Pfitzmann and Andreas Pfitzmann",
    title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
    booktitle = {Eurocrypt 89},
    publisher = {Springer-Verlag, LNCS 434},
    year = {1990},
    note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
}

@Misc{tor-spec,
   author =      {Roger Dingledine and Nick Mathewson},
   title =       {Tor Protocol Specifications},
   note =        {\url{https://www.torproject.org/svn/trunk/doc/tor-spec.txt}},
}

@Misc{incentives-txt,
   author =      {Roger Dingledine and Nick Mathewson},
   title =       {Tor Incentives Design Brainstorms},
   note =        {\url{https://www.torproject.org/svn/trunk/doc/incentives.txt}},
}

@InProceedings{BM:mixencrypt,
  author =       {M{\"o}ller, Bodo},
  title =        {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  booktitle =    {{CT-RSA} 2003},
  publisher =    {Springer-Verlag, LNCS 2612},
  year =         2003,
}

@InProceedings{back01,
  author =       {Adam Back and Ulf M\"oller and Anton Stiglic},
  title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  booktitle =    {Information Hiding (IH 2001)},
  pages =        {245--257},
  year =         2001,
  editor =       {Ira S. Moskowitz},
  publisher =    {Springer-Verlag, LNCS 2137},
}
  %note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},

@InProceedings{rackoff93cryptographic,
   author =      {Charles Rackoff and Daniel R. Simon},
   title =       {Cryptographic Defense Against Traffic Analysis},
   booktitle =   {{ACM} Symposium on Theory of Computing},
   pages =       {672--681},
   year =        {1993},
}
   %note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},

@InProceedings{freehaven-berk,
   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},
   title =       {The Free Haven Project: Distributed Anonymous Storage Service},
   booktitle =   {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   year =        2000,
   month =       {July},
   editor =      {H. Federrath},
   publisher =   {Springer-Verlag, LNCS 2009},
}

   @InProceedings{move-ndss05,
  author = 	 {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  title = 	 {MOVE: An End-to-End Solution To Network Denial of Service},
  booktitle = 	 {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  year =	 2005,
  month =	 {February},
  publisher =	 {Internet Society}
}

%note =        {\url{http://freehaven.net/papers.html}},




@InProceedings{raymond00,
  author =       {J. F. Raymond},
  title =        {{Traffic Analysis: Protocols, Attacks, Design Issues,
                  and Open Problems}},
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
  year =         2000,
  month =        {July},
  pages =        {10-29},
  editor =       {H. Federrath},
  publisher =    {Springer-Verlag, LNCS 2009},
}

@InProceedings{sybil,
  author = "John Douceur",
  title = {{The Sybil Attack}},
  booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  month = Mar,
  year = 2002,
}


@InCollection{price-privacy,
  author =	 {Paul Syverson and Adam Shostack},
  editor =	 {L. Jean Camp and Stephen Lewis},
  title = 	 {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  booktitle =	 {Economics of Information Security},
  chapter = 	 10,
  publisher = 	 {Kluwer},
  year = 	 2004,
  pages =	 {129--142}
}


@InProceedings{trickle02,
  author =       {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  title =        {From a Trickle to a Flood: Active Attacks on Several
                  Mix Types},
  booktitle =    {Information Hiding (IH 2002)},
  year =         {2002},
  editor =       {Fabien Petitcolas},
  publisher =    {Springer-Verlag, LNCS 2578},
}

@InProceedings{langos02,
  author =      {Oliver Berthold and Heinrich Langos},
  title =       {Dummy Traffic Against Long Term Intersection Attacks},
  booktitle =    {Privacy Enhancing Technologies (PET 2002)},
  year =         {2002},
  editor =       {Roger Dingledine and Paul Syverson},
  publisher =    {Springer-Verlag, LNCS 2482}
}


@InProceedings{hintz-pet02,
  author = 	 {Andrew Hintz},
  title = 	 {Fingerprinting Websites Using Traffic Analysis},
  booktitle = 	 {Privacy Enhancing Technologies (PET 2002)},
  pages =	 {171--178},
  year =	 2002,
  editor =	 {Roger Dingledine and Paul Syverson},
  publisher =	 {Springer-Verlag, LNCS 2482}
}

@InProceedings{or-discex00,
   author =      {Paul Syverson and Michael Reed and David Goldschlag},
   title =       {{O}nion {R}outing Access Configurations},
   booktitle =   {DARPA Information Survivability Conference and
                  Exposition (DISCEX 2000)},
   year =        {2000},
   publisher =   {IEEE CS Press},
   pages =       {34--40},
   volume =      {1},
}
   %note =        {\newline \url{http://www.onion-router.net/Publications.html}},

@Inproceedings{or-pet00,
  title =        {{Towards an Analysis of Onion Routing Security}},
  author =       {Paul Syverson and Gene Tsudik and Michael Reed and
                  Carl Landwehr},
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
  year =         2000,
  month =        {July},
  pages =        {96--114},
  editor =       {H. Federrath},
  publisher =    {Springer-Verlag, LNCS 2009},
}
  %note =         {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},

@Inproceedings{freenet-pets00,
  title =        {Freenet: A Distributed Anonymous Information Storage
    and Retrieval System},
  author =       {Ian Clarke and Oskar Sandberg and Brandon Wiley and
    Theodore W. Hong},
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
  year =         2000,
  month =        {July},
  pages =        {46--66},
  editor =       {H. Federrath},
  publisher =    {Springer-Verlag, LNCS 2009},
}
  %note =         {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},

@InProceedings{or-ih96,
  author =       {David M. Goldschlag and Michael G. Reed and Paul
                  F. Syverson},
  title =        {Hiding Routing Information},
  booktitle =    {Information Hiding, First International Workshop},
  pages =        {137--150},
  year =         1996,
  editor =       {R. Anderson},
  month =        {May},
  publisher =    {Springer-Verlag, LNCS 1174},
}

@InProceedings{federrath-ih96,
  author = 	 {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  title = 	 {{MIXes} in Mobile Communication Systems: Location
                  Management with Privacy},
  booktitle =    {Information Hiding, First International Workshop},
  pages =        {121--135},
  year =         1996,
  editor =       {R. Anderson},
  month =        {May},
  publisher =    {Springer-Verlag, LNCS 1174},
}


@InProceedings{reed-protocols97,
  author = 	 {Michael G. Reed and Paul F. Syverson and David
                  M. Goldschlag},
  title = 	 {Protocols Using Anonymous Connections: Mobile Applications},
  booktitle = 	 {Security Protocols: 5th International Workshop},
  pages =	 {13--23},
  year =	 1997,
  editor =	 {Bruce Christianson and Bruno Crispo and Mark Lomas
                  and Michael Roe},
  month =	 {April},
  publisher =	 {Springer-Verlag, LNCS 1361}
}



@Article{or-jsac98,
  author =       {Michael G. Reed and Paul F. Syverson and David
                  M. Goldschlag},
  title =        {Anonymous Connections and Onion Routing},
  journal =      {IEEE Journal on Selected Areas in Communications},
  year =         1998,
  volume =       16,
  number =       4,
  pages =        {482--494},
  month =        {May},
}
  %note =         {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}

@Misc{TLS,
   author =      {T. Dierks and C. Allen},
   title =       {The {TLS} {P}rotocol --- {V}ersion 1.0},
   howpublished = {IETF RFC 2246},
   month =       {January},
   year =        {1999},
}
%note =        {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},

@Misc{SMTP,
   author =      {J. Postel},
   title =       {Simple {M}ail {T}ransfer {P}rotocol},
   howpublished = {IETF RFC 2821 (also STD0010)},
   month =       {April},
   year =        {2001},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
}

@Misc{IMAP,
   author =      {M. Crispin},
   title =       {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
   howpublished = {IETF RFC 2060},
   month =       {December},
   year =        {1996},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
}

@misc{pipenet,
  title = {PipeNet 1.1},
  author = {Wei Dai},
  year = 1996,
  month = {August},
  howpublished = {Usenet post},
  note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
      in a post to the cypherpunks list, Feb.\ 1995.},
}


@Misc{POP3,
   author =      {J. Myers and M. Rose},
   title =       {Post {O}ffice {P}rotocol --- {V}ersion 3},
   howpublished = {IETF RFC 1939 (also STD0053)},
   month =       {May},
   year =        {1996},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
}


@InProceedings{shuffle,
   author =      {C. Andrew Neff},
   title =       {A Verifiable Secret Shuffle and its Application to E-Voting},
   booktitle =    {8th ACM Conference on Computer and Communications
                  Security (CCS-8)},
   pages =       {116--125},
   year =        2001,
   editor =      {P. Samarati},
   month =       {November},
   publisher =   {ACM Press},
}
   %note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/
   %                    technicaldocs/shuffle.pdf}},

@InProceedings{dolev91,
   author =      {Danny Dolev and Cynthia Dwork and Moni Naor},
   title =       {Non-Malleable Cryptography},
   booktitle =   {23rd ACM Symposium on the Theory of Computing (STOC)},
   pages =       {542--552},
   year =        1991,
   note =        {Updated version at
                  \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
}

@TechReport{rsw96,
   author =      {Ronald L. Rivest and Adi Shamir and David A. Wagner},
   title =       {Time-lock puzzles and timed-release Crypto},
   year =        1996,
   type =        {MIT LCS technical memo},
   number =      {MIT/LCS/TR-684},
   month =       {February},
   note =        {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
}

@InProceedings{web-mix,
   author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
   title =       {Web {MIX}es: A system for anonymous and unobservable
                  {I}nternet access},
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   editor =       {H. Federrath},
   publisher =    {Springer-Verlag, LNCS 2009},
   year =        {2000},
}
%   pages =       {115--129},

@InProceedings{disad-free-routes,
   author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
   title =       {The disadvantages of free {MIX} routes and how to overcome
                  them},
   booktitle =   {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   pages =       {30--45},
   year =        2000,
   editor =       {H. Federrath},
   publisher =    {Springer-Verlag, LNCS 2009},
}
   %note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
   %                    disadvantages_berthold.pdf}},

@InProceedings{boneh00,
   author =      {Dan Boneh and Moni Naor},
   title =       {Timed Commitments},
   booktitle =   {Advances in Cryptology -- {CRYPTO} 2000},
   pages =       {236--254},
   year =        2000,
   publisher =   {Springer-Verlag, LNCS 1880},
   note =        {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
}

@InProceedings{goldschlag98,
   author =      {David M. Goldschlag and Stuart G. Stubblebine},
   title =       {Publicly Verifiable Lotteries: Applications of
                  Delaying Functions},
   booktitle =   {Financial Cryptography},
   pages =       {214--226},
   year =        1998,
   publisher =   {Springer-Verlag, LNCS 1465},
   note =        {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
}

@InProceedings{syverson98,
   author =      {Paul Syverson},
   title =       {Weakly Secret Bit Commitment: Applications to
                  Lotteries and Fair Exchange},
   booktitle =   {Computer Security Foundations Workshop (CSFW11)},
   pages =       {2--13},
   year =        1998,
   address =     {Rockport Massachusetts},
   month =       {June},
   publisher =   {IEEE CS Press},
   note =        {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
}

@Misc{shoup-iso,
   author =      {Victor Shoup},
   title =       {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
   note =        {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
}

@Misc{shoup-oaep,
   author =      {Victor Shoup},
   title =       {{OAEP} Reconsidered},
   howpublished = {{IACR} e-print 2000/060},
   note =        {\newline \url{http://eprint.iacr.org/2000/060/}},
}

@Misc{oaep-still-alive,
   author =      {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
   title =       {{RSA}-{OAEP} is Still Alive!},
   howpublished = {{IACR} e-print 2000/061},
   note =        {\newline \url{http://eprint.iacr.org/2000/061/}},
}

@misc{echolot,
  author = {Peter Palfrader},
  title = {Echolot: a pinger for anonymous remailers},
  note = {\url{http://www.palfrader.org/echolot/}},
}

@Misc{mixmaster-attacks,
   author =      {Lance Cottrell},
   title =       {Mixmaster and Remailer Attacks},
   note =        {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
}

@Misc{mixmaster-spec,
   author =      {Ulf M{\"o}ller and Lance Cottrell and Peter
                  Palfrader and Len Sassaman},
   title =       {Mixmaster {P}rotocol --- {V}ersion 2},
   year =        {2003},
   month =       {July},
   howpublished = {Draft},
   note =        {\url{http://www.abditum.com/mixmaster-spec.txt}},
}

@InProceedings{puzzles-tls,
    author = "Drew Dean and Adam Stubblefield",
    title = {{Using Client Puzzles to Protect TLS}},
    booktitle = "Proceedings of the 10th USENIX Security Symposium",
    year = {2001},
    month = Aug,
    publisher = {USENIX},
}

@InProceedings{breadpudding,
  author =       {Markus Jakobsson and Ari Juels},
  title =        {Proofs of Work and Bread Pudding Protocols},
  booktitle =    {Proceedings of the IFIP TC6 and TC11 Joint Working
                  Conference on Communications and Multimedia Security
                  (CMS '99)},
  year =         1999,
  month =        {September},
  publisher =    {Kluwer}
}

@Misc{hashcash,
   author =      {Adam Back},
   title =       {Hash cash},
   note =        {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
}

@InProceedings{oreilly-acc,
   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},
   title =       {Accountability},
   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive
                  Technology},
   year =        {2001},
   publisher =   {O'Reilly and Associates},
}


@InProceedings{han,
   author =      {Yongfei Han},
   title =       {Investigation of non-repudiation protocols},
   booktitle =   {ACISP '96},
   year =        1996,
   publisher =   {Springer-Verlag},
}


@Misc{socks5,
  key =          {socks5},
  title =        {{SOCKS} {P}rotocol {V}ersion 5},
  howpublished=  {IETF RFC 1928},
  month =        {March},
  year =         1996,
  note =         {\url{http://www.ietf.org/rfc/rfc1928.txt}}
}

@InProceedings{abe,
   author =      {Masayuki Abe},
   title =       {Universally Verifiable {MIX} With Verification Work Independent of
                  The Number of {MIX} Servers},
   booktitle =   {{EUROCRYPT} 1998},
   year =        {1998},
   publisher =   {Springer-Verlag, LNCS 1403},
}

@InProceedings{desmedt,
   author =      {Yvo Desmedt and Kaoru Kurosawa},
   title =       {How To Break a Practical {MIX} and Design a New One},
   booktitle =   {{EUROCRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1803},
   note =        {\url{http://citeseer.nj.nec.com/447709.html}},
}

@InProceedings{mitkuro,
   author =      {M. Mitomo and K. Kurosawa},
   title =       {{Attack for Flash MIX}},
   booktitle =   {{ASIACRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1976},
   note =        {\newline \url{http://citeseer.nj.nec.com/450148.html}},
}

@InProceedings{hybrid-mix,
   author =      {M. Ohkubo and M. Abe},
   title =       {A {L}ength-{I}nvariant {H}ybrid {MIX}},
   booktitle =   {Advances in Cryptology - {ASIACRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1976},
}

@InProceedings{PShuffle,
  author = {Jun Furukawa and Kazue Sako},
  title = {An Efficient Scheme for Proving a Shuffle},
  editor    = {Joe Kilian},
  booktitle = {CRYPTO 2001},
  year      = {2001},
  publisher = {Springer-Verlag, LNCS 2139},
}


@InProceedings{jakobsson-optimally,
  author = "Markus Jakobsson and Ari Juels",
  title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  booktitle =   {Principles of Distributed Computing - {PODC} '01},
  year = "2001",
  publisher =   {ACM Press},
  note = {\url{http://citeseer.nj.nec.com/492015.html}},
}

@InProceedings{kesdogan,
   author =      {D. Kesdogan and M. Egner and T. B\"uschkes},
   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
                  System},
   booktitle =   {Information Hiding (IH 1998)},
   year =        {1998},
   publisher =   {Springer-Verlag, LNCS 1525},
}
   %note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},

@InProceedings{socks4,
  author =       {David Koblas and Michelle R. Koblas},
  title =        {{SOCKS}},
  booktitle =    {UNIX Security III Symposium (1992 USENIX Security
                  Symposium)},
  pages =        {77--83},
  year =         1992,
  publisher =    {USENIX},
}

@InProceedings{flash-mix,
   author =      {Markus Jakobsson},
   title =       {Flash {M}ixing},
   booktitle =   {Principles of Distributed Computing - {PODC} '99},
   year =        {1999},
   publisher =   {ACM Press},
   note =        {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
}

@InProceedings{SK,
   author =      {Joe Kilian and Kazue Sako},
   title =       {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
                  the Implementation of a Voting Booth},
   booktitle =   {EUROCRYPT '95},
   year =        {1995},
   publisher =   {Springer-Verlag},
}

@InProceedings{OAEP,
   author =      {M. Bellare and P. Rogaway},
   year =        {1994},
   booktitle =   {EUROCRYPT '94},
   title =       {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
                  {RSA}},
   publisher =   {Springer-Verlag},
   note =        {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
}
@inproceedings{babel,
  title = {Mixing {E}-mail With {B}abel},
  author = {Ceki G\"ulc\"u and Gene Tsudik},
  booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  year = 1996,
  month = {February},
  pages = {2--16},
  publisher = {IEEE},
}
  %note = {\url{http://citeseer.nj.nec.com/2254.html}},

@Misc{rprocess,
   author =      {RProcess},
   title =       {Selective Denial of Service Attacks},
   note =        {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
}

@Article{remailer-history,
  author = {Sameer Parekh},
  title = {Prospects for Remailers},
  journal = {First Monday},
  volume = {1},
  number = {2},
  month = {August},
  year = {1996},
  note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
}

@Article{chaum-mix,
   author =      {David Chaum},
   title =       {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
   journal =     {Communications of the ACM},
   year =        {1981},
   volume =      {4},
   number =      {2},
   month =       {February},
}
   %note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},

@InProceedings{nym-alias-net,
  author =       {David Mazi\`{e}res and M. Frans Kaashoek},
  title =        {{The Design, Implementation and Operation of an Email
                  Pseudonym Server}},
  booktitle =    {$5^{th}$ ACM Conference on Computer and
                  Communications Security (CCS'98)},
  year =         1998,
  publisher =    {ACM Press},
}
  %note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},

@InProceedings{tangler,
  author =       {Marc Waldman and David Mazi\`{e}res},
  title =        {Tangler: A Censorship-Resistant Publishing System
                  Based on Document Entanglements},
  booktitle =    {$8^{th}$ ACM Conference on Computer and
                  Communications Security (CCS-8)},
  pages =        {86--135},
  year =         2001,
  publisher =    {ACM Press},
}
  %note =         {\url{http://www.scs.cs.nyu.edu/~dm/}}

@misc{neochaum,
   author =      {Tim May},
   title =       {Payment mixes for anonymity},
   howpublished = {E-mail archived at
                  \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
}

@misc{helsingius,
   author =      {J. Helsingius},
   title =       {{\tt anon.penet.fi} press release},
   note =        {\newline \url{http://www.penet.fi/press-english.html}},
}

@InProceedings{garay97secure,
   author =      {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
   title =       {Secure distributed storage and retrieval},
   booktitle =   {11th International Workshop, WDAG '97},
   pages =       {275--289},
   year =        {1997},
   publisher =   {Springer-Verlag, LNCS 1320},
   note =        {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
}

@InProceedings{PIK,
   author =      {C. Park and K. Itoh and K. Kurosawa},
   title =       {Efficient anonymous channel and all/nothing election scheme},
   booktitle =   {Advances in Cryptology -- {EUROCRYPT} '93},
   pages =       {248--259},
   publisher =   {Springer-Verlag, LNCS 765},
}

@Misc{pgpfaq,
   key =         {PGP},
   title =       {{PGP} {FAQ}},
   note =        {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
}

@Article{riordan-schneier,
   author =      {James Riordan and Bruce Schneier},
   title =       {A Certified E-mail Protocol with No Trusted Third Party},
   journal =     {13th Annual Computer Security Applications Conference},
   month =       {December},
   year =        {1998},
   note =        {\newline \url{http://www.counterpane.com/certified-email.html}},
}


@Article{crowds-tissec,
  author =       {Michael K. Reiter and Aviel D. Rubin},
  title =        {Crowds: Anonymity for Web Transactions},
  journal =      {ACM TISSEC},
  year =         1998,
  volume =       1,
  number =       1,
  pages =        {66--92},
  month =        {June},
}
  %note =         {\url{http://citeseer.nj.nec.com/284739.html}}

@Article{crowds-dimacs,
   author =      {Michael K. Reiter and Aviel D. Rubin},
   title =       {Crowds: Anonymity for Web Transactions},
   journal =     {{DIMACS} Technical Report (Revised)},
   volume =      {97},
   number =      {15},
   month =       {August},
   year =        {1997},
}

@Misc{advogato,
   author =      {Raph Levien},
   title =       {Advogato's Trust Metric},
   note =        {\newline \url{http://www.advogato.org/trust-metric.html}},
}

@InProceedings{publius,
   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor},
   title =       {Publius: {A} robust, tamper-evident, censorship-resistant and
                  source-anonymous web publishing system},
   booktitle =   {Proc. 9th USENIX Security Symposium},
   pages =       {59--72},
   year =        {2000},
   month =       {August},
}
   %note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},

@Misc{freedom-nyms,
   author =      {Russell Samuels},
   title =       {Untraceable Nym Creation on the {F}reedom {N}etwork},
   year =        {1999},
   month =       {November},
   day =         {21},
   note =        {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
}

@techreport{freedom2-arch,
  title = {Freedom Systems 2.0 Architecture},
  author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  institution = {Zero Knowledge Systems, {Inc.}},
  year = {2000},
  month = {December},
  type = {White Paper},
  day = {18},
}

@techreport{freedom21-security,
  title = {Freedom Systems 2.1 Security Issues and Analysis},
  author = {Adam Back and Ian Goldberg and Adam Shostack},
  institution = {Zero Knowledge Systems, {Inc.}},
  year = {2001},
  month = {May},
  type = {White Paper},
}

@inproceedings{cfs:sosp01,
  title = {Wide-area cooperative storage with {CFS}},
  author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  year = {2001},
  month = {October},
  address = {Chateau Lake Louise, Banff, Canada},
}

@inproceedings{SS03,
  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  author = {Andrei Serjantov and Peter Sewell},
  booktitle = {Computer Security -- ESORICS 2003},
  publisher =   {Springer-Verlag, LNCS 2808},
  year = {2003},
  month = {October},
}
  %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},

@Misc{pk-relations,
   author =      {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
   title =       {Relations Among Notions of Security for Public-Key Encryption
                  Schemes},
   howpublished = {
                  Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
                  Springer-Verlag, 1998.
                  Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
}


@InProceedings{mix-acc,
  author =      {Roger Dingledine and Michael J. Freedman and David
                  Hopwood and David Molnar},
  title =       {{A Reputation System to Increase MIX-net
                  Reliability}},
  booktitle =   {Information Hiding (IH 2001)},
  pages =       {126--141},
  year =        2001,
  editor =      {Ira S. Moskowitz},
  publisher =   {Springer-Verlag, LNCS 2137},
}
  %note =        {\url{http://www.freehaven.net/papers.html}},

@InProceedings{casc-rep,
   author =      {Roger Dingledine and Paul Syverson},
   title =       {{Reliable MIX Cascade Networks through Reputation}},
  booktitle =    {Financial Cryptography},
  year =         2002,
  editor =       {Matt Blaze},
  publisher =    {Springer-Verlag, LNCS 2357},
}
  %note =        {\newline \url{http://www.freehaven.net/papers.html}},

@InProceedings{zhou96certified,
   author =      {Zhou and Gollmann},
   title =       {Certified Electronic Mail},
   booktitle =   {{ESORICS: European Symposium on Research in Computer
                  Security}},
   publisher =   {Springer-Verlag, LNCS 1146},
   year =        {1996},
   note =        {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
}

@Misc{realtime-mix,
   author =      {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
                  Birgit Pfitzmann and Michael Waidner},
   title =       {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
   howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
   note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
}

@InProceedings{danezis:pet2003,
  author =       {George Danezis},
  title =        {Mix-networks with Restricted Routes},
  booktitle =    {Privacy Enhancing Technologies (PET 2003)},
  year =         2003,
  editor =       {Roger Dingledine},
  publisher =    {Springer-Verlag LNCS 2760}
}

@InProceedings{gap-pets03,
  author =       {Krista Bennett and Christian Grothoff},
  title =        {{GAP} -- practical anonymous networking},
  booktitle =    {Privacy Enhancing Technologies (PET 2003)},
  year =         2003,
  editor =       {Roger Dingledine},
  publisher =    {Springer-Verlag LNCS 2760}
}

@Article{hordes-jcs,
  author =       {Brian Neal Levine and Clay Shields},
  title =        {Hordes: A Multicast-Based Protocol for Anonymity},
  journal =      {Journal of Computer Security},
  year =         2002,
  volume =       10,
  number =       3,
  pages =        {213--240}
}

@TechReport{herbivore,
  author =       {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  title =        {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  institution =  {Cornell University Computing and Information Science},
  year =         2003,
  type =         {Technical Report},
  number =       {TR2003-1890},
  month =        {February}
}

@InProceedings{p5,
  author =       {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  title =        {$P^5$: A Protocol for Scalable Anonymous Communication},
  booktitle =    {IEEE Symposium on Security and Privacy},
  pages =        {58--70},
  year =         2002,
  publisher =    {IEEE CS}
}

@phdthesis{ian-thesis,
  title = {A Pseudonymous Communications Infrastructure for the Internet},
  author = {Ian Goldberg},
  school = {UC Berkeley},
  year = {2000},
  month = {Dec},
}

@Article{taz,
  author =       {Ian Goldberg and David Wagner},
  title =        {TAZ Servers and the Rewebber Network: Enabling
                  Anonymous Publishing on the World Wide Web},
  journal =      {First Monday},
  year =         1998,
  volume =       3,
  number =       4,
  month =        {August},
  note =         {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
}

@Misc{tcp-over-tcp-is-bad,
  key =          {tcp-over-tcp-is-bad},
  title =        {Why {TCP} Over {TCP} Is A Bad Idea},
  author =       {Olaf Titz},
  note =         {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
}

@inproceedings{wright02,
  title = {An Analysis of the Degradation of Anonymous Protocols},
  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  year = {2002},
  month = {February},
  publisher = {IEEE},
}

@inproceedings{wright03,
  title = {Defending Anonymous Communication Against Passive Logging Attacks},
  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  booktitle = {IEEE Symposium on Security and Privacy},
  pages= {28--41},
  year = {2003},
  month = {May},
  publisher = {IEEE CS},
}


@InProceedings{attack-tor-oak05,
  author = 	 {Steven J. Murdoch and George Danezis},
  title = 	 {Low-cost Traffic Analysis of {T}or},
  booktitle = 	 {IEEE Symposium on Security and Privacy},
  year =	 2005,
  month =	 {May},
  publisher =	 {IEEE CS}
}

@Misc{jap-backdoor,
  author={{The AN.ON Project}},
  howpublished={Press release},
  year={2003},
  month={September},
  title={German Police proceeds against anonymity service},
  note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
}

@article{shsm03,
  title = {Using Caching for Browsing Anonymity},
  author = {Anna Shubina and Sean Smith},
  journal = {ACM SIGEcom Exchanges},
  volume = {4},
  number = {2},
  year = {2003},
  month = {Sept},
  note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
}

@inproceedings{tor-design,
  title = {Tor: The Second-Generation Onion Router},
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  booktitle = {Proceedings of the 13th USENIX Security Symposium},
  year = {2004},
  month = {August},
  note = {\url{https://www.torproject.org/tor-design.pdf}}
}

@inproceedings{flow-correlation04,
  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  year = {2004},
  month = {May},
  series = {LNCS},
  note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
}

@InProceedings{danezis:pet2004,
  author = "George Danezis",
  title = "The Traffic Analysis of Continuous-Time Mixes",
  booktitle= {Privacy Enhancing Technologies (PET 2004)},
  editor = {David Martin and Andrei Serjantov},
  month = {May},
  year = {2004},
  series = {LNCS},
  note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
}

@inproceedings{feamster:wpes2004,
  title = {Location Diversity in Anonymity Networks},
  author = {Nick Feamster and Roger Dingledine},
  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  year = {2004},
  month = {October},
  address = {Washington, DC, USA},
  note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
}

@inproceedings{koepsell:wpes2004,
  title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  author = {Stefan K\"opsell and Ulf Hilling},
  booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  year = {2004},
  month = {October},
  address = {Washington, DC, USA},
  note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
}

@inproceedings{sync-batching,
  title = {Synchronous Batching: From Cascades to Free Routes},
  author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  editor = {David Martin and Andrei Serjantov},
  year = {2004},
  month = {May},
  series = {LNCS},
  note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
}

@InProceedings{e2e-traffic,
  author = "Nick Mathewson and Roger Dingledine",
  title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  booktitle= {Privacy Enhancing Technologies (PET 2004)},
  editor = {David Martin and Andrei Serjantov},
  month = {May},
  year = {2004},
  series = {LNCS},
  note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
}

@Misc{dtls,
   author =      {E. Rescorla and N. Modadugu},
   title =       {{Datagram Transport Layer Security}},
   howpublished = {IETF Draft},
   month =       {December},
   year =        {2003},
   note =        {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
}

@InProceedings{usability-network-effect,
   author={Roger Dingledine and Nick Mathewson},
   title={Anonymity Loves Company: Usability and the Network Effect},
   booktitle = {Designing Security Systems That People Can Use},
   year = {2005},
   publisher = {O'Reilly Media},
}

@inproceedings{usability:weis2006,
  title = {Anonymity Loves Company: Usability and the Network Effect},
  author = {Roger Dingledine and Nick Mathewson},
  booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
        (WEIS 2006)},
  year = {2006},
  month = {June},
  address = {Cambridge, UK},
  bookurl = {http://weis2006.econinfosec.org/},
  note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
}

@Misc{six-four,
  key =          {six-four},
  title =        {{The Six/Four System}},
  note =         {\url{http://sourceforge.net/projects/sixfour/}}
}

@inproceedings{clayton:pet2006,
  title = {Ignoring the Great Firewall of China},
  author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  year = {2006},
  month = {June},
  address = {Cambridge, UK},
  publisher = {Springer},
  bookurl = {http://petworkshop.org/2006/},
  note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
}

@Misc{zuckerman-threatmodels,
  key =          {zuckerman-threatmodels},
  title =        {We've got to adjust some of our threat models},
  author =       {Ethan Zuckerman},
  note =         {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
}

@Misc{cgiproxy,
  key =          {cgiproxy},
  title =        {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
  author =       {James Marshall},
  note =         {\url{http://www.jmarshall.com/tools/cgiproxy/}}
}

@Misc{circumventor,
  key =          {circumventor},
  title =        {{How to install the Circumventor program}},
  author =       {Bennett Haselton},
  note =         {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
}

@Misc{psiphon,
  key =          {psiphon},
  title =        {Psiphon},
  author =       {Ronald Deibert et al},
  note =         {\url{http://psiphon.civisec.org/}}
}

@InProceedings{tcpstego,                                                                    author =       {Steven J. Murdoch and Stephen Lewis},
  title =        {Embedding Covert Channels into {TCP/IP}},
  booktitle = {Information Hiding: 7th International Workshop},
  pages  =       {247--261},
  year =         {2005},
  editor =       {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
  volume =       {3727},
  series =       {LNCS},
  address =      {Barcelona, Catalonia (Spain)},
  month =        {June},
  publisher = {Springer-Verlag},
  url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
}

@phdthesis{blossom-thesis,
  title = {Perspective Access Networks},
  author = {Geoffrey Goodell},
  school = {Harvard University},
  year = {2006},
  month = {July},
  note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
}

@inproceedings{tap:pet2006,
  title = {On the Security of the Tor Authentication Protocol},
  author = {Ian Goldberg},
  booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  year = {2006},
  month = {June},
  address = {Cambridge, UK},
  publisher = {Springer},
  bookurl = {http://petworkshop.org/2006/},
  note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
}

@inproceedings{rep-anon,
  title = {{Reputation in P2P Anonymity Systems}},
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
  year = {2003},
  month = {June},
  note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
}

@misc{tor-challenges,
   author       = {Roger Dingledine and Nick Mathewson and Paul Syverson},
   title        = {Challenges in deploying low-latency anonymity},
   year         = {2005},
   note         = {Manuscript}
}

@InProceedings{chaum-blind,
  author =       {David Chaum},
  title =        {Blind Signatures for Untraceable Payments},
  booktitle =    {Advances in Cryptology: Proceedings of Crypto 82},
  pages =        {199--203},
  year =         1983,
  editor =       {D. Chaum and R.L. Rivest and A.T. Sherman},
  publisher =    {Plenum Press}
}

@Article{netauth,
  author = {Geoffrey Goodell and Paul Syverson},
  title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},
  journal = 	 {Communications of the ACM},
  year = 	 2007,
  volume = 	 50,
  number = 	 5,
  pages = 	 {113--117},
  month = 	 {May}
}

@misc{ip-to-country,
  key = {ip-to-country},
  title = {IP-to-country database},
  note = {\url{http://ip-to-country.webhosting.info/}},
}

@misc{mackinnon-personal,
  author = {Rebecca MacKinnon},
  title = {Private communication},
  year = {2006},
}

@inproceedings{pet05-bissias,
  title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
  author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  year = {2005},
  month = {May},
  note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
}

@InProceedings{infranet,
   author =      {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
   title =       {Infranet: Circumventing Web Censorship and Surveillance},
   booktitle =   {Proceedings of the 11th USENIX Security Symposium},
   year =        {2002},
   month =       {August},
   note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
}

@techreport{ ptacek98insertion,
  author = "Thomas H. Ptacek and Timothy N. Newsham",
  title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
  institution = "Secure Networks, Inc.",
  address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
  year = "1998",
  url = "citeseer.ist.psu.edu/ptacek98insertion.html",
}

@inproceedings{active-wardens,
  author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
  title = "Eliminating Steganography in Internet Traffic with Active Wardens",
  booktitle = {Information Hiding Workshop (IH 2002)},
  year = {2002},
  month = {October},
  editor = {Fabien Petitcolas},
  publisher = {Springer-Verlag, LNCS 2578},
}

@inproceedings{clog-the-queue,
  title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes},
  author = {Jon McLachlan and Nicholas Hopper},
  booktitle = {Proceedings of Financial Cryptography (FC '08)},
  year = {2008},
  month = {January},
}

@inproceedings{snader08,
  title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},
  author = {Robin Snader and Nikita Borisov},
  booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},
  year = {2008},
  month = {February},
  publisher = {Internet Society},
}

@inproceedings{murdoch-pet2008,
  title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},
  author = {Steven J. Murdoch and Robert N. M. Watson},
  booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
  year = {2008},
  month = {July},
  address = {Leuven, Belgium},
  pages = {115--132},
  editor = {Nikita Borisov and Ian Goldberg},
  publisher = {Springer},
  bookurl = {http://petsymposium.org/2008/},
}

@inproceedings{danezis-pet2008,
  title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
  author = {George Danezis and Paul Syverson},
  booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
  year = {2008},
  month = {July},
  address = {Leuven, Belgium},
  pages = {133--150},
  editor = {Nikita Borisov and Ian Goldberg},
  publisher = {Springer},
  bookurl = {http://petsymposium.org/2008/},
}

%%% Local Variables:
%%% mode: latex
%%% TeX-master: "tor-design"
%%% End: