tor-design.bib 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992
  1. @inproceedings{kesdogan:pet2002,
  2. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  3. alternative to the MIX based Approach?},
  4. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  5. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  6. year = {2002},
  7. month = {April},
  8. editor = {Roger Dingledine and Paul Syverson},
  9. publisher = {Springer-Verlag, LNCS 2482},
  10. }
  11. @inproceedings{statistical-disclosure,
  12. title = {Statistical Disclosure Attacks},
  13. author = {George Danezis},
  14. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  15. organization = {{IFIP TC11}},
  16. year = {2003},
  17. month = {May},
  18. address = {Athens},
  19. pages = {421--426},
  20. publisher = {Kluwer},
  21. }
  22. @inproceedings{limits-open,
  23. title = {Limits of Anonymity in Open Environments},
  24. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  25. booktitle = {Information Hiding Workshop (IH 2002)},
  26. year = {2002},
  27. month = {October},
  28. editor = {Fabien Petitcolas},
  29. publisher = {Springer-Verlag, LNCS 2578},
  30. }
  31. @inproceedings{isdn-mixes,
  32. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  33. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  34. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  35. year = {1991},
  36. month = {February},
  37. pages = {451-463},
  38. }
  39. @inproceedings{tarzan:ccs02,
  40. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  41. author = {Michael J. Freedman and Robert Morris},
  42. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  43. {S}ecurity ({CCS 2002})},
  44. year = {2002},
  45. month = {November},
  46. address = {Washington, DC},
  47. }
  48. @inproceedings{cebolla,
  49. title = {{Cebolla: Pragmatic IP Anonymity}},
  50. author = {Zach Brown},
  51. booktitle = {Ottawa Linux Symposium},
  52. year = {2002},
  53. month = {June},
  54. }
  55. @misc{eax,
  56. author = "M. Bellare and P. Rogaway and D. Wagner",
  57. title = "A conventional authenticated-encryption mode",
  58. howpublished = {Manuscript},
  59. month = {April},
  60. year = {2003},
  61. }
  62. @misc{darkside,
  63. title = {{The Dark Side of the Web: An Open Proxy's View}},
  64. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  65. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  66. }
  67. @Misc{anonymizer,
  68. key = {anonymizer},
  69. title = {The {Anonymizer}},
  70. note = {\url{http://anonymizer.com/}}
  71. }
  72. @Misc{privoxy,
  73. key = {privoxy},
  74. title = {{Privoxy}},
  75. note = {\url{http://www.privoxy.org/}}
  76. }
  77. @inproceedings{anonnet,
  78. title = {{Analysis of an Anonymity Network for Web Browsing}},
  79. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  80. David Hutchison},
  81. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  82. 2002)}},
  83. year = {2002},
  84. month = {June},
  85. address = {Pittsburgh, USA},
  86. pages = {49--54},
  87. }
  88. @inproceedings{castro-liskov,
  89. author = {Miguel Castro and Barbara Liskov},
  90. title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
  91. booktitle = {Fourth Symposium on Operating Systems Design and Implementation},
  92. month = {October},
  93. year = {2000},
  94. }
  95. @inproceedings{econymics,
  96. title = {On the Economics of Anonymity},
  97. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  98. booktitle = {Financial Cryptography},
  99. year = {2003},
  100. editor = {Rebecca N. Wright},
  101. publisher = {Springer-Verlag, LNCS 2742},
  102. }
  103. @inproceedings{defensive-dropping,
  104. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  105. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  106. booktitle = {Financial Cryptography},
  107. year = {2004},
  108. editor = {Ari Juels},
  109. publisher = {Springer-Verlag, LNCS (forthcoming)},
  110. }
  111. @inproceedings{morphmix:fc04,
  112. title = {Practical Anonymity for the Masses with MorphMix},
  113. author = {Marc Rennhard and Bernhard Plattner},
  114. booktitle = {Financial Cryptography},
  115. year = {2004},
  116. editor = {Ari Juels},
  117. publisher = {Springer-Verlag, LNCS (forthcoming)},
  118. }
  119. @inproceedings{eternity,
  120. title = {The Eternity Service},
  121. author = {Ross Anderson},
  122. booktitle = {Pragocrypt '96},
  123. year = {1996},
  124. }
  125. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  126. @inproceedings{minion-design,
  127. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  128. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  129. booktitle = {2003 IEEE Symposium on Security and Privacy},
  130. year = {2003},
  131. month = {May},
  132. publisher = {IEEE CS},
  133. pages = {2--15},
  134. }
  135. %note = {\url{http://mixminion.net/minion-design.pdf}},
  136. @inproceedings{ rao-pseudonymity,
  137. author = "Josyula R. Rao and Pankaj Rohatgi",
  138. title = "Can Pseudonymity Really Guarantee Privacy?",
  139. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  140. year = {2000},
  141. month = Aug,
  142. publisher = {USENIX},
  143. pages = "85--96",
  144. }
  145. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  146. %full_papers/rao/rao.pdf}},
  147. @InProceedings{pfitzmann90how,
  148. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  149. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  150. booktitle = {Eurocrypt 89},
  151. publisher = {Springer-Verlag, LNCS 434},
  152. year = {1990},
  153. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  154. }
  155. % author = {Roger Dingledine and Nick Mathewson},
  156. @Misc{tor-spec,
  157. author = {Anonymized},
  158. title = {Tor Protocol Specifications},
  159. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  160. }
  161. @InProceedings{BM:mixencrypt,
  162. author = {M{\"o}ller, Bodo},
  163. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  164. booktitle = {{CT-RSA} 2003},
  165. publisher = {Springer-Verlag, LNCS 2612},
  166. year = 2003,
  167. }
  168. @InProceedings{back01,
  169. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  170. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  171. booktitle = {Information Hiding (IH 2001)},
  172. pages = {245--257},
  173. year = 2001,
  174. editor = {Ira S. Moskowitz},
  175. publisher = {Springer-Verlag, LNCS 2137},
  176. }
  177. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  178. @InProceedings{rackoff93cryptographic,
  179. author = {Charles Rackoff and Daniel R. Simon},
  180. title = {Cryptographic Defense Against Traffic Analysis},
  181. booktitle = {{ACM} Symposium on Theory of Computing},
  182. pages = {672--681},
  183. year = {1993},
  184. }
  185. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  186. @InProceedings{freehaven-berk,
  187. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  188. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  189. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  190. on Design Issue in Anonymity and Unobservability},
  191. year = {2000},
  192. month = {July},
  193. editor = {H. Federrath},
  194. publisher = {Springer-Verlag, LNCS 2009},
  195. }
  196. %note = {\url{http://freehaven.net/papers.html}},
  197. @InProceedings{raymond00,
  198. author = {J. F. Raymond},
  199. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  200. and Open Problems}},
  201. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  202. on Design Issue in Anonymity and Unobservability},
  203. year = 2000,
  204. month = {July},
  205. pages = {10-29},
  206. editor = {H. Federrath},
  207. publisher = {Springer-Verlag, LNCS 2009},
  208. }
  209. @InProceedings{sybil,
  210. author = "John Douceur",
  211. title = {{The Sybil Attack}},
  212. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
  213. month = Mar,
  214. year = 2002,
  215. }
  216. @InProceedings{trickle02,
  217. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  218. title = {From a Trickle to a Flood: Active Attacks on Several
  219. Mix Types},
  220. booktitle = {Information Hiding (IH 2002)},
  221. year = {2002},
  222. editor = {Fabien Petitcolas},
  223. publisher = {Springer-Verlag, LNCS 2578},
  224. }
  225. @InProceedings{langos02,
  226. author = {Oliver Berthold and Heinrich Langos},
  227. title = {Dummy Traffic Against Long Term Intersection Attacks},
  228. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  229. year = {2002},
  230. editor = {Roger Dingledine and Paul Syverson},
  231. publisher = {Springer-Verlag, LNCS 2482}
  232. }
  233. @InProceedings{or-discex00,
  234. author = {Paul Syverson and Michael Reed and David Goldschlag},
  235. title = {{O}nion {R}outing Access Configurations},
  236. booktitle = {DARPA Information Survivability Conference and
  237. Exposition (DISCEX 2000)},
  238. year = {2000},
  239. publisher = {IEEE CS Press},
  240. pages = {34--40},
  241. volume = {1},
  242. }
  243. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  244. @Inproceedings{or-pet00,
  245. title = {{Towards an Analysis of Onion Routing Security}},
  246. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  247. Carl Landwehr},
  248. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  249. on Design Issue in Anonymity and Unobservability},
  250. year = 2000,
  251. month = {July},
  252. pages = {96--114},
  253. editor = {H. Federrath},
  254. publisher = {Springer-Verlag, LNCS 2009},
  255. }
  256. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  257. @Inproceedings{freenet-pets00,
  258. title = {Freenet: A Distributed Anonymous Information Storage
  259. and Retrieval System},
  260. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  261. Theodore W. Hong},
  262. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  263. on Design Issue in Anonymity and Unobservability},
  264. year = 2000,
  265. month = {July},
  266. pages = {46--66},
  267. editor = {H. Federrath},
  268. publisher = {Springer-Verlag, LNCS 2009},
  269. }
  270. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  271. @InProceedings{or-ih96,
  272. author = {David M. Goldschlag and Michael G. Reed and Paul
  273. F. Syverson},
  274. title = {Hiding Routing Information},
  275. booktitle = {Information Hiding, First International Workshop},
  276. pages = {137--150},
  277. year = 1996,
  278. editor = {R. Anderson},
  279. month = {May},
  280. publisher = {Springer-Verlag, LNCS 1174},
  281. }
  282. %note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  283. @Article{or-jsac98,
  284. author = {Michael G. Reed and Paul F. Syverson and David
  285. M. Goldschlag},
  286. title = {Anonymous Connections and Onion Routing},
  287. journal = {IEEE Journal on Selected Areas in Communications},
  288. year = 1998,
  289. volume = 16,
  290. number = 4,
  291. pages = {482--494},
  292. month = {May},
  293. }
  294. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  295. @Misc{TLS,
  296. author = {T. Dierks and C. Allen},
  297. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  298. howpublished = {IETF RFC 2246},
  299. month = {January},
  300. year = {1999},
  301. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  302. }
  303. @Misc{SMTP,
  304. author = {J. Postel},
  305. title = {Simple {M}ail {T}ransfer {P}rotocol},
  306. howpublished = {IETF RFC 2821 (also STD0010)},
  307. month = {April},
  308. year = {2001},
  309. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  310. }
  311. @Misc{IMAP,
  312. author = {M. Crispin},
  313. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  314. howpublished = {IETF RFC 2060},
  315. month = {December},
  316. year = {1996},
  317. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  318. }
  319. @misc{pipenet,
  320. title = {PipeNet 1.1},
  321. author = {Wei Dai},
  322. year = 1996,
  323. month = {August},
  324. howpublished = {Usenet post},
  325. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  326. in a post to the cypherpunks list, Feb.\ 1995.},
  327. }
  328. @Misc{POP3,
  329. author = {J. Myers and M. Rose},
  330. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  331. howpublished = {IETF RFC 1939 (also STD0053)},
  332. month = {May},
  333. year = {1996},
  334. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  335. }
  336. @InProceedings{shuffle,
  337. author = {C. Andrew Neff},
  338. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  339. booktitle = {8th ACM Conference on Computer and Communications
  340. Security (CCS-8)},
  341. pages = {116--125},
  342. year = 2001,
  343. editor = {P. Samarati},
  344. month = {November},
  345. publisher = {ACM Press},
  346. }
  347. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  348. % technicaldocs/shuffle.pdf}},
  349. @InProceedings{dolev91,
  350. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  351. title = {Non-Malleable Cryptography},
  352. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  353. pages = {542--552},
  354. year = 1991,
  355. note = {Updated version at
  356. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  357. }
  358. @TechReport{rsw96,
  359. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  360. title = {Time-lock puzzles and timed-release Crypto},
  361. year = 1996,
  362. type = {MIT LCS technical memo},
  363. number = {MIT/LCS/TR-684},
  364. month = {February},
  365. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  366. }
  367. @InProceedings{web-mix,
  368. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  369. title = {Web {MIX}es: A system for anonymous and unobservable
  370. {I}nternet access},
  371. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  372. on Design Issue in Anonymity and Unobservability},
  373. editor = {H. Federrath},
  374. publisher = {Springer-Verlag, LNCS 2009},
  375. pages = {115--129},
  376. year = {2000},
  377. }
  378. @InProceedings{disad-free-routes,
  379. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  380. title = {The disadvantages of free {MIX} routes and how to overcome
  381. them},
  382. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  383. on Design Issue in Anonymity and Unobservability},
  384. pages = {30--45},
  385. year = 2000,
  386. editor = {H. Federrath},
  387. publisher = {Springer-Verlag, LNCS 2009},
  388. }
  389. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  390. % disadvantages_berthold.pdf}},
  391. @InProceedings{boneh00,
  392. author = {Dan Boneh and Moni Naor},
  393. title = {Timed Commitments},
  394. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  395. pages = {236--254},
  396. year = 2000,
  397. publisher = {Springer-Verlag, LNCS 1880},
  398. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  399. }
  400. @InProceedings{goldschlag98,
  401. author = {David M. Goldschlag and Stuart G. Stubblebine},
  402. title = {Publicly Verifiable Lotteries: Applications of
  403. Delaying Functions},
  404. booktitle = {Financial Cryptography},
  405. pages = {214--226},
  406. year = 1998,
  407. publisher = {Springer-Verlag, LNCS 1465},
  408. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  409. }
  410. @InProceedings{syverson98,
  411. author = {Paul Syverson},
  412. title = {Weakly Secret Bit Commitment: Applications to
  413. Lotteries and Fair Exchange},
  414. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  415. pages = {2--13},
  416. year = 1998,
  417. address = {Rockport Massachusetts},
  418. month = {June},
  419. publisher = {IEEE CS Press},
  420. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  421. }
  422. @Misc{shoup-iso,
  423. author = {Victor Shoup},
  424. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  425. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  426. }
  427. @Misc{shoup-oaep,
  428. author = {Victor Shoup},
  429. title = {{OAEP} Reconsidered},
  430. howpublished = {{IACR} e-print 2000/060},
  431. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  432. }
  433. @Misc{oaep-still-alive,
  434. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  435. title = {{RSA}-{OAEP} is Still Alive!},
  436. howpublished = {{IACR} e-print 2000/061},
  437. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  438. }
  439. @misc{echolot,
  440. author = {Peter Palfrader},
  441. title = {Echolot: a pinger for anonymous remailers},
  442. note = {\url{http://www.palfrader.org/echolot/}},
  443. }
  444. @Misc{mixmaster-attacks,
  445. author = {Lance Cottrell},
  446. title = {Mixmaster and Remailer Attacks},
  447. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  448. }
  449. @Misc{mixmaster-spec,
  450. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  451. Palfrader and Len Sassaman},
  452. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  453. year = {2003},
  454. month = {July},
  455. howpublished = {Draft},
  456. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  457. }
  458. @Misc{hashcash,
  459. author = {Adam Back},
  460. title = {Hash cash},
  461. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  462. }
  463. @InProceedings{oreilly-acc,
  464. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  465. title = {Accountability},
  466. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  467. Technology},
  468. year = {2001},
  469. publisher = {O'Reilly and Associates},
  470. }
  471. @InProceedings{han,
  472. author = {Yongfei Han},
  473. title = {Investigation of non-repudiation protocols},
  474. booktitle = {ACISP '96},
  475. year = 1996,
  476. publisher = {Springer-Verlag},
  477. }
  478. @Misc{socks5,
  479. key = {socks5},
  480. title = {{SOCKS} {P}rotocol {V}ersion 5},
  481. howpublished= {IETF RFC 1928},
  482. month = {March},
  483. year = 1996,
  484. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  485. }
  486. @InProceedings{abe,
  487. author = {Masayuki Abe},
  488. title = {Universally Verifiable {MIX} With Verification Work Independent of
  489. The Number of {MIX} Servers},
  490. booktitle = {{EUROCRYPT} 1998},
  491. year = {1998},
  492. publisher = {Springer-Verlag, LNCS 1403},
  493. }
  494. @InProceedings{desmedt,
  495. author = {Yvo Desmedt and Kaoru Kurosawa},
  496. title = {How To Break a Practical {MIX} and Design a New One},
  497. booktitle = {{EUROCRYPT} 2000},
  498. year = {2000},
  499. publisher = {Springer-Verlag, LNCS 1803},
  500. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  501. }
  502. @InProceedings{mitkuro,
  503. author = {M. Mitomo and K. Kurosawa},
  504. title = {{Attack for Flash MIX}},
  505. booktitle = {{ASIACRYPT} 2000},
  506. year = {2000},
  507. publisher = {Springer-Verlag, LNCS 1976},
  508. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  509. }
  510. @InProceedings{hybrid-mix,
  511. author = {M. Ohkubo and M. Abe},
  512. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  513. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  514. year = {2000},
  515. publisher = {Springer-Verlag, LNCS 1976},
  516. }
  517. @InProceedings{PShuffle,
  518. author = {Jun Furukawa and Kazue Sako},
  519. title = {An Efficient Scheme for Proving a Shuffle},
  520. editor = {Joe Kilian},
  521. booktitle = {CRYPTO 2001},
  522. year = {2001},
  523. publisher = {Springer-Verlag, LNCS 2139},
  524. }
  525. @InProceedings{jakobsson-optimally,
  526. author = "Markus Jakobsson and Ari Juels",
  527. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  528. booktitle = {Principles of Distributed Computing - {PODC} '01},
  529. year = "2001",
  530. publisher = {ACM Press},
  531. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  532. }
  533. @InProceedings{kesdogan,
  534. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  535. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  536. System},
  537. booktitle = {Information Hiding (IH 1998)},
  538. year = {1998},
  539. publisher = {Springer-Verlag, LNCS 1525},
  540. }
  541. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  542. @InProceedings{socks4,
  543. author = {David Koblas and Michelle R. Koblas},
  544. title = {{SOCKS}},
  545. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  546. Symposium)},
  547. pages = {77--83},
  548. year = 1992,
  549. publisher = {USENIX},
  550. }
  551. @InProceedings{flash-mix,
  552. author = {Markus Jakobsson},
  553. title = {Flash {M}ixing},
  554. booktitle = {Principles of Distributed Computing - {PODC} '99},
  555. year = {1999},
  556. publisher = {ACM Press},
  557. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  558. }
  559. @InProceedings{SK,
  560. author = {Joe Kilian and Kazue Sako},
  561. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  562. the Implementation of a Voting Booth},
  563. booktitle = {EUROCRYPT '95},
  564. year = {1995},
  565. publisher = {Springer-Verlag},
  566. }
  567. @InProceedings{OAEP,
  568. author = {M. Bellare and P. Rogaway},
  569. year = {1994},
  570. booktitle = {EUROCRYPT '94},
  571. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  572. {RSA}},
  573. publisher = {Springer-Verlag},
  574. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  575. }
  576. @inproceedings{babel,
  577. title = {Mixing {E}-mail With {B}abel},
  578. author = {Ceki G\"ulc\"u and Gene Tsudik},
  579. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  580. year = 1996,
  581. month = {February},
  582. pages = {2--16},
  583. publisher = {IEEE},
  584. }
  585. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  586. @Misc{rprocess,
  587. author = {RProcess},
  588. title = {Selective Denial of Service Attacks},
  589. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  590. }
  591. @Article{remailer-history,
  592. author = {Sameer Parekh},
  593. title = {Prospects for Remailers},
  594. journal = {First Monday},
  595. volume = {1},
  596. number = {2},
  597. month = {August},
  598. year = {1996},
  599. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  600. }
  601. @Article{chaum-mix,
  602. author = {David Chaum},
  603. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  604. journal = {Communications of the ACM},
  605. year = {1981},
  606. volume = {4},
  607. number = {2},
  608. month = {February},
  609. }
  610. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  611. @InProceedings{nym-alias-net,
  612. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  613. title = {{The Design, Implementation and Operation of an Email
  614. Pseudonym Server}},
  615. booktitle = {$5^{th}$ ACM Conference on Computer and
  616. Communications Security (CCS'98)},
  617. year = 1998,
  618. publisher = {ACM Press},
  619. }
  620. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  621. @InProceedings{tangler,
  622. author = {Marc Waldman and David Mazi\`{e}res},
  623. title = {Tangler: A Censorship-Resistant Publishing System
  624. Based on Document Entanglements},
  625. booktitle = {$8^{th}$ ACM Conference on Computer and
  626. Communications Security (CCS-8)},
  627. pages = {86--135},
  628. year = 2001,
  629. publisher = {ACM Press},
  630. }
  631. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  632. @misc{neochaum,
  633. author = {Tim May},
  634. title = {Payment mixes for anonymity},
  635. howpublished = {E-mail archived at
  636. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  637. }
  638. @misc{helsingius,
  639. author = {J. Helsingius},
  640. title = {{\tt anon.penet.fi} press release},
  641. note = {\newline \url{http://www.penet.fi/press-english.html}},
  642. }
  643. @InProceedings{garay97secure,
  644. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  645. title = {Secure distributed storage and retrieval},
  646. booktitle = {11th International Workshop, WDAG '97},
  647. pages = {275--289},
  648. year = {1997},
  649. publisher = {Springer-Verlag, LNCS 1320},
  650. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  651. }
  652. @InProceedings{PIK,
  653. author = {C. Park and K. Itoh and K. Kurosawa},
  654. title = {Efficient anonymous channel and all/nothing election scheme},
  655. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  656. pages = {248--259},
  657. publisher = {Springer-Verlag, LNCS 765},
  658. }
  659. @Misc{pgpfaq,
  660. key = {PGP},
  661. title = {{PGP} {FAQ}},
  662. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  663. }
  664. @Article{riordan-schneier,
  665. author = {James Riordan and Bruce Schneier},
  666. title = {A Certified E-mail Protocol with No Trusted Third Party},
  667. journal = {13th Annual Computer Security Applications Conference},
  668. month = {December},
  669. year = {1998},
  670. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  671. }
  672. @Article{crowds-tissec,
  673. author = {Michael K. Reiter and Aviel D. Rubin},
  674. title = {Crowds: Anonymity for Web Transactions},
  675. journal = {ACM TISSEC},
  676. year = 1998,
  677. volume = 1,
  678. number = 1,
  679. pages = {66--92},
  680. month = {November},
  681. }
  682. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  683. @Article{crowds-dimacs,
  684. author = {Michael K. Reiter and Aviel D. Rubin},
  685. title = {Crowds: Anonymity for Web Transactions},
  686. journal = {{DIMACS} Technical Report (Revised)},
  687. volume = {97},
  688. number = {15},
  689. month = {August},
  690. year = {1997},
  691. }
  692. @Misc{advogato,
  693. author = {Raph Levien},
  694. title = {Advogato's Trust Metric},
  695. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  696. }
  697. @InProceedings{publius,
  698. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  699. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  700. source-anonymous web publishing system},
  701. booktitle = {Proc. 9th USENIX Security Symposium},
  702. pages = {59--72},
  703. year = {2000},
  704. month = {August},
  705. }
  706. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  707. @Misc{freedom-nyms,
  708. author = {Russell Samuels},
  709. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  710. year = {1999},
  711. month = {November},
  712. day = {21},
  713. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  714. }
  715. @techreport{freedom2-arch,
  716. title = {Freedom Systems 2.0 Architecture},
  717. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  718. institution = {Zero Knowledge Systems, {Inc.}},
  719. year = {2000},
  720. month = {December},
  721. type = {White Paper},
  722. day = {18},
  723. }
  724. @techreport{freedom21-security,
  725. title = {Freedom Systems 2.1 Security Issues and Analysis},
  726. author = {Adam Back and Ian Goldberg and Adam Shostack},
  727. institution = {Zero Knowledge Systems, {Inc.}},
  728. year = {2001},
  729. month = {May},
  730. type = {White Paper},
  731. }
  732. @inproceedings{cfs:sosp01,
  733. title = {Wide-area cooperative storage with {CFS}},
  734. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  735. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  736. year = {2001},
  737. month = {October},
  738. address = {Chateau Lake Louise, Banff, Canada},
  739. }
  740. @inproceedings{SS03,
  741. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  742. author = {Andrei Serjantov and Peter Sewell},
  743. booktitle = {Computer Security -- ESORICS 2003},
  744. publisher = {Springer-Verlag, LNCS (forthcoming)},
  745. year = {2003},
  746. month = {October},
  747. }
  748. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  749. @Misc{pk-relations,
  750. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  751. title = {Relations Among Notions of Security for Public-Key Encryption
  752. Schemes},
  753. howpublished = {
  754. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  755. Springer-Verlag, 1998.
  756. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  757. }
  758. @InProceedings{mix-acc,
  759. author = {Roger Dingledine and Michael J. Freedman and David
  760. Hopwood and David Molnar},
  761. title = {{A Reputation System to Increase MIX-net
  762. Reliability}},
  763. booktitle = {Information Hiding (IH 2001)},
  764. pages = {126--141},
  765. year = 2001,
  766. editor = {Ira S. Moskowitz},
  767. publisher = {Springer-Verlag, LNCS 2137},
  768. }
  769. %note = {\url{http://www.freehaven.net/papers.html}},
  770. @InProceedings{casc-rep,
  771. author = {Roger Dingledine and Paul Syverson},
  772. title = {{Reliable MIX Cascade Networks through Reputation}},
  773. booktitle = {Financial Cryptography},
  774. year = 2002,
  775. editor = {Matt Blaze},
  776. publisher = {Springer-Verlag, LNCS 2357},
  777. }
  778. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  779. @InProceedings{zhou96certified,
  780. author = {Zhou and Gollmann},
  781. title = {Certified Electronic Mail},
  782. booktitle = {{ESORICS: European Symposium on Research in Computer
  783. Security}},
  784. publisher = {Springer-Verlag, LNCS 1146},
  785. year = {1996},
  786. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  787. }
  788. @Misc{realtime-mix,
  789. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  790. Birgit Pfitzmann and Michael Waidner},
  791. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  792. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  793. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  794. }
  795. @InProceedings{danezis-pets03,
  796. author = {George Danezis},
  797. title = {Mix-networks with Restricted Routes},
  798. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  799. year = 2003,
  800. editor = {Roger Dingledine},
  801. publisher = {Springer-Verlag LNCS 2760}
  802. }
  803. @InProceedings{gap-pets03,
  804. author = {Krista Bennett and Christian Grothoff},
  805. title = {{GAP} -- practical anonymous networking},
  806. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  807. year = 2003,
  808. editor = {Roger Dingledine},
  809. publisher = {Springer-Verlag LNCS 2760}
  810. }
  811. @Article{hordes-jcs,
  812. author = {Brian Neal Levine and Clay Shields},
  813. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  814. journal = {Journal of Computer Security},
  815. year = 2002,
  816. volume = 10,
  817. number = 3,
  818. pages = {213--240}
  819. }
  820. @TechReport{herbivore,
  821. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  822. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  823. institution = {Cornell University Computing and Information Science},
  824. year = 2003,
  825. type = {Technical Report},
  826. number = {TR2003-1890},
  827. month = {February}
  828. }
  829. @InProceedings{p5,
  830. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  831. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  832. booktitle = {2002 IEEE Symposium on Security and Privacy},
  833. pages = {58--70},
  834. year = 2002,
  835. publisher = {IEEE CS}
  836. }
  837. @phdthesis{ian-thesis,
  838. title = {A Pseudonymous Communications Infrastructure for the Internet},
  839. author = {Ian Goldberg},
  840. school = {UC Berkeley},
  841. year = {2000},
  842. month = {December},
  843. }
  844. @Article{taz,
  845. author = {Ian Goldberg and David Wagner},
  846. title = {TAZ Servers and the Rewebber Network: Enabling
  847. Anonymous Publishing on the World Wide Web},
  848. journal = {First Monday},
  849. year = 1998,
  850. volume = 3,
  851. number = 4,
  852. month = {August},
  853. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  854. }
  855. @Misc{tcp-over-tcp-is-bad,
  856. key = {tcp-over-tcp-is-bad},
  857. title = {Why TCP Over TCP Is A Bad Idea},
  858. author = {Olaf Titz},
  859. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  860. }
  861. @inproceedings{wright02,
  862. title = {An Analysis of the Degradation of Anonymous Protocols},
  863. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  864. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  865. year = {2002},
  866. month = {February},
  867. publisher = {IEEE},
  868. }
  869. @inproceedings{wright03,
  870. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  871. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  872. booktitle = {IEEE Symposium on Security and Privacy},
  873. pages= {28--41},
  874. year = {2003},
  875. month = {May},
  876. publisher = {IEEE CS},
  877. }
  878. %%% Local Variables:
  879. %%% mode: latex
  880. %%% TeX-master: "tor-design"
  881. %%% End: