tor-design.bib 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441
  1. % hs-attack
  2. @inproceedings{hs-attack,
  3. title = {Locating Hidden Servers},
  4. author = {Lasse {\O}verlier and Paul Syverson},
  5. booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
  6. year = {2006},
  7. month = {May},
  8. publisher = {IEEE CS},
  9. }
  10. @TechReport{bauer:tr2007,
  11. author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  12. title = {Low-Resource Routing Attacks Against Anonymous Systems},
  13. institution = {University of Colorado at Boulder},
  14. year = 2007,
  15. number = {CU-CS-1025-07}
  16. }
  17. % fix me
  18. @misc{tannenbaum96,
  19. author = "Andrew Tannenbaum",
  20. title = "Computer Networks",
  21. year = "1996",
  22. publisher = "Prentice Hall, 3rd edition",
  23. }
  24. @article{ meadows96,
  25. author = "Catherine Meadows",
  26. title = "The {NRL} Protocol Analyzer: An Overview",
  27. journal = "Journal of Logic Programming",
  28. volume = "26",
  29. number = "2",
  30. pages = "113--131",
  31. year = "1996",
  32. }
  33. @inproceedings{kesdogan:pet2002,
  34. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  35. alternative to the MIX based Approach?},
  36. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  37. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  38. year = {2002},
  39. month = {April},
  40. editor = {Roger Dingledine and Paul Syverson},
  41. publisher = {Springer-Verlag, LNCS 2482},
  42. }
  43. @inproceedings{statistical-disclosure,
  44. title = {Statistical Disclosure Attacks},
  45. author = {George Danezis},
  46. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  47. organization = {{IFIP TC11}},
  48. year = {2003},
  49. month = {May},
  50. address = {Athens},
  51. pages = {421--426},
  52. publisher = {Kluwer},
  53. }
  54. @inproceedings{limits-open,
  55. title = {Limits of Anonymity in Open Environments},
  56. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  57. booktitle = {Information Hiding Workshop (IH 2002)},
  58. year = {2002},
  59. month = {October},
  60. editor = {Fabien Petitcolas},
  61. publisher = {Springer-Verlag, LNCS 2578},
  62. }
  63. @inproceedings{isdn-mixes,
  64. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  65. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  66. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  67. year = {1991},
  68. month = {February},
  69. pages = {451-463},
  70. }
  71. @Article{jerichow-jsac98,
  72. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  73. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  74. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  75. journal = {IEEE Journal on Selected Areas in Communications},
  76. year = 1998,
  77. volume = 16,
  78. number = 4,
  79. pages = {495--509},
  80. month = {May}
  81. }
  82. @inproceedings{tarzan:ccs02,
  83. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  84. author = {Michael J. Freedman and Robert Morris},
  85. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  86. {S}ecurity ({CCS 2002})},
  87. year = {2002},
  88. month = {November},
  89. address = {Washington, DC},
  90. }
  91. @inproceedings{cebolla,
  92. title = {{Cebolla: Pragmatic IP Anonymity}},
  93. author = {Zach Brown},
  94. booktitle = {Ottawa Linux Symposium},
  95. year = {2002},
  96. month = {June},
  97. }
  98. @inproceedings{eax,
  99. author = "M. Bellare and P. Rogaway and D. Wagner",
  100. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  101. booktitle = {Fast Software Encryption 2004},
  102. month = {February},
  103. year = {2004},
  104. }
  105. @misc{darkside,
  106. title = {{The Dark Side of the Web: An Open Proxy's View}},
  107. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  108. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  109. }
  110. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  111. @Misc{anonymizer,
  112. key = {anonymizer},
  113. title = {The {Anonymizer}},
  114. note = {\url{http://anonymizer.com/}}
  115. }
  116. @Misc{privoxy,
  117. key = {privoxy},
  118. title = {{Privoxy}},
  119. note = {\url{http://www.privoxy.org/}}
  120. }
  121. @Misc{i2p,
  122. key = {i2p},
  123. title = {{I2P}},
  124. note = {\url{http://www.i2p.net/}}
  125. }
  126. @Misc{nym,
  127. author = {Jason Holt},
  128. title = {nym: practical pseudonymity for anonymous networks},
  129. note = {Paper and source code at \url{http://www.lunkwill.org/src/nym/}}
  130. }
  131. @InProceedings{nymble,
  132. author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
  133. title = {Nymble: Anonymous IP-address Blocking},
  134. booktitle = {Privacy Enhancing Technologies (PET 2007)},
  135. year = 2007,
  136. publisher = {Springer-Verlag, LNCS (forthcoming)}
  137. }
  138. @inproceedings{anonnet,
  139. title = {{Analysis of an Anonymity Network for Web Browsing}},
  140. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  141. David Hutchison},
  142. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  143. 2002)}},
  144. year = {2002},
  145. month = {June},
  146. address = {Pittsburgh, USA},
  147. }
  148. % pages = {49--54},
  149. @inproceedings{econymics,
  150. title = {On the Economics of Anonymity},
  151. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  152. booktitle = {Financial Cryptography},
  153. year = {2003},
  154. editor = {Rebecca N. Wright},
  155. publisher = {Springer-Verlag, LNCS 2742},
  156. }
  157. @inproceedings{defensive-dropping,
  158. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  159. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  160. booktitle = {Financial Cryptography},
  161. year = {2004},
  162. editor = {Ari Juels},
  163. publisher = {Springer-Verlag, LNCS (forthcoming)},
  164. }
  165. @inproceedings{morphmix:fc04,
  166. title = {Practical Anonymity for the Masses with MorphMix},
  167. author = {Marc Rennhard and Bernhard Plattner},
  168. booktitle = {Financial Cryptography},
  169. year = {2004},
  170. editor = {Ari Juels},
  171. publisher = {Springer-Verlag, LNCS (forthcoming)},
  172. }
  173. @inproceedings{eternity,
  174. title = {The Eternity Service},
  175. author = {Ross Anderson},
  176. booktitle = {Pragocrypt '96},
  177. year = {1996},
  178. }
  179. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  180. @inproceedings{minion-design,
  181. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  182. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  183. booktitle = {2003 IEEE Symposium on Security and Privacy},
  184. year = {2003},
  185. month = {May},
  186. publisher = {IEEE CS},
  187. pages = {2--15},
  188. }
  189. %note = {\url{http://mixminion.net/minion-design.pdf}},
  190. @inproceedings{ rao-pseudonymity,
  191. author = "Josyula R. Rao and Pankaj Rohatgi",
  192. title = "Can Pseudonymity Really Guarantee Privacy?",
  193. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  194. year = {2000},
  195. month = Aug,
  196. publisher = {USENIX},
  197. pages = "85--96",
  198. }
  199. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  200. %full_papers/rao/rao.pdf}},
  201. @InProceedings{pfitzmann90how,
  202. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  203. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  204. booktitle = {Eurocrypt 89},
  205. publisher = {Springer-Verlag, LNCS 434},
  206. year = {1990},
  207. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  208. }
  209. @Misc{tor-spec,
  210. author = {Roger Dingledine and Nick Mathewson},
  211. title = {Tor Protocol Specifications},
  212. note = {\url{http://tor.eff.org/svn/trunk/doc/tor-spec.txt}},
  213. }
  214. @Misc{incentives-txt,
  215. author = {Roger Dingledine and Nick Mathewson},
  216. title = {Tor Incentives Design Brainstorms},
  217. note = {\url{http://tor.eff.org/svn/trunk/doc/incentives.txt}},
  218. }
  219. @InProceedings{BM:mixencrypt,
  220. author = {M{\"o}ller, Bodo},
  221. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  222. booktitle = {{CT-RSA} 2003},
  223. publisher = {Springer-Verlag, LNCS 2612},
  224. year = 2003,
  225. }
  226. @InProceedings{back01,
  227. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  228. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  229. booktitle = {Information Hiding (IH 2001)},
  230. pages = {245--257},
  231. year = 2001,
  232. editor = {Ira S. Moskowitz},
  233. publisher = {Springer-Verlag, LNCS 2137},
  234. }
  235. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  236. @InProceedings{rackoff93cryptographic,
  237. author = {Charles Rackoff and Daniel R. Simon},
  238. title = {Cryptographic Defense Against Traffic Analysis},
  239. booktitle = {{ACM} Symposium on Theory of Computing},
  240. pages = {672--681},
  241. year = {1993},
  242. }
  243. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  244. @InProceedings{freehaven-berk,
  245. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  246. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  247. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  248. on Design Issue in Anonymity and Unobservability},
  249. year = 2000,
  250. month = {July},
  251. editor = {H. Federrath},
  252. publisher = {Springer-Verlag, LNCS 2009},
  253. }
  254. @InProceedings{move-ndss05,
  255. author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  256. title = {MOVE: An End-to-End Solution To Network Denial of Service},
  257. booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  258. year = 2005,
  259. month = {February},
  260. publisher = {Internet Society}
  261. }
  262. %note = {\url{http://freehaven.net/papers.html}},
  263. @InProceedings{raymond00,
  264. author = {J. F. Raymond},
  265. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  266. and Open Problems}},
  267. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  268. on Design Issue in Anonymity and Unobservability},
  269. year = 2000,
  270. month = {July},
  271. pages = {10-29},
  272. editor = {H. Federrath},
  273. publisher = {Springer-Verlag, LNCS 2009},
  274. }
  275. @InProceedings{sybil,
  276. author = "John Douceur",
  277. title = {{The Sybil Attack}},
  278. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  279. month = Mar,
  280. year = 2002,
  281. }
  282. @InCollection{price-privacy,
  283. author = {Paul Syverson and Adam Shostack},
  284. editor = {L. Jean Camp and Stephen Lewis},
  285. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  286. booktitle = {Economics of Information Security},
  287. chapter = 10,
  288. publisher = {Kluwer},
  289. year = 2004,
  290. pages = {129--142}
  291. }
  292. @InProceedings{trickle02,
  293. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  294. title = {From a Trickle to a Flood: Active Attacks on Several
  295. Mix Types},
  296. booktitle = {Information Hiding (IH 2002)},
  297. year = {2002},
  298. editor = {Fabien Petitcolas},
  299. publisher = {Springer-Verlag, LNCS 2578},
  300. }
  301. @InProceedings{langos02,
  302. author = {Oliver Berthold and Heinrich Langos},
  303. title = {Dummy Traffic Against Long Term Intersection Attacks},
  304. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  305. year = {2002},
  306. editor = {Roger Dingledine and Paul Syverson},
  307. publisher = {Springer-Verlag, LNCS 2482}
  308. }
  309. @InProceedings{hintz-pet02,
  310. author = {Andrew Hintz},
  311. title = {Fingerprinting Websites Using Traffic Analysis},
  312. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  313. pages = {171--178},
  314. year = 2002,
  315. editor = {Roger Dingledine and Paul Syverson},
  316. publisher = {Springer-Verlag, LNCS 2482}
  317. }
  318. @InProceedings{or-discex00,
  319. author = {Paul Syverson and Michael Reed and David Goldschlag},
  320. title = {{O}nion {R}outing Access Configurations},
  321. booktitle = {DARPA Information Survivability Conference and
  322. Exposition (DISCEX 2000)},
  323. year = {2000},
  324. publisher = {IEEE CS Press},
  325. pages = {34--40},
  326. volume = {1},
  327. }
  328. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  329. @Inproceedings{or-pet00,
  330. title = {{Towards an Analysis of Onion Routing Security}},
  331. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  332. Carl Landwehr},
  333. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  334. on Design Issue in Anonymity and Unobservability},
  335. year = 2000,
  336. month = {July},
  337. pages = {96--114},
  338. editor = {H. Federrath},
  339. publisher = {Springer-Verlag, LNCS 2009},
  340. }
  341. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  342. @Inproceedings{freenet-pets00,
  343. title = {Freenet: A Distributed Anonymous Information Storage
  344. and Retrieval System},
  345. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  346. Theodore W. Hong},
  347. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  348. on Design Issue in Anonymity and Unobservability},
  349. year = 2000,
  350. month = {July},
  351. pages = {46--66},
  352. editor = {H. Federrath},
  353. publisher = {Springer-Verlag, LNCS 2009},
  354. }
  355. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  356. @InProceedings{or-ih96,
  357. author = {David M. Goldschlag and Michael G. Reed and Paul
  358. F. Syverson},
  359. title = {Hiding Routing Information},
  360. booktitle = {Information Hiding, First International Workshop},
  361. pages = {137--150},
  362. year = 1996,
  363. editor = {R. Anderson},
  364. month = {May},
  365. publisher = {Springer-Verlag, LNCS 1174},
  366. }
  367. @InProceedings{federrath-ih96,
  368. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  369. title = {{MIXes} in Mobile Communication Systems: Location
  370. Management with Privacy},
  371. booktitle = {Information Hiding, First International Workshop},
  372. pages = {121--135},
  373. year = 1996,
  374. editor = {R. Anderson},
  375. month = {May},
  376. publisher = {Springer-Verlag, LNCS 1174},
  377. }
  378. @InProceedings{reed-protocols97,
  379. author = {Michael G. Reed and Paul F. Syverson and David
  380. M. Goldschlag},
  381. title = {Protocols Using Anonymous Connections: Mobile Applications},
  382. booktitle = {Security Protocols: 5th International Workshop},
  383. pages = {13--23},
  384. year = 1997,
  385. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  386. and Michael Roe},
  387. month = {April},
  388. publisher = {Springer-Verlag, LNCS 1361}
  389. }
  390. @Article{or-jsac98,
  391. author = {Michael G. Reed and Paul F. Syverson and David
  392. M. Goldschlag},
  393. title = {Anonymous Connections and Onion Routing},
  394. journal = {IEEE Journal on Selected Areas in Communications},
  395. year = 1998,
  396. volume = 16,
  397. number = 4,
  398. pages = {482--494},
  399. month = {May},
  400. }
  401. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  402. @Misc{TLS,
  403. author = {T. Dierks and C. Allen},
  404. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  405. howpublished = {IETF RFC 2246},
  406. month = {January},
  407. year = {1999},
  408. }
  409. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  410. @Misc{SMTP,
  411. author = {J. Postel},
  412. title = {Simple {M}ail {T}ransfer {P}rotocol},
  413. howpublished = {IETF RFC 2821 (also STD0010)},
  414. month = {April},
  415. year = {2001},
  416. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  417. }
  418. @Misc{IMAP,
  419. author = {M. Crispin},
  420. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  421. howpublished = {IETF RFC 2060},
  422. month = {December},
  423. year = {1996},
  424. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  425. }
  426. @misc{pipenet,
  427. title = {PipeNet 1.1},
  428. author = {Wei Dai},
  429. year = 1996,
  430. month = {August},
  431. howpublished = {Usenet post},
  432. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  433. in a post to the cypherpunks list, Feb.\ 1995.},
  434. }
  435. @Misc{POP3,
  436. author = {J. Myers and M. Rose},
  437. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  438. howpublished = {IETF RFC 1939 (also STD0053)},
  439. month = {May},
  440. year = {1996},
  441. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  442. }
  443. @InProceedings{shuffle,
  444. author = {C. Andrew Neff},
  445. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  446. booktitle = {8th ACM Conference on Computer and Communications
  447. Security (CCS-8)},
  448. pages = {116--125},
  449. year = 2001,
  450. editor = {P. Samarati},
  451. month = {November},
  452. publisher = {ACM Press},
  453. }
  454. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  455. % technicaldocs/shuffle.pdf}},
  456. @InProceedings{dolev91,
  457. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  458. title = {Non-Malleable Cryptography},
  459. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  460. pages = {542--552},
  461. year = 1991,
  462. note = {Updated version at
  463. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  464. }
  465. @TechReport{rsw96,
  466. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  467. title = {Time-lock puzzles and timed-release Crypto},
  468. year = 1996,
  469. type = {MIT LCS technical memo},
  470. number = {MIT/LCS/TR-684},
  471. month = {February},
  472. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  473. }
  474. @InProceedings{web-mix,
  475. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  476. title = {Web {MIX}es: A system for anonymous and unobservable
  477. {I}nternet access},
  478. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  479. on Design Issue in Anonymity and Unobservability},
  480. editor = {H. Federrath},
  481. publisher = {Springer-Verlag, LNCS 2009},
  482. year = {2000},
  483. }
  484. % pages = {115--129},
  485. @InProceedings{disad-free-routes,
  486. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  487. title = {The disadvantages of free {MIX} routes and how to overcome
  488. them},
  489. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  490. on Design Issue in Anonymity and Unobservability},
  491. pages = {30--45},
  492. year = 2000,
  493. editor = {H. Federrath},
  494. publisher = {Springer-Verlag, LNCS 2009},
  495. }
  496. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  497. % disadvantages_berthold.pdf}},
  498. @InProceedings{boneh00,
  499. author = {Dan Boneh and Moni Naor},
  500. title = {Timed Commitments},
  501. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  502. pages = {236--254},
  503. year = 2000,
  504. publisher = {Springer-Verlag, LNCS 1880},
  505. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  506. }
  507. @InProceedings{goldschlag98,
  508. author = {David M. Goldschlag and Stuart G. Stubblebine},
  509. title = {Publicly Verifiable Lotteries: Applications of
  510. Delaying Functions},
  511. booktitle = {Financial Cryptography},
  512. pages = {214--226},
  513. year = 1998,
  514. publisher = {Springer-Verlag, LNCS 1465},
  515. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  516. }
  517. @InProceedings{syverson98,
  518. author = {Paul Syverson},
  519. title = {Weakly Secret Bit Commitment: Applications to
  520. Lotteries and Fair Exchange},
  521. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  522. pages = {2--13},
  523. year = 1998,
  524. address = {Rockport Massachusetts},
  525. month = {June},
  526. publisher = {IEEE CS Press},
  527. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  528. }
  529. @Misc{shoup-iso,
  530. author = {Victor Shoup},
  531. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  532. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  533. }
  534. @Misc{shoup-oaep,
  535. author = {Victor Shoup},
  536. title = {{OAEP} Reconsidered},
  537. howpublished = {{IACR} e-print 2000/060},
  538. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  539. }
  540. @Misc{oaep-still-alive,
  541. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  542. title = {{RSA}-{OAEP} is Still Alive!},
  543. howpublished = {{IACR} e-print 2000/061},
  544. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  545. }
  546. @misc{echolot,
  547. author = {Peter Palfrader},
  548. title = {Echolot: a pinger for anonymous remailers},
  549. note = {\url{http://www.palfrader.org/echolot/}},
  550. }
  551. @Misc{mixmaster-attacks,
  552. author = {Lance Cottrell},
  553. title = {Mixmaster and Remailer Attacks},
  554. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  555. }
  556. @Misc{mixmaster-spec,
  557. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  558. Palfrader and Len Sassaman},
  559. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  560. year = {2003},
  561. month = {July},
  562. howpublished = {Draft},
  563. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  564. }
  565. @InProceedings{puzzles-tls,
  566. author = "Drew Dean and Adam Stubblefield",
  567. title = {{Using Client Puzzles to Protect TLS}},
  568. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  569. year = {2001},
  570. month = Aug,
  571. publisher = {USENIX},
  572. }
  573. @InProceedings{breadpudding,
  574. author = {Markus Jakobsson and Ari Juels},
  575. title = {Proofs of Work and Bread Pudding Protocols},
  576. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  577. Conference on Communications and Multimedia Security
  578. (CMS '99)},
  579. year = 1999,
  580. month = {September},
  581. publisher = {Kluwer}
  582. }
  583. @Misc{hashcash,
  584. author = {Adam Back},
  585. title = {Hash cash},
  586. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  587. }
  588. @InProceedings{oreilly-acc,
  589. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  590. title = {Accountability},
  591. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  592. Technology},
  593. year = {2001},
  594. publisher = {O'Reilly and Associates},
  595. }
  596. @InProceedings{han,
  597. author = {Yongfei Han},
  598. title = {Investigation of non-repudiation protocols},
  599. booktitle = {ACISP '96},
  600. year = 1996,
  601. publisher = {Springer-Verlag},
  602. }
  603. @Misc{socks5,
  604. key = {socks5},
  605. title = {{SOCKS} {P}rotocol {V}ersion 5},
  606. howpublished= {IETF RFC 1928},
  607. month = {March},
  608. year = 1996,
  609. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  610. }
  611. @InProceedings{abe,
  612. author = {Masayuki Abe},
  613. title = {Universally Verifiable {MIX} With Verification Work Independent of
  614. The Number of {MIX} Servers},
  615. booktitle = {{EUROCRYPT} 1998},
  616. year = {1998},
  617. publisher = {Springer-Verlag, LNCS 1403},
  618. }
  619. @InProceedings{desmedt,
  620. author = {Yvo Desmedt and Kaoru Kurosawa},
  621. title = {How To Break a Practical {MIX} and Design a New One},
  622. booktitle = {{EUROCRYPT} 2000},
  623. year = {2000},
  624. publisher = {Springer-Verlag, LNCS 1803},
  625. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  626. }
  627. @InProceedings{mitkuro,
  628. author = {M. Mitomo and K. Kurosawa},
  629. title = {{Attack for Flash MIX}},
  630. booktitle = {{ASIACRYPT} 2000},
  631. year = {2000},
  632. publisher = {Springer-Verlag, LNCS 1976},
  633. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  634. }
  635. @InProceedings{hybrid-mix,
  636. author = {M. Ohkubo and M. Abe},
  637. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  638. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  639. year = {2000},
  640. publisher = {Springer-Verlag, LNCS 1976},
  641. }
  642. @InProceedings{PShuffle,
  643. author = {Jun Furukawa and Kazue Sako},
  644. title = {An Efficient Scheme for Proving a Shuffle},
  645. editor = {Joe Kilian},
  646. booktitle = {CRYPTO 2001},
  647. year = {2001},
  648. publisher = {Springer-Verlag, LNCS 2139},
  649. }
  650. @InProceedings{jakobsson-optimally,
  651. author = "Markus Jakobsson and Ari Juels",
  652. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  653. booktitle = {Principles of Distributed Computing - {PODC} '01},
  654. year = "2001",
  655. publisher = {ACM Press},
  656. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  657. }
  658. @InProceedings{kesdogan,
  659. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  660. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  661. System},
  662. booktitle = {Information Hiding (IH 1998)},
  663. year = {1998},
  664. publisher = {Springer-Verlag, LNCS 1525},
  665. }
  666. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  667. @InProceedings{socks4,
  668. author = {David Koblas and Michelle R. Koblas},
  669. title = {{SOCKS}},
  670. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  671. Symposium)},
  672. pages = {77--83},
  673. year = 1992,
  674. publisher = {USENIX},
  675. }
  676. @InProceedings{flash-mix,
  677. author = {Markus Jakobsson},
  678. title = {Flash {M}ixing},
  679. booktitle = {Principles of Distributed Computing - {PODC} '99},
  680. year = {1999},
  681. publisher = {ACM Press},
  682. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  683. }
  684. @InProceedings{SK,
  685. author = {Joe Kilian and Kazue Sako},
  686. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  687. the Implementation of a Voting Booth},
  688. booktitle = {EUROCRYPT '95},
  689. year = {1995},
  690. publisher = {Springer-Verlag},
  691. }
  692. @InProceedings{OAEP,
  693. author = {M. Bellare and P. Rogaway},
  694. year = {1994},
  695. booktitle = {EUROCRYPT '94},
  696. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  697. {RSA}},
  698. publisher = {Springer-Verlag},
  699. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  700. }
  701. @inproceedings{babel,
  702. title = {Mixing {E}-mail With {B}abel},
  703. author = {Ceki G\"ulc\"u and Gene Tsudik},
  704. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  705. year = 1996,
  706. month = {February},
  707. pages = {2--16},
  708. publisher = {IEEE},
  709. }
  710. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  711. @Misc{rprocess,
  712. author = {RProcess},
  713. title = {Selective Denial of Service Attacks},
  714. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  715. }
  716. @Article{remailer-history,
  717. author = {Sameer Parekh},
  718. title = {Prospects for Remailers},
  719. journal = {First Monday},
  720. volume = {1},
  721. number = {2},
  722. month = {August},
  723. year = {1996},
  724. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  725. }
  726. @Article{chaum-mix,
  727. author = {David Chaum},
  728. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  729. journal = {Communications of the ACM},
  730. year = {1981},
  731. volume = {4},
  732. number = {2},
  733. month = {February},
  734. }
  735. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  736. @InProceedings{nym-alias-net,
  737. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  738. title = {{The Design, Implementation and Operation of an Email
  739. Pseudonym Server}},
  740. booktitle = {$5^{th}$ ACM Conference on Computer and
  741. Communications Security (CCS'98)},
  742. year = 1998,
  743. publisher = {ACM Press},
  744. }
  745. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  746. @InProceedings{tangler,
  747. author = {Marc Waldman and David Mazi\`{e}res},
  748. title = {Tangler: A Censorship-Resistant Publishing System
  749. Based on Document Entanglements},
  750. booktitle = {$8^{th}$ ACM Conference on Computer and
  751. Communications Security (CCS-8)},
  752. pages = {86--135},
  753. year = 2001,
  754. publisher = {ACM Press},
  755. }
  756. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  757. @misc{neochaum,
  758. author = {Tim May},
  759. title = {Payment mixes for anonymity},
  760. howpublished = {E-mail archived at
  761. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  762. }
  763. @misc{helsingius,
  764. author = {J. Helsingius},
  765. title = {{\tt anon.penet.fi} press release},
  766. note = {\newline \url{http://www.penet.fi/press-english.html}},
  767. }
  768. @InProceedings{garay97secure,
  769. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  770. title = {Secure distributed storage and retrieval},
  771. booktitle = {11th International Workshop, WDAG '97},
  772. pages = {275--289},
  773. year = {1997},
  774. publisher = {Springer-Verlag, LNCS 1320},
  775. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  776. }
  777. @InProceedings{PIK,
  778. author = {C. Park and K. Itoh and K. Kurosawa},
  779. title = {Efficient anonymous channel and all/nothing election scheme},
  780. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  781. pages = {248--259},
  782. publisher = {Springer-Verlag, LNCS 765},
  783. }
  784. @Misc{pgpfaq,
  785. key = {PGP},
  786. title = {{PGP} {FAQ}},
  787. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  788. }
  789. @Article{riordan-schneier,
  790. author = {James Riordan and Bruce Schneier},
  791. title = {A Certified E-mail Protocol with No Trusted Third Party},
  792. journal = {13th Annual Computer Security Applications Conference},
  793. month = {December},
  794. year = {1998},
  795. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  796. }
  797. @Article{crowds-tissec,
  798. author = {Michael K. Reiter and Aviel D. Rubin},
  799. title = {Crowds: Anonymity for Web Transactions},
  800. journal = {ACM TISSEC},
  801. year = 1998,
  802. volume = 1,
  803. number = 1,
  804. pages = {66--92},
  805. month = {June},
  806. }
  807. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  808. @Article{crowds-dimacs,
  809. author = {Michael K. Reiter and Aviel D. Rubin},
  810. title = {Crowds: Anonymity for Web Transactions},
  811. journal = {{DIMACS} Technical Report (Revised)},
  812. volume = {97},
  813. number = {15},
  814. month = {August},
  815. year = {1997},
  816. }
  817. @Misc{advogato,
  818. author = {Raph Levien},
  819. title = {Advogato's Trust Metric},
  820. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  821. }
  822. @InProceedings{publius,
  823. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  824. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  825. source-anonymous web publishing system},
  826. booktitle = {Proc. 9th USENIX Security Symposium},
  827. pages = {59--72},
  828. year = {2000},
  829. month = {August},
  830. }
  831. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  832. @Misc{freedom-nyms,
  833. author = {Russell Samuels},
  834. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  835. year = {1999},
  836. month = {November},
  837. day = {21},
  838. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  839. }
  840. @techreport{freedom2-arch,
  841. title = {Freedom Systems 2.0 Architecture},
  842. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  843. institution = {Zero Knowledge Systems, {Inc.}},
  844. year = {2000},
  845. month = {December},
  846. type = {White Paper},
  847. day = {18},
  848. }
  849. @techreport{freedom21-security,
  850. title = {Freedom Systems 2.1 Security Issues and Analysis},
  851. author = {Adam Back and Ian Goldberg and Adam Shostack},
  852. institution = {Zero Knowledge Systems, {Inc.}},
  853. year = {2001},
  854. month = {May},
  855. type = {White Paper},
  856. }
  857. @inproceedings{cfs:sosp01,
  858. title = {Wide-area cooperative storage with {CFS}},
  859. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  860. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  861. year = {2001},
  862. month = {October},
  863. address = {Chateau Lake Louise, Banff, Canada},
  864. }
  865. @inproceedings{SS03,
  866. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  867. author = {Andrei Serjantov and Peter Sewell},
  868. booktitle = {Computer Security -- ESORICS 2003},
  869. publisher = {Springer-Verlag, LNCS 2808},
  870. year = {2003},
  871. month = {October},
  872. }
  873. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  874. @Misc{pk-relations,
  875. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  876. title = {Relations Among Notions of Security for Public-Key Encryption
  877. Schemes},
  878. howpublished = {
  879. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  880. Springer-Verlag, 1998.
  881. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  882. }
  883. @InProceedings{mix-acc,
  884. author = {Roger Dingledine and Michael J. Freedman and David
  885. Hopwood and David Molnar},
  886. title = {{A Reputation System to Increase MIX-net
  887. Reliability}},
  888. booktitle = {Information Hiding (IH 2001)},
  889. pages = {126--141},
  890. year = 2001,
  891. editor = {Ira S. Moskowitz},
  892. publisher = {Springer-Verlag, LNCS 2137},
  893. }
  894. %note = {\url{http://www.freehaven.net/papers.html}},
  895. @InProceedings{casc-rep,
  896. author = {Roger Dingledine and Paul Syverson},
  897. title = {{Reliable MIX Cascade Networks through Reputation}},
  898. booktitle = {Financial Cryptography},
  899. year = 2002,
  900. editor = {Matt Blaze},
  901. publisher = {Springer-Verlag, LNCS 2357},
  902. }
  903. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  904. @InProceedings{zhou96certified,
  905. author = {Zhou and Gollmann},
  906. title = {Certified Electronic Mail},
  907. booktitle = {{ESORICS: European Symposium on Research in Computer
  908. Security}},
  909. publisher = {Springer-Verlag, LNCS 1146},
  910. year = {1996},
  911. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  912. }
  913. @Misc{realtime-mix,
  914. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  915. Birgit Pfitzmann and Michael Waidner},
  916. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  917. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  918. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  919. }
  920. @InProceedings{danezis:pet2003,
  921. author = {George Danezis},
  922. title = {Mix-networks with Restricted Routes},
  923. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  924. year = 2003,
  925. editor = {Roger Dingledine},
  926. publisher = {Springer-Verlag LNCS 2760}
  927. }
  928. @InProceedings{gap-pets03,
  929. author = {Krista Bennett and Christian Grothoff},
  930. title = {{GAP} -- practical anonymous networking},
  931. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  932. year = 2003,
  933. editor = {Roger Dingledine},
  934. publisher = {Springer-Verlag LNCS 2760}
  935. }
  936. @Article{hordes-jcs,
  937. author = {Brian Neal Levine and Clay Shields},
  938. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  939. journal = {Journal of Computer Security},
  940. year = 2002,
  941. volume = 10,
  942. number = 3,
  943. pages = {213--240}
  944. }
  945. @TechReport{herbivore,
  946. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  947. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  948. institution = {Cornell University Computing and Information Science},
  949. year = 2003,
  950. type = {Technical Report},
  951. number = {TR2003-1890},
  952. month = {February}
  953. }
  954. @InProceedings{p5,
  955. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  956. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  957. booktitle = {IEEE Symposium on Security and Privacy},
  958. pages = {58--70},
  959. year = 2002,
  960. publisher = {IEEE CS}
  961. }
  962. @phdthesis{ian-thesis,
  963. title = {A Pseudonymous Communications Infrastructure for the Internet},
  964. author = {Ian Goldberg},
  965. school = {UC Berkeley},
  966. year = {2000},
  967. month = {Dec},
  968. }
  969. @Article{taz,
  970. author = {Ian Goldberg and David Wagner},
  971. title = {TAZ Servers and the Rewebber Network: Enabling
  972. Anonymous Publishing on the World Wide Web},
  973. journal = {First Monday},
  974. year = 1998,
  975. volume = 3,
  976. number = 4,
  977. month = {August},
  978. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  979. }
  980. @Misc{tcp-over-tcp-is-bad,
  981. key = {tcp-over-tcp-is-bad},
  982. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  983. author = {Olaf Titz},
  984. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  985. }
  986. @inproceedings{wright02,
  987. title = {An Analysis of the Degradation of Anonymous Protocols},
  988. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  989. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  990. year = {2002},
  991. month = {February},
  992. publisher = {IEEE},
  993. }
  994. @inproceedings{wright03,
  995. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  996. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  997. booktitle = {IEEE Symposium on Security and Privacy},
  998. pages= {28--41},
  999. year = {2003},
  1000. month = {May},
  1001. publisher = {IEEE CS},
  1002. }
  1003. @InProceedings{attack-tor-oak05,
  1004. author = {Steven J. Murdoch and George Danezis},
  1005. title = {Low-cost Traffic Analysis of Tor},
  1006. booktitle = {IEEE Symposium on Security and Privacy},
  1007. year = 2005,
  1008. month = {May},
  1009. publisher = {IEEE CS}
  1010. }
  1011. @Misc{jap-backdoor,
  1012. author={{The AN.ON Project}},
  1013. howpublished={Press release},
  1014. year={2003},
  1015. month={September},
  1016. title={German Police proceeds against anonymity service},
  1017. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  1018. }
  1019. @article{shsm03,
  1020. title = {Using Caching for Browsing Anonymity},
  1021. author = {Anna Shubina and Sean Smith},
  1022. journal = {ACM SIGEcom Exchanges},
  1023. volume = {4},
  1024. number = {2},
  1025. year = {2003},
  1026. month = {Sept},
  1027. note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
  1028. }
  1029. @inproceedings{tor-design,
  1030. title = {Tor: The Second-Generation Onion Router},
  1031. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1032. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  1033. year = {2004},
  1034. month = {August},
  1035. note = {\url{http://tor.eff.org/tor-design.pdf}}
  1036. }
  1037. @inproceedings{flow-correlation04,
  1038. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  1039. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  1040. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1041. year = {2004},
  1042. month = {May},
  1043. series = {LNCS},
  1044. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1045. }
  1046. @InProceedings{danezis:pet2004,
  1047. author = "George Danezis",
  1048. title = "The Traffic Analysis of Continuous-Time Mixes",
  1049. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1050. editor = {David Martin and Andrei Serjantov},
  1051. month = {May},
  1052. year = {2004},
  1053. series = {LNCS},
  1054. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1055. }
  1056. @inproceedings{feamster:wpes2004,
  1057. title = {Location Diversity in Anonymity Networks},
  1058. author = {Nick Feamster and Roger Dingledine},
  1059. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1060. year = {2004},
  1061. month = {October},
  1062. address = {Washington, DC, USA},
  1063. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1064. }
  1065. @inproceedings{koepsell:wpes2004,
  1066. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1067. author = {Stefan K\"opsell and Ulf Hilling},
  1068. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1069. year = {2004},
  1070. month = {October},
  1071. address = {Washington, DC, USA},
  1072. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1073. }
  1074. @inproceedings{sync-batching,
  1075. title = {Synchronous Batching: From Cascades to Free Routes},
  1076. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1077. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1078. editor = {David Martin and Andrei Serjantov},
  1079. year = {2004},
  1080. month = {May},
  1081. series = {LNCS},
  1082. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1083. }
  1084. @InProceedings{e2e-traffic,
  1085. author = "Nick Mathewson and Roger Dingledine",
  1086. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1087. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1088. editor = {David Martin and Andrei Serjantov},
  1089. month = {May},
  1090. year = {2004},
  1091. series = {LNCS},
  1092. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1093. }
  1094. @Misc{dtls,
  1095. author = {E. Rescorla and N. Modadugu},
  1096. title = {{Datagram Transport Layer Security}},
  1097. howpublished = {IETF Draft},
  1098. month = {December},
  1099. year = {2003},
  1100. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1101. }
  1102. @InProceedings{usability-network-effect,
  1103. author={Roger Dingledine and Nick Mathewson},
  1104. title={Anonymity Loves Company: Usability and the Network Effect},
  1105. booktitle = {Designing Security Systems That People Can Use},
  1106. year = {2005},
  1107. publisher = {O'Reilly Media},
  1108. }
  1109. @inproceedings{usability:weis2006,
  1110. title = {Anonymity Loves Company: Usability and the Network Effect},
  1111. author = {Roger Dingledine and Nick Mathewson},
  1112. booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
  1113. (WEIS 2006)},
  1114. year = {2006},
  1115. month = {June},
  1116. address = {Cambridge, UK},
  1117. bookurl = {http://weis2006.econinfosec.org/},
  1118. note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
  1119. }
  1120. @Misc{six-four,
  1121. key = {six-four},
  1122. title = {{The Six/Four System}},
  1123. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1124. }
  1125. @inproceedings{clayton:pet2006,
  1126. title = {Ignoring the Great Firewall of China},
  1127. author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  1128. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1129. year = {2006},
  1130. month = {June},
  1131. address = {Cambridge, UK},
  1132. publisher = {Springer},
  1133. bookurl = {http://petworkshop.org/2006/},
  1134. note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
  1135. }
  1136. @Misc{zuckerman-threatmodels,
  1137. key = {zuckerman-threatmodels},
  1138. title = {We've got to adjust some of our threat models},
  1139. author = {Ethan Zuckerman},
  1140. note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
  1141. }
  1142. @Misc{cgiproxy,
  1143. key = {cgiproxy},
  1144. title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
  1145. author = {James Marshall},
  1146. note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
  1147. }
  1148. @Misc{circumventor,
  1149. key = {circumventor},
  1150. title = {{How to install the Circumventor program}},
  1151. author = {Bennett Haselton},
  1152. note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
  1153. }
  1154. @Misc{psiphon,
  1155. key = {psiphon},
  1156. title = {Psiphon},
  1157. author = {Ronald Deibert et al},
  1158. note = {\url{http://psiphon.civisec.org/}}
  1159. }
  1160. @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
  1161. title = {Embedding Covert Channels into {TCP/IP}},
  1162. booktitle = {Information Hiding: 7th International Workshop},
  1163. pages = {247--261},
  1164. year = {2005},
  1165. editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
  1166. Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
  1167. volume = {3727},
  1168. series = {LNCS},
  1169. address = {Barcelona, Catalonia (Spain)},
  1170. month = {June},
  1171. publisher = {Springer-Verlag},
  1172. url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
  1173. }
  1174. @phdthesis{blossom-thesis,
  1175. title = {Perspective Access Networks},
  1176. author = {Geoffrey Goodell},
  1177. school = {Harvard University},
  1178. year = {2006},
  1179. month = {July},
  1180. note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
  1181. }
  1182. @inproceedings{tap:pet2006,
  1183. title = {On the Security of the Tor Authentication Protocol},
  1184. author = {Ian Goldberg},
  1185. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1186. year = {2006},
  1187. month = {June},
  1188. address = {Cambridge, UK},
  1189. publisher = {Springer},
  1190. bookurl = {http://petworkshop.org/2006/},
  1191. note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
  1192. }
  1193. @inproceedings{rep-anon,
  1194. title = {{Reputation in P2P Anonymity Systems}},
  1195. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1196. booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
  1197. year = {2003},
  1198. month = {June},
  1199. note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
  1200. }
  1201. @misc{tor-challenges,
  1202. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1203. title = {Challenges in deploying low-latency anonymity},
  1204. year = {2005},
  1205. note = {Manuscript}
  1206. }
  1207. @InProceedings{chaum-blind,
  1208. author = {David Chaum},
  1209. title = {Blind Signatures for Untraceable Payments},
  1210. booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
  1211. pages = {199--203},
  1212. year = 1983,
  1213. editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
  1214. publisher = {Plenum Press}
  1215. }
  1216. @Article{netauth,
  1217. author = {Geoffrey Goodell and Paul Syverson},
  1218. title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},
  1219. journal = {Communications of the ACM},
  1220. year = 2007,
  1221. volume = 50,
  1222. number = 5,
  1223. pages = {113--117},
  1224. month = {May}
  1225. }
  1226. @misc{ip-to-country,
  1227. key = {ip-to-country},
  1228. title = {IP-to-country database},
  1229. note = {\url{http://ip-to-country.webhosting.info/}},
  1230. }
  1231. @misc{mackinnon-personal,
  1232. author = {Rebecca MacKinnon},
  1233. title = {Private communication},
  1234. year = {2006},
  1235. }
  1236. @inproceedings{pet05-bissias,
  1237. title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
  1238. author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
  1239. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  1240. year = {2005},
  1241. month = {May},
  1242. note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
  1243. }
  1244. @InProceedings{infranet,
  1245. author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
  1246. title = {Infranet: Circumventing Web Censorship and Surveillance},
  1247. booktitle = {Proceedings of the 11th USENIX Security Symposium},
  1248. year = {2002},
  1249. month = {August},
  1250. note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
  1251. }
  1252. @techreport{ ptacek98insertion,
  1253. author = "Thomas H. Ptacek and Timothy N. Newsham",
  1254. title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
  1255. institution = "Secure Networks, Inc.",
  1256. address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
  1257. year = "1998",
  1258. url = "citeseer.ist.psu.edu/ptacek98insertion.html",
  1259. }
  1260. @inproceedings{active-wardens,
  1261. author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
  1262. title = "Eliminating Steganography in Internet Traffic with Active Wardens",
  1263. booktitle = {Information Hiding Workshop (IH 2002)},
  1264. year = {2002},
  1265. month = {October},
  1266. editor = {Fabien Petitcolas},
  1267. publisher = {Springer-Verlag, LNCS 2578},
  1268. }
  1269. %%% Local Variables:
  1270. %%% mode: latex
  1271. %%% TeX-master: "tor-design"
  1272. %%% End: