tor-design.bib 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092
  1. % fix me
  2. @misc{tannenbaum96,
  3. author = "Andrew Tannenbaum",
  4. title = "Computer Networks",
  5. year = "1996",
  6. publisher = "Prentice Hall, 3rd edition",
  7. }
  8. @article{ meadows96,
  9. author = "Catherine Meadows",
  10. title = "The {NRL} Protocol Analyzer: An Overview",
  11. journal = "Journal of Logic Programming",
  12. volume = "26",
  13. number = "2",
  14. pages = "113--131",
  15. year = "1996",
  16. }
  17. @inproceedings{kesdogan:pet2002,
  18. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  19. alternative to the MIX based Approach?},
  20. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  21. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  22. year = {2002},
  23. month = {April},
  24. editor = {Roger Dingledine and Paul Syverson},
  25. publisher = {Springer-Verlag, LNCS 2482},
  26. }
  27. @inproceedings{statistical-disclosure,
  28. title = {Statistical Disclosure Attacks},
  29. author = {George Danezis},
  30. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  31. organization = {{IFIP TC11}},
  32. year = {2003},
  33. month = {May},
  34. address = {Athens},
  35. pages = {421--426},
  36. publisher = {Kluwer},
  37. }
  38. @inproceedings{limits-open,
  39. title = {Limits of Anonymity in Open Environments},
  40. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  41. booktitle = {Information Hiding Workshop (IH 2002)},
  42. year = {2002},
  43. month = {October},
  44. editor = {Fabien Petitcolas},
  45. publisher = {Springer-Verlag, LNCS 2578},
  46. }
  47. @inproceedings{isdn-mixes,
  48. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  49. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  50. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  51. year = {1991},
  52. month = {February},
  53. pages = {451-463},
  54. }
  55. @Article{jerichow-jsac98,
  56. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  57. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  58. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  59. journal = {IEEE Journal on Selected Areas in Communications},
  60. year = 1998,
  61. volume = 16,
  62. number = 4,
  63. pages = {495--509},
  64. month = {May}
  65. }
  66. @inproceedings{tarzan:ccs02,
  67. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  68. author = {Michael J. Freedman and Robert Morris},
  69. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  70. {S}ecurity ({CCS 2002})},
  71. year = {2002},
  72. month = {November},
  73. address = {Washington, DC},
  74. }
  75. @inproceedings{cebolla,
  76. title = {{Cebolla: Pragmatic IP Anonymity}},
  77. author = {Zach Brown},
  78. booktitle = {Ottawa Linux Symposium},
  79. year = {2002},
  80. month = {June},
  81. }
  82. @misc{eax,
  83. author = "M. Bellare and P. Rogaway and D. Wagner",
  84. title = "A conventional authenticated-encryption mode",
  85. howpublished = {Manuscript},
  86. month = {April},
  87. year = {2003},
  88. }
  89. @misc{darkside,
  90. title = {{The Dark Side of the Web: An Open Proxy's View}},
  91. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  92. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  93. }
  94. @Misc{anonymizer,
  95. key = {anonymizer},
  96. title = {The {Anonymizer}},
  97. note = {\url{http://anonymizer.com/}}
  98. }
  99. @Misc{privoxy,
  100. key = {privoxy},
  101. title = {{Privoxy}},
  102. note = {\url{http://www.privoxy.org/}}
  103. }
  104. @inproceedings{anonnet,
  105. title = {{Analysis of an Anonymity Network for Web Browsing}},
  106. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  107. David Hutchison},
  108. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  109. 2002)}},
  110. year = {2002},
  111. month = {June},
  112. address = {Pittsburgh, USA},
  113. pages = {49--54},
  114. }
  115. @inproceedings{econymics,
  116. title = {On the Economics of Anonymity},
  117. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  118. booktitle = {Financial Cryptography},
  119. year = {2003},
  120. editor = {Rebecca N. Wright},
  121. publisher = {Springer-Verlag, LNCS 2742},
  122. }
  123. @inproceedings{defensive-dropping,
  124. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  125. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  126. booktitle = {Financial Cryptography},
  127. year = {2004},
  128. editor = {Ari Juels},
  129. publisher = {Springer-Verlag, LNCS (forthcoming)},
  130. }
  131. @inproceedings{morphmix:fc04,
  132. title = {Practical Anonymity for the Masses with MorphMix},
  133. author = {Marc Rennhard and Bernhard Plattner},
  134. booktitle = {Financial Cryptography},
  135. year = {2004},
  136. editor = {Ari Juels},
  137. publisher = {Springer-Verlag, LNCS (forthcoming)},
  138. }
  139. @inproceedings{eternity,
  140. title = {The Eternity Service},
  141. author = {Ross Anderson},
  142. booktitle = {Pragocrypt '96},
  143. year = {1996},
  144. }
  145. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  146. @inproceedings{minion-design,
  147. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  148. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  149. booktitle = {2003 IEEE Symposium on Security and Privacy},
  150. year = {2003},
  151. month = {May},
  152. publisher = {IEEE CS},
  153. pages = {2--15},
  154. }
  155. %note = {\url{http://mixminion.net/minion-design.pdf}},
  156. @inproceedings{ rao-pseudonymity,
  157. author = "Josyula R. Rao and Pankaj Rohatgi",
  158. title = "Can Pseudonymity Really Guarantee Privacy?",
  159. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  160. year = {2000},
  161. month = Aug,
  162. publisher = {USENIX},
  163. pages = "85--96",
  164. }
  165. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  166. %full_papers/rao/rao.pdf}},
  167. @InProceedings{pfitzmann90how,
  168. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  169. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  170. booktitle = {Eurocrypt 89},
  171. publisher = {Springer-Verlag, LNCS 434},
  172. year = {1990},
  173. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  174. }
  175. @Misc{tor-spec,
  176. author = {Roger Dingledine and Nick Mathewson},
  177. title = {Tor Protocol Specifications},
  178. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  179. }
  180. @InProceedings{BM:mixencrypt,
  181. author = {M{\"o}ller, Bodo},
  182. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  183. booktitle = {{CT-RSA} 2003},
  184. publisher = {Springer-Verlag, LNCS 2612},
  185. year = 2003,
  186. }
  187. @InProceedings{back01,
  188. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  189. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  190. booktitle = {Information Hiding (IH 2001)},
  191. pages = {245--257},
  192. year = 2001,
  193. editor = {Ira S. Moskowitz},
  194. publisher = {Springer-Verlag, LNCS 2137},
  195. }
  196. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  197. @InProceedings{rackoff93cryptographic,
  198. author = {Charles Rackoff and Daniel R. Simon},
  199. title = {Cryptographic Defense Against Traffic Analysis},
  200. booktitle = {{ACM} Symposium on Theory of Computing},
  201. pages = {672--681},
  202. year = {1993},
  203. }
  204. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  205. @InProceedings{freehaven-berk,
  206. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  207. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  208. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  209. on Design Issue in Anonymity and Unobservability},
  210. year = {2000},
  211. month = {July},
  212. editor = {H. Federrath},
  213. publisher = {Springer-Verlag, LNCS 2009},
  214. }
  215. %note = {\url{http://freehaven.net/papers.html}},
  216. @InProceedings{raymond00,
  217. author = {J. F. Raymond},
  218. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  219. and Open Problems}},
  220. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  221. on Design Issue in Anonymity and Unobservability},
  222. year = 2000,
  223. month = {July},
  224. pages = {10-29},
  225. editor = {H. Federrath},
  226. publisher = {Springer-Verlag, LNCS 2009},
  227. }
  228. @InProceedings{sybil,
  229. author = "John Douceur",
  230. title = {{The Sybil Attack}},
  231. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
  232. month = Mar,
  233. year = 2002,
  234. }
  235. @InProceedings{trickle02,
  236. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  237. title = {From a Trickle to a Flood: Active Attacks on Several
  238. Mix Types},
  239. booktitle = {Information Hiding (IH 2002)},
  240. year = {2002},
  241. editor = {Fabien Petitcolas},
  242. publisher = {Springer-Verlag, LNCS 2578},
  243. }
  244. @InProceedings{langos02,
  245. author = {Oliver Berthold and Heinrich Langos},
  246. title = {Dummy Traffic Against Long Term Intersection Attacks},
  247. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  248. year = {2002},
  249. editor = {Roger Dingledine and Paul Syverson},
  250. publisher = {Springer-Verlag, LNCS 2482}
  251. }
  252. @InProceedings{hintz-pet02,
  253. author = {Andrew Hintz},
  254. title = {Fingerprinting Websites Using Traffic Analysis},
  255. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  256. pages = {171--178},
  257. year = 2002,
  258. editor = {Roger Dingledine and Paul Syverson},
  259. publisher = {Springer-Verlag, LNCS 2482}
  260. }
  261. @InProceedings{or-discex00,
  262. author = {Paul Syverson and Michael Reed and David Goldschlag},
  263. title = {{O}nion {R}outing Access Configurations},
  264. booktitle = {DARPA Information Survivability Conference and
  265. Exposition (DISCEX 2000)},
  266. year = {2000},
  267. publisher = {IEEE CS Press},
  268. pages = {34--40},
  269. volume = {1},
  270. }
  271. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  272. @Inproceedings{or-pet00,
  273. title = {{Towards an Analysis of Onion Routing Security}},
  274. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  275. Carl Landwehr},
  276. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  277. on Design Issue in Anonymity and Unobservability},
  278. year = 2000,
  279. month = {July},
  280. pages = {96--114},
  281. editor = {H. Federrath},
  282. publisher = {Springer-Verlag, LNCS 2009},
  283. }
  284. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  285. @Inproceedings{freenet-pets00,
  286. title = {Freenet: A Distributed Anonymous Information Storage
  287. and Retrieval System},
  288. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  289. Theodore W. Hong},
  290. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  291. on Design Issue in Anonymity and Unobservability},
  292. year = 2000,
  293. month = {July},
  294. pages = {46--66},
  295. editor = {H. Federrath},
  296. publisher = {Springer-Verlag, LNCS 2009},
  297. }
  298. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  299. @InProceedings{or-ih96,
  300. author = {David M. Goldschlag and Michael G. Reed and Paul
  301. F. Syverson},
  302. title = {Hiding Routing Information},
  303. booktitle = {Information Hiding, First International Workshop},
  304. pages = {137--150},
  305. year = 1996,
  306. editor = {R. Anderson},
  307. month = {May},
  308. publisher = {Springer-Verlag, LNCS 1174},
  309. }
  310. @InProceedings{federrath-ih96,
  311. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  312. title = {{MIXes} in Mobile Communication Systems: Location
  313. Management with Privacy},
  314. booktitle = {Information Hiding, First International Workshop},
  315. pages = {121--135},
  316. year = 1996,
  317. editor = {R. Anderson},
  318. month = {May},
  319. publisher = {Springer-Verlag, LNCS 1174},
  320. }
  321. @InProceedings{reed-protocols97,
  322. author = {Michael G. Reed and Paul F. Syverson and David
  323. M. Goldschlag},
  324. title = {Protocols Using Anonymous Connections: Mobile Applications},
  325. booktitle = {Security Protocols: 5th International Workshop},
  326. pages = {13--23},
  327. year = 1997,
  328. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  329. and Michael Roe},
  330. month = {April},
  331. publisher = {Springer-Verlag, LNCS 1361}
  332. }
  333. @Article{or-jsac98,
  334. author = {Michael G. Reed and Paul F. Syverson and David
  335. M. Goldschlag},
  336. title = {Anonymous Connections and Onion Routing},
  337. journal = {IEEE Journal on Selected Areas in Communications},
  338. year = 1998,
  339. volume = 16,
  340. number = 4,
  341. pages = {482--494},
  342. month = {May},
  343. }
  344. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  345. @Misc{TLS,
  346. author = {T. Dierks and C. Allen},
  347. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  348. howpublished = {IETF RFC 2246},
  349. month = {January},
  350. year = {1999},
  351. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  352. }
  353. @Misc{SMTP,
  354. author = {J. Postel},
  355. title = {Simple {M}ail {T}ransfer {P}rotocol},
  356. howpublished = {IETF RFC 2821 (also STD0010)},
  357. month = {April},
  358. year = {2001},
  359. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  360. }
  361. @Misc{IMAP,
  362. author = {M. Crispin},
  363. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  364. howpublished = {IETF RFC 2060},
  365. month = {December},
  366. year = {1996},
  367. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  368. }
  369. @misc{pipenet,
  370. title = {PipeNet 1.1},
  371. author = {Wei Dai},
  372. year = 1996,
  373. month = {August},
  374. howpublished = {Usenet post},
  375. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  376. in a post to the cypherpunks list, Feb.\ 1995.},
  377. }
  378. @Misc{POP3,
  379. author = {J. Myers and M. Rose},
  380. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  381. howpublished = {IETF RFC 1939 (also STD0053)},
  382. month = {May},
  383. year = {1996},
  384. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  385. }
  386. @InProceedings{shuffle,
  387. author = {C. Andrew Neff},
  388. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  389. booktitle = {8th ACM Conference on Computer and Communications
  390. Security (CCS-8)},
  391. pages = {116--125},
  392. year = 2001,
  393. editor = {P. Samarati},
  394. month = {November},
  395. publisher = {ACM Press},
  396. }
  397. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  398. % technicaldocs/shuffle.pdf}},
  399. @InProceedings{dolev91,
  400. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  401. title = {Non-Malleable Cryptography},
  402. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  403. pages = {542--552},
  404. year = 1991,
  405. note = {Updated version at
  406. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  407. }
  408. @TechReport{rsw96,
  409. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  410. title = {Time-lock puzzles and timed-release Crypto},
  411. year = 1996,
  412. type = {MIT LCS technical memo},
  413. number = {MIT/LCS/TR-684},
  414. month = {February},
  415. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  416. }
  417. @InProceedings{web-mix,
  418. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  419. title = {Web {MIX}es: A system for anonymous and unobservable
  420. {I}nternet access},
  421. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  422. on Design Issue in Anonymity and Unobservability},
  423. editor = {H. Federrath},
  424. publisher = {Springer-Verlag, LNCS 2009},
  425. pages = {115--129},
  426. year = {2000},
  427. }
  428. @InProceedings{disad-free-routes,
  429. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  430. title = {The disadvantages of free {MIX} routes and how to overcome
  431. them},
  432. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  433. on Design Issue in Anonymity and Unobservability},
  434. pages = {30--45},
  435. year = 2000,
  436. editor = {H. Federrath},
  437. publisher = {Springer-Verlag, LNCS 2009},
  438. }
  439. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  440. % disadvantages_berthold.pdf}},
  441. @InProceedings{boneh00,
  442. author = {Dan Boneh and Moni Naor},
  443. title = {Timed Commitments},
  444. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  445. pages = {236--254},
  446. year = 2000,
  447. publisher = {Springer-Verlag, LNCS 1880},
  448. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  449. }
  450. @InProceedings{goldschlag98,
  451. author = {David M. Goldschlag and Stuart G. Stubblebine},
  452. title = {Publicly Verifiable Lotteries: Applications of
  453. Delaying Functions},
  454. booktitle = {Financial Cryptography},
  455. pages = {214--226},
  456. year = 1998,
  457. publisher = {Springer-Verlag, LNCS 1465},
  458. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  459. }
  460. @InProceedings{syverson98,
  461. author = {Paul Syverson},
  462. title = {Weakly Secret Bit Commitment: Applications to
  463. Lotteries and Fair Exchange},
  464. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  465. pages = {2--13},
  466. year = 1998,
  467. address = {Rockport Massachusetts},
  468. month = {June},
  469. publisher = {IEEE CS Press},
  470. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  471. }
  472. @Misc{shoup-iso,
  473. author = {Victor Shoup},
  474. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  475. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  476. }
  477. @Misc{shoup-oaep,
  478. author = {Victor Shoup},
  479. title = {{OAEP} Reconsidered},
  480. howpublished = {{IACR} e-print 2000/060},
  481. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  482. }
  483. @Misc{oaep-still-alive,
  484. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  485. title = {{RSA}-{OAEP} is Still Alive!},
  486. howpublished = {{IACR} e-print 2000/061},
  487. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  488. }
  489. @misc{echolot,
  490. author = {Peter Palfrader},
  491. title = {Echolot: a pinger for anonymous remailers},
  492. note = {\url{http://www.palfrader.org/echolot/}},
  493. }
  494. @Misc{mixmaster-attacks,
  495. author = {Lance Cottrell},
  496. title = {Mixmaster and Remailer Attacks},
  497. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  498. }
  499. @Misc{mixmaster-spec,
  500. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  501. Palfrader and Len Sassaman},
  502. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  503. year = {2003},
  504. month = {July},
  505. howpublished = {Draft},
  506. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  507. }
  508. @InProceedings{puzzles-tls,
  509. author = "Drew Dean and Adam Stubblefield",
  510. title = {{Using Client Puzzles to Protect TLS}},
  511. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  512. year = {2001},
  513. month = Aug,
  514. publisher = {USENIX},
  515. }
  516. @InProceedings{breadpudding,
  517. author = {Markus Jakobsson and Ari Juels},
  518. title = {Proofs of Work and Bread Pudding Protocols},
  519. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  520. Conference on Communications and Multimedia Security
  521. (CMS '99)},
  522. year = 1999,
  523. month = {September},
  524. publisher = {Kluwer}
  525. }
  526. @Misc{hashcash,
  527. author = {Adam Back},
  528. title = {Hash cash},
  529. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  530. }
  531. @InProceedings{oreilly-acc,
  532. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  533. title = {Accountability},
  534. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  535. Technology},
  536. year = {2001},
  537. publisher = {O'Reilly and Associates},
  538. }
  539. @InProceedings{han,
  540. author = {Yongfei Han},
  541. title = {Investigation of non-repudiation protocols},
  542. booktitle = {ACISP '96},
  543. year = 1996,
  544. publisher = {Springer-Verlag},
  545. }
  546. @Misc{socks5,
  547. key = {socks5},
  548. title = {{SOCKS} {P}rotocol {V}ersion 5},
  549. howpublished= {IETF RFC 1928},
  550. month = {March},
  551. year = 1996,
  552. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  553. }
  554. @InProceedings{abe,
  555. author = {Masayuki Abe},
  556. title = {Universally Verifiable {MIX} With Verification Work Independent of
  557. The Number of {MIX} Servers},
  558. booktitle = {{EUROCRYPT} 1998},
  559. year = {1998},
  560. publisher = {Springer-Verlag, LNCS 1403},
  561. }
  562. @InProceedings{desmedt,
  563. author = {Yvo Desmedt and Kaoru Kurosawa},
  564. title = {How To Break a Practical {MIX} and Design a New One},
  565. booktitle = {{EUROCRYPT} 2000},
  566. year = {2000},
  567. publisher = {Springer-Verlag, LNCS 1803},
  568. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  569. }
  570. @InProceedings{mitkuro,
  571. author = {M. Mitomo and K. Kurosawa},
  572. title = {{Attack for Flash MIX}},
  573. booktitle = {{ASIACRYPT} 2000},
  574. year = {2000},
  575. publisher = {Springer-Verlag, LNCS 1976},
  576. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  577. }
  578. @InProceedings{hybrid-mix,
  579. author = {M. Ohkubo and M. Abe},
  580. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  581. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  582. year = {2000},
  583. publisher = {Springer-Verlag, LNCS 1976},
  584. }
  585. @InProceedings{PShuffle,
  586. author = {Jun Furukawa and Kazue Sako},
  587. title = {An Efficient Scheme for Proving a Shuffle},
  588. editor = {Joe Kilian},
  589. booktitle = {CRYPTO 2001},
  590. year = {2001},
  591. publisher = {Springer-Verlag, LNCS 2139},
  592. }
  593. @InProceedings{jakobsson-optimally,
  594. author = "Markus Jakobsson and Ari Juels",
  595. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  596. booktitle = {Principles of Distributed Computing - {PODC} '01},
  597. year = "2001",
  598. publisher = {ACM Press},
  599. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  600. }
  601. @InProceedings{kesdogan,
  602. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  603. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  604. System},
  605. booktitle = {Information Hiding (IH 1998)},
  606. year = {1998},
  607. publisher = {Springer-Verlag, LNCS 1525},
  608. }
  609. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  610. @InProceedings{socks4,
  611. author = {David Koblas and Michelle R. Koblas},
  612. title = {{SOCKS}},
  613. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  614. Symposium)},
  615. pages = {77--83},
  616. year = 1992,
  617. publisher = {USENIX},
  618. }
  619. @InProceedings{flash-mix,
  620. author = {Markus Jakobsson},
  621. title = {Flash {M}ixing},
  622. booktitle = {Principles of Distributed Computing - {PODC} '99},
  623. year = {1999},
  624. publisher = {ACM Press},
  625. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  626. }
  627. @InProceedings{SK,
  628. author = {Joe Kilian and Kazue Sako},
  629. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  630. the Implementation of a Voting Booth},
  631. booktitle = {EUROCRYPT '95},
  632. year = {1995},
  633. publisher = {Springer-Verlag},
  634. }
  635. @InProceedings{OAEP,
  636. author = {M. Bellare and P. Rogaway},
  637. year = {1994},
  638. booktitle = {EUROCRYPT '94},
  639. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  640. {RSA}},
  641. publisher = {Springer-Verlag},
  642. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  643. }
  644. @inproceedings{babel,
  645. title = {Mixing {E}-mail With {B}abel},
  646. author = {Ceki G\"ulc\"u and Gene Tsudik},
  647. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  648. year = 1996,
  649. month = {February},
  650. pages = {2--16},
  651. publisher = {IEEE},
  652. }
  653. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  654. @Misc{rprocess,
  655. author = {RProcess},
  656. title = {Selective Denial of Service Attacks},
  657. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  658. }
  659. @Article{remailer-history,
  660. author = {Sameer Parekh},
  661. title = {Prospects for Remailers},
  662. journal = {First Monday},
  663. volume = {1},
  664. number = {2},
  665. month = {August},
  666. year = {1996},
  667. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  668. }
  669. @Article{chaum-mix,
  670. author = {David Chaum},
  671. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  672. journal = {Communications of the ACM},
  673. year = {1981},
  674. volume = {4},
  675. number = {2},
  676. month = {February},
  677. }
  678. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  679. @InProceedings{nym-alias-net,
  680. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  681. title = {{The Design, Implementation and Operation of an Email
  682. Pseudonym Server}},
  683. booktitle = {$5^{th}$ ACM Conference on Computer and
  684. Communications Security (CCS'98)},
  685. year = 1998,
  686. publisher = {ACM Press},
  687. }
  688. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  689. @InProceedings{tangler,
  690. author = {Marc Waldman and David Mazi\`{e}res},
  691. title = {Tangler: A Censorship-Resistant Publishing System
  692. Based on Document Entanglements},
  693. booktitle = {$8^{th}$ ACM Conference on Computer and
  694. Communications Security (CCS-8)},
  695. pages = {86--135},
  696. year = 2001,
  697. publisher = {ACM Press},
  698. }
  699. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  700. @misc{neochaum,
  701. author = {Tim May},
  702. title = {Payment mixes for anonymity},
  703. howpublished = {E-mail archived at
  704. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  705. }
  706. @misc{helsingius,
  707. author = {J. Helsingius},
  708. title = {{\tt anon.penet.fi} press release},
  709. note = {\newline \url{http://www.penet.fi/press-english.html}},
  710. }
  711. @InProceedings{garay97secure,
  712. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  713. title = {Secure distributed storage and retrieval},
  714. booktitle = {11th International Workshop, WDAG '97},
  715. pages = {275--289},
  716. year = {1997},
  717. publisher = {Springer-Verlag, LNCS 1320},
  718. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  719. }
  720. @InProceedings{PIK,
  721. author = {C. Park and K. Itoh and K. Kurosawa},
  722. title = {Efficient anonymous channel and all/nothing election scheme},
  723. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  724. pages = {248--259},
  725. publisher = {Springer-Verlag, LNCS 765},
  726. }
  727. @Misc{pgpfaq,
  728. key = {PGP},
  729. title = {{PGP} {FAQ}},
  730. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  731. }
  732. @Article{riordan-schneier,
  733. author = {James Riordan and Bruce Schneier},
  734. title = {A Certified E-mail Protocol with No Trusted Third Party},
  735. journal = {13th Annual Computer Security Applications Conference},
  736. month = {December},
  737. year = {1998},
  738. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  739. }
  740. @Article{crowds-tissec,
  741. author = {Michael K. Reiter and Aviel D. Rubin},
  742. title = {Crowds: Anonymity for Web Transactions},
  743. journal = {ACM TISSEC},
  744. year = 1998,
  745. volume = 1,
  746. number = 1,
  747. pages = {66--92},
  748. month = {June},
  749. }
  750. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  751. @Article{crowds-dimacs,
  752. author = {Michael K. Reiter and Aviel D. Rubin},
  753. title = {Crowds: Anonymity for Web Transactions},
  754. journal = {{DIMACS} Technical Report (Revised)},
  755. volume = {97},
  756. number = {15},
  757. month = {August},
  758. year = {1997},
  759. }
  760. @Misc{advogato,
  761. author = {Raph Levien},
  762. title = {Advogato's Trust Metric},
  763. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  764. }
  765. @InProceedings{publius,
  766. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  767. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  768. source-anonymous web publishing system},
  769. booktitle = {Proc. 9th USENIX Security Symposium},
  770. pages = {59--72},
  771. year = {2000},
  772. month = {August},
  773. }
  774. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  775. @Misc{freedom-nyms,
  776. author = {Russell Samuels},
  777. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  778. year = {1999},
  779. month = {November},
  780. day = {21},
  781. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  782. }
  783. @techreport{freedom2-arch,
  784. title = {Freedom Systems 2.0 Architecture},
  785. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  786. institution = {Zero Knowledge Systems, {Inc.}},
  787. year = {2000},
  788. month = {December},
  789. type = {White Paper},
  790. day = {18},
  791. }
  792. @techreport{freedom21-security,
  793. title = {Freedom Systems 2.1 Security Issues and Analysis},
  794. author = {Adam Back and Ian Goldberg and Adam Shostack},
  795. institution = {Zero Knowledge Systems, {Inc.}},
  796. year = {2001},
  797. month = {May},
  798. type = {White Paper},
  799. }
  800. @inproceedings{cfs:sosp01,
  801. title = {Wide-area cooperative storage with {CFS}},
  802. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  803. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  804. year = {2001},
  805. month = {October},
  806. address = {Chateau Lake Louise, Banff, Canada},
  807. }
  808. @inproceedings{SS03,
  809. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  810. author = {Andrei Serjantov and Peter Sewell},
  811. booktitle = {Computer Security -- ESORICS 2003},
  812. publisher = {Springer-Verlag, LNCS (forthcoming)},
  813. year = {2003},
  814. month = {October},
  815. }
  816. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  817. @Misc{pk-relations,
  818. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  819. title = {Relations Among Notions of Security for Public-Key Encryption
  820. Schemes},
  821. howpublished = {
  822. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  823. Springer-Verlag, 1998.
  824. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  825. }
  826. @InProceedings{mix-acc,
  827. author = {Roger Dingledine and Michael J. Freedman and David
  828. Hopwood and David Molnar},
  829. title = {{A Reputation System to Increase MIX-net
  830. Reliability}},
  831. booktitle = {Information Hiding (IH 2001)},
  832. pages = {126--141},
  833. year = 2001,
  834. editor = {Ira S. Moskowitz},
  835. publisher = {Springer-Verlag, LNCS 2137},
  836. }
  837. %note = {\url{http://www.freehaven.net/papers.html}},
  838. @InProceedings{casc-rep,
  839. author = {Roger Dingledine and Paul Syverson},
  840. title = {{Reliable MIX Cascade Networks through Reputation}},
  841. booktitle = {Financial Cryptography},
  842. year = 2002,
  843. editor = {Matt Blaze},
  844. publisher = {Springer-Verlag, LNCS 2357},
  845. }
  846. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  847. @InProceedings{zhou96certified,
  848. author = {Zhou and Gollmann},
  849. title = {Certified Electronic Mail},
  850. booktitle = {{ESORICS: European Symposium on Research in Computer
  851. Security}},
  852. publisher = {Springer-Verlag, LNCS 1146},
  853. year = {1996},
  854. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  855. }
  856. @Misc{realtime-mix,
  857. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  858. Birgit Pfitzmann and Michael Waidner},
  859. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  860. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  861. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  862. }
  863. @InProceedings{danezis-pets03,
  864. author = {George Danezis},
  865. title = {Mix-networks with Restricted Routes},
  866. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  867. year = 2003,
  868. editor = {Roger Dingledine},
  869. publisher = {Springer-Verlag LNCS 2760}
  870. }
  871. @InProceedings{gap-pets03,
  872. author = {Krista Bennett and Christian Grothoff},
  873. title = {{GAP} -- practical anonymous networking},
  874. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  875. year = 2003,
  876. editor = {Roger Dingledine},
  877. publisher = {Springer-Verlag LNCS 2760}
  878. }
  879. @Article{hordes-jcs,
  880. author = {Brian Neal Levine and Clay Shields},
  881. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  882. journal = {Journal of Computer Security},
  883. year = 2002,
  884. volume = 10,
  885. number = 3,
  886. pages = {213--240}
  887. }
  888. @TechReport{herbivore,
  889. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  890. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  891. institution = {Cornell University Computing and Information Science},
  892. year = 2003,
  893. type = {Technical Report},
  894. number = {TR2003-1890},
  895. month = {February}
  896. }
  897. @InProceedings{p5,
  898. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  899. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  900. booktitle = {2002 IEEE Symposium on Security and Privacy},
  901. pages = {58--70},
  902. year = 2002,
  903. publisher = {IEEE CS}
  904. }
  905. @phdthesis{ian-thesis,
  906. title = {A Pseudonymous Communications Infrastructure for the Internet},
  907. author = {Ian Goldberg},
  908. school = {UC Berkeley},
  909. year = {2000},
  910. month = {December},
  911. }
  912. @Article{taz,
  913. author = {Ian Goldberg and David Wagner},
  914. title = {TAZ Servers and the Rewebber Network: Enabling
  915. Anonymous Publishing on the World Wide Web},
  916. journal = {First Monday},
  917. year = 1998,
  918. volume = 3,
  919. number = 4,
  920. month = {August},
  921. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  922. }
  923. @Misc{tcp-over-tcp-is-bad,
  924. key = {tcp-over-tcp-is-bad},
  925. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  926. author = {Olaf Titz},
  927. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  928. }
  929. @inproceedings{wright02,
  930. title = {An Analysis of the Degradation of Anonymous Protocols},
  931. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  932. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  933. year = {2002},
  934. month = {February},
  935. publisher = {IEEE},
  936. }
  937. @inproceedings{wright03,
  938. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  939. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  940. booktitle = {IEEE Symposium on Security and Privacy},
  941. pages= {28--41},
  942. year = {2003},
  943. month = {May},
  944. publisher = {IEEE CS},
  945. }
  946. @Misc{jap-backdoor,
  947. author={{The AN.ON Project}},
  948. howpublished={Press release},
  949. year={2003},
  950. month={September},
  951. title={German Police proceeds against anonymity service},
  952. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  953. }
  954. @article{shsm03,
  955. title = {Using Caching for Browsing Anonymity},
  956. author = {Anna Shubina and Sean Smith},
  957. journal = {ACM SIGEcom Exchanges},
  958. volume = {4},
  959. number = {2},
  960. year = {2003},
  961. month = {September},
  962. www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
  963. www_section = {Anonymous communication},
  964. }
  965. %%% Local Variables:
  966. %%% mode: latex
  967. %%% TeX-master: "tor-design"
  968. %%% End: