tor-design.bib 49 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493
  1. % hs-attack
  2. @inproceedings{hs-attack,
  3. title = {Locating Hidden Servers},
  4. author = {Lasse {\O}verlier and Paul Syverson},
  5. booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
  6. year = {2006},
  7. month = {May},
  8. publisher = {IEEE CS},
  9. }
  10. @TechReport{bauer:tr2007,
  11. author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  12. title = {Low-Resource Routing Attacks Against Anonymous Systems},
  13. institution = {University of Colorado at Boulder},
  14. year = 2007,
  15. number = {CU-CS-1025-07}
  16. }
  17. @inproceedings{bauer:wpes2007,
  18. title = {Low-Resource Routing Attacks Against Tor},
  19. author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  20. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}},
  21. year = {2007},
  22. month = {October},
  23. address = {Washington, DC, USA},
  24. }
  25. % fix me
  26. @misc{tannenbaum96,
  27. author = "Andrew Tannenbaum",
  28. title = "Computer Networks",
  29. year = "1996",
  30. publisher = "Prentice Hall, 3rd edition",
  31. }
  32. @article{ meadows96,
  33. author = "Catherine Meadows",
  34. title = "The {NRL} Protocol Analyzer: An Overview",
  35. journal = "Journal of Logic Programming",
  36. volume = "26",
  37. number = "2",
  38. pages = "113--131",
  39. year = "1996",
  40. }
  41. @inproceedings{kesdogan:pet2002,
  42. title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
  43. alternative to the MIX based Approach?},
  44. author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
  45. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  46. year = {2002},
  47. month = {April},
  48. editor = {Roger Dingledine and Paul Syverson},
  49. publisher = {Springer-Verlag, LNCS 2482},
  50. }
  51. @inproceedings{statistical-disclosure,
  52. title = {Statistical Disclosure Attacks},
  53. author = {George Danezis},
  54. booktitle = {Security and Privacy in the Age of Uncertainty ({SEC2003})},
  55. organization = {{IFIP TC11}},
  56. year = {2003},
  57. month = {May},
  58. address = {Athens},
  59. pages = {421--426},
  60. publisher = {Kluwer},
  61. }
  62. @inproceedings{limits-open,
  63. title = {Limits of Anonymity in Open Environments},
  64. author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
  65. booktitle = {Information Hiding Workshop (IH 2002)},
  66. year = {2002},
  67. month = {October},
  68. editor = {Fabien Petitcolas},
  69. publisher = {Springer-Verlag, LNCS 2578},
  70. }
  71. @inproceedings{isdn-mixes,
  72. title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  73. author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  74. booktitle = {GI/ITG Conference on Communication in Distributed Systems},
  75. year = {1991},
  76. month = {February},
  77. pages = {451-463},
  78. }
  79. @Article{jerichow-jsac98,
  80. author = {Anja Jerichow and Jan M\"{u}ller and Andreas
  81. Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  82. title = {Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol},
  83. journal = {IEEE Journal on Selected Areas in Communications},
  84. year = 1998,
  85. volume = 16,
  86. number = 4,
  87. pages = {495--509},
  88. month = {May}
  89. }
  90. @inproceedings{tarzan:ccs02,
  91. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  92. author = {Michael J. Freedman and Robert Morris},
  93. booktitle = {9th {ACM} {C}onference on {C}omputer and {C}ommunications
  94. {S}ecurity ({CCS 2002})},
  95. year = {2002},
  96. month = {November},
  97. address = {Washington, DC},
  98. }
  99. @inproceedings{cebolla,
  100. title = {{Cebolla: Pragmatic IP Anonymity}},
  101. author = {Zach Brown},
  102. booktitle = {Ottawa Linux Symposium},
  103. year = {2002},
  104. month = {June},
  105. }
  106. @inproceedings{eax,
  107. author = "M. Bellare and P. Rogaway and D. Wagner",
  108. title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
  109. booktitle = {Fast Software Encryption 2004},
  110. month = {February},
  111. year = {2004},
  112. }
  113. @misc{darkside,
  114. title = {{The Dark Side of the Web: An Open Proxy's View}},
  115. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  116. note = {\newline \url{http://codeen.cs.princeton.edu/}},
  117. }
  118. % note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  119. @Misc{anonymizer,
  120. key = {anonymizer},
  121. title = {The {Anonymizer}},
  122. note = {\url{http://anonymizer.com/}}
  123. }
  124. @Misc{privoxy,
  125. key = {privoxy},
  126. title = {{Privoxy}},
  127. note = {\url{http://www.privoxy.org/}}
  128. }
  129. @Misc{i2p,
  130. key = {i2p},
  131. title = {{I2P}},
  132. note = {\url{http://www.i2p.net/}}
  133. }
  134. @Misc{nym,
  135. author = {Jason Holt},
  136. title = {nym: practical pseudonymity for anonymous networks},
  137. note = {Paper and source code at \url{http://www.lunkwill.org/src/nym/}}
  138. }
  139. @InProceedings{nymble,
  140. author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
  141. title = {Nymble: Anonymous {IP}-address Blocking},
  142. booktitle = {Privacy Enhancing Technologies (PET 2007)},
  143. year = 2007,
  144. publisher = {Springer-Verlag, LNCS 4776}
  145. }
  146. @inproceedings{anonnet,
  147. title = {{Analysis of an Anonymity Network for Web Browsing}},
  148. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  149. David Hutchison},
  150. booktitle = {{IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  151. 2002)}},
  152. year = {2002},
  153. month = {June},
  154. address = {Pittsburgh, USA},
  155. }
  156. % pages = {49--54},
  157. @inproceedings{econymics,
  158. title = {On the Economics of Anonymity},
  159. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  160. booktitle = {Financial Cryptography},
  161. year = {2003},
  162. editor = {Rebecca N. Wright},
  163. publisher = {Springer-Verlag, LNCS 2742},
  164. }
  165. @inproceedings{defensive-dropping,
  166. title = {Timing Analysis in Low-Latency Mix-Based Systems},
  167. author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
  168. booktitle = {Financial Cryptography},
  169. year = {2004},
  170. editor = {Ari Juels},
  171. publisher = {Springer-Verlag, LNCS (forthcoming)},
  172. }
  173. @inproceedings{morphmix:fc04,
  174. title = {Practical Anonymity for the Masses with MorphMix},
  175. author = {Marc Rennhard and Bernhard Plattner},
  176. booktitle = {Financial Cryptography},
  177. year = {2004},
  178. editor = {Ari Juels},
  179. publisher = {Springer-Verlag, LNCS (forthcoming)},
  180. }
  181. @inproceedings{eternity,
  182. title = {The Eternity Service},
  183. author = {Ross Anderson},
  184. booktitle = {Pragocrypt '96},
  185. year = {1996},
  186. }
  187. %note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  188. @inproceedings{minion-design,
  189. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  190. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  191. booktitle = {2003 IEEE Symposium on Security and Privacy},
  192. year = {2003},
  193. month = {May},
  194. publisher = {IEEE CS},
  195. pages = {2--15},
  196. }
  197. %note = {\url{http://mixminion.net/minion-design.pdf}},
  198. @inproceedings{ rao-pseudonymity,
  199. author = "Josyula R. Rao and Pankaj Rohatgi",
  200. title = "Can Pseudonymity Really Guarantee Privacy?",
  201. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  202. year = {2000},
  203. month = Aug,
  204. publisher = {USENIX},
  205. pages = "85--96",
  206. }
  207. %note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  208. %full_papers/rao/rao.pdf}},
  209. @InProceedings{pfitzmann90how,
  210. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  211. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  212. booktitle = {Eurocrypt 89},
  213. publisher = {Springer-Verlag, LNCS 434},
  214. year = {1990},
  215. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  216. }
  217. @Misc{tor-spec,
  218. author = {Roger Dingledine and Nick Mathewson},
  219. title = {Tor Protocol Specifications},
  220. note = {\url{https://www.torproject.org/svn/trunk/doc/tor-spec.txt}},
  221. }
  222. @Misc{incentives-txt,
  223. author = {Roger Dingledine and Nick Mathewson},
  224. title = {Tor Incentives Design Brainstorms},
  225. note = {\url{https://www.torproject.org/svn/trunk/doc/incentives.txt}},
  226. }
  227. @InProceedings{BM:mixencrypt,
  228. author = {M{\"o}ller, Bodo},
  229. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  230. booktitle = {{CT-RSA} 2003},
  231. publisher = {Springer-Verlag, LNCS 2612},
  232. year = 2003,
  233. }
  234. @InProceedings{back01,
  235. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  236. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  237. booktitle = {Information Hiding (IH 2001)},
  238. pages = {245--257},
  239. year = 2001,
  240. editor = {Ira S. Moskowitz},
  241. publisher = {Springer-Verlag, LNCS 2137},
  242. }
  243. %note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  244. @InProceedings{rackoff93cryptographic,
  245. author = {Charles Rackoff and Daniel R. Simon},
  246. title = {Cryptographic Defense Against Traffic Analysis},
  247. booktitle = {{ACM} Symposium on Theory of Computing},
  248. pages = {672--681},
  249. year = {1993},
  250. }
  251. %note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  252. @InProceedings{freehaven-berk,
  253. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  254. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  255. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  256. on Design Issue in Anonymity and Unobservability},
  257. year = 2000,
  258. month = {July},
  259. editor = {H. Federrath},
  260. publisher = {Springer-Verlag, LNCS 2009},
  261. }
  262. @InProceedings{move-ndss05,
  263. author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein},
  264. title = {MOVE: An End-to-End Solution To Network Denial of Service},
  265. booktitle = {{ISOC Network and Distributed System Security Symposium (NDSS05)}},
  266. year = 2005,
  267. month = {February},
  268. publisher = {Internet Society}
  269. }
  270. %note = {\url{http://freehaven.net/papers.html}},
  271. @InProceedings{raymond00,
  272. author = {J. F. Raymond},
  273. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  274. and Open Problems}},
  275. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  276. on Design Issue in Anonymity and Unobservability},
  277. year = 2000,
  278. month = {July},
  279. pages = {10-29},
  280. editor = {H. Federrath},
  281. publisher = {Springer-Verlag, LNCS 2009},
  282. }
  283. @InProceedings{sybil,
  284. author = "John Douceur",
  285. title = {{The Sybil Attack}},
  286. booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
  287. month = Mar,
  288. year = 2002,
  289. }
  290. @InCollection{price-privacy,
  291. author = {Paul Syverson and Adam Shostack},
  292. editor = {L. Jean Camp and Stephen Lewis},
  293. title = {What Price Privacy? (and why identity theft is about neither identity nor theft)},
  294. booktitle = {Economics of Information Security},
  295. chapter = 10,
  296. publisher = {Kluwer},
  297. year = 2004,
  298. pages = {129--142}
  299. }
  300. @InProceedings{trickle02,
  301. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  302. title = {From a Trickle to a Flood: Active Attacks on Several
  303. Mix Types},
  304. booktitle = {Information Hiding (IH 2002)},
  305. year = {2002},
  306. editor = {Fabien Petitcolas},
  307. publisher = {Springer-Verlag, LNCS 2578},
  308. }
  309. @InProceedings{langos02,
  310. author = {Oliver Berthold and Heinrich Langos},
  311. title = {Dummy Traffic Against Long Term Intersection Attacks},
  312. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  313. year = {2002},
  314. editor = {Roger Dingledine and Paul Syverson},
  315. publisher = {Springer-Verlag, LNCS 2482}
  316. }
  317. @InProceedings{hintz-pet02,
  318. author = {Andrew Hintz},
  319. title = {Fingerprinting Websites Using Traffic Analysis},
  320. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  321. pages = {171--178},
  322. year = 2002,
  323. editor = {Roger Dingledine and Paul Syverson},
  324. publisher = {Springer-Verlag, LNCS 2482}
  325. }
  326. @InProceedings{or-discex00,
  327. author = {Paul Syverson and Michael Reed and David Goldschlag},
  328. title = {{O}nion {R}outing Access Configurations},
  329. booktitle = {DARPA Information Survivability Conference and
  330. Exposition (DISCEX 2000)},
  331. year = {2000},
  332. publisher = {IEEE CS Press},
  333. pages = {34--40},
  334. volume = {1},
  335. }
  336. %note = {\newline \url{http://www.onion-router.net/Publications.html}},
  337. @Inproceedings{or-pet00,
  338. title = {{Towards an Analysis of Onion Routing Security}},
  339. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  340. Carl Landwehr},
  341. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  342. on Design Issue in Anonymity and Unobservability},
  343. year = 2000,
  344. month = {July},
  345. pages = {96--114},
  346. editor = {H. Federrath},
  347. publisher = {Springer-Verlag, LNCS 2009},
  348. }
  349. %note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  350. @Inproceedings{freenet-pets00,
  351. title = {Freenet: A Distributed Anonymous Information Storage
  352. and Retrieval System},
  353. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  354. Theodore W. Hong},
  355. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  356. on Design Issue in Anonymity and Unobservability},
  357. year = 2000,
  358. month = {July},
  359. pages = {46--66},
  360. editor = {H. Federrath},
  361. publisher = {Springer-Verlag, LNCS 2009},
  362. }
  363. %note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  364. @InProceedings{or-ih96,
  365. author = {David M. Goldschlag and Michael G. Reed and Paul
  366. F. Syverson},
  367. title = {Hiding Routing Information},
  368. booktitle = {Information Hiding, First International Workshop},
  369. pages = {137--150},
  370. year = 1996,
  371. editor = {R. Anderson},
  372. month = {May},
  373. publisher = {Springer-Verlag, LNCS 1174},
  374. }
  375. @InProceedings{federrath-ih96,
  376. author = {Hannes Federrath and Anja Jerichow and Andreas Pfitzmann},
  377. title = {{MIXes} in Mobile Communication Systems: Location
  378. Management with Privacy},
  379. booktitle = {Information Hiding, First International Workshop},
  380. pages = {121--135},
  381. year = 1996,
  382. editor = {R. Anderson},
  383. month = {May},
  384. publisher = {Springer-Verlag, LNCS 1174},
  385. }
  386. @InProceedings{reed-protocols97,
  387. author = {Michael G. Reed and Paul F. Syverson and David
  388. M. Goldschlag},
  389. title = {Protocols Using Anonymous Connections: Mobile Applications},
  390. booktitle = {Security Protocols: 5th International Workshop},
  391. pages = {13--23},
  392. year = 1997,
  393. editor = {Bruce Christianson and Bruno Crispo and Mark Lomas
  394. and Michael Roe},
  395. month = {April},
  396. publisher = {Springer-Verlag, LNCS 1361}
  397. }
  398. @Article{or-jsac98,
  399. author = {Michael G. Reed and Paul F. Syverson and David
  400. M. Goldschlag},
  401. title = {Anonymous Connections and Onion Routing},
  402. journal = {IEEE Journal on Selected Areas in Communications},
  403. year = 1998,
  404. volume = 16,
  405. number = 4,
  406. pages = {482--494},
  407. month = {May},
  408. }
  409. %note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  410. @Misc{TLS,
  411. author = {T. Dierks and C. Allen},
  412. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  413. howpublished = {IETF RFC 2246},
  414. month = {January},
  415. year = {1999},
  416. }
  417. %note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  418. @Misc{SMTP,
  419. author = {J. Postel},
  420. title = {Simple {M}ail {T}ransfer {P}rotocol},
  421. howpublished = {IETF RFC 2821 (also STD0010)},
  422. month = {April},
  423. year = {2001},
  424. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  425. }
  426. @Misc{IMAP,
  427. author = {M. Crispin},
  428. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  429. howpublished = {IETF RFC 2060},
  430. month = {December},
  431. year = {1996},
  432. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  433. }
  434. @misc{pipenet,
  435. title = {PipeNet 1.1},
  436. author = {Wei Dai},
  437. year = 1996,
  438. month = {August},
  439. howpublished = {Usenet post},
  440. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  441. in a post to the cypherpunks list, Feb.\ 1995.},
  442. }
  443. @Misc{POP3,
  444. author = {J. Myers and M. Rose},
  445. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  446. howpublished = {IETF RFC 1939 (also STD0053)},
  447. month = {May},
  448. year = {1996},
  449. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  450. }
  451. @InProceedings{shuffle,
  452. author = {C. Andrew Neff},
  453. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  454. booktitle = {8th ACM Conference on Computer and Communications
  455. Security (CCS-8)},
  456. pages = {116--125},
  457. year = 2001,
  458. editor = {P. Samarati},
  459. month = {November},
  460. publisher = {ACM Press},
  461. }
  462. %note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  463. % technicaldocs/shuffle.pdf}},
  464. @InProceedings{dolev91,
  465. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  466. title = {Non-Malleable Cryptography},
  467. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  468. pages = {542--552},
  469. year = 1991,
  470. note = {Updated version at
  471. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  472. }
  473. @TechReport{rsw96,
  474. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  475. title = {Time-lock puzzles and timed-release Crypto},
  476. year = 1996,
  477. type = {MIT LCS technical memo},
  478. number = {MIT/LCS/TR-684},
  479. month = {February},
  480. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  481. }
  482. @InProceedings{web-mix,
  483. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  484. title = {Web {MIX}es: A system for anonymous and unobservable
  485. {I}nternet access},
  486. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  487. on Design Issue in Anonymity and Unobservability},
  488. editor = {H. Federrath},
  489. publisher = {Springer-Verlag, LNCS 2009},
  490. year = {2000},
  491. }
  492. % pages = {115--129},
  493. @InProceedings{disad-free-routes,
  494. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  495. title = {The disadvantages of free {MIX} routes and how to overcome
  496. them},
  497. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  498. on Design Issue in Anonymity and Unobservability},
  499. pages = {30--45},
  500. year = 2000,
  501. editor = {H. Federrath},
  502. publisher = {Springer-Verlag, LNCS 2009},
  503. }
  504. %note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  505. % disadvantages_berthold.pdf}},
  506. @InProceedings{boneh00,
  507. author = {Dan Boneh and Moni Naor},
  508. title = {Timed Commitments},
  509. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  510. pages = {236--254},
  511. year = 2000,
  512. publisher = {Springer-Verlag, LNCS 1880},
  513. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  514. }
  515. @InProceedings{goldschlag98,
  516. author = {David M. Goldschlag and Stuart G. Stubblebine},
  517. title = {Publicly Verifiable Lotteries: Applications of
  518. Delaying Functions},
  519. booktitle = {Financial Cryptography},
  520. pages = {214--226},
  521. year = 1998,
  522. publisher = {Springer-Verlag, LNCS 1465},
  523. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  524. }
  525. @InProceedings{syverson98,
  526. author = {Paul Syverson},
  527. title = {Weakly Secret Bit Commitment: Applications to
  528. Lotteries and Fair Exchange},
  529. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  530. pages = {2--13},
  531. year = 1998,
  532. address = {Rockport Massachusetts},
  533. month = {June},
  534. publisher = {IEEE CS Press},
  535. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  536. }
  537. @Misc{shoup-iso,
  538. author = {Victor Shoup},
  539. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  540. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  541. }
  542. @Misc{shoup-oaep,
  543. author = {Victor Shoup},
  544. title = {{OAEP} Reconsidered},
  545. howpublished = {{IACR} e-print 2000/060},
  546. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  547. }
  548. @Misc{oaep-still-alive,
  549. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  550. title = {{RSA}-{OAEP} is Still Alive!},
  551. howpublished = {{IACR} e-print 2000/061},
  552. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  553. }
  554. @misc{echolot,
  555. author = {Peter Palfrader},
  556. title = {Echolot: a pinger for anonymous remailers},
  557. note = {\url{http://www.palfrader.org/echolot/}},
  558. }
  559. @Misc{mixmaster-attacks,
  560. author = {Lance Cottrell},
  561. title = {Mixmaster and Remailer Attacks},
  562. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  563. }
  564. @Misc{mixmaster-spec,
  565. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  566. Palfrader and Len Sassaman},
  567. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  568. year = {2003},
  569. month = {July},
  570. howpublished = {Draft},
  571. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  572. }
  573. @InProceedings{puzzles-tls,
  574. author = "Drew Dean and Adam Stubblefield",
  575. title = {{Using Client Puzzles to Protect TLS}},
  576. booktitle = "Proceedings of the 10th USENIX Security Symposium",
  577. year = {2001},
  578. month = Aug,
  579. publisher = {USENIX},
  580. }
  581. @InProceedings{breadpudding,
  582. author = {Markus Jakobsson and Ari Juels},
  583. title = {Proofs of Work and Bread Pudding Protocols},
  584. booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working
  585. Conference on Communications and Multimedia Security
  586. (CMS '99)},
  587. year = 1999,
  588. month = {September},
  589. publisher = {Kluwer}
  590. }
  591. @Misc{hashcash,
  592. author = {Adam Back},
  593. title = {Hash cash},
  594. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  595. }
  596. @InProceedings{oreilly-acc,
  597. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  598. title = {Accountability},
  599. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  600. Technology},
  601. year = {2001},
  602. publisher = {O'Reilly and Associates},
  603. }
  604. @InProceedings{han,
  605. author = {Yongfei Han},
  606. title = {Investigation of non-repudiation protocols},
  607. booktitle = {ACISP '96},
  608. year = 1996,
  609. publisher = {Springer-Verlag},
  610. }
  611. @Misc{socks5,
  612. key = {socks5},
  613. title = {{SOCKS} {P}rotocol {V}ersion 5},
  614. howpublished= {IETF RFC 1928},
  615. month = {March},
  616. year = 1996,
  617. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  618. }
  619. @InProceedings{abe,
  620. author = {Masayuki Abe},
  621. title = {Universally Verifiable {MIX} With Verification Work Independent of
  622. The Number of {MIX} Servers},
  623. booktitle = {{EUROCRYPT} 1998},
  624. year = {1998},
  625. publisher = {Springer-Verlag, LNCS 1403},
  626. }
  627. @InProceedings{desmedt,
  628. author = {Yvo Desmedt and Kaoru Kurosawa},
  629. title = {How To Break a Practical {MIX} and Design a New One},
  630. booktitle = {{EUROCRYPT} 2000},
  631. year = {2000},
  632. publisher = {Springer-Verlag, LNCS 1803},
  633. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  634. }
  635. @InProceedings{mitkuro,
  636. author = {M. Mitomo and K. Kurosawa},
  637. title = {{Attack for Flash MIX}},
  638. booktitle = {{ASIACRYPT} 2000},
  639. year = {2000},
  640. publisher = {Springer-Verlag, LNCS 1976},
  641. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  642. }
  643. @InProceedings{hybrid-mix,
  644. author = {M. Ohkubo and M. Abe},
  645. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  646. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  647. year = {2000},
  648. publisher = {Springer-Verlag, LNCS 1976},
  649. }
  650. @InProceedings{PShuffle,
  651. author = {Jun Furukawa and Kazue Sako},
  652. title = {An Efficient Scheme for Proving a Shuffle},
  653. editor = {Joe Kilian},
  654. booktitle = {CRYPTO 2001},
  655. year = {2001},
  656. publisher = {Springer-Verlag, LNCS 2139},
  657. }
  658. @InProceedings{jakobsson-optimally,
  659. author = "Markus Jakobsson and Ari Juels",
  660. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  661. booktitle = {Principles of Distributed Computing - {PODC} '01},
  662. year = "2001",
  663. publisher = {ACM Press},
  664. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  665. }
  666. @InProceedings{kesdogan,
  667. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  668. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  669. System},
  670. booktitle = {Information Hiding (IH 1998)},
  671. year = {1998},
  672. publisher = {Springer-Verlag, LNCS 1525},
  673. }
  674. %note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  675. @InProceedings{socks4,
  676. author = {David Koblas and Michelle R. Koblas},
  677. title = {{SOCKS}},
  678. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  679. Symposium)},
  680. pages = {77--83},
  681. year = 1992,
  682. publisher = {USENIX},
  683. }
  684. @InProceedings{flash-mix,
  685. author = {Markus Jakobsson},
  686. title = {Flash {M}ixing},
  687. booktitle = {Principles of Distributed Computing - {PODC} '99},
  688. year = {1999},
  689. publisher = {ACM Press},
  690. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  691. }
  692. @InProceedings{SK,
  693. author = {Joe Kilian and Kazue Sako},
  694. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  695. the Implementation of a Voting Booth},
  696. booktitle = {EUROCRYPT '95},
  697. year = {1995},
  698. publisher = {Springer-Verlag},
  699. }
  700. @InProceedings{OAEP,
  701. author = {M. Bellare and P. Rogaway},
  702. year = {1994},
  703. booktitle = {EUROCRYPT '94},
  704. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  705. {RSA}},
  706. publisher = {Springer-Verlag},
  707. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  708. }
  709. @inproceedings{babel,
  710. title = {Mixing {E}-mail With {B}abel},
  711. author = {Ceki G\"ulc\"u and Gene Tsudik},
  712. booktitle = {{Network and Distributed Security Symposium (NDSS 96)}},
  713. year = 1996,
  714. month = {February},
  715. pages = {2--16},
  716. publisher = {IEEE},
  717. }
  718. %note = {\url{http://citeseer.nj.nec.com/2254.html}},
  719. @Misc{rprocess,
  720. author = {RProcess},
  721. title = {Selective Denial of Service Attacks},
  722. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  723. }
  724. @Article{remailer-history,
  725. author = {Sameer Parekh},
  726. title = {Prospects for Remailers},
  727. journal = {First Monday},
  728. volume = {1},
  729. number = {2},
  730. month = {August},
  731. year = {1996},
  732. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  733. }
  734. @Article{chaum-mix,
  735. author = {David Chaum},
  736. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  737. journal = {Communications of the ACM},
  738. year = {1981},
  739. volume = {4},
  740. number = {2},
  741. month = {February},
  742. }
  743. %note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  744. @InProceedings{nym-alias-net,
  745. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  746. title = {{The Design, Implementation and Operation of an Email
  747. Pseudonym Server}},
  748. booktitle = {$5^{th}$ ACM Conference on Computer and
  749. Communications Security (CCS'98)},
  750. year = 1998,
  751. publisher = {ACM Press},
  752. }
  753. %note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  754. @InProceedings{tangler,
  755. author = {Marc Waldman and David Mazi\`{e}res},
  756. title = {Tangler: A Censorship-Resistant Publishing System
  757. Based on Document Entanglements},
  758. booktitle = {$8^{th}$ ACM Conference on Computer and
  759. Communications Security (CCS-8)},
  760. pages = {86--135},
  761. year = 2001,
  762. publisher = {ACM Press},
  763. }
  764. %note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  765. @misc{neochaum,
  766. author = {Tim May},
  767. title = {Payment mixes for anonymity},
  768. howpublished = {E-mail archived at
  769. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  770. }
  771. @misc{helsingius,
  772. author = {J. Helsingius},
  773. title = {{\tt anon.penet.fi} press release},
  774. note = {\newline \url{http://www.penet.fi/press-english.html}},
  775. }
  776. @InProceedings{garay97secure,
  777. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  778. title = {Secure distributed storage and retrieval},
  779. booktitle = {11th International Workshop, WDAG '97},
  780. pages = {275--289},
  781. year = {1997},
  782. publisher = {Springer-Verlag, LNCS 1320},
  783. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  784. }
  785. @InProceedings{PIK,
  786. author = {C. Park and K. Itoh and K. Kurosawa},
  787. title = {Efficient anonymous channel and all/nothing election scheme},
  788. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  789. pages = {248--259},
  790. publisher = {Springer-Verlag, LNCS 765},
  791. }
  792. @Misc{pgpfaq,
  793. key = {PGP},
  794. title = {{PGP} {FAQ}},
  795. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  796. }
  797. @Article{riordan-schneier,
  798. author = {James Riordan and Bruce Schneier},
  799. title = {A Certified E-mail Protocol with No Trusted Third Party},
  800. journal = {13th Annual Computer Security Applications Conference},
  801. month = {December},
  802. year = {1998},
  803. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  804. }
  805. @Article{crowds-tissec,
  806. author = {Michael K. Reiter and Aviel D. Rubin},
  807. title = {Crowds: Anonymity for Web Transactions},
  808. journal = {ACM TISSEC},
  809. year = 1998,
  810. volume = 1,
  811. number = 1,
  812. pages = {66--92},
  813. month = {June},
  814. }
  815. %note = {\url{http://citeseer.nj.nec.com/284739.html}}
  816. @Article{crowds-dimacs,
  817. author = {Michael K. Reiter and Aviel D. Rubin},
  818. title = {Crowds: Anonymity for Web Transactions},
  819. journal = {{DIMACS} Technical Report (Revised)},
  820. volume = {97},
  821. number = {15},
  822. month = {August},
  823. year = {1997},
  824. }
  825. @Misc{advogato,
  826. author = {Raph Levien},
  827. title = {Advogato's Trust Metric},
  828. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  829. }
  830. @InProceedings{publius,
  831. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  832. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  833. source-anonymous web publishing system},
  834. booktitle = {Proc. 9th USENIX Security Symposium},
  835. pages = {59--72},
  836. year = {2000},
  837. month = {August},
  838. }
  839. %note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  840. @Misc{freedom-nyms,
  841. author = {Russell Samuels},
  842. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  843. year = {1999},
  844. month = {November},
  845. day = {21},
  846. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  847. }
  848. @techreport{freedom2-arch,
  849. title = {Freedom Systems 2.0 Architecture},
  850. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  851. institution = {Zero Knowledge Systems, {Inc.}},
  852. year = {2000},
  853. month = {December},
  854. type = {White Paper},
  855. day = {18},
  856. }
  857. @techreport{freedom21-security,
  858. title = {Freedom Systems 2.1 Security Issues and Analysis},
  859. author = {Adam Back and Ian Goldberg and Adam Shostack},
  860. institution = {Zero Knowledge Systems, {Inc.}},
  861. year = {2001},
  862. month = {May},
  863. type = {White Paper},
  864. }
  865. @inproceedings{cfs:sosp01,
  866. title = {Wide-area cooperative storage with {CFS}},
  867. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  868. booktitle = {18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  869. year = {2001},
  870. month = {October},
  871. address = {Chateau Lake Louise, Banff, Canada},
  872. }
  873. @inproceedings{SS03,
  874. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  875. author = {Andrei Serjantov and Peter Sewell},
  876. booktitle = {Computer Security -- ESORICS 2003},
  877. publisher = {Springer-Verlag, LNCS 2808},
  878. year = {2003},
  879. month = {October},
  880. }
  881. %note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  882. @Misc{pk-relations,
  883. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  884. title = {Relations Among Notions of Security for Public-Key Encryption
  885. Schemes},
  886. howpublished = {
  887. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  888. Springer-Verlag, 1998.
  889. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  890. }
  891. @InProceedings{mix-acc,
  892. author = {Roger Dingledine and Michael J. Freedman and David
  893. Hopwood and David Molnar},
  894. title = {{A Reputation System to Increase MIX-net
  895. Reliability}},
  896. booktitle = {Information Hiding (IH 2001)},
  897. pages = {126--141},
  898. year = 2001,
  899. editor = {Ira S. Moskowitz},
  900. publisher = {Springer-Verlag, LNCS 2137},
  901. }
  902. %note = {\url{http://www.freehaven.net/papers.html}},
  903. @InProceedings{casc-rep,
  904. author = {Roger Dingledine and Paul Syverson},
  905. title = {{Reliable MIX Cascade Networks through Reputation}},
  906. booktitle = {Financial Cryptography},
  907. year = 2002,
  908. editor = {Matt Blaze},
  909. publisher = {Springer-Verlag, LNCS 2357},
  910. }
  911. %note = {\newline \url{http://www.freehaven.net/papers.html}},
  912. @InProceedings{zhou96certified,
  913. author = {Zhou and Gollmann},
  914. title = {Certified Electronic Mail},
  915. booktitle = {{ESORICS: European Symposium on Research in Computer
  916. Security}},
  917. publisher = {Springer-Verlag, LNCS 1146},
  918. year = {1996},
  919. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  920. }
  921. @Misc{realtime-mix,
  922. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  923. Birgit Pfitzmann and Michael Waidner},
  924. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  925. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  926. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  927. }
  928. @InProceedings{danezis:pet2003,
  929. author = {George Danezis},
  930. title = {Mix-networks with Restricted Routes},
  931. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  932. year = 2003,
  933. editor = {Roger Dingledine},
  934. publisher = {Springer-Verlag LNCS 2760}
  935. }
  936. @InProceedings{gap-pets03,
  937. author = {Krista Bennett and Christian Grothoff},
  938. title = {{GAP} -- practical anonymous networking},
  939. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  940. year = 2003,
  941. editor = {Roger Dingledine},
  942. publisher = {Springer-Verlag LNCS 2760}
  943. }
  944. @Article{hordes-jcs,
  945. author = {Brian Neal Levine and Clay Shields},
  946. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  947. journal = {Journal of Computer Security},
  948. year = 2002,
  949. volume = 10,
  950. number = 3,
  951. pages = {213--240}
  952. }
  953. @TechReport{herbivore,
  954. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  955. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  956. institution = {Cornell University Computing and Information Science},
  957. year = 2003,
  958. type = {Technical Report},
  959. number = {TR2003-1890},
  960. month = {February}
  961. }
  962. @InProceedings{p5,
  963. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  964. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  965. booktitle = {IEEE Symposium on Security and Privacy},
  966. pages = {58--70},
  967. year = 2002,
  968. publisher = {IEEE CS}
  969. }
  970. @phdthesis{ian-thesis,
  971. title = {A Pseudonymous Communications Infrastructure for the Internet},
  972. author = {Ian Goldberg},
  973. school = {UC Berkeley},
  974. year = {2000},
  975. month = {Dec},
  976. }
  977. @Article{taz,
  978. author = {Ian Goldberg and David Wagner},
  979. title = {TAZ Servers and the Rewebber Network: Enabling
  980. Anonymous Publishing on the World Wide Web},
  981. journal = {First Monday},
  982. year = 1998,
  983. volume = 3,
  984. number = 4,
  985. month = {August},
  986. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  987. }
  988. @Misc{tcp-over-tcp-is-bad,
  989. key = {tcp-over-tcp-is-bad},
  990. title = {Why {TCP} Over {TCP} Is A Bad Idea},
  991. author = {Olaf Titz},
  992. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  993. }
  994. @inproceedings{wright02,
  995. title = {An Analysis of the Degradation of Anonymous Protocols},
  996. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  997. booktitle = {{Network and Distributed Security Symposium (NDSS 02)}},
  998. year = {2002},
  999. month = {February},
  1000. publisher = {IEEE},
  1001. }
  1002. @inproceedings{wright03,
  1003. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  1004. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  1005. booktitle = {IEEE Symposium on Security and Privacy},
  1006. pages= {28--41},
  1007. year = {2003},
  1008. month = {May},
  1009. publisher = {IEEE CS},
  1010. }
  1011. @InProceedings{attack-tor-oak05,
  1012. author = {Steven J. Murdoch and George Danezis},
  1013. title = {Low-cost Traffic Analysis of {T}or},
  1014. booktitle = {IEEE Symposium on Security and Privacy},
  1015. year = 2005,
  1016. month = {May},
  1017. publisher = {IEEE CS}
  1018. }
  1019. @Misc{jap-backdoor,
  1020. author={{The AN.ON Project}},
  1021. howpublished={Press release},
  1022. year={2003},
  1023. month={September},
  1024. title={German Police proceeds against anonymity service},
  1025. note={\url{http://www.datenschutzzentrum.de/material/themen/presse/anon-bka_e.htm}}
  1026. }
  1027. @article{shsm03,
  1028. title = {Using Caching for Browsing Anonymity},
  1029. author = {Anna Shubina and Sean Smith},
  1030. journal = {ACM SIGEcom Exchanges},
  1031. volume = {4},
  1032. number = {2},
  1033. year = {2003},
  1034. month = {Sept},
  1035. note = {\url{http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf}},
  1036. }
  1037. @inproceedings{tor-design,
  1038. title = {Tor: The Second-Generation Onion Router},
  1039. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1040. booktitle = {Proceedings of the 13th USENIX Security Symposium},
  1041. year = {2004},
  1042. month = {August},
  1043. note = {\url{https://www.torproject.org/tor-design.pdf}}
  1044. }
  1045. @inproceedings{flow-correlation04,
  1046. title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  1047. author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  1048. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1049. year = {2004},
  1050. month = {May},
  1051. series = {LNCS},
  1052. note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
  1053. }
  1054. @InProceedings{danezis:pet2004,
  1055. author = "George Danezis",
  1056. title = "The Traffic Analysis of Continuous-Time Mixes",
  1057. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1058. editor = {David Martin and Andrei Serjantov},
  1059. month = {May},
  1060. year = {2004},
  1061. series = {LNCS},
  1062. note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
  1063. }
  1064. @inproceedings{feamster:wpes2004,
  1065. title = {Location Diversity in Anonymity Networks},
  1066. author = {Nick Feamster and Roger Dingledine},
  1067. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1068. year = {2004},
  1069. month = {October},
  1070. address = {Washington, DC, USA},
  1071. note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
  1072. }
  1073. @inproceedings{koepsell:wpes2004,
  1074. title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  1075. author = {Stefan K\"opsell and Ulf Hilling},
  1076. booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  1077. year = {2004},
  1078. month = {October},
  1079. address = {Washington, DC, USA},
  1080. note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
  1081. }
  1082. @inproceedings{sync-batching,
  1083. title = {Synchronous Batching: From Cascades to Free Routes},
  1084. author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  1085. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  1086. editor = {David Martin and Andrei Serjantov},
  1087. year = {2004},
  1088. month = {May},
  1089. series = {LNCS},
  1090. note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
  1091. }
  1092. @InProceedings{e2e-traffic,
  1093. author = "Nick Mathewson and Roger Dingledine",
  1094. title = "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure",
  1095. booktitle= {Privacy Enhancing Technologies (PET 2004)},
  1096. editor = {David Martin and Andrei Serjantov},
  1097. month = {May},
  1098. year = {2004},
  1099. series = {LNCS},
  1100. note = {\url{http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}},
  1101. }
  1102. @Misc{dtls,
  1103. author = {E. Rescorla and N. Modadugu},
  1104. title = {{Datagram Transport Layer Security}},
  1105. howpublished = {IETF Draft},
  1106. month = {December},
  1107. year = {2003},
  1108. note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
  1109. }
  1110. @InProceedings{usability-network-effect,
  1111. author={Roger Dingledine and Nick Mathewson},
  1112. title={Anonymity Loves Company: Usability and the Network Effect},
  1113. booktitle = {Designing Security Systems That People Can Use},
  1114. year = {2005},
  1115. publisher = {O'Reilly Media},
  1116. }
  1117. @inproceedings{usability:weis2006,
  1118. title = {Anonymity Loves Company: Usability and the Network Effect},
  1119. author = {Roger Dingledine and Nick Mathewson},
  1120. booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
  1121. (WEIS 2006)},
  1122. year = {2006},
  1123. month = {June},
  1124. address = {Cambridge, UK},
  1125. bookurl = {http://weis2006.econinfosec.org/},
  1126. note = {\url{http://freehaven.net/doc/wupss04/usability.pdf}},
  1127. }
  1128. @Misc{six-four,
  1129. key = {six-four},
  1130. title = {{The Six/Four System}},
  1131. note = {\url{http://sourceforge.net/projects/sixfour/}}
  1132. }
  1133. @inproceedings{clayton:pet2006,
  1134. title = {Ignoring the Great Firewall of China},
  1135. author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  1136. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1137. year = {2006},
  1138. month = {June},
  1139. address = {Cambridge, UK},
  1140. publisher = {Springer},
  1141. bookurl = {http://petworkshop.org/2006/},
  1142. note = {\url{http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}},
  1143. }
  1144. @Misc{zuckerman-threatmodels,
  1145. key = {zuckerman-threatmodels},
  1146. title = {We've got to adjust some of our threat models},
  1147. author = {Ethan Zuckerman},
  1148. note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
  1149. }
  1150. @Misc{cgiproxy,
  1151. key = {cgiproxy},
  1152. title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
  1153. author = {James Marshall},
  1154. note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
  1155. }
  1156. @Misc{circumventor,
  1157. key = {circumventor},
  1158. title = {{How to install the Circumventor program}},
  1159. author = {Bennett Haselton},
  1160. note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
  1161. }
  1162. @Misc{psiphon,
  1163. key = {psiphon},
  1164. title = {Psiphon},
  1165. author = {Ronald Deibert et al},
  1166. note = {\url{http://psiphon.civisec.org/}}
  1167. }
  1168. @InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
  1169. title = {Embedding Covert Channels into {TCP/IP}},
  1170. booktitle = {Information Hiding: 7th International Workshop},
  1171. pages = {247--261},
  1172. year = {2005},
  1173. editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
  1174. Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
  1175. volume = {3727},
  1176. series = {LNCS},
  1177. address = {Barcelona, Catalonia (Spain)},
  1178. month = {June},
  1179. publisher = {Springer-Verlag},
  1180. url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
  1181. }
  1182. @phdthesis{blossom-thesis,
  1183. title = {Perspective Access Networks},
  1184. author = {Geoffrey Goodell},
  1185. school = {Harvard University},
  1186. year = {2006},
  1187. month = {July},
  1188. note = {\url{http://afs.eecs.harvard.edu/~goodell/thesis.pdf}},
  1189. }
  1190. @inproceedings{tap:pet2006,
  1191. title = {On the Security of the Tor Authentication Protocol},
  1192. author = {Ian Goldberg},
  1193. booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  1194. year = {2006},
  1195. month = {June},
  1196. address = {Cambridge, UK},
  1197. publisher = {Springer},
  1198. bookurl = {http://petworkshop.org/2006/},
  1199. note = {\url{http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}},
  1200. }
  1201. @inproceedings{rep-anon,
  1202. title = {{Reputation in P2P Anonymity Systems}},
  1203. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1204. booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
  1205. year = {2003},
  1206. month = {June},
  1207. note = {\url{http://freehaven.net/doc/econp2p03/econp2p03.pdf}},
  1208. }
  1209. @misc{tor-challenges,
  1210. author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  1211. title = {Challenges in deploying low-latency anonymity},
  1212. year = {2005},
  1213. note = {Manuscript}
  1214. }
  1215. @InProceedings{chaum-blind,
  1216. author = {David Chaum},
  1217. title = {Blind Signatures for Untraceable Payments},
  1218. booktitle = {Advances in Cryptology: Proceedings of Crypto 82},
  1219. pages = {199--203},
  1220. year = 1983,
  1221. editor = {D. Chaum and R.L. Rivest and A.T. Sherman},
  1222. publisher = {Plenum Press}
  1223. }
  1224. @Article{netauth,
  1225. author = {Geoffrey Goodell and Paul Syverson},
  1226. title = {The Right Place at the Right Time: Examining the use of network location in authentication and abuse prevention},
  1227. journal = {Communications of the ACM},
  1228. year = 2007,
  1229. volume = 50,
  1230. number = 5,
  1231. pages = {113--117},
  1232. month = {May}
  1233. }
  1234. @misc{ip-to-country,
  1235. key = {ip-to-country},
  1236. title = {IP-to-country database},
  1237. note = {\url{http://ip-to-country.webhosting.info/}},
  1238. }
  1239. @misc{mackinnon-personal,
  1240. author = {Rebecca MacKinnon},
  1241. title = {Private communication},
  1242. year = {2006},
  1243. }
  1244. @inproceedings{pet05-bissias,
  1245. title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
  1246. author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
  1247. booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  1248. year = {2005},
  1249. month = {May},
  1250. note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
  1251. }
  1252. @InProceedings{infranet,
  1253. author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
  1254. title = {Infranet: Circumventing Web Censorship and Surveillance},
  1255. booktitle = {Proceedings of the 11th USENIX Security Symposium},
  1256. year = {2002},
  1257. month = {August},
  1258. note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
  1259. }
  1260. @techreport{ ptacek98insertion,
  1261. author = "Thomas H. Ptacek and Timothy N. Newsham",
  1262. title = "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection",
  1263. institution = "Secure Networks, Inc.",
  1264. address = "Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6",
  1265. year = "1998",
  1266. url = "citeseer.ist.psu.edu/ptacek98insertion.html",
  1267. }
  1268. @inproceedings{active-wardens,
  1269. author = "Gina Fisk and Mike Fisk and Christos Papadopoulos and Joshua Neil",
  1270. title = "Eliminating Steganography in Internet Traffic with Active Wardens",
  1271. booktitle = {Information Hiding Workshop (IH 2002)},
  1272. year = {2002},
  1273. month = {October},
  1274. editor = {Fabien Petitcolas},
  1275. publisher = {Springer-Verlag, LNCS 2578},
  1276. }
  1277. @inproceedings{clog-the-queue,
  1278. title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes},
  1279. author = {Jon McLachlan and Nicholas Hopper},
  1280. booktitle = {Proceedings of Financial Cryptography (FC '08)},
  1281. year = {2008},
  1282. month = {January},
  1283. }
  1284. @inproceedings{snader08,
  1285. title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},
  1286. author = {Robin Snader and Nikita Borisov},
  1287. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},
  1288. year = {2008},
  1289. month = {February},
  1290. publisher = {Internet Society},
  1291. }
  1292. @inproceedings{murdoch-pet2008,
  1293. title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},
  1294. author = {Steven J. Murdoch and Robert N. M. Watson},
  1295. booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
  1296. year = {2008},
  1297. month = {July},
  1298. address = {Leuven, Belgium},
  1299. pages = {115--132},
  1300. editor = {Nikita Borisov and Ian Goldberg},
  1301. publisher = {Springer},
  1302. bookurl = {http://petsymposium.org/2008/},
  1303. }
  1304. @inproceedings{danezis-pet2008,
  1305. title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
  1306. author = {George Danezis and Paul Syverson},
  1307. booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
  1308. year = {2008},
  1309. month = {July},
  1310. address = {Leuven, Belgium},
  1311. pages = {133--150},
  1312. editor = {Nikita Borisov and Ian Goldberg},
  1313. publisher = {Springer},
  1314. bookurl = {http://petsymposium.org/2008/},
  1315. }
  1316. %%% Local Variables:
  1317. %%% mode: latex
  1318. %%% TeX-master: "tor-design"
  1319. %%% End: