ASlevel-ndss2016@inproceedings{ASlevel-ndss2016,
title = {Measuring and Mitigating AS-level Adversaries Against Tor},
author = {Rishab Nithyanand and Oleksii Starov and Phillipa Gill and Adva Zair and
Michael Schapira},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/measuring-mitigating-as-level-adversaries-against-tor.pdf},
www_section = {Traffic analysis},
}
|
AthanRAM07@inproceedings{AthanRAM07,
title = {GAS: Overloading a File Sharing Network as an Anonymizing System},
author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and
Evangelos P. Markatos},
booktitle = {Proceedings of Second International Workshop on Security, (IWSEC 2007)},
year = {2007},
location = {Nara, Japan},
www_tags = {selected},
www_pdf_url = {http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf},
www_section = {Anonymous communication},
}
|
BM:mixencrypt@inproceedings{BM:mixencrypt,
title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
author = {Bodo M{\"o}ller},
booktitle = {Proceedings of {CT-RSA} 2003},
year = {2003},
month = {April},
publisher = {Springer-Verlag, LNCS 2612},
www_tags = {selected},
www_pdf_url = {http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf},
www_section = {Anonymous communication},
}
|
BonehGolle:psp2002@inproceedings{BonehGolle:psp2002,
title = {Almost Entirely Correct Mixing With Application to Voting},
author = {Dan Boneh and Philippe Golle},
booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications
Security (CCS 2002)}},
year = {2002},
month = {November},
location = {Washington, DC},
pages = {68--77},
editor = {Vijay Atluri},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps},
}
|
ChatziPP07@inproceedings{ChatziPP07,
title = {Probability of Error in Information-Hiding Protocols},
author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
booktitle = {Proceedings of the 20th IEEE Computer Security Foundations Symposium
(CSF20)},
year = {2007},
location = {S. Servolo island, Venice - Italy},
www_tags = {selected},
www_pdf_url = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf},
www_section = {Anonymous communication},
}
|
DBLP:conf/ccs/EdmanS09@inproceedings{DBLP:conf/ccs/EdmanS09,
title = {{AS}-awareness in {T}or path selection},
author = {Matthew Edman and Paul F. Syverson},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {380--389},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/TroncosoD09@inproceedings{DBLP:conf/ccs/TroncosoD09,
title = {The bayesian traffic analysis of mix networks},
author = {Carmela Troncoso and George Danezis},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {369--379},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Traffic analysis},
www_pdf_url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/VassermanJTHK09@inproceedings{DBLP:conf/ccs/VassermanJTHK09,
title = {Membership-concealing overlay networks},
author = {Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas Hopper and
Yongdae Kim},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {390--399},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/esorics/DanezisDKT09@inproceedings{DBLP:conf/esorics/DanezisDKT09,
title = {The Wisdom of Crowds: Attacks and Optimal Constructions},
author = {George Danezis and Claudia D\'{\i}az and Emilia K{\"a}sper and Carmela
Troncoso},
booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security
(ESORICS 2009), Saint-Malo, France},
volume = {5789},
year = {2009},
month = {September},
pages = {406--423},
editor = {Michael Backes and Peng Ning},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-04443-4},
www_section = {Traffic analysis},
www_pdf_url = {http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf},
www_tags = {selected},
}
|
DBLP:conf/esorics/MalleshW07@inproceedings{DBLP:conf/esorics/MalleshW07,
title = {Countering Statistical Disclosure with Receiver-Bound Cover Traffic},
author = {Nayantara Mallesh and Matthew Wright},
booktitle = {Proceedings of 12th European Symposium On Research In Computer Security
(ESORICS 2007)},
volume = {4734},
year = {2007},
month = {September},
location = {Dresden, Germany},
pages = {547--562},
editor = {Joachim Biskup and Javier Lopez},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-540-74834-2},
www_section = {Anonymous communication},
www_pdf_url = {http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf},
www_tags = {selected},
}
|
DBLP:conf/pet/DanezisT09@inproceedings{DBLP:conf/pet/DanezisT09,
title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications},
author = {George Danezis and Carmela Troncoso},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {56--72},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Traffic analysis},
www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf},
www_tags = {selected},
}
|
DBLP:conf/pet/RaghavanKSW09@inproceedings{DBLP:conf/pet/RaghavanKSW09,
title = {Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default},
author = {Barath Raghavan and Tadayoshi Kohno and Alex C. Snoeren and David Wetherall},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {143--163},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf},
www_tags = {selected},
}
|
DBLP:conf/pet/SherrBL09@inproceedings{DBLP:conf/pet/SherrBL09,
title = {Scalable Link-Based Relay Selection for Anonymous Routing},
author = {Micah Sherr and Matt Blaze and Boon Thau Loo},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {73--93},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://micah.cis.upenn.edu/papers/pets09.pdf},
www_tags = {selected},
}
|
DBLP:conf/sp/DanezisG09@inproceedings{DBLP:conf/sp/DanezisG09,
title = {Sphinx: A Compact and Provably Secure Mix Format},
author = {George Danezis and Ian Goldberg},
booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P
2009)},
year = {2009},
month = {May},
location = {Oakland, California, USA},
pages = {269--282},
editor = {},
publisher = {IEEE Computer Society},
isbn = {978-0-7695-3633-0},
ee = {http://dx.doi.org/10.1109/SP.2009.15},
www_section = {Anonymous communication},
www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/sp/LeeDWWK13@inproceedings{DBLP:conf/sp/LeeDWWK13,
title = {Anon-Pass: Practical Anonymous Subscriptions},
author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett
Witchel},
booktitle = {Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P
2013)},
year = {2013},
month = {May},
location = {San Francisco, California, USA},
pages = {319--333},
publisher = {IEEE Computer Society},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.cs.utexas.edu/users/witchel/pubs/lee13oak-anon-pass.pdf},
}
|
DBLP:conf/sp/NarayananS09@inproceedings{DBLP:conf/sp/NarayananS09,
title = {De-anonymizing Social Networks},
author = {Arvind Narayanan and Vitaly Shmatikov},
booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P
2009)},
year = {2009},
month = {May},
location = {Oakland, California, USA},
pages = {173--187},
editor = {},
publisher = {IEEE Computer Society},
www_important = {1},
isbn = {978-0-7695-3633-0},
www_section = {Misc},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:journals/corr/KhattakSM14@article{DBLP:journals/corr/KhattakSM14,
title = {Systemization of Pluggable Transports for Censorship Resistance},
author = {Sheharbano Khattak and Laurent Simon and Steven J. Murdoch},
journal = {CoRR},
volume = {abs/1412.7448},
year = {2014},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/KhattakSM14},
timestamp = {Thu, 01 Jan 2015 19:51:08 +0100},
www_tags = {selected},
www_pdf_url = {http://arxiv.org/pdf/1412.7448v1.pdf},
bibsource = {dblp computer science bibliography, http://dblp.org},
www_section = {Communications Censorship},
}
|
DD08Survey@techreport{DD08Survey,
title = {A Survey of Anonymous Communication Channels},
author = {George Danezis and Claudia Diaz},
institution = {Microsoft Research},
number = {MSR-TR-2008-35},
year = {2008},
month = {January},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf},
}
|
Dan:SFMix03@inproceedings{Dan:SFMix03,
title = {Forward Secure Mixes},
author = {George Danezis},
booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems},
year = {2002},
month = {November},
location = {Karlstad, Sweden},
pages = {195--207},
editor = {Fisher-Hubner, Jonsson},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/fsmix.pdf},
day = {7},
}
|
DanSer04@inproceedings{DanSer04,
title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems},
author = {George Danezis and Andrei Serjantov},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps},
www_section = {Traffic analysis},
}
|
Diaz02@inproceedings{Diaz02,
title = {Towards measuring anonymity},
author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel},
booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_important = {1},
www_tags = {selected},
www_ps_gz_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz},
www_section = {Traffic analysis},
}
|
DiazThesis05@phdthesis{DiazThesis05,
title = {Anonymity and Privacy in Electronic Services},
author = {Claudia Diaz},
school = {Katholieke Universiteit Leuven},
year = {2005},
month = {December},
address = {Leuven, Belgium},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf},
}
|
Douglas-thesis@phdthesis{Douglas-thesis,
title = {A taxonomy for and analysis of anonymous communications networks},
author = {Douglas Kelly},
school = {Air Force Institute of Technology},
year = {2009},
month = {March},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf},
}
|
EdmanSY07@article{EdmanSY07,
title = {A Combinatorial Approach to Measuring Anonymity},
author = {M. Edman and F. Sivrikaya and B. Yener},
journal = {Intelligence and Security Informatics, 2007 IEEE},
volume = {},
number = {},
year = {2007},
month = {May},
pages = {356--363},
www_tags = {selected},
www_pdf_url = {http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf},
www_section = {Traffic analysis},
}
|
Fu::FlowMarking::2005@inproceedings{Fu::FlowMarking::2005,
title = {On Flow Marking Attacks in Wireless Anonymous Communication Networks},
author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the IEEE International Conference on Distributed Computing
Systems (ICDCS)},
year = {2005},
month = {April},
www_tags = {selected},
www_pdf_url = {http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf},
www_section = {Traffic analysis},
}
|
GHPvR05@inproceedings{GHPvR05,
title = {Provable Anonymity},
author = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum},
booktitle = {{Proceedings of the 3rd ACM Workshop on Formal Methods in Security
Engineering (FMSE05)}},
year = {2005},
month = {November},
location = {Alexandria, VA, USA},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf},
www_ps_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.ps},
}
|
GKK03@inproceedings{GKK03,
title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting},
author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of ESORICS 2003},
year = {2003},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf},
www_section = {Provable shuffles},
}
|
Golle:sp2006@inproceedings{Golle:sp2006,
title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow},
booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
year = {2006},
month = {May},
location = {Oakland, CA},
pages = {121--131},
publisher = {IEEE CS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf},
}
|
GolleJakobssonJuelsSyverson:universal04@inproceedings{GolleJakobssonJuelsSyverson:universal04,
title = {Universal Re-Encryption for Mixnets},
author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson},
booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track},
year = {2004},
month = {February},
location = {San Francisco, USA},
www_tags = {selected},
www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf},
www_section = {Anonymous communication},
}
|
HanLLHP05@inproceedings{HanLLHP05,
title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design},
author = {Jinsong Han and Yunhao Liu and Li Lu and Lei Hu and Abhishek Patil},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {143--152},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
HotOrNot@inproceedings{HotOrNot,
title = {Hot or Not: Revealing Hidden Services by their Clock Skew},
author = {Steven J. Murdoch},
booktitle = {Proceedings of CCS 2006},
year = {2006},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf},
www_section = {Traffic analysis},
}
|
ISDN-mixes@inproceedings{ISDN-mixes,
title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
Systems},
year = {1991},
month = {February},
pages = {451--463},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
}
|
KongHG07@article{KongHG07,
title = {An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in
Mobile Ad Hoc Networks},
author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla},
journal = {IEEE Transactions on Mobile Computing},
volume = {6},
number = {8},
year = {2007},
address = {Los Alamitos, CA, USA},
pages = {888--902},
publisher = {IEEE Computer Society},
issn = {1536-1233},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf},
}
|
LOCEntropy2008@techreport{LOCEntropy2008,
title = {Entropy Bounds for Traffic Confirmation},
author = {Luke O'Connor},
institution = {IACR},
number = {2008/365},
year = {2008},
month = {October},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://eprint.iacr.org/2008/365.pdf},
}
|
Levine:2002@article{Levine:2002,
title = {{Hordes --- A Multicast Based Protocol for Anonymity}},
author = {Brian Neil Levine and Clay Shields},
journal = {Journal of Computer Security},
volume = {10},
number = {3},
year = {2002},
pages = {213--240},
www_tags = {selected},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf},
keywords = {anonymity; routing; security; multicast; Journal Paper},
www_section = {Anonymous communication},
}
|
Liberatore:2006@inproceedings{Liberatore:2006,
title = {{Inferring the Source of Encrypted HTTP Connections}},
author = {Marc Liberatore and Brian Neil Levine},
booktitle = {Proceedings of the 13th ACM conference on Computer and Communications
Security (CCS 2006)},
year = {2006},
month = {November},
pages = {255--263},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf},
}
|
LuFSG05@inproceedings{LuFSG05,
title = {Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel},
author = {Tianbo Lu and Binxing Fang and Yuzhong Sun and Li Guo},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {853--862},
www_tags = {selected},
www_abstract_url = {http://www.springerlink.com/content/b3x4na87xbmcextx/},
www_section = {Anonymous communication},
}
|
MarPi08@inproceedings{MarPi08,
title = {A Concept of an Anonymous Direct P2P Distribution Overlay System},
author = {Igor Margasinski and Michal Pioro},
booktitle = {Proceedings of IEEE 22nd International Conference on Advanced Information
Networking and Applications (AINA)},
year = {2008},
month = {March},
location = {Gino-wan, Okinawa, Japan},
pages = {590--597},
publisher = {IEEE Computer Society Press},
isbn = {978-0-7695-3095-6},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf},
}
|
PIK@inproceedings{PIK,
title = {Efficient anonymous channel and all/nothing election scheme},
author = {C. Park and K. Itoh and K. Kurosawa},
booktitle = {Proceedings of {EUROCRYPT} 1993},
year = {1993},
month = {May},
pages = {248--259},
publisher = {Springer-Verlag, LNCS 765},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
PShuffle@inproceedings{PShuffle,
title = {An Efficient Scheme for Proving a Shuffle},
author = {Jun Furukawa and Kazue Sako},
booktitle = {Proceedings of {CRYPTO} 2001},
year = {2001},
editor = {Joe Kilian},
publisher = {Springer-Verlag, LNCS 2139},
www_tags = {selected},
www_pdf_url = {http://www.iacr.org/archive/crypto2001/21390366.pdf},
www_section = {Provable shuffles},
}
|
RP03-1@inproceedings{RP03-1,
title = {{Practical Anonymity for the Masses with Mix-Networks}},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE
2003)}},
year = {2003},
month = {June},
location = {Linz, Austria},
www_tags = {selected},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz},
www_section = {Anonymous communication},
}
|
RRMPH02-1@inproceedings{RRMPH02-1,
title = {{Analysis of an Anonymity Network for Web Browsing}},
author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
David Hutchison},
booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
2002)}},
year = {2002},
month = {June},
location = {Pittsburgh, USA},
pages = {49--54},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz},
}
|
SK@inproceedings{SK,
title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the
Implementation of a Voting Booth},
author = {Joe Kilian and Kazue Sako},
booktitle = {Proceedings of {EUROCRYPT} 1995},
year = {1995},
month = {May},
publisher = {Springer-Verlag},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
SN03@inproceedings{SN03,
title = {On the Anonymity of Timed Pool Mixes},
author = {Andrei Serjantov and Richard E. Newman},
booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and
Distributed Systems},
year = {2003},
month = {May},
location = {Athens, Greece},
pages = {427--434},
publisher = {Kluwer},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps},
}
|
SS03@inproceedings{SS03,
title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
author = {Andrei Serjantov and Peter Sewell},
booktitle = {Proceedings of ESORICS 2003},
year = {2003},
month = {October},
www_tags = {selected},
www_remarks = {An investigation of packet counting attacks (which work best on lightly
loaded networks) and connection-start timing attacks.},
www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
www_section = {Traffic analysis},
}
|
Salsa@inproceedings{Salsa,
title = {Salsa: A Structured Approach to Large-Scale Anonymity},
author = {Arjun Nambiar and Matthew Wright},
booktitle = {Proceedings of CCS 2006},
year = {2006},
month = {November},
www_tags = {selected},
www_pdf_url = {http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf},
www_section = {Anonymous communication},
}
|
Serj02@inproceedings{Serj02,
title = {Towards an Information Theoretic Metric for Anonymity},
author = {Andrei Serjantov and George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_important = {1},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps},
www_section = {Traffic analysis},
}
|
Serj02-iptps@inproceedings{Serj02-iptps,
title = {Anonymizing censorship resistant systems},
author = {Andrei Serjantov},
booktitle = {Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS
2002)},
year = {2002},
month = {March},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps},
www_section = {Anonymous publication},
}
|
ShWa-Relationship@inproceedings{ShWa-Relationship,
title = {Measuring Relationship Anonymity in Mix Networks},
author = {Vitaly Shmatikov and Ming-Hsiu Wang},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2006)}},
year = {2006},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf},
www_section = {Traffic analysis},
}
|
ShWa-Timing06@inproceedings{ShWa-Timing06,
title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses},
author = {Vitaly Shmatikov and Ming-Hsiu Wang},
booktitle = {Proceedings of ESORICS 2006},
year = {2006},
month = {September},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf},
www_section = {Traffic analysis},
}
|
TH04@inproceedings{TH04,
title = {Measuring Anonymity in a Non-adaptive, Real-time System},
author = {Gergely T\'oth and Zolt\'an Horn\'ak},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
pages = {226--241},
series = {Springer-Verlag, LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf},
}
|
THV04@inproceedings{THV04,
title = {Measuring Anonymity Revisited},
author = {Gergely T\'oth and Zolt\'an Horn\'ak and Ferenc Vajda},
booktitle = {Proceedings of the Ninth Nordic Workshop on Secure IT Systems},
year = {2004},
month = {November},
location = {Espoo, Finland},
pages = {85--90},
editor = {Sanna Liimatainen and Teemupekka Virtanen},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf},
}
|
TrafHTTP@inproceedings{TrafHTTP,
title = {Statistical Identification of Encrypted Web Browsing Traffic},
author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N.
Padmanabhan and Lili Qiu},
booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
year = {2002},
month = {May},
location = {Berkeley, California},
www_tags = {selected},
www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf},
www_section = {Traffic analysis},
}
|
UREbreak06@inproceedings{UREbreak06,
title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption},
author = {George Danezis},
booktitle = {Proceedings of Information Security Conference 2006},
year = {2006},
month = {September},
publisher = {Springer-Verlag},
www_tags = {selected},
www_pdf_url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf},
www_section = {Provable shuffles},
}
|
VenHeTon07@misc{VenHeTon07,
title = {Anonymous Networking amidst Eavesdroppers},
author = {Parvathinathan Venkitasubramaniam and Ting He and Lang Tong},
year = {2007},
month = {October},
howpublished = {Pre-print available as arXiv:0710.4903v1 at arxiv.org},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf},
}
|
WangCJ05@inproceedings{WangCJ05,
title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
year = {2005},
month = {November},
pages = {81--91},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
}
|
Wright:2004@article{Wright:2004,
title = {{The Predecessor Attack: An Analysis of a Threat to Anonymous Communications
Systems}},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = {4},
number = {7},
year = {2004},
month = {November},
pages = {489--522},
www_tags = {selected},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf},
keywords = {anonymity; Journal Paper},
www_section = {Traffic analysis},
}
|
WrightMM06@article{WrightMM06,
title = {On Inferring Application Protocol Behaviors in Encrypted Network Traffic},
author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson},
journal = {Journal of Machine Learning Research},
volume = {7},
year = {2006},
address = {Cambridge, MA, USA},
pages = {2745--2769},
publisher = {MIT Press},
www_tags = {selected},
issn = {1533-7928},
www_section = {Traffic analysis},
www_pdf_url = {http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf},
}
|
XuFZBCZ05@inproceedings{XuFZBCZ05,
title = {SAS: A Scalar Anonymous Communication System},
author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and
Wei Zhao},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {452--461},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
Zamani:FOCI13@inproceedings{Zamani:FOCI13,
title = {Towards Provably-Secure Scalable Anonymous Broadcast},
author = {Mahdi Zamani and Jared Saia and Mahnush Movahedi and Joud Khoury},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2013},
month = {August},
location = {Washington, DC, USA},
series = {FOCI '13},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.unm.edu/~saia/papers/foci13.pdf},
day = {13},
}
|
abbott-pet2007@inproceedings{abbott-pet2007,
title = {Browser-Based Attacks on {Tor}},
author = {Tim Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf},
www_section = {Traffic analysis},
}
|
abe@inproceedings{abe,
title = {Universally Verifiable mix-net With Verification Work Independent of The Number
of mix Servers},
author = {Masayuki Abe},
booktitle = {Proceedings of {EUROCRYPT} 1998},
year = {1998},
publisher = {Springer-Verlag, LNCS 1403},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
abra-wpes16@inproceedings{abra-wpes16,
title = {ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding
Bottlenecks},
author = {John Geddes and Michael Schliep and Nicholas Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/abra_wpes_16.pdf},
www_section = {Tor Performance},
}
|
acns11-certificateless@inproceedings{acns11-certificateless,
title = {Fully Non-Interactive Onion Routing with Forward-Secrecy},
author = {Dario Catalano and Dario Fiore and Rosario Gennaro},
booktitle = {Proceedings of the 9th International Conference on Applied Cryptography and
Network Security (ACNS 2011)},
volume = {6715},
year = {2011},
month = {June},
location = {Malaga, Spain},
editor = {Javier Lopez and Gene Tsudik},
series = {Lecture Notes in Computer Science},
www_section = {Anonymous communication},
www_pdf_url = {http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf},
www_tags = {selected},
}
|
acsac11-backlit@inproceedings{acsac11-backlit,
title = {Exposing Invisible Timing-based Traffic Watermarks with BACKLIT},
author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and
Rocky K. C. Chang},
booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference
(ACSAC'11), Orlando, FL, USA},
year = {2011},
month = {December},
www_pdf_url = {http://freehaven.net/anonbib/papers/backlit-acsac11.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
acsac11-tortoise@inproceedings{acsac11-tortoise,
title = {Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and
Steady Wins the Race With Tortoise},
author = {W. Brad Moore and Chris Wacek and Micah Sherr},
booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference
(ACSAC'11), Orlando, FL, USA},
year = {2011},
month = {December},
www_tags = {selected},
www_pdf_url = {https://security.cs.georgetown.edu/papers/tortoise.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
active-pet2010@inproceedings{active-pet2010,
title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication},
author = {Aaron Johnson and Joan Feigenbaum and Paul Syverson},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf},
www_section = {Traffic analysis},
}
|
adams06@article{adams06,
title = {A Classification for Privacy Techniques},
author = {Carlisle Adams},
journal = {University of Ottawa Law \& Technology Journal},
volume = {3},
year = {2006},
pages = {35--52},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf},
issue = {1},
}
|
adida07@inproceedings{adida07,
title = {How to Shuffle in Public},
author = {Ben Adida and Douglas Wikstr\"om},
booktitle = {Proceedings of the Theory of Cryptography 2007},
year = {2007},
month = {February},
www_tags = {selected},
www_pdf_url = {http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf},
www_section = {Provable shuffles},
}
|
agrawal03@inproceedings{agrawal03,
title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}},
author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {16--27},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf},
}
|
alpha-mixing:pet2006@inproceedings{alpha-mixing:pet2006,
title = {Blending Different Latency Traffic with Alpha-Mixing},
author = {Roger Dingledine and Andrei Serjantov and Paul Syverson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {245--257},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf},
www_section = {Anonymous communication},
}
|
anderson96eternity@inproceedings{anderson96eternity,
title = {The Eternity Service},
author = {Ross Anderson},
booktitle = {Proceedings of Pragocrypt '96},
year = {1996},
www_tags = {selected},
www_important = {1},
www_html_url = {http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html},
www_ps_url = {http://www.ovmj.org/GNUnet/papers/eternity.ps},
www_section = {Anonymous publication},
}
|
andrei-thesis@phdthesis{andrei-thesis,
title = {On the Anonymity of Anonymity Systems},
author = {Andrei Serjantov},
school = {University of Cambridge},
year = {2004},
month = {June},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_url = {http://home.arachsys.com/~aas/Thesis/2.ps},
}
|
androulaki-pet2008@inproceedings{androulaki-pet2008,
title = {Reputation Systems for Anonymous Networks},
author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {202--218},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_section = {Anonymous communication},
}
|
anon-fc10@inproceedings{anon-fc10,
title = {Cryptographic Protocol Analysis of {AN.ON}},
author = {Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/wwpk2010.pdf},
www_section = {Anonymous communication},
}
|
applicationlayer-pets2017@article{applicationlayer-pets2017,
title = {Website Fingerprinting Defenses at the Application Layer},
author = {Giovanni Cherubin and Jamie Hayes and Marc Juarez},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue2/paper54-2017-2-source.pdf},
www_section = {analysis},
}
|
aqua-sigcomm2013@inproceedings{aqua-sigcomm2013,
title = {Towards Efficient Traffic-analysis Resistant Anonymity Networks},
author = {Stevens Le Blond and David Choffnes and Wenxuan Zhou and Peter Druschel and
Hitesh Ballani and Paul Francis},
booktitle = {Proceedings of the ACM SIGCOMM 2013 Conference},
year = {2013},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/sigcomm13-aqua.pdf},
www_section = {Anonymous communication},
}
|
asiaccs2014-reputation@inproceedings{asiaccs2014-reputation,
title = {$Re^3$: Relay Reliability Reputation for Anonymity Systems},
author = {Anupam Das and Nikita Borisov and Prateek Mittal and Matthew Caesar},
booktitle = {Proceedings of the 9th ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2014)},
year = {2014},
month = {June},
www_tags = {selected},
www_pdf_url = {http://hatswitch.org/~nikita/papers/re3-asiaccs14.pdf},
www_section = {Anonymous communication},
}
|
babel@inproceedings{babel,
title = {Mixing {E}-mail With {B}abel},
author = {Ceki G\"ulc\"u and Gene Tsudik},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
year = {1996},
month = {February},
pages = {2--16},
publisher = {IEEE},
www_important = {1},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/2254.html},
www_section = {Anonymous communication},
www_ps_url = {http://www.isoc.org/conferences/ndss96/gulcu.ps},
}
|
back01@inproceedings{back01,
title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
author = {Adam Back and Ulf M\"oller and Anton Stiglic},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {245--257},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
}
|
bauer:alpaca2008@inproceedings{bauer:alpaca2008,
title = {{BitBlender}: {L}ight-Weight Anonymity for BitTorrent},
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker},
booktitle = {{Proceedings of the Workshop on Applications of Private and Anonymous
Communications (AlPACa 2008)}},
year = {2008},
month = {September},
location = {Istanbul, Turkey},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf},
www_section = {Anonymous communication},
}
|
bauer:wpes2003@inproceedings{bauer:wpes2003,
title = {{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}},
author = {Matthias Bauer},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_remarks = {Anonymity sets in deployed systems are small because few people think it's
worthwhile to use them. But we can take advantage of ordinary web users to
transfer messages (that is, mix them) from one webserver to another via cookies
and http redirect tricks. Senders and receivers should also look like ordinary
web users, so anonymity sets are large.},
www_ps_url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps},
www_section = {Anonymous communication},
}
|
bauer:wpes2007@inproceedings{bauer:wpes2007,
title = {Low-Resource Routing Attacks Against {Tor}},
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas
Sicker},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2007)}},
year = {2007},
month = {October},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf},
www_section = {Traffic analysis},
}
|
bennett:pet2003@inproceedings{bennett:pet2003,
title = {{GAP} -- Practical anonymous networking},
author = {Krista Bennett and Christian Grothoff},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {141--160},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Anonymous publication},
www_ps_url = {http://www.ovmj.org/GNUnet/download/aff.ps},
}
|
berman-fc2004@inproceedings{berman-fc2004,
title = {Provable Unlinkability Against Traffic Analysis},
author = {Ron Berman and Amos Fiat and Amnon Ta-Shma},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {266--280},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf},
}
|
blac-tissec@article{blac-tissec,
title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs},
author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.},
journal = {ACM Transactions on Information and System Security},
volume = {13},
year = {2010},
month = {December},
address = {New York, NY, USA},
pages = {39:1--39:33},
publisher = {ACM},
numpages = {33},
issue_date = {December 2010},
issn = {1094-9224},
www_tags = {selected},
acmid = {1880033},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf},
url = {http://doi.acm.org/10.1145/1880022.1880033},
www_section = {Pseudonymity},
doi = {http://doi.acm.org/10.1145/1880022.1880033},
keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced
revocation, user misbehavior},
articleno = {39},
issue = {4},
}
|
blacr-ndss@inproceedings{blacr-ndss,
title = {{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation},
author = {Man Ho Au and Apu Kapadia and Willy Susilo},
booktitle = {Proceedings of the 19th Annual Network and Distributed System Security
Symposium ({NDSS})},
year = {2012},
month = {February},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf},
www_tags = {selected},
www_section = {Pseudonymity},
}
|
bnymble11@inproceedings{bnymble11,
title = {BNymble: More anonymous blacklisting at almost no cost},
author = {Peter Lofgren and Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/bnymble.pdf},
www_tags = {selected},
www_section = {Misc},
}
|
botnetfc14@inproceedings{botnetfc14,
title = {Challenges in protecting Tor hidden services from botnet abuse},
author = {Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
year = {2014},
month = {March},
www_tags = {selected},
www_pdf_url = {http://fc14.ifca.ai/papers/fc14_submission_152.pdf},
www_section = {Anonymous communication},
}
|
bounds-pets2017@article{bounds-pets2017,
title = {Bayes, not Na\"{\i}ve: Security Bounds on Website Fingerprinting Defenses},
author = {Giovanni Cherubin},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper50-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
brands06@article{brands06,
title = {Secure User Identification Without Privacy Erosion},
author = {Stefan Brands},
journal = {University of Ottawa Law \& Technology Journal},
volume = {3},
year = {2006},
pages = {205--223},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf},
issue = {1},
}
|
buses03@article{buses03,
title = {Buses for Anonymous Message Delivery},
author = {Amos Beimel and Shlomi Dolev},
journal = {Journal of Cryptology},
volume = {16},
number = {1},
year = {2003},
pages = {25--39},
www_tags = {selected},
www_ps_url = {ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps},
www_section = {Anonymous communication},
}
|
camlys05@inproceedings{camlys05,
title = {A Formal Treatment of Onion Routing},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Proceedings of {CRYPTO} 2005},
year = {2005},
month = {August},
pages = {169--187},
editor = {Victor Shoup},
publisher = {Springer-Verlag, LNCS 3621},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf},
}
|
caronte-ccs2015@inproceedings{caronte-ccs2015,
title = {Caronte: Detecting Location Leaks for Deanonymizing Tor Hidden Services},
author = {Srdjan Matic and Platon Kotzias and Juan Caballero},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://software.imdea.org/~juanca/papers/caronte_ccs15.pdf},
www_section = {Traffic analysis},
}
|
casc-rep@inproceedings{casc-rep,
title = {{Reliable MIX Cascade Networks through Reputation}},
author = {Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC '02)},
year = {2002},
month = {March},
editor = {Matt Blaze},
publisher = {Springer-Verlag, LNCS 2357},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/casc-rep/casc-rep.pdf},
www_ps_url = {http://freehaven.net/doc/casc-rep/casc-rep.ps},
www_section = {Anonymous communication},
}
|
ccs07-doa@inproceedings{ccs07-doa,
title = {Denial of Service or Denial of Security? {H}ow Attacks on Reliability can
Compromise Anonymity},
author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz},
booktitle = {Proceedings of CCS 2007},
year = {2007},
month = {October},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf},
www_section = {Traffic analysis},
}
|
ccs09-nisan@inproceedings{ccs09-nisan,
title = {{NISAN}: Network Information Service for Anonymization Networks},
author = {Andriy Panchenko and Arne Rache and Stefan Richter},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs09-shadowwalker@inproceedings{ccs09-shadowwalker,
title = {ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured
Topologies},
author = {Prateek Mittal and Nikita Borisov},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs09-torsk@inproceedings{ccs09-torsk,
title = {{Scalable onion routing with Torsk}},
author = {Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs10-braids@inproceedings{ccs10-braids,
title = {Recruiting New {T}or Relays with {BRAIDS}},
author = {Rob Jansen and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf},
www_tags = {selected},
}
|
ccs10-dissent@inproceedings{ccs10-dissent,
title = {Dissent: Accountable Anonymous Group Messaging},
author = {Henry Corrigan-Gibbs and Bryan Ford},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Communications Censorship},
www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf},
www_tags = {selected},
}
|
ccs10-lookup@inproceedings{ccs10-lookup,
title = {In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer
Anonymous Communication Systems},
author = {Qiyan Wang and Prateek Mittal and Nikita Borisov},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Traffic analysis},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf},
www_tags = {selected},
}
|
ccs10-scheduling@inproceedings{ccs10-scheduling,
title = {An Improved Algorithm for {T}or Circuit Scheduling},
author = {Can Tang and Ian Goldberg},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf},
www_tags = {selected},
}
|
ccs2008:mittal@inproceedings{ccs2008:mittal,
title = {Information Leaks in Structured Peer-to-peer Anonymous Communication Systems},
author = {Prateek Mittal and Nikita Borisov},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {267--278},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Anonymous communication},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf},
www_tags = {selected},
www_remarks = {Describes attacks against the SALSA and AP3 peer-to-peer anonymity network
architectures.},
day = {27--31},
}
|
ccs2008:tsang@inproceedings{ccs2008:tsang,
title = {PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication},
author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {333--345},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Misc},
www_tags = {selected},
day = {27--31},
}
|
ccs2008:wang@inproceedings{ccs2008:wang,
title = {Dependent Link Padding Algorithms for Low Latency Anonymity Systems},
author = {Wei Wang and Mehul Motani and Vikram Srinivasan},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {323--332},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Traffic analysis},
www_tags = {selected},
day = {27--31},
}
|
ccs2011-cirripede@inproceedings{ccs2011-cirripede,
title = {Cirripede: Circumvention Infrastructure using Router Redirection with Plausible
Deniability},
author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
www_section = {Communications Censorship},
}
|
ccs2011-oneswarm@inproceedings{ccs2011-oneswarm,
title = {Forensic Investigation of the OneSwarm Anonymous Filesharing System},
author = {Swagatika Prusty and Marc Liberatore and Brian N. Levine},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf},
www_section = {Traffic analysis},
}
|
ccs2011-stealthy@inproceedings{ccs2011-stealthy,
title = {Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using
Throughput Fingerprinting},
author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita
Borisov},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf},
www_section = {Anonymous communication},
}
|
ccs2011-trust@inproceedings{ccs2011-trust,
title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms},
author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf},
www_section = {Anonymous communication},
}
|
ccs2012-censorspoofer@inproceedings{ccs2012-censorspoofer,
title = {CensorSpoofer: Asymmetric Communication using {IP} Spoofing for
Censorship-Resistant Web Browsing},
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita
Borisov},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-classification@inproceedings{ccs2012-classification,
title = {Enhancing Tor's Performance using Real-time Traffic Classification},
author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ccs2012-decoys@inproceedings{ccs2012-decoys,
title = {Routing Around Decoys},
author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-fingerprinting@inproceedings{ccs2012-fingerprinting,
title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses},
author = {Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.cs.sunysb.edu/~xcai/fp.pdf},
www_section = {Traffic analysis},
}
|
ccs2012-skypemorph@inproceedings{ccs2012-skypemorph,
title = {SkypeMorph: Protocol Obfuscation for {T}or Bridges},
author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian
Goldberg},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-stegotorus@inproceedings{ccs2012-stegotorus,
title = {{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System},
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister
and Steven Cheung and Frank Wang and Dan Boneh},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.owlfolio.org/media/2010/05/stegotorus.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-acks@inproceedings{ccs2013-acks,
title = {Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention},
author = {John Geddes and Maxfield Schuchard and Nicholas Hopper},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-buddies@inproceedings{ccs2013-buddies,
title = {Hang with Your Buddies to Resist Intersection Attacks},
author = {David Wolinsky and Ewa Syta and Bryan Ford},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/buddies.pdf},
www_section = {Anonymous communication},
}
|
ccs2013-fte@inproceedings{ccs2013-fte,
title = {Protocol Misidentification Made Easy with Format-Transforming Encryption},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://eprint.iacr.org/2012/494.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-pctcp@inproceedings{ccs2013-pctcp,
title = {{PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay
Networks}},
author = {Mashael AlSabah and Ian Goldberg},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/pctcp-ccs.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ccs2013-usersrouted@inproceedings{ccs2013-usersrouted,
title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries},
author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul
Syverson},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-critical@inproceedings{ccs2014-critical,
title = {A Critical Evaluation of Website Fingerprinting Attacks},
author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel
Greenstadt},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2456.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-fingerprinting@inproceedings{ccs2014-fingerprinting,
title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses},
author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/ccs14.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-mators@inproceedings{ccs2014-mators,
title = {(Nothing else) {MAT}or(s): Monitoring the Anonymity of Tor's Path Selection},
author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://eprint.iacr.org/2014/621.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-tracking@inproceedings{ccs2014-tracking,
title = {The web never forgets: Persistent tracking mechanisms in the wild},
author = {Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and
Arvind Narayanan and Claudia Diaz},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2457.pdf},
www_section = {Traffic analysis},
}
|
ccs2015obfsdetection@inproceedings{ccs2015obfsdetection,
title = {Seeing Through Network-Protocol Obfuscation},
author = {Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas
Shrimpton},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
address = {New York, NY, USA},
location = {Denver, Colorado, USA},
pages = {57--69},
publisher = {ACM},
numpages = {13},
doi = {10.1145/2810103.2813715},
isbn = {978-1-4503-3832-5},
acmid = {2813715},
url = {http://doi.acm.org/10.1145/2810103.2813715},
www_section = {analysis},
www_tags = {selected},
www_pdf_url = {http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf},
keywords = {Tor, censorship-resistance, network obfuscation},
}
|
ccsw09-fingerprinting@inproceedings{ccsw09-fingerprinting,
title = {Website fingerprinting: attacking popular privacy enhancing technologies with
the multinomial na\"{\i}ve-bayes classifier},
author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath},
booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW
'09)},
year = {2009},
month = {October},
address = {New York, NY, USA},
location = {Chicago, Illinois, USA},
pages = {31--42},
publisher = {ACM},
doi = {http://doi.acm.org/10.1145/1655008.1655013},
isbn = {978-1-60558-784-4},
www_section = {Traffic analysis},
www_tags = {selected},
www_pdf_url = {http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf},
}
|
cdn-ccs2016@inproceedings{cdn-ccs2016,
title = {Practical Censorship Evasion Leveraging Content Delivery Networks},
author = {Hadi Zolfaghari and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf},
www_section = {Communications Censorship},
}
|
cebolla@inproceedings{cebolla,
title = {{Cebolla: Pragmatic IP Anonymity}},
author = {Zach Brown},
booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
year = {2002},
month = {June},
www_tags = {selected},
www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
similar to second-generation Freedom. The initiator incrementally builds her
circuit, giving her end-to-end forward-secrecy and also better recovery from
broken nodes.},
www_section = {Anonymous communication},
}
|
censorship-framework-pets2016@article{censorship-framework-pets2016,
title = {A Framework for the Game-theoretic Analysis of Censorship Resistance},
author = {Tariq Elahi and John A. Doucette and Hadi Hosseini and Steven J. Murdoch and
Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/A_Framework_for_the_Game-theoretic_Analysis_of_Censorship_Resistance.pdf},
www_section = {Communications Censorship},
}
|
censorship-sok-pets2016@article{censorship-sok-pets2016,
title = {SoK: Making Sense of Censorship Resistance Systems},
author = {Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and
Steven J. Murdoch and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/SoK__Making_Sense_of_Censorship_Resistance_Systems.pdf},
www_section = {Communications Censorship},
}
|
chaffinch@inproceedings{chaffinch,
title = {Chaffinch: Confidentiality in the Face of Legal Threats},
author = {Richard Clayton and George Danezis},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_tags = {selected},
www_html_url = {http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf},
www_section = {Misc},
}
|
chatzikokolakis2006apn@article{chatzikokolakis2006apn,
title = {{Anonymity Protocols as Noisy Channels?}},
author = {K. Chatzikokolakis and C. Palamidessi and P. Panangaden},
journal = {Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer},
year = {2006},
www_tags = {selected},
www_section = {Formal methods},
}
|
chaum-dc@article{chaum-dc,
title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient
Untraceability},
author = {David Chaum},
journal = {Journal of Cryptology},
volume = {1},
year = {1988},
pages = {65--75},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf},
}
|
chaum-mix@article{chaum-mix,
title = {Untraceable electronic mail, return addresses, and digital pseudonyms},
author = {David Chaum},
journal = {Communications of the ACM},
volume = {24},
number = {2},
year = {1981},
month = {February},
www_important = {1},
www_tags = {selected},
www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html},
www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf},
www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt},
www_section = {Anonymous communication},
}
|
chaum85@article{chaum85,
title = {Security without Identification: Transaction Systems to Make Big Brother
Obsolete},
author = {David Chaum},
journal = {CACM},
volume = {28},
number = {10},
year = {1985},
month = {October},
www_tags = {selected},
www_section = {Misc},
}
|
cheap-pseudonyms@article{cheap-pseudonyms,
title = {The social cost of cheap pseudonyms},
author = {Eric Friedman and Paul Resnick},
journal = {Journal of Economics and Management Strategy},
volume = {10},
number = {2},
year = {2001},
pages = {173--199},
www_tags = {selected},
www_pdf_url = {http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf},
www_section = {Economics},
}
|
ciaccio:pet2006@inproceedings{ciaccio:pet2006,
title = {Improving Sender Anonymity in a Structured Overlay with Imprecise Routing},
author = {Giuseppe Ciaccio},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {190--207},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_11.pdf},
www_section = {Anonymous communication},
}
|
circuit-fingerprinting2015@inproceedings{circuit-fingerprinting2015,
title = {Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services},
author = {Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas
Devadas},
booktitle = {Proceedings of the 24th Usenix Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf},
www_section = {Traffic analysis},
}
|
clayton:pet2006@inproceedings{clayton:pet2006,
title = {{Ignoring the Great Firewall of China}},
author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {20--35},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
www_section = {Communications Censorship},
}
|
clog-the-queue@inproceedings{clog-the-queue,
title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity
schemes},
author = {Jon McLachlan and Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography (FC '08)},
year = {2008},
month = {January},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf},
www_section = {Anonymous communication},
}
|
compressive-ccs2017@inproceedings{compressive-ccs2017,
title = {Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis},
author = {Milad Nasr and Amir Houmansadr and Arya Mazumdar},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {http://people.cs.umass.edu/~milad/papers/compress_CCS.pdf},
www_section = {Traffic analysis},
}
|
conf/acsac/ADC07@inproceedings{conf/acsac/ADC07,
title = {{Closed-Circuit Unobservable Voice Over IP}},
author = {Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny},
booktitle = {Proceedings of 23rd Annual Computer Security Applications Conference
(ACSAC'07), Miami, FL, USA},
year = {2007},
publisher = {{IEEE} Computer Society Press},
www_tags = {selected},
www_pdf_url = {http://www.acsac.org/2007/papers/110.pdf},
www_section = {Anonymous communication},
}
|
conf/fc/PalmieriP15@inproceedings{conf/fc/PalmieriP15,
title = {Paying the Guard: an Entry-Guard-based Payment System for Tor},
author = {Paolo Palmieri and Johan Pouwelse},
booktitle = {Proceedings of the 19th International Conference on Financial Cryptography
and Data Security ({FC} 2015)},
year = {2015},
month = {January},
www_pdf_url = {http://paolopalmieri.com/pdf/Palmieri_Pouwelse_FC2015.pdf},
www_tags = {selected},
www_section = {Economics},
}
|
congestion-longpaths@inproceedings{congestion-longpaths,
title = {A Practical Congestion Attack on {T}or Using Long Paths},
author = {Nathan Evans and Roger Dingledine and Christian Grothoff},
booktitle = {Proceedings of the 18th USENIX Security Symposium},
year = {2009},
month = {August},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/congestion-longpaths.pdf},
www_section = {Traffic analysis},
}
|
congestion-tor12@inproceedings{congestion-tor12,
title = {{Congestion-aware Path Selection for Tor}},
author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'12)},
year = {2012},
month = {February},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
cooper@inproceedings{cooper,
title = {Preserving Privacy in a Network of Mobile Computers},
author = {David A. Cooper and Kenneth P. Birman},
booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy},
year = {1995},
month = {May},
www_tags = {selected},
www_pdf_url = {http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf},
www_section = {Private Information Retrieval},
}
|
cosic-2007-001@techreport{cosic-2007-001,
title = {{The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym
Servers}},
author = {Len Sassaman and Bart Preneel},
institution = {Katholieke Universiteit Leuven},
number = {ESAT-COSIC 2007-001},
year = {2007},
month = {February},
www_tags = {selected},
www_section = {Private Information Retrieval},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf},
}
|
covertcast-pets2016@article{covertcast-pets2016,
title = {CovertCast: Using Live Streaming to Evade Internet Censorship},
author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {3},
year = {2016},
month = {July},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/CovertCast__Using_Live_Streaming_to_Evade_Internet_Censorship.pdf},
www_section = {Communications Censorship},
}
|
crosshairs-wpes17@inproceedings{crosshairs-wpes17,
title = {Onions in the Crosshairs: When The Man really is out to get you},
author = {Aaron D. Jaggard and Paul Syverson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2017)}},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {},
www_section = {Anonymous communication},
}
|
crowds-model@article{crowds-model,
title = {Probabilistic Model Checking of an Anonymity System},
author = {Vitaly Shmatikov},
journal = {Journal of Computer Security},
volume = {12},
number = {3-4},
year = {2004},
pages = {355--377},
www_tags = {selected},
www_remarks = {Uses formal methods to analyze probabilistic anonymity systems like Crowds. Confirms that anonymity degrades with a larger
crowd: as N grows, the fact that the request came from you becomes more
suspicious.},
www_ps_url = {http://www.csl.sri.com/users/shmat/shmat_crowds.ps},
www_section = {Formal methods},
}
|
crowds:tissec@article{crowds:tissec,
title = {Crowds: Anonymity for Web Transactions},
author = {Michael Reiter and Aviel Rubin},
journal = {ACM Transactions on Information and System Security},
volume = {1},
number = {1},
year = {1998},
month = {June},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://avirubin.com/crowds.pdf},
www_ps_gz_url = {http://avirubin.com/crowds.ps.gz},
www_section = {Anonymous communication},
}
|
cryptoeprint:2005:394@misc{cryptoeprint:2005:394,
title = {Obfuscated Ciphertext Mixing},
author = {Ben Adida and Douglas Wikstr\"om},
year = {2005},
month = {November},
howpublished = {Cryptology ePrint Archive, Report 2005/394},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://eprint.iacr.org/2005/394.pdf},
www_html_url = {http://eprint.iacr.org/2005/394},
}
|
cryptoeprint:2017:1000@misc{cryptoeprint:2017:1000,
title = {No right to remain silent: Isolating Malicious Mixes},
author = {Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg},
year = {2017},
month = {October},
howpublished = {Cryptology ePrint Archive, Report 2017/1000},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://eprint.iacr.org/2017/1000.pdf},
www_html_url = {http://eprint.iacr.org/2017/1000},
}
|
cset11-experimentor@inproceedings{cset11-experimentor,
title = {ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation},
author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald},
booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and
Test (CSET 2011)},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
cset12-modeling@inproceedings{cset12-modeling,
title = {Methodically Modeling the Tor Network},
author = {Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine},
booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and
Test (CSET 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/tormodel-cset2012.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
cview:pet2006@inproceedings{cview:pet2006,
title = {Linking Anonymous Transactions: The Consistent View Attack},
author = {Andreas Pashalidis and Bernd Meyer},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {384--392},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_22.pdf},
www_section = {Traffic analysis},
}
|
danezis-pet2007@inproceedings{danezis-pet2007,
title = {Two-Sided Statistical Disclosure Attack},
author = {George Danezis and Claudia Diaz and Carmela Troncoso},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf},
www_remarks = {Extends the Statistical Disclosure attack to take advantage of reply
messages.},
www_section = {Traffic analysis},
}
|
danezis-pet2008@inproceedings{danezis-pet2008,
title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
author = {George Danezis and Paul Syverson},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {133--150},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_important = {1},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/bridge.pdf},
www_section = {Traffic analysis},
}
|
danezis:pet2003@inproceedings{danezis:pet2003,
title = {Mix-networks with Restricted Routes},
author = {George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {1--17},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf},
}
|
danezis:pet2004@inproceedings{danezis:pet2004,
title = {The Traffic Analysis of Continuous-Time Mixes},
author = {George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {35--50},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
}
|
danezis:weis2006@inproceedings{danezis:weis2006,
title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous
Communications},
author = {George Danezis and Bettina Wittneben},
booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
(WEIS 2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
editor = {Ross Anderson},
www_section = {Traffic analysis},
www_important = {1},
bookurl = {http://weis2006.econinfosec.org/},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-788.pdf},
www_tags = {selected},
}
|
danezis:wpes2003@inproceedings{danezis:wpes2003,
title = {Heartbeat Traffic to Counter (n-1) Attacks},
author = {George Danezis and Len Sassaman},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf},
www_remarks = {Mix nodes should send out "heartbeat" messages (dummies that start and end
at that node). By measuring how many return in a given time, they can detect
whether the adversary is dropping or delaying traffic coming into them (possibly
so he can launch an active blending attack).},
www_section = {Anonymous communication},
}
|
danezis:wpes2004@inproceedings{danezis:wpes2004,
title = {Minx: A simple and efficient anonymous packet format},
author = {George Danezis and Ben Laurie},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/minx.pdf},
www_section = {Anonymous communication},
}
|
danner-et-al:tissec12@article{danner-et-al:tissec12,
title = {Effectiveness and detection of denial of service attacks in {Tor}},
author = {Norman Danner and Sam DeFabbia-Kane and Danny Krizanc and Marc Liberatore},
journal = {Transactions on Information and System Security},
volume = {15},
number = {3},
year = {2012},
pages = {11:1--11:25},
doi = {10.1145/2382448.2382449},
www_tags = {selected},
www_pdf_url = {http://arxiv.org/pdf/1110.5395v3.pdf},
keywords = {anonymity},
www_section = {Anonymous communication},
}
|
dataplane-pets2016@article{dataplane-pets2016,
title = {Data-plane Defenses against Routing Attacks on Tor},
author = {Da Henry Tan and Micah Sherr and Wenchao Zhou},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Data-plane_Defenses_against_Routing_Attacks_on_Tor.pdf},
www_section = {Traffic analysis},
}
|
decoy-ccs2017@inproceedings{decoy-ccs2017,
title = {The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing
Attacks},
author = {Milad Nasr and Hadi Zolfaghari and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/CCS17-Waterfall.pdf},
www_section = {Communications Censorship},
}
|
decoys-ccs2016@inproceedings{decoys-ccs2016,
title = {GAME OF DECOYS: Optimal Decoy Routing Through Game Theory},
author = {Milad Nasr and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf},
www_section = {Communications Censorship},
}
|
delay-foci16@inproceedings{delay-foci16,
title = {Censors' Delay in Blocking Circumvention Proxies},
author = {David Fifield and Lynn Tsai},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2016},
month = {August},
location = {Austin, TX, USA},
series = {FOCI '16},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf},
www_section = {Communications Censorship},
}
|
demuth:pet2002@inproceedings{demuth:pet2002,
title = {A Passive Attack on the Privacy of Web Users Using Standard Log Information},
author = {Thomas Demuth},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://demuth.biz/veroeffentlichungen/pet02.pdf},
www_section = {Anonymous communication},
}
|
denasa-pets2016@article{denasa-pets2016,
title = {DeNASA: Destination-Naive AS-Awareness in Anonymous Communications},
author = {Armon Barton and Matthew Wright},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/DeNASA__Destination-Naive_AS-Awareness_in_Anonymous_Communications.pdf},
www_section = {Anonymous communication},
}
|
desmedt@inproceedings{desmedt,
title = {How To Break a Practical {MIX} and Design a New One},
author = {Yvo Desmedt and Kaoru Kurosawa},
booktitle = {Proceedings of {EUROCRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1803},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/447709.html},
www_section = {Provable shuffles},
}
|
diaz-pet2008@inproceedings{diaz-pet2008,
title = {On the Impact of Social Network Profiling on Anonymity},
author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {44--62},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf},
www_section = {Traffic analysis},
}
|
diaz-wpes2007@inproceedings{diaz-wpes2007,
title = {Does additional information always reduce anonymity?},
author = {Claudia Diaz and Carmela Troncoso and George Danezis},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society 2007},
volume = {},
number = {},
year = {2007},
month = {October},
location = {Alexandria,VA,USA},
pages = {72--75},
editor = {Ting Yu},
publisher = {ACM},
series = {},
www_tags = {selected},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-925.pdf},
www_section = {Traffic analysis},
}
|
diaz:pet2003@inproceedings{diaz:pet2003,
title = {Generalising Mixes},
author = {Claudia Diaz and Andrei Serjantov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {18--31},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz},
}
|
differential-ndss2016@inproceedings{differential-ndss2016,
title = {Do You See What I See? Differential Treatment of Anonymous Users},
author = {Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and
Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf},
www_section = {Communications Censorship},
}
|
disad-free-routes@inproceedings{disad-free-routes,
title = {The disadvantages of free {MIX} routes and how to overcome them},
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {30--45},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf},
}
|
disco@inproceedings{disco,
title = {The dining cryptographers in the disco: Unconditional Sender and Recipient
Untraceability},
author = {Michael Waidner and Birgit Pfitzmann},
booktitle = {Proceedings of {EUROCRYPT} 1989},
year = {1990},
publisher = {Springer-Verlag, LNCS 434},
www_tags = {selected},
www_ps_gz_url = {http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz},
www_section = {Anonymous communication},
}
|
dissecting-ndss2017@inproceedings{dissecting-ndss2017,
title = {Dissecting Tor Bridges: a Security Evaluation of their Private and Public
Infrastructures},
author = {Srdjan Matic and Carmela Troncoso and Juan Caballero},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-1_Matic_paper.pdf},
www_section = {Traffic analysis},
}
|
dnstor-ndss2017@inproceedings{dnstor-ndss2017,
title = {The Effect of DNS on Tor's Anonymity},
author = {Benjamin Greschbach and Tobias Pulls and Laura M. Roberts and Philipp Winter
and Nick Feamster},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-2_Greschbach_paper.pdf},
www_section = {Traffic analysis},
}
|
dp5-pets2015@article{dp5-pets2015,
title = {DP5: A Private Presence Service},
author = {Nikita Borisov and George Danezis and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2015/papers/14_Borisov.pdf},
www_section = {Anonymous communication},
}
|
drac-pet2010@inproceedings{drac-pet2010,
title = {Drac: An Architecture for Anonymous Low-Volume Communications},
author = {George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf},
www_section = {Anonymous communication},
}
|
dsn-09-jing@inproceedings{dsn-09-jing,
title = {On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing
Attacks},
author = {Jing Jin and Xinyuan Wang},
booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on
Dependable Systems and Networks},
year = {2009},
month = {July},
address = {Lisbon},
pages = {429--438},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf},
}
|
e2e-traffic@inproceedings{e2e-traffic,
title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
author = {Nick Mathewson and Roger Dingledine},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {17--34},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
}
|
ebe2003@article{ebe2003,
title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer
Networks}},
author = {Christian Grothoff},
journal = {Wirtschaftsinformatik},
year = {2003},
month = {June},
publisher = {Springer-Verlag},
www_tags = {selected},
www_ps_url = {http://www.ovmj.org/GNUnet/download/ebe.ps},
www_section = {Economics},
}
|
econymics@inproceedings{econymics,
title = {{On the Economics of Anonymity}},
author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC '03)},
year = {2003},
month = {January},
editor = {Rebecca N. Wright},
publisher = {Springer-Verlag, LNCS 2742},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/fc03/econymics.pdf},
www_section = {Economics},
}
|
edman2009survey@article{edman2009survey,
title = {On anonymity in an electronic society: A survey of anonymous communication
systems},
author = {Matthew Edman and B\"{u}lent Yener},
journal = {ACM Computing Surveys},
volume = {42},
number = {1},
year = {2009},
address = {New York, NY, USA},
pages = {1--35},
publisher = {ACM},
www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf},
issn = {0360-0300},
www_tags = {selected},
www_section = {Misc},
doi = {http://doi.acm.org/10.1145/1592451.1592456},
}
|
eigenspeed@inproceedings{eigenspeed,
title = {EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation},
author = {Robin Snader and Nikita Borisov},
booktitle = {Proceedings of the 8th {I}nternational {W}orkshop on {P}eer-to-{P}eer
{S}ystems ({IPTPS09})},
year = {2009},
month = {April},
location = {Boston, MA},
www_tags = {selected},
www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf},
www_section = {Anonymous communication},
}
|
entropist@inproceedings{entropist,
title = {Why {I'm} not an Entropist},
author = {Paul Syverson},
booktitle = {Proceedings of Security Protocols XVII: 17th International Workshop, April
2009, Revised Selected Papers},
year = {2013},
pages = {231--239},
editor = {Bruce Christianson and James A. Malcolm and Vashek Maty\'{a}\v{s} and Michael
Roe},
publisher = {Springer-Verlag, LNCS 7028},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.syverson.org/entropist-final.pdf},
}
|
esorics04-mauw@inproceedings{esorics04-mauw,
title = {A formalization of anonymity and onion routing},
author = {S. Mauw and J. Verschuren and E.P. de Vink},
booktitle = {Proceedings of ESORICS 2004},
year = {2004},
location = {Sophia Antipolis},
pages = {109--124},
editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
publisher = {LNCS 3193},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
}
|
esorics05-Klonowski@inproceedings{esorics05-Klonowski,
title = {Local View Attack on Anonymous Communication},
author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of ESORICS 2005},
year = {2005},
month = {September},
www_tags = {selected},
www_ps_url = {http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps},
www_section = {Traffic analysis},
}
|
esorics10-bandwidth@inproceedings{esorics10-bandwidth,
title = {Traffic Analysis Against Low-Latency Anonymity Networks Using Available
Bandwidth Estimation},
author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'10},
year = {2010},
month = {September},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf},
www_section = {Traffic analysis},
}
|
esorics12-torscan@inproceedings{esorics12-torscan,
title = {{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks},
author = {Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'12},
year = {2012},
month = {September},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf},
www_section = {Traffic analysis},
}
|
esorics13-cellflood@inproceedings{esorics13-cellflood,
title = {{CellFlood}: Attacking {T}or Onion Routers on the Cheap},
author = {Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos
Keromytis},
booktitle = {Proceedings of ESORICS 2013},
year = {2013},
month = {September},
www_tags = {selected},
www_pdf_url = {http://www.cs.columbia.edu/~vpk/papers/cellflood.esorics13.pdf},
www_section = {Traffic analysis},
}
|
esorics13-infra@inproceedings{esorics13-infra,
title = {Plug-and-Play {IP} Security: Anonymity Infrastructure Instead of {PKI}},
author = {Yossi Gilad and Amir Herzberg},
booktitle = {Proceedings of ESORICS 2013},
year = {2013},
month = {September},
www_tags = {selected},
www_pdf_url = {http://eprint.iacr.org/2013/410.pdf},
www_section = {Anonymous communication},
}
|
exit-blocking2017@inproceedings{exit-blocking2017,
title = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael
Carl Tschantz and Phillipa Gill and Vern Paxson},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-singh.pdf},
www_section = {Anonymous communication},
}
|
fairbrother:pet2004@inproceedings{fairbrother:pet2004,
title = {An Improved Construction for Universal Re-encryption},
author = {Peter Fairbrother},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {79--87},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.m-o-o-t.org/ICUR.pdf},
}
|
feamster:pet2003@inproceedings{feamster:pet2003,
title = {{Thwarting Web Censorship with Untrusted Messenger Delivery}},
author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan
and David Karger},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {125--140},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Communications Censorship},
www_pdf_url = {http://nms.lcs.mit.edu/papers/disc-pet2003.pdf},
}
|
feamster:wpes2004@inproceedings{feamster:wpes2004,
title = {Location Diversity in Anonymity Networks},
author = {Nick Feamster and Roger Dingledine},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_ps_url = {http://freehaven.net/doc/routing-zones/routing-zones.ps},
www_section = {Anonymous communication},
}
|
fifield2015fronting@article{fifield2015fronting,
title = {Blocking-resistant communication through domain fronting},
author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
pages = {46--64},
www_tags = {selected},
www_html_url = {https://www.bamsoftware.com/papers/fronting/},
www_pdf_url = {https://www.bamsoftware.com/papers/fronting.pdf},
www_section = {Communications Censorship},
}
|
fingerprinting-esorics2016@inproceedings{fingerprinting-esorics2016,
title = {Toward an Efficient Website Fingerprinting Defense},
author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia Diaz and Matthew
Wright},
booktitle = {Proceedings of ESORICS 2016},
year = {2016},
month = {September},
www_tags = {selected},
www_pdf_url = {https://scholar.google.com/scholar_url?url=https://arxiv.org/pdf/1512.00524&hl=en&sa=X&scisig=AAGBfm1kNELdLrW6MsDhMt-OpXiNjUrQsw&nossl=1&oi=scholarr},
www_section = {Traffic analysis},
}
|
fingerprinting-ndss2016@inproceedings{fingerprinting-ndss2016,
title = {Website Fingerprinting at Internet Scale},
author = {Andriy Panchenko and Fabian Lanze and Jan Pennekamp and Thomas Engel and
Andreas Zinnen and Martin Henze and Klaus Wehrle},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/website-fingerprinting-internet-scale.pdf},
www_section = {Traffic analysis},
}
|
fingerprinting-wpes17@inproceedings{fingerprinting-wpes17,
title = {Analysis of Fingerprinting Techniques for Tor Hidden Services},
author = {Andriy Panchenko and Asya Mitseva and Martin Henze and Fabian Lanze and Klaus
Wehrle and Thomas Engel},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2017)}},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://lorre.uni.lu/~andriy/papers/acmccs-wpes17-hidden-services-fp.pdf},
www_section = {Anonymous communication},
}
|
fiveyearslater@inproceedings{fiveyearslater,
title = {{Privacy-enhancing technologies for the Internet, II: Five years later}},
author = {Ian Goldberg},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/petfive.pdf},
www_ps_url = {http://freehaven.net/anonbib/papers/petfive.ps},
www_section = {Misc},
}
|
flash-mix@inproceedings{flash-mix,
title = {Flash {M}ixing},
author = {Markus Jakobsson},
booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99},
year = {1999},
publisher = {ACM Press},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf},
www_section = {Provable shuffles},
}
|
flashproxy-pets12@inproceedings{flashproxy-pets12,
title = {Evading Censorship with Browser-Based Proxies},
author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and
Roger Dingledine and Phil Porras and Dan Boneh},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {https://crypto.stanford.edu/flashproxy/flashproxy.pdf},
www_section = {Communications Censorship},
}
|
flow-correlation04@inproceedings{flow-correlation04,
title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {207--225},
series = {LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
}
|
foci11-decoy@inproceedings{foci11-decoy,
title = {Decoy Routing: Toward Unblockable Internet Communication},
author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and
Greg Lauer and David P. Mankins and W. Timothy Strayer},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2011)},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf},
www_section = {Communications Censorship},
}
|
foci12-defiance@inproceedings{foci12-defiance,
title = {Bootstrapping Communications into an Anti-Censorship System},
author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and
Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and
Dan Boneh},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf},
www_section = {Communications Censorship},
}
|
foci12-winter@inproceedings{foci12-winter,
title = {{How the Great Firewall of China is blocking Tor}},
author = {Philipp Winter and Stefan Lindskog},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf},
www_section = {Communications Censorship},
}
|
freedom2-arch@techreport{freedom2-arch,
title = {Freedom Systems 2.0 Architecture},
author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
institution = {Zero Knowledge Systems, {Inc.}},
year = {2000},
month = {December},
type = {White Paper},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf},
day = {18},
}
|
freedom21-security@techreport{freedom21-security,
title = {Freedom Systems 2.1 Security Issues and Analysis},
author = {Adam Back and Ian Goldberg and Adam Shostack},
institution = {Zero Knowledge Systems, {Inc.}},
year = {2001},
month = {May},
type = {White Paper},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf},
day = {3},
}
|
freehaven-berk@inproceedings{freehaven-berk,
title = {The Free Haven Project: Distributed Anonymous Storage Service},
author = {Roger Dingledine and Michael J. Freedman and David Molnar},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_ps_url = {http://freehaven.net/doc/berk/freehaven-berk.ps},
www_section = {Anonymous publication},
}
|
freenet@inproceedings{freenet,
title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval System},
author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
volume = {2009},
year = {2000},
month = {July},
pages = {46--66},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
series = {Lecture Notes in Computer Science},
doi = {10.1007/3-540-44702-4_4},
isbn = {978-3-540-41724-8},
url = {http://dx.doi.org/10.1007/3-540-44702-4_4},
www_section = {Anonymous publication},
www_tags = {selected},
www_pdf_url = {http://www.facweb.iitkgp.ernet.in/~niloy/COURSE/Autumn2010/UC/Resource/freenet1-big.pdf},
}
|
fte-usenix14@inproceedings{fte-usenix14,
title = {LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption
Schemes},
author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and
Thomas Shrimpton},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://kpdyer.com/publications/usenix2014-fte.pdf},
www_section = {Communications Censorship},
}
|
fu-active@inproceedings{fu-active,
title = {Active Traffic Analysis Attacks and Countermeasures},
author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the 2003 International Conference on Computer Networks and
Mobile Computing},
year = {2003},
pages = {31--39},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf},
}
|
fu-analytical@inproceedings{fu-analytical,
title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis
Attacks},
author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the 2003 International Conference on Parallel Processing},
year = {2003},
pages = {483--492},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf},
}
|
garmandecentralized@inproceedings{garmandecentralized,
title = {Decentralized Anonymous Credentials},
author = {Christina Garman and Matthew Green and Ian Miers},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/07_3_1.pdf},
www_section = {E-Cash / Anonymous Credentials},
}
|
george-thesis@phdthesis{george-thesis,
title = {Better Anonymous Communications},
author = {George Danezis},
school = {University of Cambridge},
year = {2004},
month = {July},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
}
|
gfw-foci14@inproceedings{gfw-foci14,
title = {Towards a Comprehensive Picture of the Great Firewall's {DNS} Censorship},
author = {Anonymous},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
www_section = {Communications Censorship},
}
|
gnunetencoding@inproceedings{gnunetencoding,
title = {{Efficient Sharing of Encrypted Data}},
author = {Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu},
booktitle = {{Proceedings of ASCIP 2002}},
year = {2002},
month = {July},
pages = {107--120},
publisher = {Springer-Verlag},
www_tags = {selected},
www_ps_url = {http://www.ovmj.org/GNUnet/download/esed.ps},
www_section = {Anonymous publication},
}
|
goldberg97privacyenhancing@inproceedings{goldberg97privacyenhancing,
title = {Privacy-enhancing Technologies for the Internet},
author = {Ian Goldberg and David Wagner and Eric Brewer},
booktitle = {Proceedings of the 42nd IEEE Spring COMPCON},
year = {1997},
month = {February},
publisher = {IEEE Computer Society Press},
isbn = {0-8186-7804-6},
www_tags = {selected},
www_ps_url = {http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps},
www_section = {Misc},
}
|
golle:ccs2004@inproceedings{golle:ccs2004,
title = {Parallel Mixing},
author = {Philippe Golle and Ari Juels},
booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications
Security (CCS 2004)}},
year = {2004},
month = {October},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/parallel.pdf},
www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/parallel.ps},
www_section = {Anonymous communication},
}
|
golle:eurocrypt2004@inproceedings{golle:eurocrypt2004,
title = {Dining Cryptographers Revisited},
author = {Philippe Golle and Ari Juels},
booktitle = {Proceedings of Eurocrypt 2004},
year = {2004},
month = {May},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/nim.pdf},
www_section = {Anonymous communication},
}
|
golle:pet2004@inproceedings{golle:pet2004,
title = {Reputable Mix Networks},
author = {Philippe Golle},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {51--63},
series = {LNCS},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/reputable.pdf},
}
|
guardsets-pets2015@article{guardsets-pets2015,
title = {Guard Sets for Onion Routing},
author = {Jamie Hayes and George Danezis},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
pages = {65--80},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2015/papers/05_Hayes.pdf},
www_section = {Anonymous communication},
}
|
gup@inproceedings{gup,
title = {Authentic Attributes with Fine-Grained Anonymity Protection},
author = {Stuart Stubblebine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC 2000)},
year = {2001},
pages = {276--294},
editor = {Yair Frankel},
publisher = {Springer-Verlag, LNCS 1962},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps},
}
|
halpern-oneill-2003@article{halpern-oneill-2003,
title = {Anonymity and Information Hiding in Multiagent Systems},
author = {Joseph Y. Halpern and Kevin R. O'Neill},
journal = {Journal of Computer Security},
volume = {},
number = {},
year = {2004},
www_tags = {selected},
www_pdf_url = {http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf},
www_section = {Formal methods},
}
|
herbivore:tr@techreport{herbivore:tr,
title = {{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}},
author = {Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer},
institution = {Cornell University},
number = {2003-1890},
year = {2003},
month = {February},
address = {Ithaca, NY},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf},
}
|
herd-sigcomm2015@inproceedings{herd-sigcomm2015,
title = {Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP
Systems},
author = {Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and
Nicholas Merritt},
booktitle = {Proceedings of the ACM SIGCOMM 2015 Conference},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p639.pdf},
www_section = {Anonymous communication},
}
|
hintz02@inproceedings{hintz02,
title = {Fingerprinting Websites Using Traffic Analysis},
author = {Andrew Hintz},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_html_url = {http://guh.nu/projects/ta/safeweb/safeweb.html},
www_pdf_url = {http://guh.nu/projects/ta/safeweb/safeweb.pdf},
www_ps_url = {http://guh.nu/projects/ta/safeweb/safeweb.ps},
www_section = {Traffic analysis},
}
|
histore-ndss2017@inproceedings{histore-ndss2017,
title = {HisTor{\varepsilon}: Differentially Private and Robust Statistics Collection for
Tor},
author = {Akshaya Mani and Micah Sherr},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-4_Mani_paper.pdf},
www_section = {Traffic analysis},
}
|
hitting-set04@inproceedings{hitting-set04,
title = {The Hitting Set Attack on Anonymity Protocols},
author = {Dogan Kesdogan and Lexi Pimenidis},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf},
www_section = {Traffic analysis},
}
|
hornet-ccs2015@inproceedings{hornet-ccs2015,
title = {{HORNET}: High-speed Onion Routing at the Network Layer},
author = {Chen Chen and Daniele E. Asoni and David Barrera and George Danezis and Adrian
Perrig},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.scion-architecture.net/pdf/2015-HORNET.pdf},
www_section = {Anonymous communication},
}
|
houmansadrnodirection@inproceedings{houmansadrnodirection,
title = {No Direction Home: The True Cost of Routing Around Decoys},
author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/01_2_1.pdf},
www_section = {Communications Censorship},
}
|
hs-attack06@inproceedings{hs-attack06,
title = {Locating Hidden Servers},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
year = {2006},
month = {May},
publisher = {IEEE CS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
www_remarks = {Motivates and describes Tor's entry guard design.},
www_section = {Traffic analysis},
}
|
huber2010tor@inproceedings{huber2010tor,
title = {{Tor HTTP Usage and Information Leakage}},
author = {Markus Huber and Martin Mulazzani and Edgar Weippl},
booktitle = {Proceedings of the 11th IFIP TC 6/TC 11 International Conference on
Communications and Multimedia Security (CMS 2010)},
volume = {6109},
year = {2010},
month = {May},
location = {Linz, Austria},
pages = {245--255},
publisher = {Springer},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf},
}
|
hybrid-mix@inproceedings{hybrid-mix,
title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
author = {Miyako Ohkubo and Masayuki Abe},
booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
ian-thesis@phdthesis{ian-thesis,
title = {A Pseudonymous Communications Infrastructure for the Internet},
author = {Ian Goldberg},
school = {UC Berkeley},
year = {2000},
month = {December},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf},
}
|
icdcs2006:m2@inproceedings{icdcs2006:m2,
title = {M2: Multicasting Mixes for Efficient and Anonymous Communication},
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems},
year = {2006},
month = {July},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf},
day = {4--7},
}
|
ih05-Klonowski@inproceedings{ih05-Klonowski,
title = {Provable Anonymity for Networks of Mixes},
author = {Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {26--38},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
}
|
ih05-Luke@inproceedings{ih05-Luke,
title = {On Blending Attacks For Mixes with Memory},
author = {Luke O'Connor},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {39--52},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://lukejamesoconnor.googlepages.com/blending-attacks.pdf},
}
|
ih05-csispir@inproceedings{ih05-csispir,
title = {Censorship Resistance Revisited},
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {62--76},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://gnunet.org/papers/IHW-CR.pdf},
}
|
ih05-danezisclulow@inproceedings{ih05-danezisclulow,
title = {Compulsion Resistant Anonymous Communications},
author = {George Danezis and Jolyon Clulow},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {11--25},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf},
}
|
improved-clockskew@inproceedings{improved-clockskew,
title = {An Improved Clock-skew Measurement Technique for Revealing Hidden Services},
author = {Sebastian Zander and Steven J. Murdoch},
booktitle = {Proceedings of the 17th USENIX Security Symposium},
year = {2008},
month = {July},
location = {San Jose, CA, US},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf},
www_section = {Traffic analysis},
}
|
incentives-fc10@inproceedings{incentives-fc10,
title = {{Building Incentives into Tor}},
author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/incentives-fc10.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
incomparable-pkeys@inproceedings{incomparable-pkeys,
title = {Receiver Anonymity via Incomparable Public Keys},
author = {Brent Waters and Ed Felten and Amit Sahai},
booktitle = {{Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS 2003)}},
year = {2003},
month = {October},
pages = {112--121},
editor = {Vijay Atluri and Peng Liu},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf},
www_ps_url = {http://www.cs.princeton.edu/~bwaters/research/incomparable.ps},
}
|
infranet@inproceedings{infranet,
title = {Infranet: Circumventing Web Censorship and Surveillance},
author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan
and David Karger},
booktitle = {Proceedings of the 11th USENIX Security Symposium},
year = {2002},
month = {August},
www_tags = {selected},
www_pdf_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf},
www_ps_gz_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz},
www_section = {Communications Censorship},
}
|
insidejob-ndss2018@inproceedings{insidejob-ndss2018,
title = {Inside Job: Applying Traffic Analysis to Measure Tor from Within},
author = {Jansen, Rob and Juarez, Marc and G{\'a}lvez, Rafa and Elahi, Tariq and Diaz,
Claudia},
booktitle = {Proceedings of the 25th Symposium on Network and Distributed System Security
({NDSS} '18)},
year = {2018},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/insidejob-ndss2018.pdf},
www_section = {Anonymous communication},
}
|
ipccc12-performance@inproceedings{ipccc12-performance,
title = {Improving Performance and Anonymity in the Tor Network},
author = {Andriy Panchenko and Fabian Lanze and Thomas Engel},
booktitle = {Proceedings of the 31st IEEE International Performance Computing and
Communications Conference (IPCCC 2012)},
year = {2012},
month = {December},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ishai2006ca@article{ishai2006ca,
title = {{Cryptography from Anonymity}},
author = {Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai},
journal = {Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer
Science (FOCS'06)-Volume 00},
year = {2006},
month = {October},
pages = {239--248},
publisher = {IEEE Computer Society Washington, DC, USA},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf},
}
|
jakobsson-optimally@inproceedings{jakobsson-optimally,
title = {An Optimally Robust Hybrid Mix Network (Extended Abstract)},
author = {Markus Jakobsson and Ari Juels},
booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01},
year = {2001},
publisher = {ACM Press},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/492015.html},
www_section = {Provable shuffles},
}
|
jansen-phd-thesis@phdthesis{jansen-phd-thesis,
title = {Privacy Preserving Performance Enhancements for Anonymous Communication
Systems},
author = {Rob Jansen},
school = {University of Minnesota},
year = {2012},
month = {October},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www.robgjansen.com/publications/jansen-phd-dissertation.pdf},
www_tags = {selected},
}
|
jansen14-kist@inproceedings{jansen14-kist,
title = {Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed
Socket Transport},
author = {Rob Jansen and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/kist-sec2014.pdf},
www_section = {Tor Performance},
}
|
k-anonymous:ccs2003@inproceedings{k-anonymous:ccs2003,
title = {k-Anonymous Message Transmission},
author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper},
booktitle = {{Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS 2003)}},
year = {2003},
month = {October},
pages = {122--130},
editor = {Vijay Atluri and Peng Liu},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf},
}
|
karger77@techreport{karger77,
title = {Non-Discretionary Access Control for Decentralized Computing Systems},
author = {Paul A. Karger},
institution = {Laboratory for Computer Science, Massachusetts Institute of Technology},
number = {MIT/LCS/TR-179},
year = {1977},
month = {May},
address = {Cambridge, MA},
type = {S. M. \& E. E. thesis},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf},
www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early
discussion of traffic analysis issues.},
}
|
kesdogan:pet2002@inproceedings{kesdogan:pet2002,
title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
alternative to the MIX based Approach?},
author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf},
www_section = {Anonymous communication},
}
|
kevin-thesis@phdthesis{kevin-thesis,
title = {Improving Security and Performance in Low Latency Anonymity Networks},
author = {Kevin Bauer},
school = {University of Colorado},
year = {2011},
month = {May},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf},
}
|
koepsell:wpes2004@inproceedings{koepsell:wpes2004,
title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web
Surfing},
author = {Stefan K\"opsell and Ulf Hilling},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/p103-koepsell.pdf},
www_section = {Communications Censorship},
}
|
kostas-thesis@phdthesis{kostas-thesis,
title = {Probabilistic and Information-Theoretic Approaches to Anonymity},
author = {Konstantinos Chatzikokolakis},
school = {Laboratoire d'Informatique (LIX), {\'E}cole Polytechnique, Paris},
year = {2007},
month = {October},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.lix.polytechnique.fr/~kostas/thesis.pdf},
}
|
kuesters-rpc@inproceedings{kuesters-rpc,
title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
author = {Ralf K\"usters and Tomasz Truderung and Andreas Vogt},
booktitle = {Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy},
year = {2014},
month = {May},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://infsec.uni-trier.de/publications/paper/KuestersTruderungVogt-SP-2014.pdf},
www_section = {Anonymous communication},
}
|
kugler:pet2003@inproceedings{kugler:pet2003,
title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant
Networks}},
author = {Dennis K\"ugler},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {161--176},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf},
}
|
langos02@inproceedings{langos02,
title = {Dummy Traffic Against Long Term Intersection Attacks},
author = {Oliver Berthold and Heinrich Langos},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf},
www_section = {Traffic analysis},
}
|
leastsquares-pets12@inproceedings{leastsquares-pets12,
title = {Understanding Statistical Disclosure: A Least Squares approach},
author = {Fernando Perez-Gonzalez and Carmela Troncoso},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf},
www_section = {Traffic analysis},
}
|
lenhard2009hidserv-lowbw@inproceedings{lenhard2009hidserv-lowbw,
title = {Performance Measurements of Tor Hidden Services in Low-Bandwidth Access
Networks},
author = {J{\"o}rg Lenhard and Karsten Loesing and Guido Wirtz},
booktitle = {Proceedings of the 7th International Conference on Applied Cryptography and
Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009},
volume = {5536},
year = {2009},
month = {June},
editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque and Damien
Vergnaud},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-01956-2},
www_tags = {selected},
www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
limits-open@inproceedings{limits-open,
title = {Limits of Anonymity in Open Environments},
author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_tags = {selected},
www_pdf_url = {http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf},
www_section = {Traffic analysis},
}
|
loesing2008performance@inproceedings{loesing2008performance,
title = {{Performance Measurements and Statistics of Tor Hidden Services}},
author = {Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz},
booktitle = {Proceedings of the 2008 International Symposium on Applications and the
Internet (SAINT)},
year = {2008},
month = {July},
location = {Turku, Finland},
publisher = {IEEE CS Press},
www_tags = {selected},
www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
loesing2009thesis@phdthesis{loesing2009thesis,
title = {Privacy-enhancing Technologies for Private Services},
author = {Karsten Loesing},
school = {University of Bamberg},
year = {2009},
month = {May},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf},
}
|
loopix2017@inproceedings{loopix2017,
title = {The Loopix Anonymity System},
author = {Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George
Danezis},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-piotrowska.pdf},
www_section = {Anonymous communication},
}
|
mailet-pets2016@article{mailet-pets2016,
title = {Mailet: Instant Social Networking under Censorship},
author = {Shuai Li and Nicholas Hopper},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Mailet__Instant_Social_Networking_under_Censorship.pdf},
www_section = {Communications Censorship},
}
|
marionette2015@inproceedings{marionette2015,
title = {Marionette: A Programmable Network Traffic Obfuscation System},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
booktitle = {Proceedings of the 24th Usenix Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf},
www_section = {Communications Censorship},
}
|
mators-pets2016@article{mators-pets2016,
title = {Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path
Selection Algorithms against Structural Attacks},
author = {Michael Backes and Sebastian Meiser and Marcin Slowik},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Your_Choice_MATor(s).pdf},
www_section = {Traffic analysis},
}
|
mccoy-pet2008@inproceedings{mccoy-pet2008,
title = {Shining Light in Dark Places: Understanding the {Tor} Network},
author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas
Sicker},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {63--76},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf},
www_section = {Misc},
}
|
miab-acsac13@inproceedings{miab-acsac13,
title = {Message In A Bottle: Sailing Past Censorship},
author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
booktitle = {Proceedings of the Annual Computer Security Applications Conference
(ACSAC)},
year = {2013},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.ucsb.edu/~vigna/publications/2013_ACSAC_MITB.pdf},
www_section = {Communications Censorship},
}
|
minion-design@inproceedings{minion-design,
title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}},
author = {George Danezis and Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {2--15},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://mixminion.net/minion-design.pdf},
}
|
mitkuro@inproceedings{mitkuro,
title = {{Attack for Flash MIX}},
author = {Masashi Mitomo and Kaoru Kurosawa},
booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/450148.html},
www_section = {Provable shuffles},
}
|
mix-acc@inproceedings{mix-acc,
title = {{A Reputation System to Increase MIX-net Reliability}},
author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {126--141},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/doc/mix-acc/mix-acc.pdf},
www_ps_url = {http://freehaven.net/doc/mix-acc/mix-acc.ps},
}
|
mixmaster-reliable@inproceedings{mixmaster-reliable,
title = {Comparison between two practical mix designs},
author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte},
booktitle = {Proceedings of ESORICS 2004},
year = {2004},
month = {September},
location = {France},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-98.pdf},
www_ps_gz_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz},
www_section = {Traffic analysis},
}
|
mixmaster-spec@misc{mixmaster-spec,
title = {Mixmaster {P}rotocol --- {V}ersion 2},
author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman},
year = {2003},
month = {July},
howpublished = {IETF Internet Draft},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_txt_url = {http://www.abditum.com/mixmaster-spec.txt},
}
|
mmsec04-Klonowski@inproceedings{mmsec04-Klonowski,
title = {DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion
Protocols},
author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of the IFIP TC-6 TC-11 Conference on Communications and
Multimedia Security 2004},
year = {2004},
month = {September},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
modular-approach@article{modular-approach,
title = {Information Hiding, Anonymity and Privacy: A Modular Approach},
author = {Dominic Hughes and Vitaly Shmatikov},
journal = {Journal of Computer Security},
volume = {12},
number = {1},
year = {2004},
pages = {3--36},
www_tags = {selected},
www_ps_url = {http://www.csl.sri.com/users/shmat/shmat_anon.ps},
www_section = {Formal methods},
}
|
morphing09@inproceedings{morphing09,
title = {Traffic Morphing: An efficient defense against statistical traffic analysis},
author = {Charles Wright and Scott Coull and Fabian Monrose},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '09},
year = {2009},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/morphing09.pdf},
www_section = {Traffic analysis},
}
|
morphmix-fc2004@inproceedings{morphmix-fc2004,
title = {Practical Anonymity for the Masses with MorphMix},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {233--250},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://home.zhwin.ch/~rer/publications/FC2004.pdf},
}
|
morphmix:pet2006@inproceedings{morphmix:pet2006,
title = {Breaking the Collusion Detection Mechanism of MorphMix},
author = {Parisa Tabriz and Nikita Borisov},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {368--384},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_21.pdf},
www_section = {Traffic analysis},
}
|
morphmix:wpes2002@inproceedings{morphmix:wpes2002,
title = {{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with
Collusion Detection}},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2002)}},
year = {2002},
month = {November},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz},
www_section = {Anonymous communication},
}
|
mtor-pets2016@article{mtor-pets2016,
title = {Scalable and Anonymous Group Communication with MTor},
author = {Dong Lin and Micah Sherr and Boon Thau Loo},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Scalable_and_Anonymous_Group_Communication_with_MTor.pdf},
www_section = {Anonymous communication},
}
|
murdoch-pet2007@inproceedings{murdoch-pet2007,
title = {Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries},
author = {Steven J. Murdoch and Piotr Zieli{\'n}ski},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_important = {1},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf},
www_remarks = {Examines efficacy of traffic analysis against a low-latency anonymity
network by an adversary who controls Internet exchanges, and who can only sample
a fraction of traffic.},
www_section = {Traffic analysis},
}
|
murdoch-pet2008@inproceedings{murdoch-pet2008,
title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},
author = {Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {115--132},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf},
www_section = {Traffic analysis},
}
|
ndss09-rainbow@inproceedings{ndss09-rainbow,
title = {RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows},
author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'09},
year = {2009},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf},
www_section = {Traffic analysis},
}
|
ndss11-swirl@inproceedings{ndss11-swirl,
title = {SWIRL: A Scalable Watermark to Detect Correlated Network Flows},
author = {Amir Houmansadr and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11},
year = {2011},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf},
www_section = {Traffic analysis},
}
|
ndss13-freewave@inproceedings{ndss13-freewave,
title = {{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship
Circumvention}},
author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf},
www_section = {Communications Censorship},
}
|
ndss13-lira@inproceedings{ndss13-lira,
title = {{LIRA: Lightweight Incentivized Routing for Anonymity}},
author = {Rob Jansen and Aaron Johnson and Paul Syverson},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/lira-ndss2013.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ndss13-rbridge@inproceedings{ndss13-rbridge,
title = {{rBridge: User Reputation based Tor Bridge Distribution with Privacy
Preservation}},
author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf},
www_section = {Anonymous communication},
}
|
ndss13-relay-selection@inproceedings{ndss13-relay-selection,
title = {{An Empirical Evaluation of Relay Selection in Tor}},
author = {Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ndss13-website-fingerprinting@inproceedings{ndss13-website-fingerprinting,
title = {{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}},
author = {Michael Backes and Goran Doychev and Boris K\"opf},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://software.imdea.org/~bkoepf/papers/ndss13.pdf},
www_section = {Anonymous communication},
}
|
ndss13:mittal:a@inproceedings{ndss13:mittal:a,
title = {Pisces: Anonymous Communication Using Social Networks},
author = {Prateek Mittal and Matthew Wright and Nikita Borisov},
booktitle = {Proceedings of the 20th Annual Network and Distributed System Security
Symposium (NDSS2013)},
year = {2013},
month = {February},
location = {San Diego, California, USA},
editor = {},
publisher = {The Internet Society 2013},
www_section = {Anonymous communication},
www_pdf_url = {http://internetsociety.org/sites/default/files/05_1_0.pdf},
www_tags = {selected},
}
|
newman:pet2003@inproceedings{newman:pet2003,
title = {Metrics for Traffic Analysis Prevention},
author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {48--65},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://www.cise.ufl.edu/~nemo/papers/PET2003.ps},
}
|
newman:pet2004@inproceedings{newman:pet2004,
title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls},
author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {1--16},
series = {LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf},
www_remarks = {If we think about leaked anonymity as a covert channel between the sender
Alice and the adversary Eve, then by measuring covert channel capacity we can get
an upper bound on the amount of information Alice could leak.},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps},
}
|
nfattackpam14@inproceedings{nfattackpam14,
title = {On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow
Records},
author = {S. Chakravarty and M. V. Barbera and G. Portokalidis and M. Polychronakis and
A. D. Keromytis},
booktitle = {Proceedings of the 15th Passive and Active Measurements Conference (PAM
'14)},
year = {2014},
month = {March},
www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/pam2014-tor-nfattack.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
nguyen2006vsf@article{nguyen2006vsf,
title = {{Verifiable shuffles: a formal model and a Paillier-based three-round
construction with provable security}},
author = {L. Nguyen and R. Safavi-Naini and K. Kurosawa},
journal = {International Journal of Information Security},
volume = {5},
number = {4},
year = {2006},
pages = {241--255},
publisher = {Springer},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
nguyen:pet2003@inproceedings{nguyen:pet2003,
title = {Breaking and Mending Resilient Mix-nets},
author = {Lan Nguyen and Rei Safavi-Naini},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {66--80},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://www.petworkshop.org/2003/preproc/05-preproc.pdf},
}
|
nym-alias-net@inproceedings{nym-alias-net,
title = {{The Design, Implementation and Operation of an Email Pseudonym Server}},
author = {David Mazi\`eres and M. Frans Kaashoek},
booktitle = {{Proceedings of the 5th ACM Conference on Computer and Communications
Security (CCS 1998)}},
year = {1998},
month = {November},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf},
www_ps_gz_url = {ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz},
www_section = {Pseudonymity},
}
|
nymble-tdsc@article{nymble-tdsc,
title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks},
author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith},
journal = {IEEE Transactions on Dependable and Secure Computing},
volume = {8},
number = {2},
year = {2011},
month = {March--April},
pages = {256--269},
doi = {10.1109/TDSC.2009.38},
www_tags = {selected},
www_important = {1},
www_remarks = {Describes Nymble, a system that allows services to block anonymous users
that misbehave, without making their transactions linkable.},
www_section = {Misc},
}
|
nymbler@inproceedings{nymbler,
title = {{Making a Nymbler Nymble using VERBS (Extended Version)}},
author = {Ryan Henry and Kevin Henry and Ian Goldberg},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf},
www_section = {Misc},
}
|
oakland11-formalizing@inproceedings{oakland11-formalizing,
title = {Formalizing Anonymous Blacklisting Systems},
author = {Ryan Henry and Ian Goldberg},
booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy},
year = {2011},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf},
www_section = {Misc},
}
|
oakland2012-lap@inproceedings{oakland2012-lap,
title = {{LAP}: Lightweight Anonymity and Privacy},
author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and
Sam Nelson and Marco Gruteser and Wei Ming},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://freehaven.net/anonbib/papers/LAP.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
oakland2012-lastor@inproceedings{oakland2012-lastor,
title = {{LASTor: A Low-Latency AS-Aware Tor Client}},
author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
oakland2012-peekaboo@inproceedings{oakland2012-peekaboo,
title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures
Fail},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://kpdyer.com/publications/oakland2012.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
oakland2013-parrot@inproceedings{oakland2013-parrot,
title = {The Parrot is Dead: Observing Unobservable Network Communications},
author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov},
booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy},
year = {2013},
month = {May},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/parrot.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
oakland2013-trawling@inproceedings{oakland2013-trawling,
title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization},
author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy},
year = {2013},
month = {May},
www_pdf_url = {http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
offpath2016@inproceedings{offpath2016,
title = {Off-Path TCP Exploits: Global Rate Limit Considered Dangerous},
author = {Yue Cao and Zhiyun Qian and Zhongjie Wang and Tuan Dao and Srikanth V.
Krishnamurthy and Lisa M. Marvel},
booktitle = {Proceedings of the 25th Usenix Security Symposium},
year = {2016},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf},
www_section = {Traffic analysis},
}
|
onion-discex00@inproceedings{onion-discex00,
title = {{O}nion {R}outing Access Configurations},
author = {Paul Syverson and Michael Reed and David Goldschlag},
booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
(DISCEX 2000)},
volume = {1},
year = {2000},
pages = {34--40},
publisher = {IEEE CS Press},
www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
www_tags = {selected},
www_abstract_url = {http://www.onion-router.net/Publications.html},
www_section = {Anonymous communication},
www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
}
|
onion-ns-pets2017@article{onion-ns-pets2017,
title = {The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services},
author = {Jesse Victors and Ming Li and Xinwen Fu},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper05-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
onion-routing:ih96@inproceedings{onion-routing:ih96,
title = {{Hiding Routing Information}},
author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson},
booktitle = {Proceedings of Information Hiding: First International Workshop},
year = {1996},
month = {May},
pages = {137--150},
editor = {R. Anderson},
publisher = {Springer-Verlag, LNCS 1174},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.onion-router.net/Publications/IH-1996.pdf},
www_ps_gz_url = {http://www.onion-router.net/Publications/IH-1996.ps.gz},
}
|
onion-routing:pet2000@inproceedings{onion-routing:pet2000,
title = {{Towards an Analysis of Onion Routing Security}},
author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {96--114},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
}
|
overlier-pet2007@inproceedings{overlier-pet2007,
title = {Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden
services},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf},
www_remarks = {Introduces Diffie-Hellman-based handshakes to build Tor circuits with
fewer exponentiations than the original circuit-establishment protocol.},
www_section = {Anonymous communication,Tor Performance},
}
|
padlipky78@techreport{padlipky78,
title = {Limitations of End-to-End Encryption in Secure Computer Networks},
author = {Michael A. Padlipsky and David W. Snow and Paul A. Karger},
institution = {The MITRE Corporation: Bedford MA, HQ Electronic Systems Division},
number = {ESD-TR-78-158},
year = {1978},
month = {August},
address = {Hanscom AFB, MA},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf},
}
|
patterns-failure@inproceedings{patterns-failure,
title = {Real World Patterns of Failure in Anonymity Systems},
author = {Richard Clayton and George Danezis and Markus G. Kuhn},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {230--244},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf},
}
|
peerflow-pets2017@article{peerflow-pets2017,
title = {PeerFlow: Secure Load Balancing in Tor},
author = {Aaron Johnson and Rob Jansen and Nicholas Hopper and Aaron Segal and Paul
Syverson},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/peerflow-popets2017.pdf},
www_section = {Tor Performance},
}
|
perea-tissec11@article{perea-tissec11,
title = {{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous
users},
author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia},
journal = {ACM Transactions on Information and System Security ({ACM TISSEC})},
volume = {14},
year = {2011},
month = {December},
address = {New York, NY, USA},
pages = {29:1--29:34},
publisher = {ACM},
numpages = {34},
issue_date = {December 2011},
issn = {1094-9224},
www_tags = {selected},
acmid = {204363},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf},
url = {http://doi.acm.org/10.1145/2043628.2043630},
www_section = {Misc},
doi = {http://doi.acm.org/10.1145/2043628.2043630},
keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced
revocation, user misbehavior},
articleno = {29},
issue = {4},
}
|
perm-ccs12@inproceedings{perm-ccs12,
title = {{PERM}: Practical Reputation-Based Blacklisting without {TTPs}},
author = {Man Ho Au and Apu Kapadia},
booktitle = {Proceedings of The 19th ACM Conference on Computer and Communications
Security (CCS)},
year = {2012},
month = {October},
pages = {929--940},
publisher = {ACM},
doi = {10.1145/2382196.2382294},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf},
}
|
pet05-bissias@inproceedings{pet05-bissias,
title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {1--11},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf},
}
|
pet05-borisov@inproceedings{pet05-borisov,
title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs},
author = {Nikita Borisov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {12--25},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf},
}
|
pet05-camenisch@inproceedings{pet05-camenisch,
title = {Mix-network with Stronger Security},
author = {Jan Camenisch and Anton Mityagin},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {128--147},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
pet05-serjantov@inproceedings{pet05-serjantov,
title = {Message Splitting Against the Partial Adversary},
author = {Andrei Serjantov and Steven J. Murdoch},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {26--39},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf},
}
|
pet05-zhu@inproceedings{pet05-zhu,
title = {Unmixing Mix Traffic},
author = {Ye Zhu and Riccardo Bettati},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {110--127},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf},
}
|
pets13-flow-fingerprints@inproceedings{pets13-flow-fingerprints,
title = {The need for flow fingerprints to link correlated network flows},
author = {Amir Houmansadr and Nikita Borisov},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/Fancy.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets13-how-low@inproceedings{pets13-how-low,
title = {How Low Can You Go: Balancing Performance with Anonymity in Tor},
author = {John Geddes and Rob Jansen and Nicholas Hopper},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets13-oss@inproceedings{pets13-oss,
title = {{OSS}: Using Online Scanning Services for Censorship Circumvention},
author = {David Fifield and Gabi Nakibly and Dan Boneh},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
pets13-splitting@inproceedings{pets13-splitting,
title = {The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting},
author = {Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
pets14-cellular-ident@inproceedings{pets14-cellular-ident,
title = {Exploiting Delay Patterns for User IPs Identification in Cellular Networks},
author = {Vasile Claudiu Perta and Marco Valerio Barbera and Alessandro Mei},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Perta.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets14-cloudtransport@inproceedings{pets14-cloudtransport,
title = {CloudTransport: Using Cloud Storage for Censorship-Resistant Networking},
author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Brubaker.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
pets14-dovetail@inproceedings{pets14-dovetail,
title = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing},
author = {Jody Sankey and Matthew Wright},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Sankey.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
pets14-dummy-traffic@inproceedings{pets14-dummy-traffic,
title = {Do dummies pay off? Limits of dummy traffic protection in anonymous
communications},
author = {Simon Oya, Carmela Troncoso and Fernando P{\'e}rez-Gonz\'alez},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Oya.pdf},
www_tags = {selected},
www_section = {Traffic analysis,Anonymous communication},
}
|
pets14-https-traffic-analysis@inproceedings{pets14-https-traffic-analysis,
title = {I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic
Analysis},
author = {Brad Miller and Ling Huang and A. D. Joseph and J. D. Tygar},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Miller.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets14-measuring-freenet@inproceedings{pets14-measuring-freenet,
title = {Measuring Freenet in the Wild: Censorship-resilience under Observation},
author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Roos.pdf},
www_tags = {selected},
www_section = {Anonymous publication},
}
|
pets14-spoiled-onions@inproceedings{pets14-spoiled-onions,
title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
author = {Philipp Winter and Richard K\"ower and Martin Mulazzani and Markus Huber and
Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Winter.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
pets2010:eckersley2010unique@inproceedings{pets2010:eckersley2010unique,
title = {How unique is your web browser?},
author = {Peter Eckersley},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium},
year = {2010},
month = {July},
location = {Berlin, Germany},
pages = {1--18},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf},
}
|
pets2011-bagai@inproceedings{pets2011-bagai,
title = {An Accurate System-Wide Anonymity Metric for Probabilistic Attacks},
author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf},
www_section = {Traffic analysis},
}
|
pets2011-defenestrator@inproceedings{pets2011-defenestrator,
title = {DefenestraTor: Throwing out Windows in Tor},
author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon
McCoy and Stefan Savage and Geoffrey Voelker},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
pets2011-i2p@inproceedings{pets2011-i2p,
title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A
Real-World Case Study using I2P},
author = {Michael Herrmann and Christian Grothoff},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf},
www_section = {Traffic analysis},
}
|
pfitzmann85@inproceedings{pfitzmann85,
title = {Networks Without User Observability -- Design Options},
author = {Andreas Pfitzmann and Michael Waidner},
booktitle = {Proceedings of {EUROCRYPT} 1985},
year = {1985},
month = {April},
publisher = {Springer-Verlag, LNCS 219},
www_tags = {selected},
www_html_url = {http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html},
www_section = {Anonymous communication},
}
|
phi-pets2017@article{phi-pets2017,
title = {PHI: a Path-Hidden Lightweight Anonymity Protocol at Network Layer},
author = {Chen Chen and Adrian Perrig},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper15-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
phonion-pets2017@article{phonion-pets2017,
title = {Phonion: Practical Protection of Metadata in Telephony Networks},
author = {Stephan Heuser and Bradley Reaves and Praveen Kumar Pendyala and Henry Carter
and Alexandra Dmitrienko and William Enck and Negar Kiyavash and Ahmad-Reza
Sadeghi and Patrick Traynor},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper27-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
pipenet@misc{pipenet,
title = {PipeNet 1.1},
author = {Wei Dai},
year = {1998},
month = {November},
howpublished = {Post to Cypherpunks mailing list},
www_tags = {selected},
www_section = {Anonymous communication},
www_txt_url = {http://www.eskimo.com/~weidai/pipenet.txt},
www_remarks = {Cypherpunks post at
http://cypherpunks.venona.com/date/1998/11/msg00941.html},
day = {26},
}
|
pipenet10@misc{pipenet10,
title = {PipeNet 1.0},
author = {Wei Dai},
year = {1998},
month = {January},
howpublished = {Post to Cypherpunks mailing list},
www_tags = {selected},
www_html_url = {http://cypherpunks.venona.com/date/1998/01/msg00878.html},
www_section = {Anonymous communication},
www_remarks = {First written in 1996 based on cypherpunks posts in 1995.},
day = {19},
}
|
pool-dummy04@inproceedings{pool-dummy04,
title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy
Traffic},
author = {Claudia Diaz and Bart Preneel},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-95.pdf},
www_section = {Anonymous communication},
}
|
prifi-wpes16@inproceedings{prifi-wpes16,
title = {PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous
Communication},
author = {Ludovic Barman and Mahdi Zamani and Italo Dacosta and Joan Feigenbaum and Bryan
Ford and Jean-Pierre Hubaux and David Wolinsky},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/wpes16-prifi.pdf},
www_section = {Anonymous communication},
}
|
privcount-ccs2016@inproceedings{privcount-ccs2016,
title = {Safely Measuring Tor},
author = {Rob Jansen and Aaron Johnson},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/privcount-ccs2016.pdf},
www_section = {Misc},
}
|
proximax11@inproceedings{proximax11,
title = {Proximax: Fighting Censorship With an Adaptive System for Distribution of Open
Proxies},
author = {Kirill Levchenko and Damon McCoy},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
publius@inproceedings{publius,
title = {Publius: {A} robust, tamper-evident, censorship-resistant and source-anonymous
web publishing system},
author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
booktitle = {Proceedings of the 9th USENIX Security Symposium},
year = {2000},
month = {August},
pages = {59--72},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.cs.nyu.edu/~waldman/publius/publius.pdf},
}
|
quant-adhoc@inproceedings{quant-adhoc,
title = {Quantification of Anonymity for Mobile Ad Hoc Networks},
author = {Marie Elisabeth Gaup Moe},
booktitle = {Proceedings of the 4th International Workshop on Security and Trust
Management (STM 08)},
year = {2008},
month = {June},
location = {Trondheim, Norway},
pages = {25--36},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf},
}
|
rackoff93cryptographic@inproceedings{rackoff93cryptographic,
title = {Cryptographic Defense Against Traffic Analysis},
author = {Charles Rackoff and Daniel R. Simon},
booktitle = {Proceedings of {ACM} Symposium on Theory of Computing},
year = {1993},
pages = {672--681},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps},
}
|
raid2011:chakravartydetecting@inproceedings{raid2011:chakravartydetecting,
title = {Detecting Traffic Snooping in Tor Using Decoys},
author = {Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and
Angelos D. Keromytis},
booktitle = {Proceedings of the 14th International Conference on Recent Advances in
Intrusion Detection},
year = {2011},
month = {September},
address = {Berlin, Heidelberg},
location = {Menlo Park, CA},
pages = {222--241},
publisher = {Springer-Verlag},
series = {RAID'11},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf},
}
|
randomized-checking@inproceedings{randomized-checking,
title = {Making mix nets robust for electronic voting by randomized partial checking},
author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest},
booktitle = {Proceedings of the 11th USENIX Security Symposium},
year = {2002},
month = {August},
www_tags = {selected},
www_important = {1},
www_pdf_url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf},
www_section = {Provable shuffles},
}
|
rao-pseudonymity@inproceedings{rao-pseudonymity,
title = {Can Pseudonymity Really Guarantee Privacy?},
author = {Josyula R. Rao and Pankaj Rohatgi},
booktitle = {Proceedings of the 9th USENIX Security Symposium},
year = {2000},
month = {August},
pages = {85--96},
publisher = {USENIX},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf},
}
|
raptor-sec2015@inproceedings{raptor-sec2015,
title = {{RAPTOR}: Routing Attacks on Privacy in {Tor}},
author = {Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer
Rexford and Mung Chiang and Prateek Mittal},
booktitle = {Proceedings of the 24th USENIX Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-sun.pdf},
www_section = {Traffic analysis},
}
|
raykova-pet2008@inproceedings{raykova-pet2008,
title = {PAR: Payment for Anonymous Routing},
author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou
and Steven M. Bellovin},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {219--236},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf},
www_section = {Anonymous communication},
}
|
raymond00@inproceedings{raymond00,
title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}},
author = {Jean-Fran\c{c}ois Raymond},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {10--29},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf},
www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps},
}
|
realtime-mix@article{realtime-mix,
title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and Birgit Pfitzmann and
Michael Waidner},
journal = {IEEE Journal on Selected Areas in Communications},
volume = {16},
number = {4},
year = {1998},
www_tags = {selected},
www_html_url = {http://www.zurich.ibm.com/security/publications/1998.html},
www_section = {Anonymous communication},
}
|
reardon-thesis@mastersthesis{reardon-thesis,
title = {Improving {Tor} using a {TCP}-over-{DTLS} Tunnel},
author = {Reardon, Joel},
school = {University of Waterloo},
year = {2008},
month = {September},
www_tags = {selected},
www_abstract_url = {http://hdl.handle.net/10012/4011},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf},
}
|
redblue@inproceedings{redblue,
title = {The Economics of Censorship Resistance},
author = {George Danezis and Ross Anderson},
booktitle = {Proceedings of Workshop on Economics and Information Security (WEIS04)},
year = {2004},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/redblue.pdf},
www_section = {Economics},
}
|
regroup2006@article{regroup2006,
title = {Regroup-And-Go mixes to counter the $(n-1)$ attack},
author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao},
journal = {Journal of Internet Research},
volume = {16},
number = {2},
year = {2006},
pages = {213--223},
publisher = {Emerald Group Publishing Limited},
doi = {http://dx.doi.org/10.1108/10662240610656528},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
reiter:ccs2004@inproceedings{reiter:ccs2004,
title = {Fragile Mixing},
author = {Michael Reiter and XiaoFeng Wang},
booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications
Security (CCS 2004)}},
year = {2004},
month = {October},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf},
www_section = {Anonymous communication},
}
|
remailer-history@article{remailer-history,
title = {Prospects for Remailers},
author = {Sameer Parekh},
journal = {First Monday},
volume = {1},
number = {2},
year = {1996},
month = {August},
www_tags = {selected},
www_html_url = {http://www.firstmonday.dk/issues/issue2/remailers/},
www_section = {Anonymous communication},
}
|
remote-traffic-pets12@inproceedings{remote-traffic-pets12,
title = {Website Detection Using Remote Traffic Analysis},
author = {Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf},
www_section = {Traffic analysis},
}
|
rep-anon@inproceedings{rep-anon,
title = {{Reputation in P2P Anonymity Systems}},
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
year = {2003},
month = {June},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/econp2p03/econp2p03.pdf},
www_section = {Economics},
}
|
reusable-channels:wpes2003@inproceedings{reusable-channels:wpes2003,
title = {Reusable Anonymous Return Channels},
author = {Philippe Golle and Markus Jakobsson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf},
www_remarks = {Reencryption mix-nets can allow users to use a single reply channel even
when they maintain multiple separate nyms (think of it like a reply block but it
looks different each time you give it to somebody).},
www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/return.ps},
www_section = {Anonymous communication},
}
|
rewebber@article{rewebber,
title = {{TAZ servers and the rewebber network: Enabling anonymous publishing on the
world wide web}},
author = {Ian Goldberg and David Wagner},
journal = {First Monday},
volume = {3},
number = {4},
year = {1998},
month = {August},
www_tags = {selected},
www_html_url = {http://www.firstmonday.dk/issues/issue3_4/goldberg/},
www_ps_url = {http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps},
www_section = {Anonymous publication},
}
|
riffle-pets2016@article{riffle-pets2016,
title = {Riffle: An Efficient Communication System With Strong Anonymity},
author = {Albert Kwon and David Lazar and Srinivas Devadas and Bryan Ford},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
pages = {115--134},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Riffle.pdf},
www_section = {Anonymous communication},
}
|
riposte2015@inproceedings{riposte2015,
title = {{Riposte}: An anonymous messaging system handling millions of users},
author = {Corrigan-Gibbs, Henry and Boneh, Dan and Mazi{\`e}res, David},
booktitle = {Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P
2015)},
year = {2015},
month = {May},
location = {San Jose, California, USA},
pages = {321--338},
editor = {},
publisher = {IEEE Computer Society},
isbn = {978-1-4673-6949-7},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {https://www.henrycg.com/files/academic/papers/oakland15riposte.pdf},
}
|
rook-wpes15@inproceedings{rook-wpes15,
title = {Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication
Platform},
author = {Paul Vines and Tadayoshi Kohno},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2015)}},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://homes.cs.washington.edu/~yoshi/papers/wpes-rook.pdf},
www_section = {Communications Censorship},
}
|
roos15impossibility@inproceedings{roos15impossibility,
title = {On the Impossibility of Efficient Self-Stabilization in Virtual Overlays with
Churn},
author = {Stefanie Roos and Thorsten Strufe},
booktitle = {Proceedings of IEEE INFOCOM 2015},
year = {2015},
month = {April},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {https://www.researchgate.net/profile/Stefanie_Roos/publication/280623435_On_the_Impossibility_of_Efficient_Self-Stabilization_in_Virtual_Overlays_with_Churn/links/55bf708108ae092e96669065.pdf},
www_section = {Anonymous publication},
}
|
safeplug-foci@inproceedings{safeplug-foci,
title = {{Security Audit of Safeplug ``Tor in a Box''}},
author = {Anne Edmundson and Anna Kornfeld Simpson and Joshua A. Kroll and Edward W.
Felten},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-edmundson.pdf},
www_section = {Anonymous communication},
}
|
salmon-pets2016@article{salmon-pets2016,
title = {Salmon: Robust Proxy Distribution for Censorship Circumvention},
author = {Frederick Douglas and Rorshach and Weiyang Pan and Matthew Caesar},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Salmon__Robust_Proxy_Distribution_for_Censorship_Circumvention.pdf},
www_section = {Communications Censorship},
}
|
sassaman-pet2008@inproceedings{sassaman-pet2008,
title = {How to Bypass Two Anonymity Revocation Systems},
author = {George Danezis and Len Sassaman},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {187--201},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/KWF.pdf},
www_section = {Anonymous communication},
}
|
sassaman:wpes2005@inproceedings{sassaman:wpes2005,
title = {The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval},
author = {Len Sassaman and Bram Cohen and Nick Mathewson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2005)}},
year = {2005},
month = {November},
location = {Arlington, VA, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf},
www_section = {Pseudonymity},
}
|
search-engine-pets2017@article{search-engine-pets2017,
title = {Fingerprinting Past the Front Page: Identifying Keywords in Search Engine
Queries over Tor},
author = {Se Eun Oh and Shuai Li and Nicholas Hopper},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper59-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
shadow-ndss12@inproceedings{shadow-ndss12,
title = {{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}},
author = {Rob Jansen and Nicholas Hopper},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'12},
year = {2012},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/09_3.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
shalon-anon@inproceedings{shalon-anon,
title = {{SHALON}: Lightweight Anonymization based on Open Standards},
author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer
Andersson},
booktitle = {Proceedings of 18th International Conference on Computer Communications and
Networks},
year = {2009},
month = {August},
location = {San Francisco, CA, USA},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf},
www_section = {Anonymous communication},
}
|
sherwood-protocol@inproceedings{sherwood-protocol,
title = {P5: A Protocol for Scalable Anonymous Communication},
author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
year = {2002},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cs.umd.edu/projects/p5/p5.pdf},
www_ps_url = {http://www.cs.umd.edu/projects/p5/p5.ps},
www_section = {Anonymous communication},
}
|
shimshock-pet2008@inproceedings{shimshock-pet2008,
title = {Breaking and Provably Fixing Minx},
author = {Eric Shimshock and Matt Staats and Nicholas Hopper},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {99--114},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf},
www_section = {Anonymous communication},
}
|
shsm03@article{shsm03,
title = {Using Caching for Browsing Anonymity},
author = {Anna Shubina and Sean Smith},
journal = {ACM SIGEcom Exchanges},
volume = {4},
number = {2},
year = {2003},
month = {September},
www_tags = {selected},
www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
www_section = {Anonymous communication},
}
|
shuffle:ccs01@inproceedings{shuffle:ccs01,
title = {A Verifiable Secret Shuffle and its Application to E-Voting},
author = {C. Andrew Neff},
booktitle = {{Proceedings of the 8th ACM Conference on Computer and Communications
Security (CCS 2001)}},
year = {2001},
month = {November},
pages = {116--125},
editor = {P. Samarati},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf},
}
|
slicing07@inproceedings{slicing07,
title = {Information Slicing: Anonymity Using Unreliable Overlays},
author = {Sachin Katti and Jeffery Cohen and Dina Katabi},
booktitle = {Proceedings of the 4th USENIX Symposium on Network Systems Design and
Implementation (NSDI)},
year = {2007},
month = {April},
www_tags = {selected},
www_pdf_url = {http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf},
www_section = {Anonymous communication},
}
|
slitheen-ccs2016@inproceedings{slitheen-ccs2016,
title = {Slitheen: Perfectly imitated decoy routing through traffic replacement},
author = {Cecylia Bocovich and Ian Goldberg},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf},
www_section = {Communications Censorship},
}
|
snader08@inproceedings{snader08,
title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},
author = {Robin Snader and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},
year = {2008},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
sniper14@inproceedings{sniper14,
title = {The Sniper Attack: Anonymously Deanonymizing and Disabling the {T}or Network},
author = {Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\"{o}}rn
Scheuermann},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/sniper-ndss2014.pdf},
www_section = {Traffic analysis},
}
|
sofem05-Klonowski@inproceedings{sofem05-Klonowski,
title = {Anonymous Communication with On-line and Off-line Onion Encoding},
author = {Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski},
booktitle = {Proceedings of Conference on Current Trends in Theory and Practice of
Informatics (SOFSEM 2005)},
year = {2005},
month = {January},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf},
www_section = {Anonymous communication},
}
|
sphinx-onion-fc10@inproceedings{sphinx-onion-fc10,
title = {Using Sphinx to Improve Onion Routing Circuit Construction},
author = {Aniket Kate and Ian Goldberg},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
statistical-disclosure@inproceedings{statistical-disclosure,
title = {Statistical Disclosure Attacks: Traffic Confirmation in Open Environments},
author = {George Danezis},
booktitle = {Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})},
organization = {{IFIP TC11}},
year = {2003},
month = {May},
location = {Athens},
pages = {421--426},
editor = {Gritzalis and Vimercati and Samarati and Katsikas},
publisher = {Kluwer},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf},
}
|
steinbrecher:pet2003@inproceedings{steinbrecher:pet2003,
title = {Modelling Unlinkability},
author = {Sandra Steinbrecher and Stefan K\"opsell},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {32--47},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf},
}
|
stepping-stones@inproceedings{stepping-stones,
title = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through
Stepping Stones},
author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu},
booktitle = {Proceedings of ESORICS 2002},
year = {2002},
month = {October},
pages = {244--263},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf},
}
|
steven-thesis@phdthesis{steven-thesis,
title = {Covert channel vulnerabilities in anonymity systems},
author = {Steven J. Murdoch},
school = {University of Cambridge},
year = {2007},
month = {December},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf},
}
|
stop-and-go@inproceedings{stop-and-go,
title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System},
author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes},
booktitle = {Proceedings of Information Hiding Workshop (IH 1998)},
year = {1998},
publisher = {Springer-Verlag, LNCS 1525},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.uow.edu.au/~ldn01/infohide98.pdf},
www_section = {Anonymous communication},
}
|
strong-eternity@inproceedings{strong-eternity,
title = {The Strong Eternity Service},
author = {Tonda Benes},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/strong-eternity.pdf},
www_section = {Anonymous publication},
}
|
sybil@inproceedings{sybil,
title = {{The Sybil Attack}},
author = {John Douceur},
booktitle = {Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS
2002)},
year = {2002},
month = {March},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf},
www_section = {Traffic analysis},
}
|
sync-batching@inproceedings{sync-batching,
title = {Synchronous Batching: From Cascades to Free Routes},
author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {186--206},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/doc/sync-batching/sync-batching.pdf},
www_ps_url = {http://freehaven.net/doc/sync-batching/sync-batching.ps},
}
|
systems-anon-communication@incollection{systems-anon-communication,
title = {{Systems for Anonymous Communication}},
author = {George Danezis and Claudia Diaz and Paul F. Syverson},
booktitle = {CRC Handbook of Financial Cryptography and Security},
volume = {},
year = {2010},
month = {August},
pages = {341--390},
editor = {B. Rosenberg and D. Stinson},
publisher = {Chapman \& Hall},
series = {CRC Cryptography and Network Security Series},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf},
}
|
syverson99@inproceedings{syverson99,
title = {Group Principals and the Formalization of Anonymity},
author = {Paul F. Syverson and Stuart G. Stubblebine},
booktitle = {Proceedings of the World Congress on Formal Methods (1)},
year = {1999},
pages = {814--833},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps},
}
|
tagit-pets2017@article{tagit-pets2017,
title = {TagIt: Tagging Network Flows using Blind Fingerprints},
author = {Fatemeh Rezaei and Amir Houmansadr},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper66-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
tap:pet2006@inproceedings{tap:pet2006,
title = {On the Security of the {Tor} Authentication Protocol},
author = {Ian Goldberg},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {316--331},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/torsec.pdf},
www_section = {Formal methods},
}
|
tapdance-foci17@inproceedings{tapdance-foci17,
title = {An ISP-Scale Deployment of TapDance},
author = {Sergey Frolov and Fred Douglas and Will Scott and Allison McDonald and Benjamin
VanderSloot and Rod Hynes and Adam Kruger and Michalis Kallitsis and David G.
Robinson and Nikita Borisov and Alex Halderman and Eric Wustrow},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2017},
month = {August},
location = {Vancouver, Canada},
series = {FOCI '17},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci17/foci17-paper-frolov_0.pdf},
www_section = {Communications Censorship},
}
|
taps-ndss2017@inproceedings{taps-ndss2017,
title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path
Selection},
author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul
Syverson},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/taps-ndss2017.pdf},
www_section = {Anonymous communication},
}
|
tarzan:ccs02@inproceedings{tarzan:ccs02,
title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
author = {Michael J. Freedman and Robert Morris},
booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications
Security (CCS 2002)}},
year = {2002},
month = {November},
location = {Washington, DC},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf},
www_section = {Anonymous communication},
}
|
tasp-wpes16@inproceedings{tasp-wpes16,
title = {TASP: Towards Anonymity Sets that Persist},
author = {Jamie Hayes and Carmela Troncoso and George Danezis},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.homepages.ucl.ac.uk/~ucabaye/papers/TASP.pdf},
www_section = {Anonymous communication},
}
|
taxonomy-dummy@inproceedings{taxonomy-dummy,
title = {Taxonomy of Mixes and Dummy Traffic},
author = {Claudia Diaz and Bart Preneel},
booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity
in Networked and Distributed Systems},
year = {2004},
month = {August},
location = {Toulouse, France},
www_tags = {selected},
www_pdf_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf},
www_section = {Anonymous communication},
}
|
tcp-tor-pets12@inproceedings{tcp-tor-pets12,
title = {{Spying in the Dark: TCP and Tor Traffic Analysis}},
author = {Yossi Gilad and Amir Herzberg},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf},
www_section = {Traffic analysis},
}
|
terminology@misc{terminology,
title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for
Terminology},
author = {Andreas Pfitzmann and Marit Hansen},
year = {2000},
month = {July},
howpublished = {Draft},
www_tags = {selected},
www_section = {Misc},
optnote = {For date of the latest version, see the document itself},
www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml},
}
|
throttling-sec12@inproceedings{throttling-sec12,
title = {{Throttling Tor Bandwidth Parasites}},
author = {Rob Jansen and Paul Syverson and Nicholas Hopper},
booktitle = {Proceedings of the 21st USENIX Security Symposium},
year = {2012},
month = {August},
www_pdf_url = {http://www.robgjansen.com/publications/throttling-sec2012.pdf},
www_tags = {selected},
www_section = {Traffic analysis,Tor Performance},
}
|
timing-fc2004@inproceedings{timing-fc2004,
title = {Timing Attacks in Low-Latency Mix-Based Systems},
author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {251--265},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
}
|
ting-imc2015@inproceedings{ting-imc2015,
title = {Ting: Measuring and Exploiting Latencies Between All Tor Nodes},
author = {Frank Cangialosi and Dave Levin and Neil Spring},
booktitle = {Proceedings of the 2015 Internet Measurement Conference},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://www.cs.umd.edu/~dml/papers/ting_imc15.pdf},
www_section = {Traffic analysis},
}
|
tissec-latency-leak@article{tissec-latency-leak,
title = {How Much Anonymity does Network Latency Leak?},
author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin},
journal = {ACM Transactions on Information and System Security},
volume = {13},
number = {2},
year = {2010},
month = {February},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf},
www_section = {Traffic analysis},
}
|
topology-pet2010@inproceedings{topology-pet2010,
title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity
Networks},
author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf},
www_section = {Traffic analysis},
}
|
tor-blocking@techreport{tor-blocking,
title = {Design of a blocking-resistant anonymity system},
author = {Roger Dingledine and Nick Mathewson},
institution = {The Tor Project},
number = {2006-1},
year = {2006},
month = {November},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
}
|
tor-design@inproceedings{tor-design,
title = {{Tor}: The Second-Generation Onion Router},
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
booktitle = {Proceedings of the 13th USENIX Security Symposium},
year = {2004},
month = {August},
www_important = {1},
www_tags = {selected},
www_html_url = {https://svn.torproject.org/svn/projects/design-paper/tor-design.html},
www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf},
www_section = {Anonymous communication},
}
|
tor-soups07@inproceedings{tor-soups07,
title = {{Usability of anonymous web browsing: an examination of Tor interfaces and
deployability}},
author = {Jeremy Clark and P. C. van Oorschot and Carlisle Adams},
booktitle = {{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS
'07)}},
year = {2007},
month = {July},
address = {New York, NY, USA},
location = {Pittsburgh, Pennsylvania},
pages = {41--51},
publisher = {ACM},
doi = {http://doi.acm.org/10.1145/1280680.1280687},
isbn = {978-1-59593-801-5},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf},
}
|
tor-sybils2016@inproceedings{tor-sybils2016,
title = {Identifying and Characterizing Sybils in the Tor Network},
author = {Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster},
booktitle = {Proceedings of the 25th Usenix Security Symposium},
year = {2016},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_winter.pdf},
www_section = {Traffic analysis},
}
|
torspinISC08@inproceedings{torspinISC08,
title = {Compromising Anonymity Using Packet Spinning},
author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P.
Markatos},
booktitle = {Proceedings of the 11th Information Security Conference (ISC 2008)},
year = {2008},
month = {September},
location = {Taipei, Taiwan},
www_tags = {selected},
www_pdf_url = {http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf},
www_section = {Anonymous communication},
}
|
torta05@inproceedings{torta05,
title = {Low-Cost Traffic Analysis of {Tor}},
author = {Steven J. Murdoch and George Danezis},
booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy},
year = {2005},
month = {May},
publisher = {IEEE CS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf},
www_section = {Traffic analysis},
}
|
tortraceroutes-pets2015@article{tortraceroutes-pets2015,
title = {Defending Tor from Network Adversaries: A Case Study of Network Path
Prediction},
author = {Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew
Caesar},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
pages = {171--187},
doi = {10.1515/popets-2015-0021},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/tortraceroutes-pets15.pdf},
www_section = {Traffic analysis},
}
|
traffic-padding-pets12@inproceedings{traffic-padding-pets12,
title = {k-Indistinguishable Traffic Padding in Web Applications},
author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf},
www_section = {Traffic analysis},
}
|
trickle02@inproceedings{trickle02,
title = {From a Trickle to a Flood: Active Attacks on Several Mix Types},
author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf},
www_ps_url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.ps},
www_section = {Traffic analysis},
}
|
troncoso-pet2008@inproceedings{troncoso-pet2008,
title = {Perfect Matching Statistical Disclosure Attacks},
author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid
Verbauwhede},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {2--23},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf},
www_section = {Traffic analysis},
}
|
trustrep-pets2015@article{trustrep-pets2015,
title = {20,000 In League Under the Sea: Anonymous Communication, Trust, {MLAT}s, and
Undersea Cables},
author = {Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan
Feigenbaum},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {1},
year = {2015},
month = {April},
pages = {4--24},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/trustrep-popets15.pdf},
www_section = {Traffic analysis},
}
|
tschorsch:translayeranon@inproceedings{tschorsch:translayeranon,
title = {How (not) to build a transport layer for anonymity overlays},
author = {Florian Tschorsch and Bj{\"{o}}rn Scheurmann},
booktitle = {Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and
Anonymity for the Digital Economy},
year = {2012},
month = {June},
www_pdf_url = {http://pade12.mytestbed.net/pade12-final6.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
unique-ccs2017@inproceedings{unique-ccs2017,
title = {How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion
Services},
author = {Rebekah Overdorf and Marc Juarez and Gunes Acar and Rachel Greenstadt and
Claudia Diaz},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://cosic.esat.kuleuven.be/fingerprintability/fingerprintability.pdf},
www_section = {Traffic analysis},
}
|
usability:weis2006@inproceedings{usability:weis2006,
title = {Anonymity Loves Company: Usability and the Network Effect},
author = {Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
(WEIS 2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
editor = {Ross Anderson},
www_section = {Economics},
bookurl = {http://weis2006.econinfosec.org/},
www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf},
www_tags = {selected},
}
|
usableTor@inproceedings{usableTor,
title = {Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in
Anonymity Systems},
author = {Greg Norcie and Jim Blythe and Kelly Caine and L Jean Camp},
booktitle = {Proceedings of the 2014 Workshop on Usable Security (USEC)},
year = {2014},
month = {February},
www_pdf_url = {http://www.norcie.com/papers/torUSEC.pdf},
www_tags = {selected},
www_section = {Misc},
}
|
usenix11-pirtor@inproceedings{usenix11-pirtor,
title = {PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval},
author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and
Ian Goldberg},
booktitle = {Proceedings of the 20th USENIX Security Symposium},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
usenix11-telex@inproceedings{usenix11-telex,
title = {Telex: Anticensorship in the Network Infrastructure},
author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
booktitle = {Proceedings of the 20th USENIX Security Symposium},
year = {2011},
month = {August},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf},
www_section = {Communications Censorship},
}
|
usenix2010:aggarwal2010analysis@inproceedings{usenix2010:aggarwal2010analysis,
title = {An Analysis of Private Browsing Modes in Modern Browsers},
author = {Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh},
booktitle = {Proceedings of the 19th Usenix Security Symposium},
year = {2010},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.collinjackson.com/research/private-browsing.pdf},
www_section = {Misc},
}
|
valet:pet2006@inproceedings{valet:pet2006,
title = {Valet Services: Improving Hidden Servers with a Personal Touch},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {223--244},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf},
www_section = {Pseudonymity},
}
|
vuvuzela:sosp15@inproceedings{vuvuzela:sosp15,
title = {Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis},
author = {Jelle van den Hooff and David Lazar and Matei Zaharia and Nickolai Zeldovich},
booktitle = {Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP
2015)},
year = {2015},
month = {October},
address = {Monterey, California},
www_tags = {selected},
www_pdf_url = {https://pdos.csail.mit.edu/papers/vuvuzela:sosp15.pdf},
www_section = {Anonymous communication},
}
|
wagner@article{wagner,
title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}},
author = {Robyn Wagner},
journal = {New Mexico Law Review},
volume = {32},
number = {Winter},
year = {2002},
pages = {99--142},
www_tags = {selected},
www_section = {Misc},
}
|
waldman01tangler@inproceedings{waldman01tangler,
title = {Tangler: a censorship-resistant publishing system based on document
entanglements},
author = {Marc Waldman and David Mazi\`eres},
booktitle = {{Proceedings of the 8th ACM Conference on Computer and Communications
Security (CCS 2001)}},
year = {2001},
month = {November},
pages = {126--135},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous publication},
www_ps_url = {http://www.cs.nyu.edu/~waldman/tangler.ps},
}
|
walkie-talkie2017@inproceedings{walkie-talkie2017,
title = {Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting
Attacks},
author = {Tao Wang and Ian Goldberg},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang-tao.pdf},
www_section = {Anonymous communication},
}
|
wang14-fingerprinting-defenses@inproceedings{wang14-fingerprinting-defenses,
title = {Effective Attacks and Provable Defenses for Website Fingerprinting},
author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {http://cacr.uwaterloo.ca/techreports/2014/cacr2014-05.pdf},
www_section = {Traffic analysis},
}
|
warta04-Klonowski@inproceedings{warta04-Klonowski,
title = {Universal Re-encryption of Signatures and Controlling Anonymous Information
Flow},
author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski},
booktitle = {Proceedings of WARTACRYPT '04},
year = {2004},
month = {July},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
www_section = {Misc},
}
|
waterfilling-pets2017@article{waterfilling-pets2017,
title = {Waterfilling: Balancing the Tor network with maximum diversity},
author = {Florentin Rochet and Olivier Pereira},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue2/paper05-2017-2-source.pdf},
www_section = {Tor Performance},
}
|
web-mix:pet2000@inproceedings{web-mix:pet2000,
title = {Web {MIX}es: A system for anonymous and unobservable {I}nternet access},
author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {115--129},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf},
}
|
websitefingerprinting-pets2016@article{websitefingerprinting-pets2016,
title = {On Realistically Attacking Tor with Website Fingerprinting},
author = {Tao Wang and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/On_Realistically_Attacking_Tor_with_Website_Fingerprinting.pdf},
www_section = {Traffic analysis},
}
|
wecsr10measuring-tor@inproceedings{wecsr10measuring-tor,
title = {A Case Study on Measuring Statistical Data in the {T}or Anonymity Network},
author = {Karsten Loesing and Steven J. Murdoch and Roger Dingledine},
booktitle = {Proceedings of the Workshop on Ethics in Computer Security Research (WECSR
2010)},
year = {2010},
month = {January},
location = {Tenerife, Canary Islands, Spain},
publisher = {Springer},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf},
www_section = {Anonymous communication},
}
|
wiangsripanawan-acsw07@inproceedings{wiangsripanawan-acsw07,
title = {Design principles for low latency anonymous network systems secure against
timing attacks},
author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini},
booktitle = {Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW
'07)},
year = {2007},
address = {Darlinghurst, Australia, Australia},
location = {Ballarat, Australia},
pages = {183--191},
publisher = {Australian Computer Society, Inc},
isbn = {1-920-68285-X},
www_section = {Traffic analysis},
www_tags = {selected},
www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=},
}
|
wileydust@techreport{wileydust,
title = {Dust: A Blocking-Resistant Internet Transport Protocol},
author = {Brandon Wiley},
institution = {School of Information, University of Texas at Austin},
year = {2011},
www_section = {Communications Censorship},
www_pdf_url = {http://blanu.net/Dust.pdf},
www_tags = {selected},
}
|
wisa04-Klonowski@inproceedings{wisa04-Klonowski,
title = {Anonymous Communication with On-line and Off-line Onion Encoding},
author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)},
year = {2004},
month = {August},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf},
www_section = {Anonymous communication},
}
|
wk11-malice-vs-anon@inproceedings{wk11-malice-vs-anon,
title = {Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection},
author = {Benedikt Westermann and Dogan Kesdogan},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
wpes06:heydt-benjamin@inproceedings{wpes06:heydt-benjamin,
title = {Nonesuch: a mix network with sender unobservability},
author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2006)}},
year = {2006},
month = {October},
address = {New York, NY, USA},
location = {Alexandria, Virginia, USA},
pages = {1--8},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/1179601.1179603},
isbn = {1-59593-556-8},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf},
}
|
wpes09-bridge-attack@inproceedings{wpes09-bridge-attack,
title = {{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking
resistance design}},
author = {Jon McLachlan and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf},
www_section = {Traffic analysis},
}
|
wpes09-dht-attack@inproceedings{wpes09-dht-attack,
title = {{Hashing it out in public: Common failure modes of DHT-based anonymity
schemes}},
author = {Andrew Tran and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf},
www_section = {Traffic analysis},
}
|
wpes09-xpay@inproceedings{wpes09-xpay,
title = {{XPay: Practical anonymous payments for Tor routing and other networked
services}},
author = {Yao Chen and Radu Sion and Bogdan Carbunar},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf},
www_section = {Anonymous communication},
}
|
wpes10-jack@inproceedings{wpes10-jack,
title = {Jack: Scalable Accumulator-based Nymble System},
author = {Zi Lin and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2010)},
year = {2010},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf},
www_section = {Misc},
}
|
wpes10-unraveling@inproceedings{wpes10-unraveling,
title = {Unraveling an Old Cloak: k-anonymity for Location Privacy},
author = {Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and
Jean-Pierre Hubaux},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2010)},
year = {2010},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2},
www_section = {Anonymous communication},
}
|
wpes11-bridgespa@inproceedings{wpes11-bridgespa,
title = {{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization},
author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs
Hengartner},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
www_section = {Anonymous communication},
}
|
wpes11-faust@inproceedings{wpes11-faust,
title = {FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting},
author = {Peter Lofgren and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf},
www_section = {Anonymous communication},
}
|
wpes11-panchenko@inproceedings{wpes11-panchenko,
title = {Website Fingerprinting in Onion Routing Based Anonymization Networks},
author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf},
www_section = {Traffic analysis},
}
|
wpes12-cogs@inproceedings{wpes12-cogs,
title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard
Selection in Tor},
author = {Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian
Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2012)},
year = {2012},
month = {October},
location = {Raleigh, NC, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/~arma/cogs-wpes.pdf},
www_section = {Traffic analysis},
}
|
wpes12-torchestra@inproceedings{wpes12-torchestra,
title = {Torchestra: Reducing interactive traffic delays over Tor},
author = {Deepika Gopal and Nadia Heninger},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2012)},
year = {2012},
month = {October},
location = {Raleigh, NC, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/torchestra-wpes.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
wpes13-blac@inproceedings{wpes13-blac,
title = {Thinking Inside the {BLAC} Box: Smarter Protocols for Faster Anonymous
Blacklisting},
author = {Ryan Henry and Ian Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf},
www_section = {Pseudonymity},
}
|
wpes13-conscript@inproceedings{wpes13-conscript,
title = {Conscript Your Friends into Larger Anonymity Sets with {J}ava{S}cript},
author = {Henry Corrigan-Gibbs and Bryan Ford},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/wpes13.pdf},
www_section = {Anonymous communication},
}
|
wpes13-fingerprinting@inproceedings{wpes13-fingerprinting,
title = {Improved Website Fingerprinting on Tor},
author = {Tao Wang and Ian Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/webfingerprint-wpes.pdf},
www_section = {Traffic analysis},
}
|
wpes13-gotr@inproceedings{wpes13-gotr,
title = {Improved Group Off-The-Record Messaging},
author = {Hong Liu and Eugene Y. Vasserman and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/gotr.pdf},
www_section = {Anonymous communication},
}
|
wpes13-hide@inproceedings{wpes13-hide,
title = {You Cannot Hide for Long: De-Anonymization of Real-World Dynamic Behaviour},
author = {George Danezis and Carmela Troncoso},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/DanezisTroncoso13.pdf},
www_section = {Traffic analysis},
}
|
wpes13-scramblesuit@inproceedings{wpes13-scramblesuit,
title = {ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship},
author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.kau.se/philwint/pdf/wpes2013.pdf},
www_section = {Traffic analysis},
}
|
wpes14-csbuflo@inproceedings{wpes14-csbuflo,
title = {{CS-BuFLO}: A Congestion Sensitive Website Fingerprinting Defense},
author = {Xiang Cai and Rishab Nithyanand and Rob Johnson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://pub.cs.sunysb.edu/~rob/papers/csbuflo.pdf},
www_section = {Anonymous communication},
}
|
wpes14-facet@inproceedings{wpes14-facet,
title = {Facet: Streaming over Videoconferencing for Censorship Circumvention},
author = {Shuai Li and Mike Schliep and Nick Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
www_section = {Communications Censorship},
}
|
wpes14-farb@inproceedings{wpes14-farb,
title = {{FARB}: Fast Anonymous Reputation-Based Blacklisting without {TTPs}},
author = {Li Xi and Dengguo Feng},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {},
www_section = {Pseudonymity},
}
|
wpes14-glove@inproceedings{wpes14-glove,
title = {Glove: A Bespoke Website Fingerprinting Defense},
author = {Rishab Nithyanand and Xiang Cai and Rob Johnson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/glove.pdf},
www_section = {Anonymous communication},
}
|
wpes14-imux@inproceedings{wpes14-imux,
title = {Tor {IMUX}: Managing Connections from Two to Infinity, and Beyond},
author = {John Geddes and Rob Jansen and Nicholas Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf},
www_section = {Tor Performance},
}
|
wpes14-leakage@inproceedings{wpes14-leakage,
title = {Measuring the Leakage of Onion at the Root},
author = {Aziz Mohaisen and Matthew Thomas},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://labs.verisigninc.com/assets/labs/Measuring-the-Leakage-of-Onion-at-the-Root.pdf},
www_section = {Anonymous communication},
}
|
wright02@inproceedings{wright02,
title = {An Analysis of the Degradation of Anonymous Protocols},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
year = {2002},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf},
www_section = {Traffic analysis},
}
|
wright03@inproceedings{wright03,
title = {Defending Anonymous Communication Against Passive Logging Attacks},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {28--43},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf},
}
|
wustrow14-tapdance@inproceedings{wustrow14-tapdance,
title = {TapDance: End-to-Middle Anticensorship without Flow Blocking},
author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://jhalderm.com/pub/papers/tapdance-sec14.pdf},
www_section = {Communications Censorship},
}
|
xor-trees@article{xor-trees,
title = {Xor-trees for efficient anonymous multicast and reception},
author = {Shlomi Dolev and Rafail Ostrobsky},
journal = {ACM Trans. Inf. Syst. Secur},
volume = {3},
number = {2},
year = {2000},
address = {New York, NY, USA},
pages = {63--84},
publisher = {ACM Press},
www_section = {Anonymous communication},
www_tags = {selected},
www_ps_url = {ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps},
}
|