tor-design.bib 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930
  1. @Misc{anonymizer,
  2. key = {anonymizer},
  3. title = {The {Anonymizer}},
  4. note = {\url{http://www.anonymizer.com}}
  5. }
  6. @Misc{anonnet,
  7. key = {anonnet},
  8. title = {{AnonNet}},
  9. note = {\url{http://www.authnet.org/anonnet/}}
  10. }
  11. @inproceedings{econymics,
  12. title = {On the Economics of Anonymity},
  13. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  14. booktitle = {Financial Cryptography, FC 2003},
  15. year = {2003},
  16. editor = {Rebecca N. Wright},
  17. publisher = {Springer-Verlag, LNCS 2742},
  18. note = {\url{http://freehaven.net/doc/fc03/econymics.pdf}},
  19. }
  20. @inproceedings{eternity,
  21. title = {The Eternity Service},
  22. author = {Ross Anderson},
  23. booktitle = {Proceedings of Pragocrypt '96},
  24. year = {1996},
  25. note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  26. }
  27. @inproceedings{minion-design,
  28. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  29. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  30. booktitle = {2003 IEEE Symposium on Security and Privacy},
  31. year = {2003},
  32. month = {May},
  33. publisher = {IEEE CS},
  34. pages = {2--15},
  35. note = {\url{http://mixminion.net/minion-design.pdf}},
  36. www_important = {1},
  37. www_section = {Anonymous communication},
  38. }
  39. @inproceedings{ rao-pseudonymity,
  40. author = "Josyula R. Rao and Pankaj Rohatgi",
  41. title = "Can Pseudonymity Really Guarantee Privacy?",
  42. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  43. year = {2000},
  44. month = Aug,
  45. publisher = {USENIX},
  46. pages = "85--96",
  47. note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  48. full_papers/rao/rao.pdf}},
  49. }
  50. @InProceedings{pfitzmann90how,
  51. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  52. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  53. booktitle = {Eurocrypt 89},
  54. publisher = {Springer-Verlag, LNCS 434},
  55. year = {1990},
  56. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  57. }
  58. @Misc{mixminion-spec,
  59. author = {Mixminion},
  60. title = {Type {III} ({M}ixminion) Mix Protocol Specifications},
  61. note = {\newline \url{http://mixminion.net/minion-spec.txt}},
  62. }
  63. @InProceedings{BM:mixencrypt,
  64. author = {M{\"o}ller, Bodo},
  65. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  66. booktitle = {{CT-RSA} 2003},
  67. publisher = {Springer-Verlag, LNCS 2612},
  68. year = 2003,
  69. }
  70. % Would a more recent reference for SPRPs be more useful?
  71. @Article{sprp,
  72. author = {Michael Luby and Charles Rackoff},
  73. title = {How to Construct Pseudorandom Permutations from
  74. Pseudorandom Functions},
  75. journal = {SIAM Journal on Computing},
  76. year = {1988},
  77. volume = {17},
  78. number = {2},
  79. pages = {373--386},
  80. }
  81. @InProceedings{back01,
  82. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  83. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  84. booktitle = {Information Hiding (IH 2001)},
  85. pages = {245--257},
  86. year = 2001,
  87. editor = {Ira S. Moskowitz},
  88. publisher = {Springer-Verlag, LNCS 2137},
  89. note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  90. }
  91. @InProceedings{rackoff93cryptographic,
  92. author = {Charles Rackoff and Daniel R. Simon},
  93. title = {Cryptographic Defense Against Traffic Analysis},
  94. booktitle = {{ACM} Symposium on Theory of Computing},
  95. pages = {672--681},
  96. year = {1993},
  97. note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  98. }
  99. @InProceedings{freehaven-berk,
  100. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  101. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  102. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  103. on Design Issue in Anonymity and Unobservability},
  104. year = {2000},
  105. month = {July},
  106. editor = {H. Federrath},
  107. publisher = {Springer-Verlag, LNCS 2009},
  108. note = {\url{http://freehaven.net/papers.html}},
  109. }
  110. @InProceedings{raymond00,
  111. author = {J. F. Raymond},
  112. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  113. and Open Problems}},
  114. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  115. on Design Issue in Anonymity and Unobservability},
  116. year = 2000,
  117. month = {July},
  118. pages = {10-29},
  119. editor = {H. Federrath},
  120. publisher = {Springer-Verlag, LNCS 2009},
  121. }
  122. @InProceedings{trickle02,
  123. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  124. title = {From a Trickle to a Flood: Active Attacks on Several
  125. Mix Types},
  126. booktitle = {Information Hiding (IH 2002)},
  127. year = {2002},
  128. editor = {Fabien Petitcolas},
  129. publisher = {Springer-Verlag, LNCS 2578},
  130. }
  131. @InProceedings{langos02,
  132. author = {Oliver Berthold and Heinrich Langos},
  133. title = {Dummy Traffic Against Long Term Intersection Attacks},
  134. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  135. year = {2002},
  136. editor = {Roger Dingledine and Paul Syverson},
  137. publisher = {Springer-Verlag, LNCS 2482}
  138. }
  139. @InProceedings{or-discex00,
  140. author = {Paul Syverson and Michael Reed and David Goldschlag},
  141. title = {{O}nion {R}outing Access Configurations},
  142. booktitle = {DARPA Information Survivability Conference and
  143. Exposition (DISCEX 2000)},
  144. year = {2000},
  145. publisher = {IEEE CS Press},
  146. pages = {34--40},
  147. volume = {1},
  148. note = {\newline \url{http://www.onion-router.net/Publications.html}},
  149. }
  150. @Inproceedings{or-pet00,
  151. title = {{Towards an Analysis of Onion Routing Security}},
  152. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  153. Carl Landwehr},
  154. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  155. on Design Issue in Anonymity and Unobservability},
  156. year = 2000,
  157. month = {July},
  158. pages = {96--114},
  159. editor = {H. Federrath},
  160. publisher = {Springer-Verlag, LNCS 2009},
  161. note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  162. }
  163. @Inproceedings{freenet-pets00,
  164. title = {Freenet: A Distributed Anonymous Information Storage
  165. and Retrieval System},
  166. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  167. Theodore W. Hong},
  168. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  169. on Design Issue in Anonymity and Unobservability},
  170. year = 2000,
  171. month = {July},
  172. pages = {46--66},
  173. editor = {H. Federrath},
  174. publisher = {Springer-Verlag, LNCS 2009},
  175. note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  176. }
  177. @InProceedings{or-ih96,
  178. author = {David M. Goldschlag and Michael G. Reed and Paul
  179. F. Syverson},
  180. title = {Hiding Routing Information},
  181. booktitle = {Information Hiding, First International Workshop},
  182. pages = {137--150},
  183. year = 1996,
  184. editor = {R. Anderson},
  185. month = {May},
  186. publisher = {Springer-Verlag, LNCS 1174},
  187. note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  188. }
  189. @Article{or-jsac98,
  190. author = {Michael G. Reed and Paul F. Syverson and David
  191. M. Goldschlag},
  192. title = {Anonymous Connections and Onion Routing},
  193. journal = {IEEE Journal on Selected Areas in Communications},
  194. year = 1998,
  195. volume = 16,
  196. number = 4,
  197. pages = {482--494},
  198. month = {May},
  199. note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  200. }
  201. @Misc{TLS,
  202. author = {T. Dierks and C. Allen},
  203. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  204. howpublished = {IETF RFC 2246},
  205. month = {January},
  206. year = {1999},
  207. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  208. }
  209. @Misc{SMTP,
  210. author = {J. Postel},
  211. title = {Simple {M}ail {T}ransfer {P}rotocol},
  212. howpublished = {IETF RFC 2821 (also STD0010)},
  213. month = {April},
  214. year = {2001},
  215. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  216. }
  217. @Misc{IMAP,
  218. author = {M. Crispin},
  219. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  220. howpublished = {IETF RFC 2060},
  221. month = {December},
  222. year = {1996},
  223. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  224. }
  225. @misc{pipenet,
  226. title = {PipeNet 1.1},
  227. author = {Wei Dai},
  228. year = 1996,
  229. month = {August},
  230. howpublished = {Usenet post},
  231. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  232. in a post to the cypherpunks list, Feb.\ 1995.},
  233. }
  234. @Misc{POP3,
  235. author = {J. Myers and M. Rose},
  236. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  237. howpublished = {IETF RFC 1939 (also STD0053)},
  238. month = {May},
  239. year = {1996},
  240. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  241. }
  242. @InProceedings{shuffle,
  243. author = {C. Andrew Neff},
  244. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  245. booktitle = {8th ACM Conference on Computer and Communications
  246. Security (CCS-8)},
  247. pages = {116--125},
  248. year = 2001,
  249. editor = {P. Samarati},
  250. month = {November},
  251. publisher = {ACM Press},
  252. note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  253. technicaldocs/shuffle.pdf}},
  254. }
  255. @InProceedings{dolev91,
  256. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  257. title = {Non-Malleable Cryptography},
  258. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  259. pages = {542--552},
  260. year = 1991,
  261. note = {Updated version at
  262. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  263. }
  264. @TechReport{rsw96,
  265. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  266. title = {Time-lock puzzles and timed-release Crypto},
  267. year = 1996,
  268. type = {MIT LCS technical memo},
  269. number = {MIT/LCS/TR-684},
  270. month = {February},
  271. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  272. }
  273. @InProceedings{web-mix,
  274. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  275. title = {Web {MIX}es: A system for anonymous and unobservable
  276. {I}nternet access},
  277. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  278. on Design Issue in Anonymity and Unobservability},
  279. editor = {H. Federrath},
  280. publisher = {Springer-Verlag, LNCS 2009},
  281. pages = {115--129},
  282. year = 2000,
  283. }
  284. @InProceedings{disad-free-routes,
  285. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  286. title = {The disadvantages of free {MIX} routes and how to overcome
  287. them},
  288. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  289. on Design Issue in Anonymity and Unobservability},
  290. pages = {30--45},
  291. year = 2000,
  292. editor = {H. Federrath},
  293. publisher = {Springer-Verlag, LNCS 2009},
  294. note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  295. disadvantages_berthold.pdf}},
  296. }
  297. @InProceedings{boneh00,
  298. author = {Dan Boneh and Moni Naor},
  299. title = {Timed Commitments},
  300. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  301. pages = {236--254},
  302. year = 2000,
  303. publisher = {Springer-Verlag, LNCS 1880},
  304. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  305. }
  306. @InProceedings{goldschlag98,
  307. author = {David M. Goldschlag and Stuart G. Stubblebine},
  308. title = {Publicly Verifiable Lotteries: Applications of
  309. Delaying Functions},
  310. booktitle = {Financial Cryptography, FC'98},
  311. pages = {214--226},
  312. year = 1998,
  313. publisher = {Springer-Verlag, LNCS 1465},
  314. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  315. }
  316. @InProceedings{syverson98,
  317. author = {Paul Syverson},
  318. title = {Weakly Secret Bit Commitment: Applications to
  319. Lotteries and Fair Exchange},
  320. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  321. pages = {2--13},
  322. year = 1998,
  323. address = {Rockport Massachusetts},
  324. month = {June},
  325. publisher = {IEEE CS Press},
  326. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  327. }
  328. @Misc{shoup-iso,
  329. author = {Victor Shoup},
  330. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  331. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  332. }
  333. @Misc{shoup-oaep,
  334. author = {Victor Shoup},
  335. title = {{OAEP} Reconsidered},
  336. howpublished = {{IACR} e-print 2000/060},
  337. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  338. }
  339. @Misc{oaep-still-alive,
  340. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  341. title = {{RSA}-{OAEP} is Still Alive!},
  342. howpublished = {{IACR} e-print 2000/061},
  343. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  344. }
  345. @misc{echolot,
  346. author = {Peter Palfrader},
  347. title = {Echolot: a pinger for anonymous remailers},
  348. note = {\url{http://www.palfrader.org/echolot/}},
  349. }
  350. @Misc{mixmaster-attacks,
  351. author = {Lance Cottrell},
  352. title = {Mixmaster and Remailer Attacks},
  353. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  354. }
  355. @Misc{mixmaster-spec,
  356. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  357. Palfrader and Len Sassaman},
  358. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  359. year = {2003},
  360. month = {July},
  361. howpublished = {Draft},
  362. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  363. }
  364. @Article{mitzenm-loss,
  365. author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
  366. title = {Computational Complexity of Loss Networks},
  367. journal = {Theoretical Computer Science},
  368. year = {1994},
  369. volume = {125},
  370. pages = {45-59},
  371. note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
  372. }
  373. @Misc{hashcash,
  374. author = {Adam Back},
  375. title = {Hash cash},
  376. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  377. }
  378. @InProceedings{oreilly-acc,
  379. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  380. title = {Accountability},
  381. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  382. Technology},
  383. year = {2001},
  384. publisher = {O'Reilly and Associates},
  385. }
  386. @InProceedings{han,
  387. author = {Yongfei Han},
  388. title = {Investigation of non-repudiation protocols},
  389. booktitle = {ACISP '96},
  390. year = 1996,
  391. publisher = {Springer-Verlag},
  392. }
  393. @Misc{socks5,
  394. key = {socks5},
  395. title = {{SOCKS} {P}rotocol {V}ersion 5},
  396. howpublished= {IETF RFC 1928},
  397. month = {March},
  398. year = 1996,
  399. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  400. }
  401. @InProceedings{abe,
  402. author = {Masayuki Abe},
  403. title = {Universally Verifiable {MIX} With Verification Work Independent of
  404. The Number of {MIX} Servers},
  405. booktitle = {{EUROCRYPT} 1998},
  406. year = {1998},
  407. publisher = {Springer-Verlag, LNCS 1403},
  408. }
  409. @InProceedings{desmedt,
  410. author = {Yvo Desmedt and Kaoru Kurosawa},
  411. title = {How To Break a Practical {MIX} and Design a New One},
  412. booktitle = {{EUROCRYPT} 2000},
  413. year = {2000},
  414. publisher = {Springer-Verlag, LNCS 1803},
  415. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  416. }
  417. @InProceedings{mitkuro,
  418. author = {M. Mitomo and K. Kurosawa},
  419. title = {{Attack for Flash MIX}},
  420. booktitle = {{ASIACRYPT} 2000},
  421. year = {2000},
  422. publisher = {Springer-Verlag, LNCS 1976},
  423. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  424. }
  425. @InProceedings{hybrid-mix,
  426. author = {M. Ohkubo and M. Abe},
  427. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  428. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  429. year = {2000},
  430. publisher = {Springer-Verlag, LNCS 1976},
  431. }
  432. @InProceedings{PShuffle,
  433. author = {Jun Furukawa and Kazue Sako},
  434. title = {An Efficient Scheme for Proving a Shuffle},
  435. editor = {Joe Kilian},
  436. booktitle = {CRYPTO 2001},
  437. year = {2001},
  438. publisher = {Springer-Verlag, LNCS 2139},
  439. }
  440. @InProceedings{jakobsson-optimally,
  441. author = "Markus Jakobsson and Ari Juels",
  442. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  443. booktitle = {Principles of Distributed Computing - {PODC} '01},
  444. year = "2001",
  445. publisher = {ACM Press},
  446. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  447. }
  448. @InProceedings{kesdogan,
  449. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  450. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  451. System},
  452. booktitle = {Information Hiding (IH 1998)},
  453. year = {1998},
  454. publisher = {Springer-Verlag, LNCS 1525},
  455. note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  456. }
  457. @InProceedings{socks4,
  458. author = {David Koblas and Michelle R. Koblas},
  459. title = {{SOCKS}},
  460. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  461. Symposium)},
  462. pages = {77--83},
  463. year = 1992,
  464. publisher = {USENIX},
  465. }
  466. @InProceedings{flash-mix,
  467. author = {Markus Jakobsson},
  468. title = {Flash {M}ixing},
  469. booktitle = {Principles of Distributed Computing - {PODC} '99},
  470. year = {1999},
  471. publisher = {ACM Press},
  472. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  473. }
  474. @InProceedings{SK,
  475. author = {Joe Kilian and Kazue Sako},
  476. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  477. the Implementation of a Voting Booth},
  478. booktitle = {EUROCRYPT '95},
  479. year = {1995},
  480. publisher = {Springer-Verlag},
  481. }
  482. @InProceedings{OAEP,
  483. author = {M. Bellare and P. Rogaway},
  484. year = {1994},
  485. booktitle = {EUROCRYPT '94},
  486. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  487. {RSA}},
  488. publisher = {Springer-Verlag},
  489. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  490. }
  491. @inproceedings{babel,
  492. title = {Mixing {E}-mail With {B}abel},
  493. author = {Ceki G\"ulc\"u and Gene Tsudik},
  494. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
  495. year = 1996,
  496. month = {February},
  497. pages = {2--16},
  498. publisher = {IEEE},
  499. www_important = 1,
  500. note = {\url{http://citeseer.nj.nec.com/2254.html}},
  501. www_section = {Anonymous communication},
  502. }
  503. @InProceedings{freenet,
  504. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
  505. title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval
  506. System},
  507. booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
  508. pages = {46--66},
  509. year = {2000},
  510. note = {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  511. }
  512. @Misc{rprocess,
  513. author = {RProcess},
  514. title = {Selective Denial of Service Attacks},
  515. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  516. }
  517. @Article{remailer-history,
  518. author = {Sameer Parekh},
  519. title = {Prospects for Remailers},
  520. journal = {First Monday},
  521. volume = {1},
  522. number = {2},
  523. month = {August},
  524. year = {1996},
  525. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  526. }
  527. @Article{chaum-mix,
  528. author = {David Chaum},
  529. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  530. journal = {Communications of the ACM},
  531. year = {1981},
  532. volume = {4},
  533. number = {2},
  534. month = {February},
  535. note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  536. }
  537. @InProceedings{nym-alias-net,
  538. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  539. title = {{The Design, Implementation and Operation of an Email
  540. Pseudonym Server}},
  541. booktitle = {$5^{th}$ ACM Conference on Computer and
  542. Communications Security (CCS'98)},
  543. year = 1998,
  544. publisher = {ACM Press},
  545. note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  546. }
  547. @InProceedings{tangler,
  548. author = {Marc Waldman and David Mazi\`{e}res},
  549. title = {Tanger: A Censorship-Resistant Publishing System
  550. Based on Document Entanglements},
  551. booktitle = {$8^{th}$ ACM Conference on Computer and
  552. Communications Security (CCS-8)},
  553. pages = {86--135},
  554. year = 2001,
  555. publisher = {ACM Press},
  556. note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  557. }
  558. @misc{neochaum,
  559. author = {Tim May},
  560. title = {Payment mixes for anonymity},
  561. howpublished = {E-mail archived at
  562. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  563. }
  564. @misc{helsingius,
  565. author = {J. Helsingius},
  566. title = {{\tt anon.penet.fi} press release},
  567. note = {\newline \url{http://www.penet.fi/press-english.html}},
  568. }
  569. @InProceedings{garay97secure,
  570. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  571. title = {Secure distributed storage and retrieval},
  572. booktitle = {11th International Workshop, WDAG '97},
  573. pages = {275--289},
  574. year = {1997},
  575. publisher = {Springer-Verlag, LNCS 1320},
  576. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  577. }
  578. @InProceedings{PIK,
  579. author = {C. Park and K. Itoh and K. Kurosawa},
  580. title = {Efficient anonymous channel and all/nothing election scheme},
  581. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  582. pages = {248--259},
  583. publisher = {Springer-Verlag, LNCS 765},
  584. }
  585. @Misc{pgpfaq,
  586. key = {PGP},
  587. title = {{PGP} {FAQ}},
  588. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  589. }
  590. @Article{riordan-schneier,
  591. author = {James Riordan and Bruce Schneier},
  592. title = {A Certified E-mail Protocol with No Trusted Third Party},
  593. journal = {13th Annual Computer Security Applications Conference},
  594. month = {December},
  595. year = {1998},
  596. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  597. }
  598. @Article{crowds-tissec,
  599. author = {Michael K. Reiter and Aviel D. Rubin},
  600. title = {Crowds: Anonymity for Web Transactions},
  601. journal = {ACM TISSEC},
  602. year = 1998,
  603. volume = 1,
  604. number = 1,
  605. pages = {66--92},
  606. month = {November},
  607. note = {\url{http://citeseer.nj.nec.com/284739.html}}
  608. }
  609. @Article{crowds-dimacs,
  610. author = {Michael K. Reiter and Aviel D. Rubin},
  611. title = {Crowds: Anonymity for Web Transactions},
  612. journal = {{DIMACS} Technical Report (Revised)},
  613. volume = {97},
  614. number = {15},
  615. month = {August},
  616. year = {1997},
  617. }
  618. @Misc{advogato,
  619. author = {Raph Levien},
  620. title = {Advogato's Trust Metric},
  621. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  622. }
  623. @InProceedings{publius,
  624. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  625. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  626. source-anonymous web publishing system},
  627. booktitle = {Proc. 9th USENIX Security Symposium},
  628. pages = {59--72},
  629. year = {2000},
  630. month = {August},
  631. note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  632. }
  633. @Misc{freedom-nyms,
  634. author = {Russell Samuels},
  635. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  636. year = {1999},
  637. month = {November},
  638. day = {21},
  639. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  640. }
  641. @techreport{freedom21-security,
  642. title = {Freedom Systems 2.1 Security Issues and Analysis},
  643. author = {Adam Back and Ian Goldberg and Adam Shostack},
  644. institution = {Zero Knowledge Systems, {Inc.}},
  645. year = {2001},
  646. month = {May},
  647. type = {White Paper},
  648. }
  649. @inproceedings{cfs:sosp01,
  650. title = {Wide-area cooperative storage with {CFS}},
  651. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  652. booktitle = {Proceedings of the 18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  653. year = {2001},
  654. month = {October},
  655. address = {Chateau Lake Louise, Banff, Canada},
  656. }
  657. @inproceedings{SS03,
  658. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  659. author = {Andrei Serjantov and Peter Sewell},
  660. booktitle = {Computer Security -- ESORICS 2003},
  661. publisher = {Springer-Verlag, LNCS (forthcoming)},
  662. year = {2003},
  663. month = {October},
  664. note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  665. }
  666. @Article{raghavan87randomized,
  667. author = {P. Raghavan and C. Thompson},
  668. title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
  669. journal = {Combinatorica},
  670. volume = {7},
  671. pages = {365--374},
  672. year = {1987},
  673. }
  674. @InProceedings{leighton91fast,
  675. author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
  676. Clifford Stein and Eva Tardos and Spyros Tragoudas},
  677. title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
  678. booktitle = {{ACM} Symposium on Theory of Computing},
  679. pages = {101-111},
  680. year = {1991},
  681. note = {\newline \url{http://citeseer.nj.nec.com/91073.html}},
  682. }
  683. @Misc{pk-relations,
  684. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  685. title = {Relations Among Notions of Security for Public-Key Encryption
  686. Schemes},
  687. howpublished = {
  688. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  689. Springer-Verlag, 1998.
  690. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  691. }
  692. @InProceedings{mix-acc,
  693. author = {Roger Dingledine and Michael J. Freedman and David
  694. Hopwood and David Molnar},
  695. title = {{A Reputation System to Increase MIX-net
  696. Reliability}},
  697. booktitle = {Information Hiding (IH 2001)},
  698. pages = {126--141},
  699. year = 2001,
  700. editor = {Ira S. Moskowitz},
  701. publisher = {Springer-Verlag, LNCS 2137},
  702. note = {\url{http://www.freehaven.net/papers.html}},
  703. }
  704. @InProceedings{casc-rep,
  705. author = {Roger Dingledine and Paul Syverson},
  706. title = {{Reliable MIX Cascade Networks through Reputation}},
  707. booktitle = {Financial Cryptography (FC '02)},
  708. year = 2002,
  709. editor = {Matt Blaze},
  710. publisher = {Springer-Verlag, LNCS 2357},
  711. note = {\newline \url{http://www.freehaven.net/papers.html}},
  712. }
  713. @InProceedings{zhou96certified,
  714. author = {Zhou and Gollmann},
  715. title = {Certified Electronic Mail},
  716. booktitle = {{ESORICS: European Symposium on Research in Computer
  717. Security}},
  718. publisher = {Springer-Verlag, LNCS 1146},
  719. year = {1996},
  720. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  721. }
  722. @Misc{realtime-mix,
  723. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  724. Birgit Pfitzmann and Michael Waidner},
  725. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  726. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  727. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  728. }
  729. @InProceedings{BEAR-LIONESS,
  730. author = {Ross Anderson and Eli Biham},
  731. title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
  732. booktitle = {International Workshop on Fast Software Encryption},
  733. year = {1996},
  734. publisher = {Springer-Verlag},
  735. note = {\url{http://citeseer.nj.nec.com/anderson96two.html}},
  736. }
  737. @Misc{SPC,
  738. author = {Daniel Bleichenbacher and Anand Desai},
  739. title = {A Construction of a Super-Pseudorandom Cipher},
  740. howpublished = {Manuscript},
  741. }
  742. @InProceedings{danezis-pets03,
  743. author = {George Danezis},
  744. title = {Mix-networks with Restricted Routes},
  745. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  746. year = 2003,
  747. editor = {Roger Dingledine},
  748. publisher = {Springer-Verlag LNCS 2760}
  749. }
  750. @InProceedings{gap-pets03,
  751. author = {Krista Bennett and Christian Grothoff},
  752. title = {{GAP} -- practical anonymous networking},
  753. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  754. year = 2003,
  755. editor = {Roger Dingledine},
  756. publisher = {Springer-Verlag LNCS 2760}
  757. }
  758. @Article{hordes-jcs,
  759. author = {Brian Neal Levine and Clay Shields},
  760. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  761. journal = {Journal of Computer Security},
  762. year = 2002,
  763. volume = 10,
  764. number = 3,
  765. pages = {213--240}
  766. }
  767. @TechReport{herbivore,
  768. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  769. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  770. institution = {Cornell University Computing and Information Science},
  771. year = 2003,
  772. type = {Technical Report},
  773. number = {TR2003-1890},
  774. month = {February}
  775. }
  776. @InProceedings{p5,
  777. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  778. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  779. booktitle = {2002 IEEE Symposium on Security and Privacy},
  780. pages = {58--70},
  781. year = 2002,
  782. publisher = {IEEE CS}
  783. }
  784. @phdthesis{ian-thesis,
  785. title = {A Pseudonymous Communications Infrastructure for the Internet},
  786. author = {Ian Goldberg},
  787. school = {UC Berkeley},
  788. year = {2000},
  789. month = {December},
  790. }
  791. @Article{taz,
  792. author = {Ian Goldberg and David Wagner},
  793. title = {TAZ Servers and the Rewebber Network: Enabling
  794. Anonymous Publishing on the World Wide Web},
  795. journal = {First Monday},
  796. year = 1998,
  797. volume = 3,
  798. number = 4,
  799. month = {August},
  800. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  801. }
  802. @inproceedings{wright02,
  803. title = {An Analysis of the Degradation of Anonymous Protocols},
  804. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  805. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
  806. year = {2002},
  807. month = {February},
  808. publisher = {IEEE},
  809. }
  810. @inproceedings{wright03,
  811. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  812. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  813. booktitle = {2003 IEEE Symposium on Security and Privacy},
  814. pages= {28--41}
  815. year = {2003},
  816. month = {May},
  817. publisher = {IEEE CS},
  818. }
  819. %%% Local Variables:
  820. %%% mode: latex
  821. %%% TeX-master: "tor-design"
  822. %%% End: