tor-design.bib 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224
  1. % fix me
  2. @misc{tannenbaum96,
  3. author = "Andrew Tannenbaum",
  4. title = "Computer Networks",
  5. year = "1996",
  6. publisher = "Prentice Hall, 3rd edition",
  7. }
  8. @article{ meadows96,
  9. author = "Catherine Meadows",
  10. title = "The {NRL} Protocol Analyzer: An Overview",
  11. journal = "Journal of Logic Programming",
  12. volume = "26",
  13. number = "2",
  14. pages = "113--131",
  15. year = "1996",
  16. }
  17. @inproceedings{kesdogan:pet2002,
  18. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  19. alternative to the MIX based Approach?},
  20. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  21. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  22. year = {2002},
  23. month = {April},
  24. editor = {Roger Dingledine and Paul Syverson},
  25. publisher = {Springer-Verlag, LNCS 2482},
  26. }
  27. @inproceedings{statistical-disclosure,
  28. title = {Statistical Disclosure Attacks},
  29. author = {George Danezis},
  30. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  31. organization = {{IFIP TC11}},
  32. year = {2003},
  33. month = {May},
  34. address = {Athens},
  35. pages = {421--426},
  36. publisher = {Kluwer},
  37. }
  38. @inproceedings{limits-open,
  39. title = {Limits of Anonymity in Open Environments},
  40. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  41. booktitle = {Information Hiding Workshop (IH 2002)},
  42. year = {2002},
  43. month = {October},
  44. editor = {Fabien Petitcolas},
  45. publisher = {Springer-Verlag, LNCS 2578},
  46. }
  47. @inproceedings{isdn-mixes,
  48. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  49. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  50. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  51. year = {1991},
  52. month = {February},
  53. pages = {451-463},
  54. }
  55. @Article{jerichow-jsac98,
  56. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  57. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  58. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  59. journal = {IEEE Journal on Selected Areas in Communications},
  60. year = 1998,
  61. volume = 16,
  62. number = 4,
  63. pages = {495--509},
  64. month = {May}
  65. }
  66. @inproceedings{tarzan:ccs02,
  67. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  68. author = {Michael J. Freedman and Robert Morris},
  69. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  70. {S}ecurity ({CCS 2002})},
  71. year = {2002},
  72. month = {November},
  73. address = {Washington, DC},
  74. }
  75. @inproceedings{cebolla,
  76. title = {{Cebolla: Pragmatic IP Anonymity}},
  77. author = {Zach Brown},
  78. booktitle = {Ottawa Linux Symposium},
  79. year = {2002},
  80. month = {June},
  81. }
  82. @inproceedings{eax,
  83. author = "M. Bellare and P. Rogaway and D. Wagner",
  84. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  85. booktitle = {Fast Software Encryption 2004},
  86. month = {February},
  87. year = {2004},
  88. }
  89. @misc{darkside,
  90. title = {{The Dark Side of the Web: An Open Proxy's View}},
  91. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  92. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  93. }
  94. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  95. @Misc{anonymizer,
  96. key = {anonymizer},
  97. title = {The {Anonymizer}},
  98. note = {\url{http://anonymizer.com/}}
  99. }
  100. @Misc{privoxy,
  101. key = {privoxy},
  102. title = {{Privoxy}},
  103. note = {\url{http://www.privoxy.org/}}
  104. }
  105. @inproceedings{anonnet,
  106. title = {{Analysis of an Anonymity Network for Web Browsing}},
  107. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  108. David Hutchison},
  109. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  110. 2002)}},
  111. year = {2002},
  112. month = {June},
  113. address = {Pittsburgh, USA},
  114. }
  115. % pages = {49--54},
  116. @inproceedings{econymics,
  117. title = {On the Economics of Anonymity},
  118. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  119. booktitle = {Financial Cryptography},
  120. year = {2003},
  121. editor = {Rebecca N. Wright},
  122. publisher = {Springer-Verlag, LNCS 2742},
  123. }
  124. @inproceedings{defensive-dropping,
  125. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  126. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  127. booktitle = {Financial Cryptography},
  128. year = {2004},
  129. editor = {Ari Juels},
  130. publisher = {Springer-Verlag, LNCS (forthcoming)},
  131. }
  132. @inproceedings{morphmix:fc04,
  133. title = {Practical Anonymity for the Masses with MorphMix},
  134. author = {Marc Rennhard and Bernhard Plattner},
  135. booktitle = {Financial Cryptography},
  136. year = {2004},
  137. editor = {Ari Juels},
  138. publisher = {Springer-Verlag, LNCS (forthcoming)},
  139. }
  140. @inproceedings{eternity,
  141. title = {The Eternity Service},
  142. author = {Ross Anderson},
  143. booktitle = {Pragocrypt '96},
  144. year = {1996},
  145. }
  146. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  147. @inproceedings{minion-design,
  148. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  149. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  150. booktitle = {2003 IEEE Symposium on Security and Privacy},
  151. year = {2003},
  152. month = {May},
  153. publisher = {IEEE CS},
  154. pages = {2--15},
  155. }
  156. %note = {\url{http://mixminion.net/minion-design.pdf}},
  157. @inproceedings{ rao-pseudonymity,
  158. author = "Josyula R. Rao and Pankaj Rohatgi",
  159. title = "Can Pseudonymity Really Guarantee Privacy?",
  160. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  161. year = {2000},
  162. month = Aug,
  163. publisher = {USENIX},
  164. pages = "85--96",
  165. }
  166. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  167. %full_papers/rao/rao.pdf}},
  168. @InProceedings{pfitzmann90how,
  169. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  170. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  171. booktitle = {Eurocrypt 89},
  172. publisher = {Springer-Verlag, LNCS 434},
  173. year = {1990},
  174. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  175. }
  176. @Misc{tor-spec,
  177. author = {Roger Dingledine and Nick Mathewson},
  178. title = {Tor Protocol Specifications},
  179. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  180. }
  181. @InProceedings{BM:mixencrypt,
  182. author = {M{\"o}ller, Bodo},
  183. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  184. booktitle = {{CT-RSA} 2003},
  185. publisher = {Springer-Verlag, LNCS 2612},
  186. year = 2003,
  187. }
  188. @InProceedings{back01,
  189. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  190. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  191. booktitle = {Information Hiding (IH 2001)},
  192. pages = {245--257},
  193. year = 2001,
  194. editor = {Ira S. Moskowitz},
  195. publisher = {Springer-Verlag, LNCS 2137},
  196. }
  197. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  198. @InProceedings{rackoff93cryptographic,
  199. author = {Charles Rackoff and Daniel R. Simon},
  200. title = {Cryptographic Defense Against Traffic Analysis},
  201. booktitle = {{ACM} Symposium on Theory of Computing},
  202. pages = {672--681},
  203. year = {1993},
  204. }
  205. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  206. @InProceedings{freehaven-berk,
  207. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  208. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  209. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  210. on Design Issue in Anonymity and Unobservability},
  211. year = 2000,
  212. month = {July},
  213. editor = {H. Federrath},
  214. publisher = {Springer-Verlag, LNCS 2009},
  215. }
  216. @InProceedings{move-ndss05,
  217. author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  218. title = {MOVE: An End-to-End Solution To Network Denial of Service},
  219. booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  220. year = 2005,
  221. month = {February},
  222. publisher = {Internet Society}
  223. }
  224. %note = {\url{http://freehaven.net/papers.html}},
  225. @InProceedings{raymond00,
  226. author = {J. F. Raymond},
  227. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  228. and Open Problems}},
  229. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  230. on Design Issue in Anonymity and Unobservability},
  231. year = 2000,
  232. month = {July},
  233. pages = {10-29},
  234. editor = {H. Federrath},
  235. publisher = {Springer-Verlag, LNCS 2009},
  236. }
  237. @InProceedings{sybil,
  238. author = "John Douceur",
  239. title = {{The Sybil Attack}},
  240. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  241. month = Mar,
  242. year = 2002,
  243. }
  244. @InCollection{price-privacy,
  245. author = {Paul Syverson and Adam Shostack},
  246. editor = {L. Jean Camp and Stephen Lewis},
  247. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  248. booktitle = {Economics of Information Security},
  249. chapter = 10,
  250. publisher = {Kluwer},
  251. year = 2004,
  252. pages = {129--142}
  253. }
  254. @InProceedings{trickle02,
  255. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  256. title = {From a Trickle to a Flood: Active Attacks on Several
  257. Mix Types},
  258. booktitle = {Information Hiding (IH 2002)},
  259. year = {2002},
  260. editor = {Fabien Petitcolas},
  261. publisher = {Springer-Verlag, LNCS 2578},
  262. }
  263. @InProceedings{langos02,
  264. author = {Oliver Berthold and Heinrich Langos},
  265. title = {Dummy Traffic Against Long Term Intersection Attacks},
  266. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  267. year = {2002},
  268. editor = {Roger Dingledine and Paul Syverson},
  269. publisher = {Springer-Verlag, LNCS 2482}
  270. }
  271. @InProceedings{hintz-pet02,
  272. author = {Andrew Hintz},
  273. title = {Fingerprinting Websites Using Traffic Analysis},
  274. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  275. pages = {171--178},
  276. year = 2002,
  277. editor = {Roger Dingledine and Paul Syverson},
  278. publisher = {Springer-Verlag, LNCS 2482}
  279. }
  280. @InProceedings{or-discex00,
  281. author = {Paul Syverson and Michael Reed and David Goldschlag},
  282. title = {{O}nion {R}outing Access Configurations},
  283. booktitle = {DARPA Information Survivability Conference and
  284. Exposition (DISCEX 2000)},
  285. year = {2000},
  286. publisher = {IEEE CS Press},
  287. pages = {34--40},
  288. volume = {1},
  289. }
  290. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  291. @Inproceedings{or-pet00,
  292. title = {{Towards an Analysis of Onion Routing Security}},
  293. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  294. Carl Landwehr},
  295. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  296. on Design Issue in Anonymity and Unobservability},
  297. year = 2000,
  298. month = {July},
  299. pages = {96--114},
  300. editor = {H. Federrath},
  301. publisher = {Springer-Verlag, LNCS 2009},
  302. }
  303. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  304. @Inproceedings{freenet-pets00,
  305. title = {Freenet: A Distributed Anonymous Information Storage
  306. and Retrieval System},
  307. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  308. Theodore W. Hong},
  309. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  310. on Design Issue in Anonymity and Unobservability},
  311. year = 2000,
  312. month = {July},
  313. pages = {46--66},
  314. editor = {H. Federrath},
  315. publisher = {Springer-Verlag, LNCS 2009},
  316. }
  317. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  318. @InProceedings{or-ih96,
  319. author = {David M. Goldschlag and Michael G. Reed and Paul
  320. F. Syverson},
  321. title = {Hiding Routing Information},
  322. booktitle = {Information Hiding, First International Workshop},
  323. pages = {137--150},
  324. year = 1996,
  325. editor = {R. Anderson},
  326. month = {May},
  327. publisher = {Springer-Verlag, LNCS 1174},
  328. }
  329. @InProceedings{federrath-ih96,
  330. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  331. title = {{MIXes} in Mobile Communication Systems: Location
  332. Management with Privacy},
  333. booktitle = {Information Hiding, First International Workshop},
  334. pages = {121--135},
  335. year = 1996,
  336. editor = {R. Anderson},
  337. month = {May},
  338. publisher = {Springer-Verlag, LNCS 1174},
  339. }
  340. @InProceedings{reed-protocols97,
  341. author = {Michael G. Reed and Paul F. Syverson and David
  342. M. Goldschlag},
  343. title = {Protocols Using Anonymous Connections: Mobile Applications},
  344. booktitle = {Security Protocols: 5th International Workshop},
  345. pages = {13--23},
  346. year = 1997,
  347. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  348. and Michael Roe},
  349. month = {April},
  350. publisher = {Springer-Verlag, LNCS 1361}
  351. }
  352. @Article{or-jsac98,
  353. author = {Michael G. Reed and Paul F. Syverson and David
  354. M. Goldschlag},
  355. title = {Anonymous Connections and Onion Routing},
  356. journal = {IEEE Journal on Selected Areas in Communications},
  357. year = 1998,
  358. volume = 16,
  359. number = 4,
  360. pages = {482--494},
  361. month = {May},
  362. }
  363. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  364. @Misc{TLS,
  365. author = {T. Dierks and C. Allen},
  366. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  367. howpublished = {IETF RFC 2246},
  368. month = {January},
  369. year = {1999},
  370. }
  371. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  372. @Misc{SMTP,
  373. author = {J. Postel},
  374. title = {Simple {M}ail {T}ransfer {P}rotocol},
  375. howpublished = {IETF RFC 2821 (also STD0010)},
  376. month = {April},
  377. year = {2001},
  378. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  379. }
  380. @Misc{IMAP,
  381. author = {M. Crispin},
  382. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  383. howpublished = {IETF RFC 2060},
  384. month = {December},
  385. year = {1996},
  386. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  387. }
  388. @misc{pipenet,
  389. title = {PipeNet 1.1},
  390. author = {Wei Dai},
  391. year = 1996,
  392. month = {August},
  393. howpublished = {Usenet post},
  394. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  395. in a post to the cypherpunks list, Feb.\ 1995.},
  396. }
  397. @Misc{POP3,
  398. author = {J. Myers and M. Rose},
  399. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  400. howpublished = {IETF RFC 1939 (also STD0053)},
  401. month = {May},
  402. year = {1996},
  403. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  404. }
  405. @InProceedings{shuffle,
  406. author = {C. Andrew Neff},
  407. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  408. booktitle = {8th ACM Conference on Computer and Communications
  409. Security (CCS-8)},
  410. pages = {116--125},
  411. year = 2001,
  412. editor = {P. Samarati},
  413. month = {November},
  414. publisher = {ACM Press},
  415. }
  416. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  417. % technicaldocs/shuffle.pdf}},
  418. @InProceedings{dolev91,
  419. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  420. title = {Non-Malleable Cryptography},
  421. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  422. pages = {542--552},
  423. year = 1991,
  424. note = {Updated version at
  425. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  426. }
  427. @TechReport{rsw96,
  428. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  429. title = {Time-lock puzzles and timed-release Crypto},
  430. year = 1996,
  431. type = {MIT LCS technical memo},
  432. number = {MIT/LCS/TR-684},
  433. month = {February},
  434. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  435. }
  436. @InProceedings{web-mix,
  437. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  438. title = {Web {MIX}es: A system for anonymous and unobservable
  439. {I}nternet access},
  440. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  441. on Design Issue in Anonymity and Unobservability},
  442. editor = {H. Federrath},
  443. publisher = {Springer-Verlag, LNCS 2009},
  444. year = {2000},
  445. }
  446. % pages = {115--129},
  447. @InProceedings{disad-free-routes,
  448. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  449. title = {The disadvantages of free {MIX} routes and how to overcome
  450. them},
  451. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  452. on Design Issue in Anonymity and Unobservability},
  453. pages = {30--45},
  454. year = 2000,
  455. editor = {H. Federrath},
  456. publisher = {Springer-Verlag, LNCS 2009},
  457. }
  458. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  459. % disadvantages_berthold.pdf}},
  460. @InProceedings{boneh00,
  461. author = {Dan Boneh and Moni Naor},
  462. title = {Timed Commitments},
  463. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  464. pages = {236--254},
  465. year = 2000,
  466. publisher = {Springer-Verlag, LNCS 1880},
  467. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  468. }
  469. @InProceedings{goldschlag98,
  470. author = {David M. Goldschlag and Stuart G. Stubblebine},
  471. title = {Publicly Verifiable Lotteries: Applications of
  472. Delaying Functions},
  473. booktitle = {Financial Cryptography},
  474. pages = {214--226},
  475. year = 1998,
  476. publisher = {Springer-Verlag, LNCS 1465},
  477. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  478. }
  479. @InProceedings{syverson98,
  480. author = {Paul Syverson},
  481. title = {Weakly Secret Bit Commitment: Applications to
  482. Lotteries and Fair Exchange},
  483. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  484. pages = {2--13},
  485. year = 1998,
  486. address = {Rockport Massachusetts},
  487. month = {June},
  488. publisher = {IEEE CS Press},
  489. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  490. }
  491. @Misc{shoup-iso,
  492. author = {Victor Shoup},
  493. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  494. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  495. }
  496. @Misc{shoup-oaep,
  497. author = {Victor Shoup},
  498. title = {{OAEP} Reconsidered},
  499. howpublished = {{IACR} e-print 2000/060},
  500. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  501. }
  502. @Misc{oaep-still-alive,
  503. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  504. title = {{RSA}-{OAEP} is Still Alive!},
  505. howpublished = {{IACR} e-print 2000/061},
  506. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  507. }
  508. @misc{echolot,
  509. author = {Peter Palfrader},
  510. title = {Echolot: a pinger for anonymous remailers},
  511. note = {\url{http://www.palfrader.org/echolot/}},
  512. }
  513. @Misc{mixmaster-attacks,
  514. author = {Lance Cottrell},
  515. title = {Mixmaster and Remailer Attacks},
  516. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  517. }
  518. @Misc{mixmaster-spec,
  519. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  520. Palfrader and Len Sassaman},
  521. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  522. year = {2003},
  523. month = {July},
  524. howpublished = {Draft},
  525. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  526. }
  527. @InProceedings{puzzles-tls,
  528. author = "Drew Dean and Adam Stubblefield",
  529. title = {{Using Client Puzzles to Protect TLS}},
  530. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  531. year = {2001},
  532. month = Aug,
  533. publisher = {USENIX},
  534. }
  535. @InProceedings{breadpudding,
  536. author = {Markus Jakobsson and Ari Juels},
  537. title = {Proofs of Work and Bread Pudding Protocols},
  538. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  539. Conference on Communications and Multimedia Security
  540. (CMS '99)},
  541. year = 1999,
  542. month = {September},
  543. publisher = {Kluwer}
  544. }
  545. @Misc{hashcash,
  546. author = {Adam Back},
  547. title = {Hash cash},
  548. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  549. }
  550. @InProceedings{oreilly-acc,
  551. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  552. title = {Accountability},
  553. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  554. Technology},
  555. year = {2001},
  556. publisher = {O'Reilly and Associates},
  557. }
  558. @InProceedings{han,
  559. author = {Yongfei Han},
  560. title = {Investigation of non-repudiation protocols},
  561. booktitle = {ACISP '96},
  562. year = 1996,
  563. publisher = {Springer-Verlag},
  564. }
  565. @Misc{socks5,
  566. key = {socks5},
  567. title = {{SOCKS} {P}rotocol {V}ersion 5},
  568. howpublished= {IETF RFC 1928},
  569. month = {March},
  570. year = 1996,
  571. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  572. }
  573. @InProceedings{abe,
  574. author = {Masayuki Abe},
  575. title = {Universally Verifiable {MIX} With Verification Work Independent of
  576. The Number of {MIX} Servers},
  577. booktitle = {{EUROCRYPT} 1998},
  578. year = {1998},
  579. publisher = {Springer-Verlag, LNCS 1403},
  580. }
  581. @InProceedings{desmedt,
  582. author = {Yvo Desmedt and Kaoru Kurosawa},
  583. title = {How To Break a Practical {MIX} and Design a New One},
  584. booktitle = {{EUROCRYPT} 2000},
  585. year = {2000},
  586. publisher = {Springer-Verlag, LNCS 1803},
  587. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  588. }
  589. @InProceedings{mitkuro,
  590. author = {M. Mitomo and K. Kurosawa},
  591. title = {{Attack for Flash MIX}},
  592. booktitle = {{ASIACRYPT} 2000},
  593. year = {2000},
  594. publisher = {Springer-Verlag, LNCS 1976},
  595. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  596. }
  597. @InProceedings{hybrid-mix,
  598. author = {M. Ohkubo and M. Abe},
  599. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  600. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  601. year = {2000},
  602. publisher = {Springer-Verlag, LNCS 1976},
  603. }
  604. @InProceedings{PShuffle,
  605. author = {Jun Furukawa and Kazue Sako},
  606. title = {An Efficient Scheme for Proving a Shuffle},
  607. editor = {Joe Kilian},
  608. booktitle = {CRYPTO 2001},
  609. year = {2001},
  610. publisher = {Springer-Verlag, LNCS 2139},
  611. }
  612. @InProceedings{jakobsson-optimally,
  613. author = "Markus Jakobsson and Ari Juels",
  614. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  615. booktitle = {Principles of Distributed Computing - {PODC} '01},
  616. year = "2001",
  617. publisher = {ACM Press},
  618. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  619. }
  620. @InProceedings{kesdogan,
  621. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  622. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  623. System},
  624. booktitle = {Information Hiding (IH 1998)},
  625. year = {1998},
  626. publisher = {Springer-Verlag, LNCS 1525},
  627. }
  628. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  629. @InProceedings{socks4,
  630. author = {David Koblas and Michelle R. Koblas},
  631. title = {{SOCKS}},
  632. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  633. Symposium)},
  634. pages = {77--83},
  635. year = 1992,
  636. publisher = {USENIX},
  637. }
  638. @InProceedings{flash-mix,
  639. author = {Markus Jakobsson},
  640. title = {Flash {M}ixing},
  641. booktitle = {Principles of Distributed Computing - {PODC} '99},
  642. year = {1999},
  643. publisher = {ACM Press},
  644. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  645. }
  646. @InProceedings{SK,
  647. author = {Joe Kilian and Kazue Sako},
  648. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  649. the Implementation of a Voting Booth},
  650. booktitle = {EUROCRYPT '95},
  651. year = {1995},
  652. publisher = {Springer-Verlag},
  653. }
  654. @InProceedings{OAEP,
  655. author = {M. Bellare and P. Rogaway},
  656. year = {1994},
  657. booktitle = {EUROCRYPT '94},
  658. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  659. {RSA}},
  660. publisher = {Springer-Verlag},
  661. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  662. }
  663. @inproceedings{babel,
  664. title = {Mixing {E}-mail With {B}abel},
  665. author = {Ceki G\"ulc\"u and Gene Tsudik},
  666. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  667. year = 1996,
  668. month = {February},
  669. pages = {2--16},
  670. publisher = {IEEE},
  671. }
  672. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  673. @Misc{rprocess,
  674. author = {RProcess},
  675. title = {Selective Denial of Service Attacks},
  676. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  677. }
  678. @Article{remailer-history,
  679. author = {Sameer Parekh},
  680. title = {Prospects for Remailers},
  681. journal = {First Monday},
  682. volume = {1},
  683. number = {2},
  684. month = {August},
  685. year = {1996},
  686. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  687. }
  688. @Article{chaum-mix,
  689. author = {David Chaum},
  690. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  691. journal = {Communications of the ACM},
  692. year = {1981},
  693. volume = {4},
  694. number = {2},
  695. month = {February},
  696. }
  697. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  698. @InProceedings{nym-alias-net,
  699. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  700. title = {{The Design, Implementation and Operation of an Email
  701. Pseudonym Server}},
  702. booktitle = {$5^{th}$ ACM Conference on Computer and
  703. Communications Security (CCS'98)},
  704. year = 1998,
  705. publisher = {ACM Press},
  706. }
  707. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  708. @InProceedings{tangler,
  709. author = {Marc Waldman and David Mazi\`{e}res},
  710. title = {Tangler: A Censorship-Resistant Publishing System
  711. Based on Document Entanglements},
  712. booktitle = {$8^{th}$ ACM Conference on Computer and
  713. Communications Security (CCS-8)},
  714. pages = {86--135},
  715. year = 2001,
  716. publisher = {ACM Press},
  717. }
  718. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  719. @misc{neochaum,
  720. author = {Tim May},
  721. title = {Payment mixes for anonymity},
  722. howpublished = {E-mail archived at
  723. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  724. }
  725. @misc{helsingius,
  726. author = {J. Helsingius},
  727. title = {{\tt anon.penet.fi} press release},
  728. note = {\newline \url{http://www.penet.fi/press-english.html}},
  729. }
  730. @InProceedings{garay97secure,
  731. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  732. title = {Secure distributed storage and retrieval},
  733. booktitle = {11th International Workshop, WDAG '97},
  734. pages = {275--289},
  735. year = {1997},
  736. publisher = {Springer-Verlag, LNCS 1320},
  737. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  738. }
  739. @InProceedings{PIK,
  740. author = {C. Park and K. Itoh and K. Kurosawa},
  741. title = {Efficient anonymous channel and all/nothing election scheme},
  742. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  743. pages = {248--259},
  744. publisher = {Springer-Verlag, LNCS 765},
  745. }
  746. @Misc{pgpfaq,
  747. key = {PGP},
  748. title = {{PGP} {FAQ}},
  749. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  750. }
  751. @Article{riordan-schneier,
  752. author = {James Riordan and Bruce Schneier},
  753. title = {A Certified E-mail Protocol with No Trusted Third Party},
  754. journal = {13th Annual Computer Security Applications Conference},
  755. month = {December},
  756. year = {1998},
  757. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  758. }
  759. @Article{crowds-tissec,
  760. author = {Michael K. Reiter and Aviel D. Rubin},
  761. title = {Crowds: Anonymity for Web Transactions},
  762. journal = {ACM TISSEC},
  763. year = 1998,
  764. volume = 1,
  765. number = 1,
  766. pages = {66--92},
  767. month = {June},
  768. }
  769. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  770. @Article{crowds-dimacs,
  771. author = {Michael K. Reiter and Aviel D. Rubin},
  772. title = {Crowds: Anonymity for Web Transactions},
  773. journal = {{DIMACS} Technical Report (Revised)},
  774. volume = {97},
  775. number = {15},
  776. month = {August},
  777. year = {1997},
  778. }
  779. @Misc{advogato,
  780. author = {Raph Levien},
  781. title = {Advogato's Trust Metric},
  782. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  783. }
  784. @InProceedings{publius,
  785. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  786. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  787. source-anonymous web publishing system},
  788. booktitle = {Proc. 9th USENIX Security Symposium},
  789. pages = {59--72},
  790. year = {2000},
  791. month = {August},
  792. }
  793. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  794. @Misc{freedom-nyms,
  795. author = {Russell Samuels},
  796. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  797. year = {1999},
  798. month = {November},
  799. day = {21},
  800. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  801. }
  802. @techreport{freedom2-arch,
  803. title = {Freedom Systems 2.0 Architecture},
  804. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  805. institution = {Zero Knowledge Systems, {Inc.}},
  806. year = {2000},
  807. month = {December},
  808. type = {White Paper},
  809. day = {18},
  810. }
  811. @techreport{freedom21-security,
  812. title = {Freedom Systems 2.1 Security Issues and Analysis},
  813. author = {Adam Back and Ian Goldberg and Adam Shostack},
  814. institution = {Zero Knowledge Systems, {Inc.}},
  815. year = {2001},
  816. month = {May},
  817. type = {White Paper},
  818. }
  819. @inproceedings{cfs:sosp01,
  820. title = {Wide-area cooperative storage with {CFS}},
  821. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  822. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  823. year = {2001},
  824. month = {October},
  825. address = {Chateau Lake Louise, Banff, Canada},
  826. }
  827. @inproceedings{SS03,
  828. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  829. author = {Andrei Serjantov and Peter Sewell},
  830. booktitle = {Computer Security -- ESORICS 2003},
  831. publisher = {Springer-Verlag, LNCS 2808},
  832. year = {2003},
  833. month = {October},
  834. }
  835. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  836. @Misc{pk-relations,
  837. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  838. title = {Relations Among Notions of Security for Public-Key Encryption
  839. Schemes},
  840. howpublished = {
  841. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  842. Springer-Verlag, 1998.
  843. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  844. }
  845. @InProceedings{mix-acc,
  846. author = {Roger Dingledine and Michael J. Freedman and David
  847. Hopwood and David Molnar},
  848. title = {{A Reputation System to Increase MIX-net
  849. Reliability}},
  850. booktitle = {Information Hiding (IH 2001)},
  851. pages = {126--141},
  852. year = 2001,
  853. editor = {Ira S. Moskowitz},
  854. publisher = {Springer-Verlag, LNCS 2137},
  855. }
  856. %note = {\url{http://www.freehaven.net/papers.html}},
  857. @InProceedings{casc-rep,
  858. author = {Roger Dingledine and Paul Syverson},
  859. title = {{Reliable MIX Cascade Networks through Reputation}},
  860. booktitle = {Financial Cryptography},
  861. year = 2002,
  862. editor = {Matt Blaze},
  863. publisher = {Springer-Verlag, LNCS 2357},
  864. }
  865. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  866. @InProceedings{zhou96certified,
  867. author = {Zhou and Gollmann},
  868. title = {Certified Electronic Mail},
  869. booktitle = {{ESORICS: European Symposium on Research in Computer
  870. Security}},
  871. publisher = {Springer-Verlag, LNCS 1146},
  872. year = {1996},
  873. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  874. }
  875. @Misc{realtime-mix,
  876. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  877. Birgit Pfitzmann and Michael Waidner},
  878. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  879. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  880. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  881. }
  882. @InProceedings{danezis-pets03,
  883. author = {George Danezis},
  884. title = {Mix-networks with Restricted Routes},
  885. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  886. year = 2003,
  887. editor = {Roger Dingledine},
  888. publisher = {Springer-Verlag LNCS 2760}
  889. }
  890. @InProceedings{gap-pets03,
  891. author = {Krista Bennett and Christian Grothoff},
  892. title = {{GAP} -- practical anonymous networking},
  893. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  894. year = 2003,
  895. editor = {Roger Dingledine},
  896. publisher = {Springer-Verlag LNCS 2760}
  897. }
  898. @Article{hordes-jcs,
  899. author = {Brian Neal Levine and Clay Shields},
  900. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  901. journal = {Journal of Computer Security},
  902. year = 2002,
  903. volume = 10,
  904. number = 3,
  905. pages = {213--240}
  906. }
  907. @TechReport{herbivore,
  908. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  909. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  910. institution = {Cornell University Computing and Information Science},
  911. year = 2003,
  912. type = {Technical Report},
  913. number = {TR2003-1890},
  914. month = {February}
  915. }
  916. @InProceedings{p5,
  917. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  918. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  919. booktitle = {IEEE Symposium on Security and Privacy},
  920. pages = {58--70},
  921. year = 2002,
  922. publisher = {IEEE CS}
  923. }
  924. @phdthesis{ian-thesis,
  925. title = {A Pseudonymous Communications Infrastructure for the Internet},
  926. author = {Ian Goldberg},
  927. school = {UC Berkeley},
  928. year = {2000},
  929. month = {Dec},
  930. }
  931. @Article{taz,
  932. author = {Ian Goldberg and David Wagner},
  933. title = {TAZ Servers and the Rewebber Network: Enabling
  934. Anonymous Publishing on the World Wide Web},
  935. journal = {First Monday},
  936. year = 1998,
  937. volume = 3,
  938. number = 4,
  939. month = {August},
  940. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  941. }
  942. @Misc{tcp-over-tcp-is-bad,
  943. key = {tcp-over-tcp-is-bad},
  944. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  945. author = {Olaf Titz},
  946. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  947. }
  948. @inproceedings{wright02,
  949. title = {An Analysis of the Degradation of Anonymous Protocols},
  950. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  951. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  952. year = {2002},
  953. month = {February},
  954. publisher = {IEEE},
  955. }
  956. @inproceedings{wright03,
  957. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  958. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  959. booktitle = {IEEE Symposium on Security and Privacy},
  960. pages= {28--41},
  961. year = {2003},
  962. month = {May},
  963. publisher = {IEEE CS},
  964. }
  965. @InProceedings{attack-tor-oak05,
  966. author = {Steven J. Murdoch and George Danezis},
  967. title = {Low-cost Traffic Analysis of Tor},
  968. booktitle = {IEEE Symposium on Security and Privacy},
  969. year = 2005,
  970. month = {May},
  971. publisher = {IEEE CS}
  972. }
  973. @Misc{jap-backdoor,
  974. author={{The AN.ON Project}},
  975. howpublished={Press release},
  976. year={2003},
  977. month={September},
  978. title={German Police proceeds against anonymity service},
  979. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  980. }
  981. @article{shsm03,
  982. title = {Using Caching for Browsing Anonymity},
  983. author = {Anna Shubina and Sean Smith},
  984. journal = {ACM SIGEcom Exchanges},
  985. volume = {4},
  986. number = {2},
  987. year = {2003},
  988. month = {Sept},
  989. www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
  990. www_section = {Anonymous communication},
  991. }
  992. @inproceedings{tor-design,
  993. title = {Tor: The Second-Generation Onion Router},
  994. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  995. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  996. year = {2004},
  997. month = {August},
  998. note = {\url{http://tor.eff.org/tor-design.pdf}}
  999. }
  1000. @inproceedings{flow-correlation04,
  1001. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  1002. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  1003. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1004. year = {2004},
  1005. month = {May},
  1006. series = {LNCS},
  1007. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1008. }
  1009. @InProceedings{danezis-pet2004,
  1010. author = "George Danezis",
  1011. title = "The Traffic Analysis of Continuous-Time Mixes",
  1012. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1013. editor = {David Martin and Andrei Serjantov},
  1014. month = {May},
  1015. year = {2004},
  1016. series = {LNCS},
  1017. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1018. }
  1019. @inproceedings{feamster:wpes2004,
  1020. title = {Location Diversity in Anonymity Networks},
  1021. author = {Nick Feamster and Roger Dingledine},
  1022. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1023. year = {2004},
  1024. month = {October},
  1025. address = {Washington, DC, USA},
  1026. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1027. }
  1028. @inproceedings{koepsell:wpes2004,
  1029. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1030. author = {Stefan K\"opsell and Ulf Hilling},
  1031. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1032. year = {2004},
  1033. month = {October},
  1034. address = {Washington, DC, USA},
  1035. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1036. }
  1037. @inproceedings{sync-batching,
  1038. title = {Synchronous Batching: From Cascades to Free Routes},
  1039. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1040. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1041. editor = {David Martin and Andrei Serjantov},
  1042. year = {2004},
  1043. month = {May},
  1044. series = {LNCS},
  1045. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1046. }
  1047. @InProceedings{e2e-traffic,
  1048. author = "Nick Mathewson and Roger Dingledine",
  1049. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1050. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1051. editor = {David Martin and Andrei Serjantov},
  1052. month = {May},
  1053. year = {2004},
  1054. series = {LNCS},
  1055. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1056. }
  1057. @Misc{dtls,
  1058. author = {E. Rescorla and N. Modadugu},
  1059. title = {{Datagram Transport Layer Security}},
  1060. howpublished = {IETF Draft},
  1061. month = {December},
  1062. year = {2003},
  1063. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1064. }
  1065. @InProceedings{usability-network-effect,
  1066. author={Roger Dingledine and Nick Mathewson},
  1067. title={Anonymity Loves Company: Usability and the Network Effect},
  1068. booktitle = {Designing Security Systems That People Can Use},
  1069. year = {2005},
  1070. publisher = {O'Reilly Media},
  1071. }
  1072. @Misc{six-four,
  1073. key = {six-four},
  1074. title = {{The Six/Four System}},
  1075. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1076. }
  1077. %%% Local Variables:
  1078. %%% mode: latex
  1079. %%% TeX-master: "tor-design"
  1080. %%% End: