| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093 | 
% fix me@misc{tannenbaum96,  author = "Andrew Tannenbaum",  title = "Computer Networks",  year = "1996",  publisher = "Prentice Hall, 3rd edition",}@article{ meadows96,    author = "Catherine Meadows",    title = "The {NRL} Protocol Analyzer: An Overview",    journal = "Journal of Logic Programming",    volume = "26",    number = "2",    pages = "113--131",    year = "1996",}@inproceedings{kesdogan:pet2002,  title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an        alternative to the MIX based Approach?},   author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},   booktitle = {Privacy Enhancing Technologies (PET 2002)},  year = {2002},   month = {April},   editor = {Roger Dingledine and Paul Syverson},   publisher = {Springer-Verlag, LNCS 2482}, }@inproceedings{statistical-disclosure,  title = {Statistical Disclosure Attacks},   author = {George Danezis},   booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},   organization = {{IFIP TC11}},   year = {2003},   month = {May},   address = {Athens},   pages = {421--426},   publisher = {Kluwer}, }@inproceedings{limits-open,  title = {Limits of Anonymity in Open Environments},   author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},   booktitle = {Information Hiding Workshop (IH 2002)},   year = {2002},   month = {October},   editor = {Fabien Petitcolas},   publisher = {Springer-Verlag, LNCS 2578}, }@inproceedings{isdn-mixes,  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},   author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},   booktitle = {GI/ITG Conference on Communication in Distributed Systems},   year = {1991},   month = {February},   pages = {451-463}, }@Article{jerichow-jsac98,  author = 	 {Anja Jerichow and Jan M\"{u}ller and Andreas                  Pfitzmann and Birgit Pfitzmann and Michael Waidner},  title = 	 {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},  journal = 	 {IEEE Journal on Selected Areas in Communications},  year = 	 1998,  volume =	 16,  number =	 4,  pages =	 {495--509},  month =	 {May}}@inproceedings{tarzan:ccs02,  title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},   author = {Michael J. Freedman and Robert Morris},   booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications        {S}ecurity ({CCS 2002})},   year = {2002},   month = {November},   address = {Washington, DC}, }@inproceedings{cebolla,  title = {{Cebolla: Pragmatic IP Anonymity}},   author = {Zach Brown},   booktitle = {Ottawa Linux Symposium},   year = {2002},   month = {June}, }@inproceedings{eax,  author = "M. Bellare and P. Rogaway and D. Wagner",  title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},  booktitle = {Fast Software Encryption 2004},  month = {February},  year = {2004},}@misc{darkside,  title = {{The Dark Side of the Web: An Open Proxy's View}},  author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},  note = {\newline \url{http://codeen.cs.princeton.edu/}},}%  note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},@Misc{anonymizer,  key =          {anonymizer},  title =        {The {Anonymizer}},  note =         {\url{http://anonymizer.com/}}}@Misc{privoxy,  key =          {privoxy},  title =        {{Privoxy}},  note =         {\url{http://www.privoxy.org/}}}@inproceedings{anonnet,  title = {{Analysis of an Anonymity Network for Web Browsing}},   author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and        David Hutchison},   booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE        2002)}},   year = {2002},   month = {June},   address = {Pittsburgh, USA}, }%  pages = {49--54}, @inproceedings{econymics,  title = {On the Economics of Anonymity},   author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},   booktitle = {Financial Cryptography},   year = {2003},   editor = {Rebecca N. Wright},   publisher = {Springer-Verlag, LNCS 2742}, }@inproceedings{defensive-dropping,  title = {Timing Analysis in Low-Latency Mix-Based Systems},  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},  booktitle = {Financial Cryptography},  year = {2004},   editor = {Ari Juels},  publisher = {Springer-Verlag, LNCS (forthcoming)}, }@inproceedings{morphmix:fc04,  title = {Practical Anonymity for the Masses with MorphMix},  author = {Marc Rennhard and Bernhard Plattner},  booktitle = {Financial Cryptography},  year = {2004},   editor = {Ari Juels},  publisher = {Springer-Verlag, LNCS (forthcoming)}, }@inproceedings{eternity,  title = {The Eternity Service},   author = {Ross Anderson},   booktitle = {Pragocrypt '96},   year = {1996}, }  %note =  {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}}, @inproceedings{minion-design,  title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},   author = {George Danezis and Roger Dingledine and Nick Mathewson},   booktitle = {2003 IEEE Symposium on Security and Privacy},   year = {2003},   month = {May},  publisher = {IEEE CS},  pages = {2--15}, }  %note = {\url{http://mixminion.net/minion-design.pdf}}, @inproceedings{ rao-pseudonymity,    author = "Josyula R. Rao and Pankaj Rohatgi",    title = "Can Pseudonymity Really Guarantee Privacy?",    booktitle = "Proceedings of the Ninth USENIX Security Symposium",    year = {2000},    month = Aug,    publisher = {USENIX},    pages = "85--96",}    %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/%full_papers/rao/rao.pdf}},@InProceedings{pfitzmann90how,    author = "Birgit Pfitzmann and Andreas Pfitzmann",    title = "How to Break the Direct {RSA}-Implementation of {MIXes}",    booktitle = {Eurocrypt 89},    publisher = {Springer-Verlag, LNCS 434},    year = {1990},    note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},}@Misc{tor-spec,   author =      {Roger Dingledine and Nick Mathewson},   title =       {Tor Protocol Specifications},   note =        {\url{http://freehaven.net/tor/tor-spec.txt}},}@InProceedings{BM:mixencrypt,  author =       {M{\"o}ller, Bodo},  title =        {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},  booktitle =    {{CT-RSA} 2003},  publisher =    {Springer-Verlag, LNCS 2612},  year =         2003,}@InProceedings{back01,  author =       {Adam Back and Ulf M\"oller and Anton Stiglic},  title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},  booktitle =    {Information Hiding (IH 2001)},  pages =        {245--257},  year =         2001,  editor =       {Ira S. Moskowitz},  publisher =    {Springer-Verlag, LNCS 2137},}  %note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},@InProceedings{rackoff93cryptographic,   author =      {Charles Rackoff and Daniel R. Simon},   title =       {Cryptographic Defense Against Traffic Analysis},   booktitle =   {{ACM} Symposium on Theory of Computing},   pages =       {672--681},   year =        {1993},}   %note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},@InProceedings{freehaven-berk,   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},   title =       {The Free Haven Project: Distributed Anonymous Storage Service},   booktitle =   {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   year =        {2000},   month =       {July},   editor =      {H. Federrath},   publisher =   {Springer-Verlag, LNCS 2009},}   %note =        {\url{http://freehaven.net/papers.html}},@InProceedings{raymond00,  author =       {J. F. Raymond},  title =        {{Traffic Analysis: Protocols, Attacks, Design Issues,                  and Open Problems}},   booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},    year =         2000,  month =        {July},  pages =        {10-29},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}@InProceedings{sybil,  author = "John Douceur",  title = {{The Sybil Attack}},  booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",  month = Mar,  year = 2002,}@InProceedings{trickle02,  author =       {Andrei Serjantov and Roger Dingledine and Paul Syverson},  title =        {From a Trickle to a Flood: Active Attacks on Several                  Mix Types},  booktitle =    {Information Hiding (IH 2002)},  year =         {2002},  editor =       {Fabien Petitcolas},  publisher =    {Springer-Verlag, LNCS 2578},}@InProceedings{langos02,  author =      {Oliver Berthold and Heinrich Langos},  title =       {Dummy Traffic Against Long Term Intersection Attacks},  booktitle =    {Privacy Enhancing Technologies (PET 2002)},  year =         {2002},  editor =       {Roger Dingledine and Paul Syverson},  publisher =    {Springer-Verlag, LNCS 2482}}@InProceedings{hintz-pet02,  author = 	 {Andrew Hintz},  title = 	 {Fingerprinting Websites Using Traffic Analysis},  booktitle = 	 {Privacy Enhancing Technologies (PET 2002)},  pages =	 {171--178},  year =	 2002,  editor =	 {Roger Dingledine and Paul Syverson},  publisher =	 {Springer-Verlag, LNCS 2482}}@InProceedings{or-discex00,   author =      {Paul Syverson and Michael Reed and David Goldschlag},   title =       {{O}nion {R}outing Access Configurations},   booktitle =   {DARPA Information Survivability Conference and                  Exposition (DISCEX 2000)},    year =        {2000},   publisher =   {IEEE CS Press},   pages =       {34--40},   volume =      {1},}   %note =        {\newline \url{http://www.onion-router.net/Publications.html}},@Inproceedings{or-pet00,  title =        {{Towards an Analysis of Onion Routing Security}},  author =       {Paul Syverson and Gene Tsudik and Michael Reed and                  Carl Landwehr},   booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},  year =         2000,  month =        {July},  pages =        {96--114},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}  %note =         {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},@Inproceedings{freenet-pets00,  title =        {Freenet: A Distributed Anonymous Information Storage    and Retrieval System},   author =       {Ian Clarke and Oskar Sandberg and Brandon Wiley and    Theodore W. Hong},    booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},  year =         2000,  month =        {July},  pages =        {46--66},  editor =       {H. Federrath},  publisher =    {Springer-Verlag, LNCS 2009},}  %note =         {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},@InProceedings{or-ih96,  author =       {David M. Goldschlag and Michael G. Reed and Paul                  F. Syverson},   title =        {Hiding Routing Information},  booktitle =    {Information Hiding, First International Workshop},  pages =        {137--150},  year =         1996,  editor =       {R. Anderson},  month =        {May},  publisher =    {Springer-Verlag, LNCS 1174},}@InProceedings{federrath-ih96,  author = 	 {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},  title = 	 {{MIXes} in Mobile Communication Systems: Location                  Management with Privacy},   booktitle =    {Information Hiding, First International Workshop},  pages =        {121--135},  year =         1996,  editor =       {R. Anderson},  month =        {May},  publisher =    {Springer-Verlag, LNCS 1174},}@InProceedings{reed-protocols97,  author = 	 {Michael G. Reed and Paul F. Syverson and David                  M. Goldschlag},   title = 	 {Protocols Using Anonymous Connections: Mobile Applications},  booktitle = 	 {Security Protocols: 5th International Workshop},  pages =	 {13--23},  year =	 1997,  editor =	 {Bruce Christianson and Bruno Crispo and Mark Lomas                  and Michael Roe},  month =	 {April},  publisher =	 {Springer-Verlag, LNCS 1361}}@Article{or-jsac98,  author =       {Michael G. Reed and Paul F. Syverson and David                  M. Goldschlag},   title =        {Anonymous Connections and Onion Routing},  journal =      {IEEE Journal on Selected Areas in Communications},  year =         1998,  volume =       16,  number =       4,  pages =        {482--494},  month =        {May},}  %note =         {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}@Misc{TLS,   author =      {T. Dierks and C. Allen},   title =       {The {TLS} {P}rotocol --- {V}ersion 1.0},   howpublished = {IETF RFC 2246},   month =       {January},   year =        {1999},}%note =        {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},@Misc{SMTP,   author =      {J. Postel},   title =       {Simple {M}ail {T}ransfer {P}rotocol},   howpublished = {IETF RFC 2821 (also STD0010)},   month =       {April},   year =        {2001},   note =        {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},}@Misc{IMAP,   author =      {M. Crispin},   title =       {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},   howpublished = {IETF RFC 2060},   month =       {December},   year =        {1996},   note =        {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},}@misc{pipenet,  title = {PipeNet 1.1},   author = {Wei Dai},   year = 1996,   month = {August},   howpublished = {Usenet post},   note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned      in a post to the cypherpunks list, Feb.\ 1995.}, }@Misc{POP3,   author =      {J. Myers and M. Rose},   title =       {Post {O}ffice {P}rotocol --- {V}ersion 3},   howpublished = {IETF RFC 1939 (also STD0053)},   month =       {May},   year =        {1996},   note =        {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},}@InProceedings{shuffle,   author =      {C. Andrew Neff},   title =       {A Verifiable Secret Shuffle and its Application to E-Voting},   booktitle =    {8th ACM Conference on Computer and Communications                  Security (CCS-8)},   pages =       {116--125},   year =        2001,   editor =      {P. Samarati},   month =       {November},   publisher =   {ACM Press},}   %note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/   %                    technicaldocs/shuffle.pdf}},@InProceedings{dolev91,   author =      {Danny Dolev and Cynthia Dwork and Moni Naor},   title =       {Non-Malleable Cryptography},   booktitle =   {23rd ACM Symposium on the Theory of Computing (STOC)},   pages =       {542--552},   year =        1991,   note =        {Updated version at                  \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},}@TechReport{rsw96,   author =      {Ronald L. Rivest and Adi Shamir and David A. Wagner},   title =       {Time-lock puzzles and timed-release Crypto},   year =        1996,   type =        {MIT LCS technical memo},   number =      {MIT/LCS/TR-684},   month =       {February},   note =        {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},}@InProceedings{web-mix,   author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},   title =       {Web {MIX}es: A system for anonymous and unobservable                  {I}nternet access},   booktitle =    {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   editor =       {H. Federrath},   publisher =    {Springer-Verlag, LNCS 2009},   year =        {2000},}%   pages =       {115--129},@InProceedings{disad-free-routes,   author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},   title =       {The disadvantages of free {MIX} routes and how to overcome                  them},    booktitle =   {Designing Privacy Enhancing Technologies: Workshop                  on Design Issue in Anonymity and Unobservability},   pages =       {30--45},   year =        2000,   editor =       {H. Federrath},   publisher =    {Springer-Verlag, LNCS 2009},}   %note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/   %                    disadvantages_berthold.pdf}},@InProceedings{boneh00,   author =      {Dan Boneh and Moni Naor},   title =       {Timed Commitments},   booktitle =   {Advances in Cryptology -- {CRYPTO} 2000},   pages =       {236--254},   year =        2000,   publisher =   {Springer-Verlag, LNCS 1880},   note =        {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},}@InProceedings{goldschlag98,   author =      {David M. Goldschlag and Stuart G. Stubblebine},   title =       {Publicly Verifiable Lotteries: Applications of                  Delaying Functions},   booktitle =   {Financial Cryptography},   pages =       {214--226},   year =        1998,   publisher =   {Springer-Verlag, LNCS 1465},   note =        {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},}@InProceedings{syverson98,   author =      {Paul Syverson},   title =       {Weakly Secret Bit Commitment: Applications to                  Lotteries and Fair Exchange},   booktitle =   {Computer Security Foundations Workshop (CSFW11)},   pages =       {2--13},   year =        1998,   address =     {Rockport Massachusetts},   month =       {June},   publisher =   {IEEE CS Press},   note =        {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},}@Misc{shoup-iso,   author =      {Victor Shoup},   title =       {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},   note =        {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},}@Misc{shoup-oaep,   author =      {Victor Shoup},   title =       {{OAEP} Reconsidered},   howpublished = {{IACR} e-print 2000/060},   note =        {\newline \url{http://eprint.iacr.org/2000/060/}},}@Misc{oaep-still-alive,   author =      {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},   title =       {{RSA}-{OAEP} is Still Alive!},   howpublished = {{IACR} e-print 2000/061},   note =        {\newline \url{http://eprint.iacr.org/2000/061/}},}@misc{echolot,  author = {Peter Palfrader},  title = {Echolot: a pinger for anonymous remailers},  note = {\url{http://www.palfrader.org/echolot/}},}@Misc{mixmaster-attacks,   author =      {Lance Cottrell},   title =       {Mixmaster and Remailer Attacks},   note =        {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},}@Misc{mixmaster-spec,   author =      {Ulf M{\"o}ller and Lance Cottrell and Peter                  Palfrader and Len Sassaman},    title =       {Mixmaster {P}rotocol --- {V}ersion 2},   year =        {2003},   month =       {July},   howpublished = {Draft},   note =        {\url{http://www.abditum.com/mixmaster-spec.txt}},}@InProceedings{puzzles-tls,    author = "Drew Dean and Adam Stubblefield",    title = {{Using Client Puzzles to Protect TLS}},    booktitle = "Proceedings of the 10th USENIX Security Symposium",    year = {2001},    month = Aug,    publisher = {USENIX},}@InProceedings{breadpudding,  author =       {Markus Jakobsson and Ari Juels},  title =        {Proofs of Work and Bread Pudding Protocols},  booktitle =    {Proceedings of the IFIP TC6 and TC11 Joint Working                  Conference on Communications and Multimedia Security                  (CMS '99)},  year =         1999,  month =        {September},  publisher =    {Kluwer}}@Misc{hashcash,   author =      {Adam Back},   title =       {Hash cash},   note =        {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},}@InProceedings{oreilly-acc,   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},   title =       {Accountability},   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive                   Technology},   year =        {2001},   publisher =   {O'Reilly and Associates},}@InProceedings{han,   author =      {Yongfei Han},   title =       {Investigation of non-repudiation protocols},   booktitle =   {ACISP '96},   year =        1996,   publisher =   {Springer-Verlag},}@Misc{socks5,  key =          {socks5},  title =        {{SOCKS} {P}rotocol {V}ersion 5},  howpublished=  {IETF RFC 1928},  month =        {March},  year =         1996,  note =         {\url{http://www.ietf.org/rfc/rfc1928.txt}}}@InProceedings{abe,   author =      {Masayuki Abe},   title =       {Universally Verifiable {MIX} With Verification Work Independent of                  The Number of {MIX} Servers},   booktitle =   {{EUROCRYPT} 1998},   year =        {1998},   publisher =   {Springer-Verlag, LNCS 1403},}@InProceedings{desmedt,   author =      {Yvo Desmedt and Kaoru Kurosawa},   title =       {How To Break a Practical {MIX} and Design a New One},   booktitle =   {{EUROCRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1803},   note =        {\url{http://citeseer.nj.nec.com/447709.html}},}@InProceedings{mitkuro,   author =      {M. Mitomo and K. Kurosawa},   title =       {{Attack for Flash MIX}},   booktitle =   {{ASIACRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1976},   note =        {\newline \url{http://citeseer.nj.nec.com/450148.html}},}@InProceedings{hybrid-mix,   author =      {M. Ohkubo and M. Abe},   title =       {A {L}ength-{I}nvariant {H}ybrid {MIX}},   booktitle =   {Advances in Cryptology - {ASIACRYPT} 2000},   year =        {2000},   publisher =   {Springer-Verlag, LNCS 1976},}@InProceedings{PShuffle,  author = {Jun Furukawa and Kazue Sako},  title = {An Efficient Scheme for Proving a Shuffle},  editor    = {Joe Kilian},  booktitle = {CRYPTO 2001},  year      = {2001},  publisher = {Springer-Verlag, LNCS 2139},}@InProceedings{jakobsson-optimally,  author = "Markus Jakobsson and Ari Juels",  title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",  booktitle =   {Principles of Distributed Computing - {PODC} '01},  year = "2001",  publisher =   {ACM Press},  note = {\url{http://citeseer.nj.nec.com/492015.html}},}@InProceedings{kesdogan,   author =      {D. Kesdogan and M. Egner and T. B\"uschkes},   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open                   System},   booktitle =   {Information Hiding (IH 1998)},   year =        {1998},   publisher =   {Springer-Verlag, LNCS 1525},}   %note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},@InProceedings{socks4,  author =       {David Koblas and Michelle R. Koblas},  title =        {{SOCKS}},  booktitle =    {UNIX Security III Symposium (1992 USENIX Security                  Symposium)},   pages =        {77--83},  year =         1992,  publisher =    {USENIX},}@InProceedings{flash-mix,   author =      {Markus Jakobsson},   title =       {Flash {M}ixing},   booktitle =   {Principles of Distributed Computing - {PODC} '99},   year =        {1999},   publisher =   {ACM Press},   note =        {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},}@InProceedings{SK,   author =      {Joe Kilian and Kazue Sako},   title =       {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to                  the Implementation of a Voting Booth},   booktitle =   {EUROCRYPT '95},   year =        {1995},   publisher =   {Springer-Verlag},}@InProceedings{OAEP,   author =      {M. Bellare and P. Rogaway},   year =        {1994},   booktitle =   {EUROCRYPT '94},   title =       {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With                  {RSA}},   publisher =   {Springer-Verlag},   note =        {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},}@inproceedings{babel,  title = {Mixing {E}-mail With {B}abel},   author = {Ceki G\"ulc\"u and Gene Tsudik},   booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},   year = 1996,   month = {February},   pages = {2--16},   publisher = {IEEE}, }  %note = {\url{http://citeseer.nj.nec.com/2254.html}}, @Misc{rprocess,   author =      {RProcess},   title =       {Selective Denial of Service Attacks},   note =        {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},}@Article{remailer-history,  author = {Sameer Parekh},  title = {Prospects for Remailers},  journal = {First Monday},  volume = {1},  number = {2},  month = {August},  year = {1996},  note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},}@Article{chaum-mix,   author =      {David Chaum},   title =       {Untraceable electronic mail, return addresses, and digital pseudo-nyms},   journal =     {Communications of the ACM},   year =        {1981},   volume =      {4},   number =      {2},   month =       {February},}   %note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},@InProceedings{nym-alias-net,  author =       {David Mazi\`{e}res and M. Frans Kaashoek},   title =        {{The Design, Implementation and Operation of an Email                  Pseudonym Server}},  booktitle =    {$5^{th}$ ACM Conference on Computer and                  Communications Security (CCS'98)},  year =         1998,  publisher =    {ACM Press},}  %note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},@InProceedings{tangler,  author =       {Marc Waldman and David Mazi\`{e}res},  title =        {Tangler: A Censorship-Resistant Publishing System                  Based on Document Entanglements},   booktitle =    {$8^{th}$ ACM Conference on Computer and                  Communications Security (CCS-8)},  pages =        {86--135},  year =         2001,  publisher =    {ACM Press},}  %note =         {\url{http://www.scs.cs.nyu.edu/~dm/}}@misc{neochaum,   author =      {Tim May},   title =       {Payment mixes for anonymity},    howpublished = {E-mail archived at                  \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},}@misc{helsingius,    author =      {J. Helsingius},   title =       {{\tt anon.penet.fi} press release},    note =        {\newline \url{http://www.penet.fi/press-english.html}},}@InProceedings{garay97secure,   author =      {J. Garay and R. Gennaro and C. Jutla and T. Rabin},   title =       {Secure distributed storage and retrieval},   booktitle =   {11th International Workshop, WDAG '97},   pages =       {275--289},   year =        {1997},   publisher =   {Springer-Verlag, LNCS 1320},   note =        {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},}@InProceedings{PIK,   author =      {C. Park and K. Itoh and K. Kurosawa},   title =       {Efficient anonymous channel and all/nothing election scheme},   booktitle =   {Advances in Cryptology -- {EUROCRYPT} '93},   pages =       {248--259},   publisher =   {Springer-Verlag, LNCS 765},}@Misc{pgpfaq,   key =         {PGP},   title =       {{PGP} {FAQ}},   note =        {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},}@Article{riordan-schneier,   author =      {James Riordan and Bruce Schneier},   title =       {A Certified E-mail Protocol with No Trusted Third Party},   journal =     {13th Annual Computer Security Applications Conference},   month =       {December},   year =        {1998},   note =        {\newline \url{http://www.counterpane.com/certified-email.html}},}@Article{crowds-tissec,  author =       {Michael K. Reiter and Aviel D. Rubin},  title =        {Crowds: Anonymity for Web Transactions},  journal =      {ACM TISSEC},  year =         1998,  volume =       1,  number =       1,  pages =        {66--92},  month =        {June},}  %note =         {\url{http://citeseer.nj.nec.com/284739.html}}@Article{crowds-dimacs,   author =      {Michael K. Reiter and Aviel D. Rubin},   title =       {Crowds: Anonymity for Web Transactions},   journal =     {{DIMACS} Technical Report (Revised)},   volume =      {97},   number =      {15},   month =       {August},   year =        {1997},}@Misc{advogato,   author =      {Raph Levien},    title =       {Advogato's Trust Metric},   note =        {\newline \url{http://www.advogato.org/trust-metric.html}},}@InProceedings{publius,   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor},    title =       {Publius: {A} robust, tamper-evident, censorship-resistant and                  source-anonymous web publishing system},   booktitle =   {Proc. 9th USENIX Security Symposium},   pages =       {59--72},   year =        {2000},   month =       {August},}   %note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},@Misc{freedom-nyms,   author =      {Russell Samuels},   title =       {Untraceable Nym Creation on the {F}reedom {N}etwork},   year =        {1999},   month =       {November},   day =         {21},   note =        {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},}@techreport{freedom2-arch,  title = {Freedom Systems 2.0 Architecture},   author = {Philippe Boucher and Adam Shostack and Ian Goldberg},   institution = {Zero Knowledge Systems, {Inc.}},   year = {2000},   month = {December},   type = {White Paper},   day = {18}, }@techreport{freedom21-security,  title = {Freedom Systems 2.1 Security Issues and Analysis},   author = {Adam Back and Ian Goldberg and Adam Shostack},   institution = {Zero Knowledge Systems, {Inc.}},   year = {2001},   month = {May},   type = {White Paper}, }@inproceedings{cfs:sosp01,  title = {Wide-area cooperative storage with {CFS}},  author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},  booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},  year = {2001},  month = {October},  address = {Chateau Lake Louise, Banff, Canada},}@inproceedings{SS03,  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},   author = {Andrei Serjantov and Peter Sewell},   booktitle = {Computer Security -- ESORICS 2003},   publisher =   {Springer-Verlag, LNCS 2808},  year = {2003},   month = {October}, }  %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},@Misc{pk-relations,   author =      {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},   title =       {Relations Among Notions of Security for Public-Key Encryption                  Schemes},   howpublished = {                  Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.                  Springer-Verlag, 1998.                  Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},}@InProceedings{mix-acc,   author =      {Roger Dingledine and Michael J. Freedman and David                  Hopwood and David Molnar},  title =       {{A Reputation System to Increase MIX-net                  Reliability}},  booktitle =   {Information Hiding (IH 2001)},  pages =       {126--141},  year =        2001,  editor =      {Ira S. Moskowitz},  publisher =   {Springer-Verlag, LNCS 2137},}  %note =        {\url{http://www.freehaven.net/papers.html}},@InProceedings{casc-rep,   author =      {Roger Dingledine and Paul Syverson},   title =       {{Reliable MIX Cascade Networks through Reputation}},  booktitle =    {Financial Cryptography},  year =         2002,  editor =       {Matt Blaze},  publisher =    {Springer-Verlag, LNCS 2357},}  %note =        {\newline \url{http://www.freehaven.net/papers.html}},@InProceedings{zhou96certified,   author =      {Zhou and Gollmann},   title =       {Certified Electronic Mail},   booktitle =   {{ESORICS: European Symposium on Research in Computer                  Security}},   publisher =   {Springer-Verlag, LNCS 1146},   year =        {1996},   note =        {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},}@Misc{realtime-mix,   author =      {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and                  Birgit Pfitzmann and Michael Waidner},    title =       {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},   howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},   note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}},}@InProceedings{danezis-pets03,  author =       {George Danezis},  title =        {Mix-networks with Restricted Routes},  booktitle =    {Privacy Enhancing Technologies (PET 2003)},  year =         2003,  editor =       {Roger Dingledine},  publisher =    {Springer-Verlag LNCS 2760}}@InProceedings{gap-pets03,  author =       {Krista Bennett and Christian Grothoff},  title =        {{GAP} -- practical anonymous networking},  booktitle =    {Privacy Enhancing Technologies (PET 2003)},  year =         2003,  editor =       {Roger Dingledine},  publisher =    {Springer-Verlag LNCS 2760}}@Article{hordes-jcs,  author =       {Brian Neal Levine and Clay Shields},  title =        {Hordes: A Multicast-Based Protocol for Anonymity},  journal =      {Journal of Computer Security},  year =         2002,  volume =       10,  number =       3,  pages =        {213--240}}@TechReport{herbivore,  author =       {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},  title =        {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},  institution =  {Cornell University Computing and Information Science},  year =         2003,  type =         {Technical Report},  number =       {TR2003-1890},  month =        {February}}@InProceedings{p5,  author =       {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},  title =        {$P^5$: A Protocol for Scalable Anonymous Communication},  booktitle =    {IEEE Symposium on Security and Privacy},  pages =        {58--70},  year =         2002,  publisher =    {IEEE CS}}@phdthesis{ian-thesis,  title = {A Pseudonymous Communications Infrastructure for the Internet},   author = {Ian Goldberg},   school = {UC Berkeley},   year = {2000},   month = {Dec}, }@Article{taz,  author =       {Ian Goldberg and David Wagner},  title =        {TAZ Servers and the Rewebber Network: Enabling                  Anonymous Publishing on the World Wide Web},  journal =      {First Monday},  year =         1998,  volume =       3,  number =       4,  month =        {August},  note =         {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}}@Misc{tcp-over-tcp-is-bad,  key =          {tcp-over-tcp-is-bad},  title =        {Why {TCP} Over {TCP} Is A Bad Idea},  author =       {Olaf Titz},  note =         {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}}@inproceedings{wright02,  title = {An Analysis of the Degradation of Anonymous Protocols},   author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},   booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},   year = {2002},   month = {February},   publisher = {IEEE}, }@inproceedings{wright03,  title = {Defending Anonymous Communication Against Passive Logging Attacks},   author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},   booktitle = {IEEE Symposium on Security and Privacy},   pages= {28--41},  year = {2003},   month = {May},   publisher = {IEEE CS}, }@Misc{jap-backdoor,  author={{The AN.ON Project}},  howpublished={Press release},  year={2003},  month={September},  title={German Police proceeds against anonymity service},  note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}}@article{shsm03,  title = {Using Caching for Browsing Anonymity},   author = {Anna Shubina and Sean Smith},   journal = {ACM SIGEcom Exchanges},   volume = {4},   number = {2},   year = {2003},   month = {Sept},   www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},   www_section = {Anonymous communication}, }%%% Local Variables: %%% mode: latex%%% TeX-master: "tor-design"%%% End: 
 |