10.1109/IWNAS.2006.40@article{10.1109/IWNAS.2006.40,
title = {Resilient P2P Anonymous Routing by Using Redundancy},
author = {Yingwu Zhu},
journal = {iwnas},
volume = {0},
year = {2006},
address = {Los Alamitos, CA, USA},
pages = {103--110},
publisher = {IEEE Computer Society},
doi = {http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40},
isbn = {0-7695-2651-9},
www_section = {Anonymous communication},
}
|
10.1109/SP.2006.17@article{10.1109/SP.2006.17,
title = {Fundamental Limits on the Anonymity Provided by the MIX Technique},
author = {Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter Rautenbach},
journal = {sp},
volume = {0},
year = {2006},
address = {Los Alamitos, CA, USA},
pages = {86--99},
publisher = {IEEE Computer Society},
doi = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17},
issn = {1081-6011},
www_section = {Traffic analysis},
www_pdf_url = {http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf},
}
|
1166488@inproceedings{1166488,
title = {Timing channels, anonymity, mixes, and spikes},
author = {Ira S. Moskowitz and Richard E. Newman},
booktitle = {Proceedings of the 2nd IASTED international conference on Advances in
computer science and technology (ACST '06)},
year = {2006},
month = {January},
address = {Anaheim, CA, USA},
location = {Puerto Vallarta, Mexico},
pages = {251--256},
publisher = {ACTA Press},
isbn = {0-88986-545-0},
www_section = {Formal methods},
}
|
ASlevel-ndss2016@inproceedings{ASlevel-ndss2016,
title = {Measuring and Mitigating AS-level Adversaries Against Tor},
author = {Rishab Nithyanand and Oleksii Starov and Phillipa Gill and Adva Zair and
Michael Schapira},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/measuring-mitigating-as-level-adversaries-against-tor.pdf},
www_section = {Traffic analysis},
}
|
AthanRAM07@inproceedings{AthanRAM07,
title = {GAS: Overloading a File Sharing Network as an Anonymizing System},
author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and
Evangelos P. Markatos},
booktitle = {Proceedings of Second International Workshop on Security, (IWSEC 2007)},
year = {2007},
location = {Nara, Japan},
www_tags = {selected},
www_pdf_url = {http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf},
www_section = {Anonymous communication},
}
|
BM:mixencrypt@inproceedings{BM:mixencrypt,
title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
author = {Bodo M{\"o}ller},
booktitle = {Proceedings of {CT-RSA} 2003},
year = {2003},
month = {April},
publisher = {Springer-Verlag, LNCS 2612},
www_tags = {selected},
www_pdf_url = {http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf},
www_section = {Anonymous communication},
}
|
BaKaGoMo_12@inproceedings{BaKaGoMo_12,
title = {{Provably Secure and Practical Onion Routing}},
author = {Michael Backes and Aniket Kate and Ian Goldberg and Esfandiar Mohammadi},
booktitle = {{Proceedings of the 25th IEEE Computer Security Foundations Symposium
(CSF)}},
year = {2012},
month = {June},
pages = {369--385},
www_section = {Anonymous communication},
www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/uc-or.pdf},
}
|
BaKaMaMeMo_13@inproceedings{BaKaMaMeMo_13,
title = {{AnoA: A Framework For Analyzing Anonymous Communication Protocols}},
author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser,
Esfandiar Mohammadi},
booktitle = {{Proceedings of the of the 26th IEEE Computer Security Foundations Symposium
(CSF)}},
year = {2013},
month = {June},
pages = {163--178},
www_section = {Anonymous communication},
www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~meiser/paper/anoa.pdf},
}
|
BaKaMo_13@inproceedings{BaKaMo_13,
title = {{Ace: An Efficient Key-Exchange Protocol for Onion Routing}},
author = {Michael Backes and Aniket Kate and Esfandiar Mohammadi},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)}},
year = {2013},
month = {October},
pages = {55--64},
www_section = {Anonymous communication},
www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/owake.pdf},
}
|
BaMaMo_13@misc{BaMaMo_13,
title = {{TUC: Time-sensitive and Modular Analysis of Anonymous Communication}},
author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi},
year = {2013},
month = {October},
howpublished = {IACR ePrint Archive Report 2013/664},
www_section = {Anonymous communication},
www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/tuc.pdf},
}
|
BlackHat2011-crenshaw@inproceedings{BlackHat2011-crenshaw,
title = {Darknets - I2P Identifying Hidden Servers},
author = {Adrian Crenshaw},
booktitle = {Proceedings of Black Hat},
year = {2011},
month = {January},
location = {DC},
url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
www_pdf_url = {http://www.irongeek.com/downloads/Identifying\%20the\%20true\%20IP\%20of\%20I2P\%20service\%20hosts.pdf},
www_section = {Traffic analysis},
}
|
BonehGolle:psp2002@inproceedings{BonehGolle:psp2002,
title = {Almost Entirely Correct Mixing With Application to Voting},
author = {Dan Boneh and Philippe Golle},
booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications
Security (CCS 2002)}},
year = {2002},
month = {November},
location = {Washington, DC},
pages = {68--77},
editor = {Vijay Atluri},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps},
}
|
BrownWright2013@book{BrownWright2013,
title = {Comprehensive Study on Cybercrime},
author = {Ian Brown and Joss Wright et al},
year = {2013},
address = {Vienna},
publisher = {UN Office on Drugs and Crime},
www_section = {Misc},
www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2010/wright10is2_en.pdf},
}
|
CDFS07@misc{CDFS07,
title = {k-Anonymity},
author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and
Pierangela Samarati},
booktitle = {Security in Decentralized Data Management},
year = {2007},
address = {Berlin Heidelberg},
editor = {T. Yu and S. Jajodia},
howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S.
Jajodia editors), Springer},
publisher = {Springer},
www_remarks = {Discusses the original k-anonymity proposal and research results on
k-anonymity. Introduces also a taxonomy of k-anonymity solutions.},
www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf},
www_section = {Anonymous publication},
}
|
CPIR@inproceedings{CPIR,
title = {Computationally private information retrieval (extended abstract)},
author = {Benny Chor and Niv Gilboa},
booktitle = {Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing
(STOC '97)},
year = {1997},
month = {May},
address = {New York, NY, USA},
location = {El Paso, Texas, United States},
pages = {304--313},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/258533.258609},
isbn = {0-89791-888-6},
www_section = {Private Information Retrieval},
www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf},
www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps},
}
|
ChatziPP07@inproceedings{ChatziPP07,
title = {Probability of Error in Information-Hiding Protocols},
author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
booktitle = {Proceedings of the 20th IEEE Computer Security Foundations Symposium
(CSF20)},
year = {2007},
location = {S. Servolo island, Venice - Italy},
www_tags = {selected},
www_pdf_url = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf},
www_section = {Anonymous communication},
}
|
DBLP:conf/acns/KlonowskiKL08@inproceedings{DBLP:conf/acns/KlonowskiKL08,
title = {Repelling Detour Attack Against Onions with Re-encryption},
author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks},
booktitle = {Proceedings of the 6th International Conference on Applied Cryptography and
Network Security (ACNS 2008)},
volume = {5037},
year = {2008},
month = {June},
location = {New York, NY, USA},
pages = {296--308},
editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung},
series = {Lecture Notes in Computer Science},
isbn = {978-3-540-68913-3},
ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18},
www_section = {Anonymous communication},
www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/EdmanS09@inproceedings{DBLP:conf/ccs/EdmanS09,
title = {{AS}-awareness in {T}or path selection},
author = {Matthew Edman and Paul F. Syverson},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {380--389},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/LingLYFXJ09@inproceedings{DBLP:conf/ccs/LingLYFXJ09,
title = {A new cell counter based attack against tor},
author = {Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Dong Xuan and Weijia
Jia},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {578--589},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Traffic analysis},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/TroncosoD09@inproceedings{DBLP:conf/ccs/TroncosoD09,
title = {The bayesian traffic analysis of mix networks},
author = {Carmela Troncoso and George Danezis},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {369--379},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Traffic analysis},
www_pdf_url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/ccs/VassermanJTHK09@inproceedings{DBLP:conf/ccs/VassermanJTHK09,
title = {Membership-concealing overlay networks},
author = {Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas Hopper and
Yongdae Kim},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
pages = {390--399},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/esorics/DanezisDKT09@inproceedings{DBLP:conf/esorics/DanezisDKT09,
title = {The Wisdom of Crowds: Attacks and Optimal Constructions},
author = {George Danezis and Claudia D\'{\i}az and Emilia K{\"a}sper and Carmela
Troncoso},
booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security
(ESORICS 2009), Saint-Malo, France},
volume = {5789},
year = {2009},
month = {September},
pages = {406--423},
editor = {Michael Backes and Peng Ning},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-04443-4},
www_section = {Traffic analysis},
www_pdf_url = {http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf},
www_tags = {selected},
}
|
DBLP:conf/esorics/MalleshW07@inproceedings{DBLP:conf/esorics/MalleshW07,
title = {Countering Statistical Disclosure with Receiver-Bound Cover Traffic},
author = {Nayantara Mallesh and Matthew Wright},
booktitle = {Proceedings of 12th European Symposium On Research In Computer Security
(ESORICS 2007)},
volume = {4734},
year = {2007},
month = {September},
location = {Dresden, Germany},
pages = {547--562},
editor = {Joachim Biskup and Javier Lopez},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-540-74834-2},
www_section = {Anonymous communication},
www_pdf_url = {http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf},
www_tags = {selected},
}
|
DBLP:conf/esorics/ModersheimV09@inproceedings{DBLP:conf/esorics/ModersheimV09,
title = {Secure Pseudonymous Channels},
author = {Sebastian M{\"o}dersheim and Luca Vigan{\`o}},
booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security
(ESORICS 2009), Saint-Malo, France},
volume = {5789},
year = {2009},
month = {September},
pages = {337--354},
editor = {Michael Backes and Peng Ning},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-04443-4},
www_section = {Anonymous communication},
www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf},
}
|
DBLP:conf/pervasive/CichonKK08@inproceedings{DBLP:conf/pervasive/CichonKK08,
title = {Privacy Protection for RFID with Hidden Subset Identifiers},
author = {Jacek Cichon and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of the 6th International Pervasive Computing Conference
(Pervasive 2008)},
volume = {5013},
year = {2008},
month = {May},
location = {Sydney, Australia},
pages = {298--314},
editor = {Jadwiga Indulska and Donald J. Patterson and Tom Rodden and Max Ott},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-540-79575-9},
ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18},
www_section = {Misc},
www_publisher_url = {http://www.springerlink.com/content/r754w32x71176057/},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/pet/AndroulakiB09@inproceedings{DBLP:conf/pet/AndroulakiB09,
title = {APOD: Anonymous Physical Object Delivery},
author = {Elli Androulaki and Steven M. Bellovin},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {202--215},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf},
}
|
DBLP:conf/pet/BauerMGGS09@inproceedings{DBLP:conf/pet/BauerMGGS09,
title = {Physical Layer Attacks on Unlinkability in Wireless LANs},
author = {Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas
C. Sicker},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {108--127},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication},
www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf},
}
|
DBLP:conf/pet/DanezisT09@inproceedings{DBLP:conf/pet/DanezisT09,
title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications},
author = {George Danezis and Carmela Troncoso},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {56--72},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Traffic analysis},
www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf},
www_tags = {selected},
}
|
DBLP:conf/pet/RaghavanKSW09@inproceedings{DBLP:conf/pet/RaghavanKSW09,
title = {Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default},
author = {Barath Raghavan and Tadayoshi Kohno and Alex C. Snoeren and David Wetherall},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {143--163},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf},
www_tags = {selected},
}
|
DBLP:conf/pet/SchiffnerC09@inproceedings{DBLP:conf/pet/SchiffnerC09,
title = {Using Linkability Information to Attack Mix-Based Anonymity Services},
author = {Stefan Schiffner and Sebastian Clau{\ss}},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {94--107},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf},
}
|
DBLP:conf/pet/SherrBL09@inproceedings{DBLP:conf/pet/SherrBL09,
title = {Scalable Link-Based Relay Selection for Anonymous Routing},
author = {Micah Sherr and Matt Blaze and Boon Thau Loo},
booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium
(PETS 2009)},
volume = {5672},
year = {2009},
month = {August},
pages = {73--93},
editor = {Ian Goldberg and Mikhail J. Atallah},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-03167-0},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://micah.cis.upenn.edu/papers/pets09.pdf},
www_tags = {selected},
}
|
DBLP:conf/sp/DanezisG09@inproceedings{DBLP:conf/sp/DanezisG09,
title = {Sphinx: A Compact and Provably Secure Mix Format},
author = {George Danezis and Ian Goldberg},
booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P
2009)},
year = {2009},
month = {May},
location = {Oakland, California, USA},
pages = {269--282},
editor = {},
publisher = {IEEE Computer Society},
isbn = {978-0-7695-3633-0},
ee = {http://dx.doi.org/10.1109/SP.2009.15},
www_section = {Anonymous communication},
www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:conf/sp/LeeDWWK13@inproceedings{DBLP:conf/sp/LeeDWWK13,
title = {Anon-Pass: Practical Anonymous Subscriptions},
author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett
Witchel},
booktitle = {Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P
2013)},
year = {2013},
month = {May},
location = {San Francisco, California, USA},
pages = {319--333},
publisher = {IEEE Computer Society},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.cs.utexas.edu/users/witchel/pubs/lee13oak-anon-pass.pdf},
}
|
DBLP:conf/sp/NarayananS09@inproceedings{DBLP:conf/sp/NarayananS09,
title = {De-anonymizing Social Networks},
author = {Arvind Narayanan and Vitaly Shmatikov},
booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P
2009)},
year = {2009},
month = {May},
location = {Oakland, California, USA},
pages = {173--187},
editor = {},
publisher = {IEEE Computer Society},
www_important = {1},
isbn = {978-0-7695-3633-0},
www_section = {Misc},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
DBLP:journals/corr/KhattakSM14@article{DBLP:journals/corr/KhattakSM14,
title = {Systemization of Pluggable Transports for Censorship Resistance},
author = {Sheharbano Khattak and Laurent Simon and Steven J. Murdoch},
journal = {CoRR},
volume = {abs/1412.7448},
year = {2014},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/KhattakSM14},
timestamp = {Thu, 01 Jan 2015 19:51:08 +0100},
www_tags = {selected},
www_pdf_url = {http://arxiv.org/pdf/1412.7448v1.pdf},
bibsource = {dblp computer science bibliography, http://dblp.org},
www_section = {Communications Censorship},
}
|
DD08Survey@techreport{DD08Survey,
title = {A Survey of Anonymous Communication Channels},
author = {George Danezis and Claudia Diaz},
institution = {Microsoft Research},
number = {MSR-TR-2008-35},
year = {2008},
month = {January},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf},
}
|
DPCS2010@inproceedings{DPCS2010,
title = {Differential Privacy for Collaborative Security},
author = {Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and
Benjamin C. Pierce and Jonathan M. Smith},
booktitle = {Proceedings of the European Workshop on System Security (EUROSEC)},
year = {2010},
month = {April},
publisher = {ACM Press},
www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf},
www_section = {Misc},
}
|
Dan:SFMix03@inproceedings{Dan:SFMix03,
title = {Forward Secure Mixes},
author = {George Danezis},
booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems},
year = {2002},
month = {November},
location = {Karlstad, Sweden},
pages = {195--207},
editor = {Fisher-Hubner, Jonsson},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/fsmix.pdf},
day = {7},
}
|
DanSer04@inproceedings{DanSer04,
title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems},
author = {George Danezis and Andrei Serjantov},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps},
www_section = {Traffic analysis},
}
|
Diaz02@inproceedings{Diaz02,
title = {Towards measuring anonymity},
author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel},
booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_important = {1},
www_tags = {selected},
www_ps_gz_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz},
www_section = {Traffic analysis},
}
|
DiazThesis05@phdthesis{DiazThesis05,
title = {Anonymity and Privacy in Electronic Services},
author = {Claudia Diaz},
school = {Katholieke Universiteit Leuven},
year = {2005},
month = {December},
address = {Leuven, Belgium},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf},
}
|
Douglas-thesis@phdthesis{Douglas-thesis,
title = {A taxonomy for and analysis of anonymous communications networks},
author = {Douglas Kelly},
school = {Air Force Institute of Technology},
year = {2009},
month = {March},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf},
}
|
EdmanSY07@article{EdmanSY07,
title = {A Combinatorial Approach to Measuring Anonymity},
author = {M. Edman and F. Sivrikaya and B. Yener},
journal = {Intelligence and Security Informatics, 2007 IEEE},
volume = {},
number = {},
year = {2007},
month = {May},
pages = {356--363},
www_tags = {selected},
www_pdf_url = {http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf},
www_section = {Traffic analysis},
}
|
FIPR05@inproceedings{FIPR05,
title = {Keyword Search and Oblivious Pseudorandom Functions},
author = {Michael J. Freedman and Yuval Ishai and Benny Pinkas and Omer Reingold},
booktitle = {Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})},
year = {2005},
month = {February},
location = {Cambridge, MA},
www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf},
www_section = {Misc},
}
|
FNP04@inproceedings{FNP04,
title = {Efficient Private Matching and Set Intersection},
author = {Michael J. Freedman and Kobbi Nissim and Benny Pinkas},
booktitle = {Proceedings of {EUROCRYPT} 2004},
year = {2004},
month = {May},
location = {Interlaken, Switzerland},
www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf},
www_section = {Misc},
}
|
Fu::FlowMarking::2005@inproceedings{Fu::FlowMarking::2005,
title = {On Flow Marking Attacks in Wireless Anonymous Communication Networks},
author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the IEEE International Conference on Distributed Computing
Systems (ICDCS)},
year = {2005},
month = {April},
www_tags = {selected},
www_pdf_url = {http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf},
www_section = {Traffic analysis},
}
|
GHPvR05@inproceedings{GHPvR05,
title = {Provable Anonymity},
author = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum},
booktitle = {{Proceedings of the 3rd ACM Workshop on Formal Methods in Security
Engineering (FMSE05)}},
year = {2005},
month = {November},
location = {Alexandria, VA, USA},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf},
www_ps_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.ps},
}
|
GKK03@inproceedings{GKK03,
title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting},
author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of ESORICS 2003},
year = {2003},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf},
www_section = {Provable shuffles},
}
|
GR2014@article{GR2014,
title = {{Garbled Routing (GR): A Generic Framework towards Unification of Anonymous
Communication Systems}},
author = {Shaahin Madani and Ibrahim Khalil},
journal = {{Journal of Network and Computer Applications}},
volume = {44},
number = {},
year = {2014},
pages = {183--195},
issn = {1084-8045},
www_html_url = {http://www.sciencedirect.com/science/article/pii/S1084804514001246},
doi = {http://dx.doi.org/10.1016/j.jnca.2014.05.005},
www_section = {Anonymous communication},
}
|
GTDPV-WPES08@inproceedings{GTDPV-WPES08,
title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity},
author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and
Ingrid Verbauwhede},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2008)},
year = {2008},
month = {October},
location = {Alexandria, VA, USA},
publisher = {ACM},
www_tags = {},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf},
www_section = {Traffic analysis},
}
|
Golle:sp2006@inproceedings{Golle:sp2006,
title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow},
booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
year = {2006},
month = {May},
location = {Oakland, CA},
pages = {121--131},
publisher = {IEEE CS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf},
}
|
GolleJakobssonJuelsSyverson:universal04@inproceedings{GolleJakobssonJuelsSyverson:universal04,
title = {Universal Re-Encryption for Mixnets},
author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson},
booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track},
year = {2004},
month = {February},
location = {San Francisco, USA},
www_tags = {selected},
www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf},
www_section = {Anonymous communication},
}
|
HanLLHP05@inproceedings{HanLLHP05,
title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design},
author = {Jinsong Han and Yunhao Liu and Li Lu and Lei Hu and Abhishek Patil},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {143--152},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
HasuoK07a@inproceedings{HasuoK07a,
title = {Probabilistic Anonymity via Coalgebraic Simulations},
author = {Ichiro Hasuo and Yoshinobu Kawabe},
booktitle = {Proceedings of the European Symposium on Programming (ESOP '07)},
volume = {4421},
year = {2007},
pages = {379--394},
publisher = {Springer, Berlin},
series = {Lecture Notes in Computer Science},
www_section = {Formal methods},
www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf},
}
|
HotOrNot@inproceedings{HotOrNot,
title = {Hot or Not: Revealing Hidden Services by their Clock Skew},
author = {Steven J. Murdoch},
booktitle = {Proceedings of CCS 2006},
year = {2006},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf},
www_section = {Traffic analysis},
}
|
Huang06@inproceedings{Huang06,
title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based
communication systems},
author = {Dijiang Huang},
booktitle = {Proceedings of the 5th ACM workshop on Wireless security (WiSe '06)},
year = {2006},
address = {New York, NY, USA},
location = {Los Angeles, California},
pages = {65--74},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/1161289.1161303},
isbn = {1-59593-557-6},
www_section = {Traffic analysis},
}
|
ISDN-mixes@inproceedings{ISDN-mixes,
title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
Systems},
year = {1991},
month = {February},
pages = {451--463},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
}
|
InfDisclosureIDM07@inproceedings{InfDisclosureIDM07,
title = {Information Disclosure in Identity Management},
author = {Dogan Kesdogan and Vinh Pham and Lexi Pimenidis},
booktitle = {Proceedings of 12th Nordic Workshop on IT-Security, NordSec},
year = {2007},
month = {October},
location = {Reykjavik, Iceland},
pages = {141--152},
editor = {Ulfar Erlingsson and Andrei Sabelfeld},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf},
}
|
KesdoganPK06@inproceedings{KesdoganPK06,
title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis},
author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"o}lsch},
booktitle = {Proceedings of First Workshop on Quality of Protection},
volume = {23},
year = {2005},
month = {September},
pages = {159--171},
series = {Advances in Information Security},
www_tags = {},
locations = {Milan, Italy},
www_pdf_url = {http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf},
www_section = {Anonymous communication},
}
|
KongHG07@article{KongHG07,
title = {An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in
Mobile Ad Hoc Networks},
author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla},
journal = {IEEE Transactions on Mobile Computing},
volume = {6},
number = {8},
year = {2007},
address = {Los Alamitos, CA, USA},
pages = {888--902},
publisher = {IEEE Computer Society},
issn = {1536-1233},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf},
}
|
LCC_DSN08@inproceedings{LCC_DSN08,
title = {{TCP} Covert Timing Channels: Design and Detection},
author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems
and Networks - {DSN}'08},
year = {2008},
month = {June},
publisher = {IEEE},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf},
www_section = {Anonymous communication},
}
|
LCC_ESORICS07@inproceedings{LCC_ESORICS07,
title = {Cloak: A Ten-fold Way for Reliable Covert Communications},
author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'07},
year = {2007},
month = {September},
publisher = {Springer},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf},
www_section = {Anonymous communication},
}
|
LCC_ICC09@inproceedings{LCC_ICC09,
title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding},
author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
booktitle = {Proceedings of the International Conference on Communications - {ICC}'09},
year = {2009},
month = {June},
publisher = {IEEE},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf},
www_section = {Anonymous communication},
}
|
LCC_IFIPSEC07@inproceedings{LCC_IFIPSEC07,
title = {Crafting Web Counters into Covert Channels},
author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
booktitle = {Proceedings of the IFIP International Information Security Conference -
{IFIP SEC}'07},
year = {2007},
month = {May},
publisher = {Springer},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf},
www_section = {Anonymous communication},
}
|
LOCEntropy2008@techreport{LOCEntropy2008,
title = {Entropy Bounds for Traffic Confirmation},
author = {Luke O'Connor},
institution = {IACR},
number = {2008/365},
year = {2008},
month = {October},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://eprint.iacr.org/2008/365.pdf},
}
|
LZCCL_DSN11@inproceedings{LZCCL_DSN11,
title = {A Combinatorial Approach to Network Covert Communications with Applications in
Web Leaks},
author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke
Lee},
booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems
and Networks - {DSN}'11},
year = {2011},
month = {June},
publisher = {IEEE},
www_section = {Anonymous communication},
}
|
LZCLCP_NDSS11@inproceedings{LZCLCP_NDSS11,
title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted
Flows},
author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C.
Chang and Roberto Perdisci},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11},
year = {2011},
month = {February},
publisher = {Internet Society},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf},
www_section = {Traffic analysis},
}
|
LZPL_ESORICS10@inproceedings{LZPL_ESORICS10,
title = {On the Secrecy of Spread-Spectrum Flow Watermarks},
author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'10},
year = {2010},
month = {September},
publisher = {Springer},
www_section = {Traffic analysis},
}
|
Levine:2002@article{Levine:2002,
title = {{Hordes --- A Multicast Based Protocol for Anonymity}},
author = {Brian Neil Levine and Clay Shields},
journal = {Journal of Computer Security},
volume = {10},
number = {3},
year = {2002},
pages = {213--240},
www_tags = {selected},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf},
keywords = {anonymity; routing; security; multicast; Journal Paper},
www_section = {Anonymous communication},
}
|
Liberatore:2006@inproceedings{Liberatore:2006,
title = {{Inferring the Source of Encrypted HTTP Connections}},
author = {Marc Liberatore and Brian Neil Levine},
booktitle = {Proceedings of the 13th ACM conference on Computer and Communications
Security (CCS 2006)},
year = {2006},
month = {November},
pages = {255--263},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf},
}
|
LuFSG05@inproceedings{LuFSG05,
title = {Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel},
author = {Tianbo Lu and Binxing Fang and Yuzhong Sun and Li Guo},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {853--862},
www_tags = {selected},
www_abstract_url = {http://www.springerlink.com/content/b3x4na87xbmcextx/},
www_section = {Anonymous communication},
}
|
MORE@inproceedings{MORE,
title = {{More: A Peer-To-Peer Based Connectionless Onion Router}},
author = {Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko +Niedermayer and
Georg Carle},
booktitle = {Proceedings of IEEE GLOBECOM, Globalcommunications Conference},
year = {2007},
month = {November},
location = {Washington DC, USA},
www_section = {Anonymous communication},
www_pdf_url = {http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf},
day = {26},
}
|
MadaniThesis@phdthesis{MadaniThesis,
title = {{Improving Security and Efficiency of Mix-Based Anonymous Communication
Systems}},
author = {Shaahin Madani},
school = {RMIT University, Melbourne, Australia},
year = {2015},
month = {April},
url = {https://researchbank.rmit.edu.au/view/rmit:161447},
www_section = {Anonymous communication},
www_pdf_url = {https://researchbank.rmit.edu.au/eserv/rmit:161447/Madani.pdf},
}
|
MarPi08@inproceedings{MarPi08,
title = {A Concept of an Anonymous Direct P2P Distribution Overlay System},
author = {Igor Margasinski and Michal Pioro},
booktitle = {Proceedings of IEEE 22nd International Conference on Advanced Information
Networking and Applications (AINA)},
year = {2008},
month = {March},
location = {Gino-wan, Okinawa, Japan},
pages = {590--597},
publisher = {IEEE Computer Society Press},
isbn = {978-0-7695-3095-6},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf},
}
|
MultiBinomial2015@article{MultiBinomial2015,
title = {{Multi-Binomial Mix: A Proposal for Secure and Efficient Anonymous
Communication}},
author = {Shaahin Madani and Ibrahim Khalil},
journal = {Computer Networks},
volume = {93, Part 1},
number = {},
year = {2015},
pages = {41--53},
issn = {1389-1286},
url = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV},
www_html_url = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV},
doi = {http://dx.doi.org/10.1016/j.comnet.2015.10.007},
www_section = {Anonymous communication},
}
|
OHanlonWrightBrown2014@inproceedings{OHanlonWrightBrown2014,
title = {Privacy at the Link Layer},
author = {Piers O'Hanlon, Joss Wright, and Ian Brown},
booktitle = {Proceedings of the W3C/IAB workshop on Strengthening the Internet Against
Pervasive Monitoring},
year = {2014},
www_pdf_url = {https://www.w3.org/2014/strint/papers/35.pdf},
www_section = {Anonymous communication},
}
|
PIK@inproceedings{PIK,
title = {Efficient anonymous channel and all/nothing election scheme},
author = {C. Park and K. Itoh and K. Kurosawa},
booktitle = {Proceedings of {EUROCRYPT} 1993},
year = {1993},
month = {May},
pages = {248--259},
publisher = {Springer-Verlag, LNCS 765},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
PShuffle@inproceedings{PShuffle,
title = {An Efficient Scheme for Proving a Shuffle},
author = {Jun Furukawa and Kazue Sako},
booktitle = {Proceedings of {CRYPTO} 2001},
year = {2001},
editor = {Joe Kilian},
publisher = {Springer-Verlag, LNCS 2139},
www_tags = {selected},
www_pdf_url = {http://www.iacr.org/archive/crypto2001/21390366.pdf},
www_section = {Provable shuffles},
}
|
PanchenkoP06@inproceedings{PanchenkoP06,
title = {Towards Practical Attacker Classification for Risk Analysis in Anonymous
Communication},
author = {Andriy Panchenko and Lexi Pimenidis},
booktitle = {Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11
International Conference (CMS 2006)},
volume = {4237},
year = {2006},
month = {October},
location = {Heraklion, Crete, Greece},
pages = {240--251},
series = {Lecture Notes in Computer Science},
www_section = {Anonymous communication},
}
|
PanchenkoPR08@inproceedings{PanchenkoPR08,
title = {Performance Analysis of Anonymous Communication Channels Provided by {Tor}},
author = {Andriy Panchenko and Lexi Pimenidis and Johannes Renner},
booktitle = {Proceedings of the The Third International Conference on Availability,
Reliability and Security (ARES 2008)},
year = {2008},
month = {March},
location = {Barcelona, Spain},
pages = {221--228},
publisher = {IEEE Computer Society},
www_tags = {},
www_section = {Anonymous communication,Tor Performance},
www_ps_url = {http://www.pimenidis.org/research/papers/PaPiRe08.ps},
}
|
PhamWrightKesdogan2011@inproceedings{PhamWrightKesdogan2011,
title = {A Practical Complexity-Theoretic Analysis of Mix Systems},
author = {Dang Vinh Pham, Joss Wright, and Dogan Kesdogan},
booktitle = {Proceedings of ESORICS 2011},
year = {2011},
address = {Leuven, Belgium},
pages = {12--15},
publisher = {September 2011},
www_section = {Anonymous communication},
www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2011/pham2011complexity.pdf},
}
|
RP03-1@inproceedings{RP03-1,
title = {{Practical Anonymity for the Masses with Mix-Networks}},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE
2003)}},
year = {2003},
month = {June},
location = {Linz, Austria},
www_tags = {selected},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz},
www_section = {Anonymous communication},
}
|
RRMPH02-1@inproceedings{RRMPH02-1,
title = {{Analysis of an Anonymity Network for Web Browsing}},
author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
David Hutchison},
booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
2002)}},
year = {2002},
month = {June},
location = {Pittsburgh, USA},
pages = {49--54},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz},
}
|
ReedPierce10@inproceedings{ReedPierce10,
title = {Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy},
author = {Jason Reed and Benjamin C. Pierce},
booktitle = {Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on
{F}unctional {P}rogramming ({ICFP})},
year = {2010},
month = {September},
location = {Baltimore, Maryland},
publisher = {ACM Press},
www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf},
www_section = {Formal methods},
}
|
Ruiz-Martinez_2012@article{Ruiz-Martinez_2012,
title = {A survey on solutions and main free tools for privacy enhancing Web
communications},
author = {Ruiz-Mart{\'i}nez, A.},
journal = {Journal of Network and Computer Applications},
volume = {35},
number = {5},
year = {2012},
month = {September},
pages = {1473--1492},
doi = {10.1016/j.jnca.2012.02.011},
issn = {1084-8045},
www_pdf_url = {http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf},
www_section = {Anonymous communication},
}
|
Rybczynska-incos2009@inproceedings{Rybczynska-incos2009,
title = {{A Round--based Cover Traffic Algorithm for Anonymity Systems}},
author = {Rybczy\'{n}ska, Marta},
booktitle = {{Proceedings of the 2009 International Conference on Intelligent Networking
and Collaborative Systems}},
year = {2009},
month = {November},
location = {Barcelona, Spain},
pages = {93--99},
publisher = {IEEE Computer Society Press},
www_section = {Traffic analysis},
www_pdf_url = {http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf},
}
|
SK@inproceedings{SK,
title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the
Implementation of a Voting Booth},
author = {Joe Kilian and Kazue Sako},
booktitle = {Proceedings of {EUROCRYPT} 1995},
year = {1995},
month = {May},
publisher = {Springer-Verlag},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
SN03@inproceedings{SN03,
title = {On the Anonymity of Timed Pool Mixes},
author = {Andrei Serjantov and Richard E. Newman},
booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and
Distributed Systems},
year = {2003},
month = {May},
location = {Athens, Greece},
pages = {427--434},
publisher = {Kluwer},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps},
}
|
SPIR@inproceedings{SPIR,
title = {Protecting data privacy in private information retrieval schemes},
author = {Gertner, Yael and Ishai, Yuval and Kushilevitz, Eyal and Malkin, Tal},
booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
organization = {ACM},
year = {1998},
pages = {151--160},
www_section = {Private Information Retrieval},
www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.50.6801&rep=rep1&type=pdf},
}
|
SS03@inproceedings{SS03,
title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
author = {Andrei Serjantov and Peter Sewell},
booktitle = {Proceedings of ESORICS 2003},
year = {2003},
month = {October},
www_tags = {selected},
www_remarks = {An investigation of packet counting attacks (which work best on lightly
loaded networks) and connection-start timing attacks.},
www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
www_section = {Traffic analysis},
}
|
SalehCISS15@inproceedings{SalehCISS15,
title = {IM Session Identification by Outlier Detection in Cross-correlation Functions},
author = {Saad Saleh and Muhammad U. Ilyas and Khawar Khurshid and Alex X. Liu and Hayder
Radha},
booktitle = {Proceedings of the 49th Annual Conference on Information Sciences and
Systems (CISS 2015)},
year = {2015},
location = {Baltimore, MD, USA},
www_pdf_url = {https://www.researchgate.net/publication/274635819_IM_Session_Identification_by_Outlier_Detection_in_Cross-correlation_Functions},
www_section = {Anonymous communication},
}
|
Salsa@inproceedings{Salsa,
title = {Salsa: A Structured Approach to Large-Scale Anonymity},
author = {Arjun Nambiar and Matthew Wright},
booktitle = {Proceedings of CCS 2006},
year = {2006},
month = {November},
www_tags = {selected},
www_pdf_url = {http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf},
www_section = {Anonymous communication},
}
|
Scarlata:2001@inproceedings{Scarlata:2001,
title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}},
author = {Vincent Scarlata and Brian Neil Levine and Clay Shields},
booktitle = {Proceedings of the IEEE International Conference on Network Protocols
(ICNP)},
year = {2001},
month = {November},
pages = {272--280},
www_section = {Misc},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf},
keywords = {security; routing; peer-to-peer; anonymity},
}
|
Serj02@inproceedings{Serj02,
title = {Towards an Information Theoretic Metric for Anonymity},
author = {Andrei Serjantov and George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_important = {1},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps},
www_section = {Traffic analysis},
}
|
Serj02-iptps@inproceedings{Serj02-iptps,
title = {Anonymizing censorship resistant systems},
author = {Andrei Serjantov},
booktitle = {Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS
2002)},
year = {2002},
month = {March},
www_tags = {selected},
www_ps_url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps},
www_section = {Anonymous publication},
}
|
ShWa-Relationship@inproceedings{ShWa-Relationship,
title = {Measuring Relationship Anonymity in Mix Networks},
author = {Vitaly Shmatikov and Ming-Hsiu Wang},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2006)}},
year = {2006},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf},
www_section = {Traffic analysis},
}
|
ShWa-Timing06@inproceedings{ShWa-Timing06,
title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses},
author = {Vitaly Shmatikov and Ming-Hsiu Wang},
booktitle = {Proceedings of ESORICS 2006},
year = {2006},
month = {September},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf},
www_section = {Traffic analysis},
}
|
Shao-infocom07@inproceedings{Shao-infocom07,
title = {{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}},
author = {Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao},
booktitle = {Proceedings of 26th Annual IEEE Conference on. Computer Communications
(Infocom'07)},
year = {2007},
month = {May},
www_pdf_url = {http://www.cse.psu.edu/~szhu/papers/pDCS.pdf},
www_section = {Anonymous communication},
}
|
Shao-infocom08@inproceedings{Shao-infocom08,
title = {{ Towards Statistically Strong Source Anonymity for Sensor Networks }},
author = {Min Shao and Yi Yang and Sencun Zhu and Guohong Cao},
booktitle = {Proceedings of 27th Annual IEEE Conference on. Computer Communications
(Infocom'08)},
year = {2008},
month = {May},
www_pdf_url = {http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf},
www_section = {Anonymous communication},
}
|
Shokri11QLP1@inproceedings{Shokri11QLP1,
title = {Quantifying location privacy},
author = {Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre
Hubaux},
booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy},
organization = {IEEE},
year = {2011},
pages = {247--262},
www_section = {Misc},
www_pdf_url = {http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf},
}
|
Shokri11QLP2@inproceedings{Shokri11QLP2,
title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
author = {Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux,
Jean-Pierre and Jean-Yves Le Boudec},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
pages = {57--76},
publisher = {Springer},
www_section = {Misc},
www_pdf_url = {http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf},
}
|
TH04@inproceedings{TH04,
title = {Measuring Anonymity in a Non-adaptive, Real-time System},
author = {Gergely T\'oth and Zolt\'an Horn\'ak},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
pages = {226--241},
series = {Springer-Verlag, LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf},
}
|
TH06a@inproceedings{TH06a,
title = {{The APROB Channel: adaptive semi-real-time anonymous communication}},
author = {Gergely T\'oth and Zolt\'an Horn\'ak},
booktitle = {Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and
Distributed, Karlstad, Sweden},
year = {2006},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf},
www_section = {stream},
}
|
TH06b@inproceedings{TH06b,
title = {{The Chances of Successful Attacks against Continuous-time Mixes}},
author = {Gergely T\'oth and Zolt\'an Horn\'ak},
booktitle = {Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\"oping,
Sweden},
year = {2006},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf},
www_section = {Traffic analysis},
}
|
THV04@inproceedings{THV04,
title = {Measuring Anonymity Revisited},
author = {Gergely T\'oth and Zolt\'an Horn\'ak and Ferenc Vajda},
booktitle = {Proceedings of the Ninth Nordic Workshop on Secure IT Systems},
year = {2004},
month = {November},
location = {Espoo, Finland},
pages = {85--90},
editor = {Sanna Liimatainen and Teemupekka Virtanen},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf},
}
|
TrafHTTP@inproceedings{TrafHTTP,
title = {Statistical Identification of Encrypted Web Browsing Traffic},
author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N.
Padmanabhan and Lili Qiu},
booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
year = {2002},
month = {May},
location = {Berkeley, California},
www_tags = {selected},
www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf},
www_section = {Traffic analysis},
}
|
UREbreak06@inproceedings{UREbreak06,
title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption},
author = {George Danezis},
booktitle = {Proceedings of Information Security Conference 2006},
year = {2006},
month = {September},
publisher = {Springer-Verlag},
www_tags = {selected},
www_pdf_url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf},
www_section = {Provable shuffles},
}
|
VenHeTon07@misc{VenHeTon07,
title = {Anonymous Networking amidst Eavesdroppers},
author = {Parvathinathan Venkitasubramaniam and Ting He and Lang Tong},
year = {2007},
month = {October},
howpublished = {Pre-print available as arXiv:0710.4903v1 at arxiv.org},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf},
}
|
Wang-SP2007@inproceedings{Wang-SP2007,
title = {{Network Flow Watermarking Attack on Low-Latency Anonymous Communication
Systems}},
author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy},
year = {2007},
month = {May},
pages = {116--130},
www_section = {Traffic analysis},
www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf},
}
|
WangCJ05@inproceedings{WangCJ05,
title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
year = {2005},
month = {November},
pages = {81--91},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
}
|
Weber11@phdthesis{Weber11,
title = {Multilaterally Secure Pervasive Cooperation},
author = {Stefan G. Weber},
school = {TU Darmstadt, Germany},
year = {2011},
month = {December},
www_section = {comm},
www_pdf_url = {http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf},
}
|
Wright2010@inproceedings{Wright2010,
title = {Obscured by Clouds: On the Privacy Implications of Cloud Computing},
author = {Joss Wright},
booktitle = {Proceedings of the 11th Czech Information Security Summit},
year = {2010},
pages = {24--26},
editor = {Prague, Czech Republic},
publisher = {May 2010},
www_section = {Misc},
www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2010/wright10is2_en.pdf},
}
|
Wright2013@article{Wright2013,
title = {Necessary and inherent limits to internet surveillance},
author = {Joss Wright},
journal = {Internet Policy Review},
year = {2013},
www_pdf_url = {http://policyreview.info/node/184/pdf},
www_section = {Traffic analysis},
}
|
Wright2014@article{Wright2014,
title = {Regional Variation in Chinese Internet Filtering},
author = {Joss Wright},
journal = {Information, Communication & Society},
volume = {17},
number = {1},
year = {2014},
pages = {121--141},
www_pdf_url = {https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf},
www_section = {Communications Censorship},
}
|
Wright:2004@article{Wright:2004,
title = {{The Predecessor Attack: An Analysis of a Threat to Anonymous Communications
Systems}},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = {4},
number = {7},
year = {2004},
month = {November},
pages = {489--522},
www_tags = {selected},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf},
keywords = {anonymity; Journal Paper},
www_section = {Traffic analysis},
}
|
WrightBrown2010@inproceedings{WrightBrown2010,
title = {Privacy Challenges in Delay-Tolerant and Restricted-Route Networks},
author = {Joss Wright and Ian Brown},
booktitle = {Proceedings of the 2nd Extreme Workshop on Communication},
year = {2010},
address = {India, September 2010},
pages = {4--10},
publisher = {Dharamsala},
www_section = {Traffic analysis},
www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2010/wright10privdtn.pdf},
}
|
WrightMM06@article{WrightMM06,
title = {On Inferring Application Protocol Behaviors in Encrypted Network Traffic},
author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson},
journal = {Journal of Machine Learning Research},
volume = {7},
year = {2006},
address = {Cambridge, MA, USA},
pages = {2745--2769},
publisher = {MIT Press},
www_tags = {selected},
issn = {1533-7928},
www_section = {Traffic analysis},
www_pdf_url = {http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf},
}
|
WrightSouzaBrown2011@inproceedings{WrightSouzaBrown2011,
title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics},
author = {Joss Wright, Tulio de Souza, and Ian Brown},
booktitle = {Proceedings of FOCI'11 (USENIX Security Symposium)},
year = {2011},
address = {San Francisco},
publisher = {8 August 2011},
www_pdf_url = {https://db.usenix.org/events/foci11/tech/final_files/Wright.pdf},
www_section = {Communications Censorship},
}
|
WrightStepneyClarkJacob2005@article{WrightStepneyClarkJacob2005,
title = {Formalizing Anonymity: A Review},
author = {Joss Wright, Susan Stepney, John A. Clark, and Jeremy Jacob},
journal = {University of York Technical (Yellow) Report},
year = {2005},
comment = {University of York, Heslington, York, UK},
www_pdf_url = {http://www-users.cs.york.ac.uk/susan/bib/ss/security/389.pdf},
www_section = {Anonymous communication},
}
|
XuFZBCZ05@inproceedings{XuFZBCZ05,
title = {SAS: A Scalar Anonymous Communication System},
author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and
Wei Zhao},
booktitle = {Proceedings of ICCNMC},
year = {2005},
pages = {452--461},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
Yang-wisec08@inproceedings{Yang-wisec08,
title = {{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor
Networks }},
author = {Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao},
booktitle = {Proceedings of The ACM Conference on Wireless Network Security (WiSec)},
year = {2008},
month = {March},
www_pdf_url = {http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf},
www_section = {Anonymous communication},
}
|
Zamani:FOCI13@inproceedings{Zamani:FOCI13,
title = {Towards Provably-Secure Scalable Anonymous Broadcast},
author = {Mahdi Zamani and Jared Saia and Mahnush Movahedi and Joud Khoury},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2013},
month = {August},
location = {Washington, DC, USA},
series = {FOCI '13},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.unm.edu/~saia/papers/foci13.pdf},
day = {13},
}
|
ZevenbergenBrownWrightErdos2013@techreport{ZevenbergenBrownWrightErdos2013,
title = {Ethical Privacy Guidelines for Mobile Connectivity Measurements},
author = {Bendert Zevenbergen, Ian Brown, Joss Wright, and David Erdos},
institution = {Oxford Internet Institute, University of Oxford},
year = {2013},
www_section = {Misc},
www_pdf_url = {http://www.oii.ox.ac.uk/research/Ethical_Privacy_Guidelines_for_Mobile_Connectivity_Measurements.pdf},
}
|
abbott-pet2007@inproceedings{abbott-pet2007,
title = {Browser-Based Attacks on {Tor}},
author = {Tim Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf},
www_section = {Traffic analysis},
}
|
abe@inproceedings{abe,
title = {Universally Verifiable mix-net With Verification Work Independent of The Number
of mix Servers},
author = {Masayuki Abe},
booktitle = {Proceedings of {EUROCRYPT} 1998},
year = {1998},
publisher = {Springer-Verlag, LNCS 1403},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
abra-wpes16@inproceedings{abra-wpes16,
title = {ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding
Bottlenecks},
author = {John Geddes and Michael Schliep and Nicholas Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/abra_wpes_16.pdf},
www_section = {Tor Performance},
}
|
acharya2017few@inproceedings{acharya2017few,
title = {Few throats to choke: On the current structure of the internet},
author = {Acharya, HB and Chakravarty, Sambuddho and Gosain, Devashish},
booktitle = {Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks
(LCN)},
organization = {IEEE},
year = {2017},
pages = {339--346},
www_section = {Traffic analysis},
www_pdf_url = {https://arxiv.org/pdf/1806.07038.pdf},
}
|
acns11-certificateless@inproceedings{acns11-certificateless,
title = {Fully Non-Interactive Onion Routing with Forward-Secrecy},
author = {Dario Catalano and Dario Fiore and Rosario Gennaro},
booktitle = {Proceedings of the 9th International Conference on Applied Cryptography and
Network Security (ACNS 2011)},
volume = {6715},
year = {2011},
month = {June},
location = {Malaga, Spain},
editor = {Javier Lopez and Gene Tsudik},
series = {Lecture Notes in Computer Science},
www_section = {Anonymous communication},
www_pdf_url = {http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf},
www_tags = {selected},
}
|
acsac11-backlit@inproceedings{acsac11-backlit,
title = {Exposing Invisible Timing-based Traffic Watermarks with BACKLIT},
author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and
Rocky K. C. Chang},
booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference
(ACSAC'11), Orlando, FL, USA},
year = {2011},
month = {December},
www_pdf_url = {http://freehaven.net/anonbib/papers/backlit-acsac11.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
acsac11-supernodes@inproceedings{acsac11-supernodes,
title = {"Super Nodes" in Tor: Existence and Security Implication},
author = {Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang},
booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference
(ACSAC'11), Orlando, FL, USA},
year = {2011},
month = {December},
www_pdf_url = {http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf},
www_section = {Anonymous communication},
}
|
acsac11-tortoise@inproceedings{acsac11-tortoise,
title = {Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and
Steady Wins the Race With Tortoise},
author = {W. Brad Moore and Chris Wacek and Micah Sherr},
booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference
(ACSAC'11), Orlando, FL, USA},
year = {2011},
month = {December},
www_tags = {selected},
www_pdf_url = {https://security.cs.georgetown.edu/papers/tortoise.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
active-pet2010@inproceedings{active-pet2010,
title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication},
author = {Aaron Johnson and Joan Feigenbaum and Paul Syverson},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf},
www_section = {Traffic analysis},
}
|
adams06@article{adams06,
title = {A Classification for Privacy Techniques},
author = {Carlisle Adams},
journal = {University of Ottawa Law \& Technology Journal},
volume = {3},
year = {2006},
pages = {35--52},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf},
issue = {1},
}
|
adida07@inproceedings{adida07,
title = {How to Shuffle in Public},
author = {Ben Adida and Douglas Wikstr\"om},
booktitle = {Proceedings of the Theory of Cryptography 2007},
year = {2007},
month = {February},
www_tags = {selected},
www_pdf_url = {http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf},
www_section = {Provable shuffles},
}
|
agrawal03@inproceedings{agrawal03,
title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}},
author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {16--27},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf},
}
|
alpha-mixing:pet2006@inproceedings{alpha-mixing:pet2006,
title = {Blending Different Latency Traffic with Alpha-Mixing},
author = {Roger Dingledine and Andrei Serjantov and Paul Syverson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {245--257},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf},
www_section = {Anonymous communication},
}
|
anderson96eternity@inproceedings{anderson96eternity,
title = {The Eternity Service},
author = {Ross Anderson},
booktitle = {Proceedings of Pragocrypt '96},
year = {1996},
www_tags = {selected},
www_important = {1},
www_html_url = {http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html},
www_ps_url = {http://www.ovmj.org/GNUnet/papers/eternity.ps},
www_section = {Anonymous publication},
}
|
andrei-thesis@phdthesis{andrei-thesis,
title = {On the Anonymity of Anonymity Systems},
author = {Andrei Serjantov},
school = {University of Cambridge},
year = {2004},
month = {June},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_url = {http://home.arachsys.com/~aas/Thesis/2.ps},
}
|
androulaki-pet2008@inproceedings{androulaki-pet2008,
title = {Reputation Systems for Anonymous Networks},
author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {202--218},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_section = {Anonymous communication},
}
|
anon-fc10@inproceedings{anon-fc10,
title = {Cryptographic Protocol Analysis of {AN.ON}},
author = {Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/wwpk2010.pdf},
www_section = {Anonymous communication},
}
|
anonize@inproceedings{anonize,
title = {{ANONIZE}: A Large-Scale Anonymous Survey System},
author = {Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat},
booktitle = {Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy},
year = {2014},
month = {May},
publisher = {IEEE},
www_pdf_url = {http://ieee-security.org/TC/SP2014/papers/ANONIZE_c_ALarge-ScaleAnonymousSurveySystem.pdf},
www_section = {Misc},
}
|
applicationlayer-pets2017@article{applicationlayer-pets2017,
title = {Website Fingerprinting Defenses at the Application Layer},
author = {Giovanni Cherubin and Jamie Hayes and Marc Juarez},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue2/paper54-2017-2-source.pdf},
www_section = {analysis},
}
|
aqua-sigcomm2013@inproceedings{aqua-sigcomm2013,
title = {Towards Efficient Traffic-analysis Resistant Anonymity Networks},
author = {Stevens Le Blond and David Choffnes and Wenxuan Zhou and Peter Druschel and
Hitesh Ballani and Paul Francis},
booktitle = {Proceedings of the ACM SIGCOMM 2013 Conference},
year = {2013},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/sigcomm13-aqua.pdf},
www_section = {Anonymous communication},
}
|
asiaccs2014-reputation@inproceedings{asiaccs2014-reputation,
title = {$Re^3$: Relay Reliability Reputation for Anonymity Systems},
author = {Anupam Das and Nikita Borisov and Prateek Mittal and Matthew Caesar},
booktitle = {Proceedings of the 9th ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2014)},
year = {2014},
month = {June},
www_tags = {selected},
www_pdf_url = {http://hatswitch.org/~nikita/papers/re3-asiaccs14.pdf},
www_section = {Anonymous communication},
}
|
asonov:pet2002@inproceedings{asonov:pet2002,
title = {Almost Optimal Private Information Retrieval},
author = {Dmitri Asonov and Johann-Christoph Freytag},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_pdf_url = {http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf},
www_section = {Private Information Retrieval},
}
|
babel@inproceedings{babel,
title = {Mixing {E}-mail With {B}abel},
author = {Ceki G\"ulc\"u and Gene Tsudik},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
year = {1996},
month = {February},
pages = {2--16},
publisher = {IEEE},
www_important = {1},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/2254.html},
www_section = {Anonymous communication},
www_ps_url = {http://www.isoc.org/conferences/ndss96/gulcu.ps},
}
|
back01@inproceedings{back01,
title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
author = {Adam Back and Ulf M\"oller and Anton Stiglic},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {245--257},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
}
|
bauer:alpaca2008@inproceedings{bauer:alpaca2008,
title = {{BitBlender}: {L}ight-Weight Anonymity for BitTorrent},
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker},
booktitle = {{Proceedings of the Workshop on Applications of Private and Anonymous
Communications (AlPACa 2008)}},
year = {2008},
month = {September},
location = {Istanbul, Turkey},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf},
www_section = {Anonymous communication},
}
|
bauer:wpes2003@inproceedings{bauer:wpes2003,
title = {{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}},
author = {Matthias Bauer},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_remarks = {Anonymity sets in deployed systems are small because few people think it's
worthwhile to use them. But we can take advantage of ordinary web users to
transfer messages (that is, mix them) from one webserver to another via cookies
and http redirect tricks. Senders and receivers should also look like ordinary
web users, so anonymity sets are large.},
www_ps_url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps},
www_section = {Anonymous communication},
}
|
bauer:wpes2007@inproceedings{bauer:wpes2007,
title = {Low-Resource Routing Attacks Against {Tor}},
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas
Sicker},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2007)}},
year = {2007},
month = {October},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf},
www_section = {Traffic analysis},
}
|
bazzi2007establishment@article{bazzi2007establishment,
title = {On the establishment of distinct identities in overlay networks},
author = {Bazzi, Rida A and Konjevod, Goran},
journal = {Distributed Computing},
volume = {19},
number = {4},
year = {2007},
pages = {267--287},
publisher = {Springer},
www_pdf_url = {http://www.organicorigami.com/thrackle/papers/dc06.pdf},
www_section = {comm},
}
|
beimel-barrier@inproceedings{beimel-barrier,
title = {{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private
Information Retrieval}},
author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\c{c}ois
Raymond},
booktitle = {Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science
(FOCS'02)},
year = {2002},
month = {November},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf},
www_section = {Private Information Retrieval},
}
|
beimel-robust@inproceedings{beimel-robust,
title = {Robust information-theoretic private information retrieval},
author = {A. Beimel and Y. Stahl},
booktitle = {Proceedings of the 3rd Conference on Security in Communication Networks},
volume = {2576},
year = {2002},
pages = {326--341},
editor = {S. Cimato C. Galdi G. Persiano},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science},
www_section = {Private Information Retrieval},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf},
www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps},
}
|
beimel01informationtheoretic@article{beimel01informationtheoretic,
title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction},
author = {Amos Beimel and Yuval Ishai},
journal = {Lecture Notes in Computer Science},
volume = {2076},
year = {2001},
pages = {89--98},
www_section = {Private Information Retrieval},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf},
}
|
bennett:pet2003@inproceedings{bennett:pet2003,
title = {{GAP} -- Practical anonymous networking},
author = {Krista Bennett and Christian Grothoff},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {141--160},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Anonymous publication},
www_ps_url = {http://www.ovmj.org/GNUnet/download/aff.ps},
}
|
berman-fc2004@inproceedings{berman-fc2004,
title = {Provable Unlinkability Against Traffic Analysis},
author = {Ron Berman and Amos Fiat and Amnon Ta-Shma},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {266--280},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf},
}
|
bitcoin-p2p-anon@inproceedings{bitcoin-p2p-anon,
title = {An Analysis of Anonymity in Bitcoin Using P2P Network Traffic},
author = {Philip Koshy and Diana Koshy and Patrick McDaniel},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
year = {2014},
month = {March},
www_pdf_url = {http://fc14.ifca.ai/papers/fc14_submission_71.pdf},
www_section = {Traffic analysis},
}
|
blac-tissec@article{blac-tissec,
title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs},
author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.},
journal = {ACM Transactions on Information and System Security},
volume = {13},
year = {2010},
month = {December},
address = {New York, NY, USA},
pages = {39:1--39:33},
publisher = {ACM},
numpages = {33},
issue_date = {December 2010},
issn = {1094-9224},
www_tags = {selected},
acmid = {1880033},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf},
url = {http://doi.acm.org/10.1145/1880022.1880033},
www_section = {Pseudonymity},
doi = {http://doi.acm.org/10.1145/1880022.1880033},
keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced
revocation, user misbehavior},
articleno = {39},
issue = {4},
}
|
blacr-ndss@inproceedings{blacr-ndss,
title = {{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation},
author = {Man Ho Au and Apu Kapadia and Willy Susilo},
booktitle = {Proceedings of the 19th Annual Network and Distributed System Security
Symposium ({NDSS})},
year = {2012},
month = {February},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf},
www_tags = {selected},
www_section = {Pseudonymity},
}
|
bnymble11@inproceedings{bnymble11,
title = {BNymble: More anonymous blacklisting at almost no cost},
author = {Peter Lofgren and Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/bnymble.pdf},
www_tags = {selected},
www_section = {Misc},
}
|
botnetfc14@inproceedings{botnetfc14,
title = {Challenges in protecting Tor hidden services from botnet abuse},
author = {Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
year = {2014},
month = {March},
www_tags = {selected},
www_pdf_url = {http://fc14.ifca.ai/papers/fc14_submission_152.pdf},
www_section = {Anonymous communication},
}
|
boukerche2005esd@article{boukerche2005esd,
title = {{An efficient secure distributed anonymous routing protocol for mobile and
wireless ad hoc networks}},
author = {A. Boukerche and K. El-Khatib and L. Xu and L. Korba},
journal = {Computer Communications},
volume = {28},
number = {10},
year = {2005},
pages = {1193--1203},
publisher = {Elsevier},
www_pdf_url = {http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf},
www_section = {Anonymous communication},
}
|
bounds-pets2017@article{bounds-pets2017,
title = {Bayes, not Na\"{\i}ve: Security Bounds on Website Fingerprinting Defenses},
author = {Giovanni Cherubin},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper50-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
brands06@article{brands06,
title = {Secure User Identification Without Privacy Erosion},
author = {Stefan Brands},
journal = {University of Ottawa Law \& Technology Journal},
volume = {3},
year = {2006},
pages = {205--223},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf},
issue = {1},
}
|
buses03@article{buses03,
title = {Buses for Anonymous Message Delivery},
author = {Amos Beimel and Shlomi Dolev},
journal = {Journal of Cryptology},
volume = {16},
number = {1},
year = {2003},
pages = {25--39},
www_tags = {selected},
www_ps_url = {ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps},
www_section = {Anonymous communication},
}
|
camenisch2002da@inproceedings{camenisch2002da,
title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous
Credentials},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Proceedings of {CRYPTO} 2002},
year = {2002},
pages = {61--76},
publisher = {Springer Verlag, LNCS 2442},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm},
}
|
camenisch2002ssep@inproceedings{camenisch2002ssep,
title = {A Signature Scheme with Efficient Protocols},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Proceedings of {SCN '02}, Third Conference on Security in Communication
Networks},
year = {2002},
pages = {268--289},
publisher = {Springer Verlag, LNCS 2576},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf},
}
|
camenisch2003pve@inproceedings{camenisch2003pve,
title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
author = {Jan Camenisch and Victor Shoup},
booktitle = {Proceedings of {CRYPTO} 2003},
year = {2003},
pages = {126--144},
publisher = {Springer Verlag, LNCS 2729},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2729{\&}spage=126},
}
|
camlys05@inproceedings{camlys05,
title = {A Formal Treatment of Onion Routing},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Proceedings of {CRYPTO} 2005},
year = {2005},
month = {August},
pages = {169--187},
editor = {Victor Shoup},
publisher = {Springer-Verlag, LNCS 3621},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf},
}
|
cangialosi15@inproceedings{cangialosi15,
title = {Ting: Measuring and Exploiting Latencies Between All {Tor} Nodes},
author = {Frank Cangialosi and Dave Levin and Neil Spring},
booktitle = {Proceedings of the 2015 Internet Measurement Conference},
year = {2015},
month = {October},
location = {Tokyo, Japan},
pages = {289--302},
doi = {10.1145/2815675.2815701},
www_section = {Traffic analysis},
www_pdf_url = {https://www.cs.umd.edu/~dml/papers/ting_imc15.pdf},
}
|
carlsson2012motorcycles@article{carlsson2012motorcycles,
title = {Performance modelling of anonymity protocols},
author = {Carlsson, Niklas and Williamson, Carey and Hirt, Andreas and Jacobson, Jr.,
Michael},
journal = {Performance Evaluation},
volume = {69},
number = {12},
year = {2012},
month = {December},
pages = {643--661},
publisher = {Elsevier},
doi = {{10.1016/j.peva.2012.08.001}},
www_pdf_url = {https://www.ida.liu.se/~nikca/papers/pe12.pdf},
www_section = {comm},
issn = {{0166-5316}},
}
|
caronte-ccs2015@inproceedings{caronte-ccs2015,
title = {Caronte: Detecting Location Leaks for Deanonymizing Tor Hidden Services},
author = {Srdjan Matic and Platon Kotzias and Juan Caballero},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://software.imdea.org/~juanca/papers/caronte_ccs15.pdf},
www_section = {Traffic analysis},
}
|
casc-rep@inproceedings{casc-rep,
title = {{Reliable MIX Cascade Networks through Reputation}},
author = {Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC '02)},
year = {2002},
month = {March},
editor = {Matt Blaze},
publisher = {Springer-Verlag, LNCS 2357},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/casc-rep/casc-rep.pdf},
www_ps_url = {http://freehaven.net/doc/casc-rep/casc-rep.ps},
www_section = {Anonymous communication},
}
|
cascades-vs-p2p:pet2004@inproceedings{cascades-vs-p2p:pet2004,
title = {On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: Is One Concept
Superior?''},
author = {Rainer B\"ohme and George Danezis and Claudia Diaz and Stefan K\"opsell and
Andreas Pfitzmann},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
pages = {226--241},
series = {Springer-Verlag, LNCS},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-523.pdf},
}
|
ccs07-blac@inproceedings{ccs07-blac,
title = {Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs},
author = {Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith},
booktitle = {Proceedings of CCS 2007},
year = {2007},
month = {October},
www_pdf_url = {http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf},
www_remarks = {Superseded by blac-tissec},
www_section = {Pseudonymity},
}
|
ccs07-doa@inproceedings{ccs07-doa,
title = {Denial of Service or Denial of Security? {H}ow Attacks on Reliability can
Compromise Anonymity},
author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz},
booktitle = {Proceedings of CCS 2007},
year = {2007},
month = {October},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf},
www_section = {Traffic analysis},
}
|
ccs07-latency-leak@inproceedings{ccs07-latency-leak,
title = {How Much Anonymity does Network Latency Leak?},
author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin},
booktitle = {Proceedings of CCS 2007},
year = {2007},
month = {October},
www_pdf_url = {http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf},
www_section = {Traffic analysis},
}
|
ccs09-certificateless@inproceedings{ccs09-certificateless,
title = {Certificateless Onion Routing},
author = {Dario Catalano and Dario Fiore and Rosario Gennaro},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.ippari.unict.it/~catalano/CaGeFi09.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs09-nisan@inproceedings{ccs09-nisan,
title = {{NISAN}: Network Information Service for Anonymization Networks},
author = {Andriy Panchenko and Arne Rache and Stefan Richter},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs09-shadowwalker@inproceedings{ccs09-shadowwalker,
title = {ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured
Topologies},
author = {Prateek Mittal and Nikita Borisov},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs09-torsk@inproceedings{ccs09-torsk,
title = {{Scalable onion routing with Torsk}},
author = {Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications
Security, CCS 2009},
year = {2009},
month = {November},
location = {Chicago, Illinois, USA},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
publisher = {ACM},
isbn = {978-1-60558-894-0},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf},
www_tags = {selected},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ccs10-braids@inproceedings{ccs10-braids,
title = {Recruiting New {T}or Relays with {BRAIDS}},
author = {Rob Jansen and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf},
www_tags = {selected},
}
|
ccs10-dissent@inproceedings{ccs10-dissent,
title = {Dissent: Accountable Anonymous Group Messaging},
author = {Henry Corrigan-Gibbs and Bryan Ford},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Communications Censorship},
www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf},
www_tags = {selected},
}
|
ccs10-lookup@inproceedings{ccs10-lookup,
title = {In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer
Anonymous Communication Systems},
author = {Qiyan Wang and Prateek Mittal and Nikita Borisov},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Traffic analysis},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf},
www_tags = {selected},
}
|
ccs10-scheduling@inproceedings{ccs10-scheduling,
title = {An Improved Algorithm for {T}or Circuit Scheduling},
author = {Can Tang and Ian Goldberg},
booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications
Security (CCS 2010)},
year = {2010},
month = {October},
location = {Chicago, Illinois, USA},
editor = {Angelos D. Keromytis and Vitaly Shmatikov},
publisher = {ACM},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf},
www_tags = {selected},
}
|
ccs2008:camenisch@inproceedings{ccs2008:camenisch,
title = {Efficient Attributes for Anonymous Credentials},
author = {Jan Camenisch and Thomas Gross},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {345--356},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf},
day = {27--31},
}
|
ccs2008:mittal@inproceedings{ccs2008:mittal,
title = {Information Leaks in Structured Peer-to-peer Anonymous Communication Systems},
author = {Prateek Mittal and Nikita Borisov},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {267--278},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Anonymous communication},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf},
www_tags = {selected},
www_remarks = {Describes attacks against the SALSA and AP3 peer-to-peer anonymity network
architectures.},
day = {27--31},
}
|
ccs2008:tsang@inproceedings{ccs2008:tsang,
title = {PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication},
author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {333--345},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Misc},
www_tags = {selected},
day = {27--31},
}
|
ccs2008:wang@inproceedings{ccs2008:wang,
title = {Dependent Link Padding Algorithms for Low Latency Anonymity Systems},
author = {Wei Wang and Mehul Motani and Vikram Srinivasan},
booktitle = {{Proceedings of the 15th ACM Conference on Computer and Communications
Security (CCS 2008)}},
year = {2008},
month = {October},
location = {Alexandria, Virginia, USA},
pages = {323--332},
editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang},
publisher = {ACM Press},
www_section = {Traffic analysis},
www_tags = {selected},
day = {27--31},
}
|
ccs2011-cirripede@inproceedings{ccs2011-cirripede,
title = {Cirripede: Circumvention Infrastructure using Router Redirection with Plausible
Deniability},
author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
www_section = {Communications Censorship},
}
|
ccs2011-oneswarm@inproceedings{ccs2011-oneswarm,
title = {Forensic Investigation of the OneSwarm Anonymous Filesharing System},
author = {Swagatika Prusty and Marc Liberatore and Brian N. Levine},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf},
www_section = {Traffic analysis},
}
|
ccs2011-stealthy@inproceedings{ccs2011-stealthy,
title = {Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using
Throughput Fingerprinting},
author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita
Borisov},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf},
www_section = {Anonymous communication},
}
|
ccs2011-trust@inproceedings{ccs2011-trust,
title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms},
author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the 18th ACM conference on Computer and Communications
Security (CCS 2011)},
year = {2011},
month = {October},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf},
www_section = {Anonymous communication},
}
|
ccs2012-censorspoofer@inproceedings{ccs2012-censorspoofer,
title = {CensorSpoofer: Asymmetric Communication using {IP} Spoofing for
Censorship-Resistant Web Browsing},
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita
Borisov},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-classification@inproceedings{ccs2012-classification,
title = {Enhancing Tor's Performance using Real-time Traffic Classification},
author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ccs2012-decoys@inproceedings{ccs2012-decoys,
title = {Routing Around Decoys},
author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-fingerprinting@inproceedings{ccs2012-fingerprinting,
title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses},
author = {Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.cs.sunysb.edu/~xcai/fp.pdf},
www_section = {Traffic analysis},
}
|
ccs2012-skypemorph@inproceedings{ccs2012-skypemorph,
title = {SkypeMorph: Protocol Obfuscation for {T}or Bridges},
author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian
Goldberg},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf},
www_section = {Communications Censorship},
}
|
ccs2012-stegotorus@inproceedings{ccs2012-stegotorus,
title = {{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System},
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister
and Steven Cheung and Frank Wang and Dan Boneh},
booktitle = {Proceedings of the 19th ACM conference on Computer and Communications
Security (CCS 2012)},
year = {2012},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.owlfolio.org/media/2010/05/stegotorus.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-acks@inproceedings{ccs2013-acks,
title = {Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention},
author = {John Geddes and Maxfield Schuchard and Nicholas Hopper},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-buddies@inproceedings{ccs2013-buddies,
title = {Hang with Your Buddies to Resist Intersection Attacks},
author = {David Wolinsky and Ewa Syta and Bryan Ford},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/buddies.pdf},
www_section = {Anonymous communication},
}
|
ccs2013-fte@inproceedings{ccs2013-fte,
title = {Protocol Misidentification Made Easy with Format-Transforming Encryption},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://eprint.iacr.org/2012/494.pdf},
www_section = {Communications Censorship},
}
|
ccs2013-pctcp@inproceedings{ccs2013-pctcp,
title = {{PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay
Networks}},
author = {Mashael AlSabah and Ian Goldberg},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/pctcp-ccs.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ccs2013-usersrouted@inproceedings{ccs2013-usersrouted,
title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries},
author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul
Syverson},
booktitle = {Proceedings of the 20th ACM conference on Computer and Communications
Security (CCS 2013)},
year = {2013},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-critical@inproceedings{ccs2014-critical,
title = {A Critical Evaluation of Website Fingerprinting Attacks},
author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel
Greenstadt},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2456.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-fingerprinting@inproceedings{ccs2014-fingerprinting,
title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses},
author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/ccs14.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-mators@inproceedings{ccs2014-mators,
title = {(Nothing else) {MAT}or(s): Monitoring the Anonymity of Tor's Path Selection},
author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://eprint.iacr.org/2014/621.pdf},
www_section = {Traffic analysis},
}
|
ccs2014-tracking@inproceedings{ccs2014-tracking,
title = {The web never forgets: Persistent tracking mechanisms in the wild},
author = {Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and
Arvind Narayanan and Claudia Diaz},
booktitle = {Proceedings of the 21th ACM conference on Computer and Communications
Security (CCS 2014)},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2457.pdf},
www_section = {Traffic analysis},
}
|
ccs2015obfsdetection@inproceedings{ccs2015obfsdetection,
title = {Seeing Through Network-Protocol Obfuscation},
author = {Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas
Shrimpton},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
address = {New York, NY, USA},
location = {Denver, Colorado, USA},
pages = {57--69},
publisher = {ACM},
numpages = {13},
doi = {10.1145/2810103.2813715},
isbn = {978-1-4503-3832-5},
acmid = {2813715},
url = {http://doi.acm.org/10.1145/2810103.2813715},
www_section = {analysis},
www_tags = {selected},
www_pdf_url = {http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf},
keywords = {Tor, censorship-resistance, network obfuscation},
}
|
ccsw09-fingerprinting@inproceedings{ccsw09-fingerprinting,
title = {Website fingerprinting: attacking popular privacy enhancing technologies with
the multinomial na\"{\i}ve-bayes classifier},
author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath},
booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW
'09)},
year = {2009},
month = {October},
address = {New York, NY, USA},
location = {Chicago, Illinois, USA},
pages = {31--42},
publisher = {ACM},
doi = {http://doi.acm.org/10.1145/1655008.1655013},
isbn = {978-1-60558-784-4},
www_section = {Traffic analysis},
www_tags = {selected},
www_pdf_url = {http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf},
}
|
cdn-ccs2016@inproceedings{cdn-ccs2016,
title = {Practical Censorship Evasion Leveraging Content Delivery Networks},
author = {Hadi Zolfaghari and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf},
www_section = {Communications Censorship},
}
|
cebolla@inproceedings{cebolla,
title = {{Cebolla: Pragmatic IP Anonymity}},
author = {Zach Brown},
booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
year = {2002},
month = {June},
www_tags = {selected},
www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
similar to second-generation Freedom. The initiator incrementally builds her
circuit, giving her end-to-end forward-secrecy and also better recovery from
broken nodes.},
www_section = {Anonymous communication},
}
|
censorship-framework-pets2016@article{censorship-framework-pets2016,
title = {A Framework for the Game-theoretic Analysis of Censorship Resistance},
author = {Tariq Elahi and John A. Doucette and Hadi Hosseini and Steven J. Murdoch and
Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/A_Framework_for_the_Game-theoretic_Analysis_of_Censorship_Resistance.pdf},
www_section = {Communications Censorship},
}
|
censorship-sok-pets2016@article{censorship-sok-pets2016,
title = {SoK: Making Sense of Censorship Resistance Systems},
author = {Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and
Steven J. Murdoch and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/SoK__Making_Sense_of_Censorship_Resistance_Systems.pdf},
www_section = {Communications Censorship},
}
|
chaffinch@inproceedings{chaffinch,
title = {Chaffinch: Confidentiality in the Face of Legal Threats},
author = {Richard Clayton and George Danezis},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_tags = {selected},
www_html_url = {http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf},
www_section = {Misc},
}
|
chatzikokolakis2006apn@article{chatzikokolakis2006apn,
title = {{Anonymity Protocols as Noisy Channels?}},
author = {K. Chatzikokolakis and C. Palamidessi and P. Panangaden},
journal = {Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer},
year = {2006},
www_tags = {selected},
www_section = {Formal methods},
}
|
chaum-dc@article{chaum-dc,
title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient
Untraceability},
author = {David Chaum},
journal = {Journal of Cryptology},
volume = {1},
year = {1988},
pages = {65--75},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf},
}
|
chaum-mix@article{chaum-mix,
title = {Untraceable electronic mail, return addresses, and digital pseudonyms},
author = {David Chaum},
journal = {Communications of the ACM},
volume = {24},
number = {2},
year = {1981},
month = {February},
www_important = {1},
www_tags = {selected},
www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html},
www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf},
www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt},
www_section = {Anonymous communication},
}
|
chaum85@article{chaum85,
title = {Security without Identification: Transaction Systems to Make Big Brother
Obsolete},
author = {David Chaum},
journal = {CACM},
volume = {28},
number = {10},
year = {1985},
month = {October},
www_tags = {selected},
www_section = {Misc},
}
|
cheap-pseudonyms@article{cheap-pseudonyms,
title = {The social cost of cheap pseudonyms},
author = {Eric Friedman and Paul Resnick},
journal = {Journal of Economics and Management Strategy},
volume = {10},
number = {2},
year = {2001},
pages = {173--199},
www_tags = {selected},
www_pdf_url = {http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf},
www_section = {Economics},
}
|
chl05-full:eurocrypt2005@inproceedings{chl05-full:eurocrypt2005,
title = {Compact E-Cash},
author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
booktitle = {Proceedings of EUROCRYPT 2005},
volume = {3494},
year = {2005},
month = {May},
pages = {302--321},
editor = {Ronald Cramer},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
isbn = {3-540-25910-4},
ee = {http://dx.doi.org/10.1007/11426639_18},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.cs.brown.edu/~anna/papers/chl05-full.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de},
}
|
ciaccio:pet2006@inproceedings{ciaccio:pet2006,
title = {Improving Sender Anonymity in a Structured Overlay with Imprecise Routing},
author = {Giuseppe Ciaccio},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {190--207},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_11.pdf},
www_section = {Anonymous communication},
}
|
circuit-fingerprinting2015@inproceedings{circuit-fingerprinting2015,
title = {Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services},
author = {Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas
Devadas},
booktitle = {Proceedings of the 24th Usenix Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf},
www_section = {Traffic analysis},
}
|
cl01a@inproceedings{cl01a,
title = {An Efficient System for Non-transferable Anonymous Credentials with Optional
Anonymity Revocation},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Proceedings of the International Conference on the Theory and Application of
Cryptographic Techniques (EUROCRYPT '01)},
year = {2001},
location = {London, UK},
pages = {93--118},
publisher = {Springer-Verlag},
isbn = {3-540-42070-3},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf},
}
|
clarke1999freenet@misc{clarke1999freenet,
title = {Freenet: A distributed anonymous information storage and retrieval system.
Freenet White Paper},
author = {Clarke, I and Sandberg, O and Wiley, B and Hong, TW},
year = {1999},
howpublished = {white paper},
www_section = {comm},
www_pdf_url = {https://freenetproject.org/papers/ddisrs.pdf},
}
|
clarke2002protecting@article{clarke2002protecting,
title = {Protecting free expression online with Freenet},
author = {Clarke, Ian and Miller, Scott G and Hong, Theodore W and Sandberg, Oskar and
Wiley, Brandon},
journal = {Internet Computing, IEEE},
volume = {6},
number = {1},
year = {2002},
pages = {40--49},
publisher = {IEEE},
www_pdf_url = {https://freenetproject.org/papers/freenet-ieee.pdf},
www_section = {comm},
}
|
clarke2010private@article{clarke2010private,
title = {Private communication through a network of trusted connections: The dark
freenet},
author = {Clarke, Ian and Sandberg, Oskar and Toseland, Matthew and Verendel, Vilhelm},
journal = {Network},
year = {2010},
www_pdf_url = {https://freenetproject.org/papers/freenet-0.7.5-paper.pdf},
www_section = {comm},
}
|
clauss2006sam@inproceedings{clauss2006sam,
title = {Structuring Anonymity Metrics},
author = {Clau\ss, Sebastian and Schiffner, Stefan},
booktitle = {Proceedings of the Second ACM Workshop on Digital Identity Management},
year = {2006},
address = {New York, NY, USA},
location = {Alexandria, Virginia, USA},
pages = {55--62},
publisher = {ACM Press},
series = {DIM '06},
numpages = {8},
doi = {10.1145/1179529.1179539},
isbn = {1-59593-547-9},
acmid = {1179539},
url = {http://doi.acm.org/10.1145/1179529.1179539},
www_section = {Formal methods},
keywords = {anonymity metrics, identity management, privacy metrics},
}
|
clayton:pet2003@inproceedings{clayton:pet2003,
title = {Improving Onion Notation},
author = {Richard Clayton},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {81--87},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/onions.pdf},
}
|
clayton:pet2006@inproceedings{clayton:pet2006,
title = {{Ignoring the Great Firewall of China}},
author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {20--35},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
www_section = {Communications Censorship},
}
|
clog-the-queue@inproceedings{clog-the-queue,
title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity
schemes},
author = {Jon McLachlan and Nicholas Hopper},
booktitle = {Proceedings of Financial Cryptography (FC '08)},
year = {2008},
month = {January},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf},
www_section = {Anonymous communication},
}
|
clonewars@inproceedings{clonewars,
title = {How to win the clonewars: efficient periodic n-times anonymous authentication},
author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya
and Mira Meyerovich},
booktitle = {Proceedings of the 13th ACM conference on Computer and communications
security (CCS 2006)},
year = {2006},
month = {November},
address = {New York, NY, USA},
location = {Alexandria, Virginia, USA},
pages = {201--210},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/1180405.1180431},
isbn = {1-59593-518-5},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-812.pdf},
}
|
coble-pet2008@inproceedings{coble-pet2008,
title = {Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem
Prover},
author = {Aaron H. Coble},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {77--98},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
bookurl = {http://petsymposium.org/2008/},
www_section = {Formal methods},
}
|
compressive-ccs2017@inproceedings{compressive-ccs2017,
title = {Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis},
author = {Milad Nasr and Amir Houmansadr and Arya Mazumdar},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {http://people.cs.umass.edu/~milad/papers/compress_CCS.pdf},
www_section = {Traffic analysis},
}
|
conf/acsac/ADC07@inproceedings{conf/acsac/ADC07,
title = {{Closed-Circuit Unobservable Voice Over IP}},
author = {Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny},
booktitle = {Proceedings of 23rd Annual Computer Security Applications Conference
(ACSAC'07), Miami, FL, USA},
year = {2007},
publisher = {{IEEE} Computer Society Press},
www_tags = {selected},
www_pdf_url = {http://www.acsac.org/2007/papers/110.pdf},
www_section = {Anonymous communication},
}
|
conf/fc/PalmieriP15@inproceedings{conf/fc/PalmieriP15,
title = {Paying the Guard: an Entry-Guard-based Payment System for Tor},
author = {Paolo Palmieri and Johan Pouwelse},
booktitle = {Proceedings of the 19th International Conference on Financial Cryptography
and Data Security ({FC} 2015)},
year = {2015},
month = {January},
www_pdf_url = {http://paolopalmieri.com/pdf/Palmieri_Pouwelse_FC2015.pdf},
www_tags = {selected},
www_section = {Economics},
}
|
conf/iwsec/PalmieriP14@inproceedings{conf/iwsec/PalmieriP14,
title = {Key Management for Onion Routing in a True Peer to Peer Setting},
author = {Paolo Palmieri and Johan Pouwelse},
booktitle = {Proceedings of the 9th International Workshop on Security ({IWSEC} 2014)},
year = {2014},
month = {August},
www_pdf_url = {http://paolopalmieri.com/pdf/Palmieri_Pouwelse_IWSEC2014.pdf},
www_section = {Anonymous communication},
}
|
congestion-longpaths@inproceedings{congestion-longpaths,
title = {A Practical Congestion Attack on {T}or Using Long Paths},
author = {Nathan Evans and Roger Dingledine and Christian Grothoff},
booktitle = {Proceedings of the 18th USENIX Security Symposium},
year = {2009},
month = {August},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/congestion-longpaths.pdf},
www_section = {Traffic analysis},
}
|
congestion-tor12@inproceedings{congestion-tor12,
title = {{Congestion-aware Path Selection for Tor}},
author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'12)},
year = {2012},
month = {February},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
cooper@inproceedings{cooper,
title = {Preserving Privacy in a Network of Mobile Computers},
author = {David A. Cooper and Kenneth P. Birman},
booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy},
year = {1995},
month = {May},
www_tags = {selected},
www_pdf_url = {http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf},
www_section = {Private Information Retrieval},
}
|
cosic-2007-001@techreport{cosic-2007-001,
title = {{The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym
Servers}},
author = {Len Sassaman and Bart Preneel},
institution = {Katholieke Universiteit Leuven},
number = {ESAT-COSIC 2007-001},
year = {2007},
month = {February},
www_tags = {selected},
www_section = {Private Information Retrieval},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf},
}
|
covertcast-pets2016@article{covertcast-pets2016,
title = {CovertCast: Using Live Streaming to Evade Internet Censorship},
author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {3},
year = {2016},
month = {July},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/CovertCast__Using_Live_Streaming_to_Evade_Internet_Censorship.pdf},
www_section = {Communications Censorship},
}
|
credentials-fc2004@inproceedings{credentials-fc2004,
title = {An Efficient and Usable Multi-show Non-transferable Anonymous Credential
System},
author = {Guiseppe Persiano and Ivan Visconti},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {196--211},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_section = {E-Cash / Anonymous Credentials},
}
|
crosshairs-wpes17@inproceedings{crosshairs-wpes17,
title = {Onions in the Crosshairs: When The Man really is out to get you},
author = {Aaron D. Jaggard and Paul Syverson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2017)}},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {},
www_section = {Anonymous communication},
}
|
crowds-model@article{crowds-model,
title = {Probabilistic Model Checking of an Anonymity System},
author = {Vitaly Shmatikov},
journal = {Journal of Computer Security},
volume = {12},
number = {3-4},
year = {2004},
pages = {355--377},
www_tags = {selected},
www_remarks = {Uses formal methods to analyze probabilistic anonymity systems like Crowds. Confirms that anonymity degrades with a larger
crowd: as N grows, the fact that the request came from you becomes more
suspicious.},
www_ps_url = {http://www.csl.sri.com/users/shmat/shmat_crowds.ps},
www_section = {Formal methods},
}
|
crowds:tissec@article{crowds:tissec,
title = {Crowds: Anonymity for Web Transactions},
author = {Michael Reiter and Aviel Rubin},
journal = {ACM Transactions on Information and System Security},
volume = {1},
number = {1},
year = {1998},
month = {June},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://avirubin.com/crowds.pdf},
www_ps_gz_url = {http://avirubin.com/crowds.ps.gz},
www_section = {Anonymous communication},
}
|
cryptoeprint:2005:394@misc{cryptoeprint:2005:394,
title = {Obfuscated Ciphertext Mixing},
author = {Ben Adida and Douglas Wikstr\"om},
year = {2005},
month = {November},
howpublished = {Cryptology ePrint Archive, Report 2005/394},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://eprint.iacr.org/2005/394.pdf},
www_html_url = {http://eprint.iacr.org/2005/394},
}
|
cryptoeprint:2014:1011@misc{cryptoeprint:2014:1011,
title = {Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay},
author = {Alex Biryukov and Ivan Pustogarov},
year = {2014},
howpublished = {Cryptology ePrint Archive, Report 2014/1011},
www_section = {Economics},
www_pdf_url = {https://eprint.iacr.org/2014/1011.pdf},
}
|
cryptoeprint:2017:1000@misc{cryptoeprint:2017:1000,
title = {No right to remain silent: Isolating Malicious Mixes},
author = {Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg},
year = {2017},
month = {October},
howpublished = {Cryptology ePrint Archive, Report 2017/1000},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://eprint.iacr.org/2017/1000.pdf},
www_html_url = {http://eprint.iacr.org/2017/1000},
}
|
cset11-experimentor@inproceedings{cset11-experimentor,
title = {ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation},
author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald},
booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and
Test (CSET 2011)},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
cset12-modeling@inproceedings{cset12-modeling,
title = {Methodically Modeling the Tor Network},
author = {Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine},
booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and
Test (CSET 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/tormodel-cset2012.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
cview:pet2006@inproceedings{cview:pet2006,
title = {Linking Anonymous Transactions: The Consistent View Attack},
author = {Andreas Pashalidis and Bernd Meyer},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {384--392},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_22.pdf},
www_section = {Traffic analysis},
}
|
danezis-pet2007@inproceedings{danezis-pet2007,
title = {Two-Sided Statistical Disclosure Attack},
author = {George Danezis and Claudia Diaz and Carmela Troncoso},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf},
www_remarks = {Extends the Statistical Disclosure attack to take advantage of reply
messages.},
www_section = {Traffic analysis},
}
|
danezis-pet2008@inproceedings{danezis-pet2008,
title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
author = {George Danezis and Paul Syverson},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {133--150},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_important = {1},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/bridge.pdf},
www_section = {Traffic analysis},
}
|
danezis2006rfa@article{danezis2006rfa,
title = {{Route Fingerprinting in Anonymous Communications}},
author = {George Danezis and Richard Clayton},
journal = {Proceedings of the Sixth IEEE International Conference on Peer-to-Peer
Computing},
year = {2006},
pages = {69--72},
publisher = {IEEE Computer Society Washington, DC, USA},
www_section = {mixattacks},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf},
}
|
danezis:pet2003@inproceedings{danezis:pet2003,
title = {Mix-networks with Restricted Routes},
author = {George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {1--17},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf},
}
|
danezis:pet2004@inproceedings{danezis:pet2004,
title = {The Traffic Analysis of Continuous-Time Mixes},
author = {George Danezis},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {35--50},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
}
|
danezis:weis2006@inproceedings{danezis:weis2006,
title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous
Communications},
author = {George Danezis and Bettina Wittneben},
booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
(WEIS 2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
editor = {Ross Anderson},
www_section = {Traffic analysis},
www_important = {1},
bookurl = {http://weis2006.econinfosec.org/},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-788.pdf},
www_tags = {selected},
}
|
danezis:wpes2003@inproceedings{danezis:wpes2003,
title = {Heartbeat Traffic to Counter (n-1) Attacks},
author = {George Danezis and Len Sassaman},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf},
www_remarks = {Mix nodes should send out "heartbeat" messages (dummies that start and end
at that node). By measuring how many return in a given time, they can detect
whether the adversary is dropping or delaying traffic coming into them (possibly
so he can launch an active blending attack).},
www_section = {Anonymous communication},
}
|
danezis:wpes2004@inproceedings{danezis:wpes2004,
title = {Minx: A simple and efficient anonymous packet format},
author = {George Danezis and Ben Laurie},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/minx.pdf},
www_section = {Anonymous communication},
}
|
danner-et-al:tissec12@article{danner-et-al:tissec12,
title = {Effectiveness and detection of denial of service attacks in {Tor}},
author = {Norman Danner and Sam DeFabbia-Kane and Danny Krizanc and Marc Liberatore},
journal = {Transactions on Information and System Security},
volume = {15},
number = {3},
year = {2012},
pages = {11:1--11:25},
doi = {10.1145/2382448.2382449},
www_tags = {selected},
www_pdf_url = {http://arxiv.org/pdf/1110.5395v3.pdf},
keywords = {anonymity},
www_section = {Anonymous communication},
}
|
dataplane-pets2016@article{dataplane-pets2016,
title = {Data-plane Defenses against Routing Attacks on Tor},
author = {Da Henry Tan and Micah Sherr and Wenchao Zhou},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Data-plane_Defenses_against_Routing_Attacks_on_Tor.pdf},
www_section = {Traffic analysis},
}
|
decoy-ccs2017@inproceedings{decoy-ccs2017,
title = {The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing
Attacks},
author = {Milad Nasr and Hadi Zolfaghari and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/CCS17-Waterfall.pdf},
www_section = {Communications Censorship},
}
|
decoys-ccs2016@inproceedings{decoys-ccs2016,
title = {GAME OF DECOYS: Optimal Decoy Routing Through Game Theory},
author = {Milad Nasr and Amir Houmansadr},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf},
www_section = {Communications Censorship},
}
|
delay-foci16@inproceedings{delay-foci16,
title = {Censors' Delay in Blocking Circumvention Proxies},
author = {David Fifield and Lynn Tsai},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2016},
month = {August},
location = {Austin, TX, USA},
series = {FOCI '16},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf},
www_section = {Communications Censorship},
}
|
delmer-mthesis@mastersthesis{delmer-mthesis,
title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes,
Freenet et i2p},
author = {Laurie Delmer},
school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques
et sociales},
year = {2009},
note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P.
School: Catholic University of Leuven - Department of Political and Social
Science},
www_section = {Anonymous communication},
}
|
demuth:pet2002@inproceedings{demuth:pet2002,
title = {A Passive Attack on the Privacy of Web Users Using Standard Log Information},
author = {Thomas Demuth},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://demuth.biz/veroeffentlichungen/pet02.pdf},
www_section = {Anonymous communication},
}
|
denasa-pets2016@article{denasa-pets2016,
title = {DeNASA: Destination-Naive AS-Awareness in Anonymous Communications},
author = {Armon Barton and Matthew Wright},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/DeNASA__Destination-Naive_AS-Awareness_in_Anonymous_Communications.pdf},
www_section = {Anonymous communication},
}
|
deng2006mar@article{deng2006mar,
title = {{Measuring anonymity with relative entropy}},
author = {Y. Deng and J. Pang and P. Wu},
journal = {Proc. of FAST},
year = {2006},
www_section = {Formal methods},
}
|
desmedt@inproceedings{desmedt,
title = {How To Break a Practical {MIX} and Design a New One},
author = {Yvo Desmedt and Kaoru Kurosawa},
booktitle = {Proceedings of {EUROCRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1803},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/447709.html},
www_section = {Provable shuffles},
}
|
diaz-esorics2008@inproceedings{diaz-esorics2008,
title = {A Framework for the Analysis of Mix-Based Steganographic File Systems},
author = {Claudia Diaz and Carmela Troncoso and Bart Preneel},
booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security
(ESORICS 2008)},
volume = {LNCS (in print)},
number = {},
year = {2008},
month = {October},
location = {Malaga,ES},
editor = {Sushil Jajodia and J. Lopez},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf},
www_section = {Misc},
}
|
diaz-pet2008@inproceedings{diaz-pet2008,
title = {On the Impact of Social Network Profiling on Anonymity},
author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {44--62},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf},
www_section = {Traffic analysis},
}
|
diaz-wpes2007@inproceedings{diaz-wpes2007,
title = {Does additional information always reduce anonymity?},
author = {Claudia Diaz and Carmela Troncoso and George Danezis},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society 2007},
volume = {},
number = {},
year = {2007},
month = {October},
location = {Alexandria,VA,USA},
pages = {72--75},
editor = {Ting Yu},
publisher = {ACM},
series = {},
www_tags = {selected},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-925.pdf},
www_section = {Traffic analysis},
}
|
diaz:pet2003@inproceedings{diaz:pet2003,
title = {Generalising Mixes},
author = {Claudia Diaz and Andrei Serjantov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {18--31},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz},
}
|
differential-ndss2016@inproceedings{differential-ndss2016,
title = {Do You See What I See? Differential Treatment of Anonymous Users},
author = {Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and
Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf},
www_section = {Communications Censorship},
}
|
disad-free-routes@inproceedings{disad-free-routes,
title = {The disadvantages of free {MIX} routes and how to overcome them},
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {30--45},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf},
}
|
disco@inproceedings{disco,
title = {The dining cryptographers in the disco: Unconditional Sender and Recipient
Untraceability},
author = {Michael Waidner and Birgit Pfitzmann},
booktitle = {Proceedings of {EUROCRYPT} 1989},
year = {1990},
publisher = {Springer-Verlag, LNCS 434},
www_tags = {selected},
www_ps_gz_url = {http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz},
www_section = {Anonymous communication},
}
|
dissecting-ndss2017@inproceedings{dissecting-ndss2017,
title = {Dissecting Tor Bridges: a Security Evaluation of their Private and Public
Infrastructures},
author = {Srdjan Matic and Carmela Troncoso and Juan Caballero},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-1_Matic_paper.pdf},
www_section = {Traffic analysis},
}
|
dnstor-ndss2017@inproceedings{dnstor-ndss2017,
title = {The Effect of DNS on Tor's Anonymity},
author = {Benjamin Greschbach and Tobias Pulls and Laura M. Roberts and Philipp Winter
and Nick Feamster},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-2_Greschbach_paper.pdf},
www_section = {Traffic analysis},
}
|
dp5-pets2015@article{dp5-pets2015,
title = {DP5: A Private Presence Service},
author = {Nikita Borisov and George Danezis and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2015/papers/14_Borisov.pdf},
www_section = {Anonymous communication},
}
|
drac-pet2010@inproceedings{drac-pet2010,
title = {Drac: An Architecture for Anonymous Low-Volume Communications},
author = {George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf},
www_section = {Anonymous communication},
}
|
dsn-09-jing@inproceedings{dsn-09-jing,
title = {On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing
Attacks},
author = {Jing Jin and Xinyuan Wang},
booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on
Dependable Systems and Networks},
year = {2009},
month = {July},
address = {Lisbon},
pages = {429--438},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf},
}
|
durresi2006tac@article{durresi2006tac,
title = {{Tokens for Anonymous Communications in the Internet}},
author = {A. Durresi and V. Paruchuri and L. Barolli and R. Jain and M. Takizawa},
journal = {Proceedings of the 17th International Conference on Database and Expert
Systems Applications},
year = {2006},
pages = {83--90},
publisher = {IEEE Computer Society Washington, DC, USA},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf},
}
|
e2e-traffic@inproceedings{e2e-traffic,
title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
author = {Nick Mathewson and Roger Dingledine},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {17--34},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
}
|
ebe2003@article{ebe2003,
title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer
Networks}},
author = {Christian Grothoff},
journal = {Wirtschaftsinformatik},
year = {2003},
month = {June},
publisher = {Springer-Verlag},
www_tags = {selected},
www_ps_url = {http://www.ovmj.org/GNUnet/download/ebe.ps},
www_section = {Economics},
}
|
econymics@inproceedings{econymics,
title = {{On the Economics of Anonymity}},
author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC '03)},
year = {2003},
month = {January},
editor = {Rebecca N. Wright},
publisher = {Springer-Verlag, LNCS 2742},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/fc03/econymics.pdf},
www_section = {Economics},
}
|
edman2009survey@article{edman2009survey,
title = {On anonymity in an electronic society: A survey of anonymous communication
systems},
author = {Matthew Edman and B\"{u}lent Yener},
journal = {ACM Computing Surveys},
volume = {42},
number = {1},
year = {2009},
address = {New York, NY, USA},
pages = {1--35},
publisher = {ACM},
www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf},
issn = {0360-0300},
www_tags = {selected},
www_section = {Misc},
doi = {http://doi.acm.org/10.1145/1592451.1592456},
}
|
egger2013:practical-attacks@inproceedings{egger2013:practical-attacks,
title = {Practical Attacks Against the I2P Network},
author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni
Vigna},
booktitle = {Proceedings of the 16th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID 2013)},
year = {2013},
month = {October},
www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf},
www_section = {Traffic analysis},
}
|
ehlert2011:usability-comparison-i2p-tor@misc{ehlert2011:usability-comparison-i2p-tor,
title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison},
author = {Mathias Ehlert},
institution = {Humboldt University of Berlin},
year = {2011},
month = {November},
howpublished = {Seminar},
www_section = {Anonymous communication},
www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf},
}
|
eigenspeed@inproceedings{eigenspeed,
title = {EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation},
author = {Robin Snader and Nikita Borisov},
booktitle = {Proceedings of the 8th {I}nternational {W}orkshop on {P}eer-to-{P}eer
{S}ystems ({IPTPS09})},
year = {2009},
month = {April},
location = {Boston, MA},
www_tags = {selected},
www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf},
www_section = {Anonymous communication},
}
|
entropist@inproceedings{entropist,
title = {Why {I'm} not an Entropist},
author = {Paul Syverson},
booktitle = {Proceedings of Security Protocols XVII: 17th International Workshop, April
2009, Revised Selected Papers},
year = {2013},
pages = {231--239},
editor = {Bruce Christianson and James A. Malcolm and Vashek Maty\'{a}\v{s} and Michael
Roe},
publisher = {Springer-Verlag, LNCS 7028},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.syverson.org/entropist-final.pdf},
}
|
erway:wpes2007@inproceedings{erway:wpes2007,
title = {Making P2P Accountable without Losing Privacy},
author = {Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna
Lysyanskaya and Mira Meyerovich and Eric Rachlin},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2007)}},
year = {2007},
month = {October},
location = {Washington, DC, USA},
www_pdf_url = {http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf},
www_section = {Economics},
}
|
esorics04-mauw@inproceedings{esorics04-mauw,
title = {A formalization of anonymity and onion routing},
author = {S. Mauw and J. Verschuren and E.P. de Vink},
booktitle = {Proceedings of ESORICS 2004},
year = {2004},
location = {Sophia Antipolis},
pages = {109--124},
editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
publisher = {LNCS 3193},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
}
|
esorics05-Klonowski@inproceedings{esorics05-Klonowski,
title = {Local View Attack on Anonymous Communication},
author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of ESORICS 2005},
year = {2005},
month = {September},
www_tags = {selected},
www_ps_url = {http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps},
www_section = {Traffic analysis},
}
|
esorics10-bandwidth@inproceedings{esorics10-bandwidth,
title = {Traffic Analysis Against Low-Latency Anonymity Networks Using Available
Bandwidth Estimation},
author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'10},
year = {2010},
month = {September},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf},
www_section = {Traffic analysis},
}
|
esorics12-torscan@inproceedings{esorics12-torscan,
title = {{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks},
author = {Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann},
booktitle = {Proceedings of the European Symposium Research Computer Security -
{ESORICS}'12},
year = {2012},
month = {September},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf},
www_section = {Traffic analysis},
}
|
esorics13-cellflood@inproceedings{esorics13-cellflood,
title = {{CellFlood}: Attacking {T}or Onion Routers on the Cheap},
author = {Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos
Keromytis},
booktitle = {Proceedings of ESORICS 2013},
year = {2013},
month = {September},
www_tags = {selected},
www_pdf_url = {http://www.cs.columbia.edu/~vpk/papers/cellflood.esorics13.pdf},
www_section = {Traffic analysis},
}
|
esorics13-infra@inproceedings{esorics13-infra,
title = {Plug-and-Play {IP} Security: Anonymity Infrastructure Instead of {PKI}},
author = {Yossi Gilad and Amir Herzberg},
booktitle = {Proceedings of ESORICS 2013},
year = {2013},
month = {September},
www_tags = {selected},
www_pdf_url = {http://eprint.iacr.org/2013/410.pdf},
www_section = {Anonymous communication},
}
|
exit-blocking2017@inproceedings{exit-blocking2017,
title = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael
Carl Tschantz and Phillipa Gill and Vern Paxson},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-singh.pdf},
www_section = {Anonymous communication},
}
|
facade-foci@inproceedings{facade-foci,
title = {Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search},
author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover
and Sathya Gunasekaran and Karim Habak},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf},
www_section = {Communications Censorship},
}
|
fairbrother:pet2004@inproceedings{fairbrother:pet2004,
title = {An Improved Construction for Universal Re-encryption},
author = {Peter Fairbrother},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {79--87},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.m-o-o-t.org/ICUR.pdf},
}
|
fan2009efficient@inproceedings{fan2009efficient,
title = {An efficient privacy-preserving scheme against traffic analysis attacks in
network coding},
author = {Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Shen, Xuemin},
booktitle = {Proceedings of the 28th Annual IEEE Conference on Computer Communications
(INFOCOM 2009)},
organization = {IEEE},
year = {2009},
pages = {2213--2221},
www_section = {Misc},
www_pdf_url = {http://adhoc-security.googlecode.com/svn/trunk/Research/Research%20Papers/Network%20Coding/An%20Efficient%20Privacy%20Traffic%20Analysis%20Attacks%20in%20Network%20Coding.pdf},
}
|
fan2011network@article{fan2011network,
title = {Network coding based privacy preservation against traffic analysis in multi-hop
wireless networks},
author = {Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Chen, Jiming and Shen,
Xuemin},
journal = {IEEE Transactions on Wireless Communications},
volume = {10},
number = {3},
year = {2011},
pages = {834--843},
publisher = {IEEE},
www_pdf_url = {http://bbcr.uwaterloo.ca/papers/FJZCS11.pdf},
www_section = {Misc},
}
|
faust-pet2007@inproceedings{faust-pet2007,
title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment
Broker},
author = {Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and
Bart Preneel},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf},
www_section = {Anonymous communication},
}
|
feamster:pet2003@inproceedings{feamster:pet2003,
title = {{Thwarting Web Censorship with Untrusted Messenger Delivery}},
author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan
and David Karger},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {125--140},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Communications Censorship},
www_pdf_url = {http://nms.lcs.mit.edu/papers/disc-pet2003.pdf},
}
|
feamster:wpes2004@inproceedings{feamster:wpes2004,
title = {Location Diversity in Anonymity Networks},
author = {Nick Feamster and Roger Dingledine},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_ps_url = {http://freehaven.net/doc/routing-zones/routing-zones.ps},
www_section = {Anonymous communication},
}
|
feigenbaum:wpes2007@inproceedings{feigenbaum:wpes2007,
title = {A Probabilistic Analysis of Onion Routing in a Black-box Model},
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2007)}},
year = {2007},
month = {October},
location = {Washington, DC, USA},
www_pdf_url = {http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf},
www_section = {Provable shuffles},
}
|
fifield2015fronting@article{fifield2015fronting,
title = {Blocking-resistant communication through domain fronting},
author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
pages = {46--64},
www_tags = {selected},
www_html_url = {https://www.bamsoftware.com/papers/fronting/},
www_pdf_url = {https://www.bamsoftware.com/papers/fronting.pdf},
www_section = {Communications Censorship},
}
|
fingerprinting-esorics2016@inproceedings{fingerprinting-esorics2016,
title = {Toward an Efficient Website Fingerprinting Defense},
author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia Diaz and Matthew
Wright},
booktitle = {Proceedings of ESORICS 2016},
year = {2016},
month = {September},
www_tags = {selected},
www_pdf_url = {https://scholar.google.com/scholar_url?url=https://arxiv.org/pdf/1512.00524&hl=en&sa=X&scisig=AAGBfm1kNELdLrW6MsDhMt-OpXiNjUrQsw&nossl=1&oi=scholarr},
www_section = {Traffic analysis},
}
|
fingerprinting-ndss2016@inproceedings{fingerprinting-ndss2016,
title = {Website Fingerprinting at Internet Scale},
author = {Andriy Panchenko and Fabian Lanze and Jan Pennekamp and Thomas Engel and
Andreas Zinnen and Martin Henze and Klaus Wehrle},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '16},
year = {2016},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/blogs-media/website-fingerprinting-internet-scale.pdf},
www_section = {Traffic analysis},
}
|
fingerprinting-wpes17@inproceedings{fingerprinting-wpes17,
title = {Analysis of Fingerprinting Techniques for Tor Hidden Services},
author = {Andriy Panchenko and Asya Mitseva and Martin Henze and Fabian Lanze and Klaus
Wehrle and Thomas Engel},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2017)}},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://lorre.uni.lu/~andriy/papers/acmccs-wpes17-hidden-services-fp.pdf},
www_section = {Anonymous communication},
}
|
fiveyearslater@inproceedings{fiveyearslater,
title = {{Privacy-enhancing technologies for the Internet, II: Five years later}},
author = {Ian Goldberg},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/petfive.pdf},
www_ps_url = {http://freehaven.net/anonbib/papers/petfive.ps},
www_section = {Misc},
}
|
flash-mix@inproceedings{flash-mix,
title = {Flash {M}ixing},
author = {Markus Jakobsson},
booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99},
year = {1999},
publisher = {ACM Press},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf},
www_section = {Provable shuffles},
}
|
flashproxy-pets12@inproceedings{flashproxy-pets12,
title = {Evading Censorship with Browser-Based Proxies},
author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and
Roger Dingledine and Phil Porras and Dan Boneh},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {https://crypto.stanford.edu/flashproxy/flashproxy.pdf},
www_section = {Communications Censorship},
}
|
flow-correlation04@inproceedings{flow-correlation04,
title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {207--225},
series = {LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
}
|
foci11-clouds@inproceedings{foci11-clouds,
title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing},
author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2011)},
year = {2011},
month = {August},
www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf},
www_section = {Anonymous communication},
}
|
foci11-decoy@inproceedings{foci11-decoy,
title = {Decoy Routing: Toward Unblockable Internet Communication},
author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and
Greg Lauer and David P. Mankins and W. Timothy Strayer},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2011)},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf},
www_section = {Communications Censorship},
}
|
foci12-defiance@inproceedings{foci12-defiance,
title = {Bootstrapping Communications into an Anti-Censorship System},
author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and
Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and
Dan Boneh},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf},
www_section = {Communications Censorship},
}
|
foci12-winter@inproceedings{foci12-winter,
title = {{How the Great Firewall of China is blocking Tor}},
author = {Philipp Winter and Stefan Lindskog},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (FOCI 2012)},
year = {2012},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf},
www_section = {Communications Censorship},
}
|
fof:iptps07@inproceedings{fof:iptps07,
title = {Efficient Private Techniques for Verifying Social Proximity},
author = {Michael J. Freedman and Antonio Nicolosi},
booktitle = {Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer
{S}ystems ({IPTPS07})},
year = {2007},
month = {February},
location = {Bellevue, WA},
www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf},
www_section = {Misc},
}
|
fontmetrics-fc14@inproceedings{fontmetrics-fc14,
title = {Fingerprinting web users through font metrics},
author = {David Fifield and Serge Egelman},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'15)},
year = {2015},
month = {February},
www_pdf_url = {http://fc15.ifca.ai/preproceedings/paper_83.pdf},
www_section = {Traffic analysis},
}
|
franz-pet2007@inproceedings{franz-pet2007,
title = {Attacking Unlinkability: The Importance of Context},
author = {Matthias Franz and Bernd Meyer and Andreas Pashalidis},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf},
www_section = {Formal methods},
}
|
freedom2-arch@techreport{freedom2-arch,
title = {Freedom Systems 2.0 Architecture},
author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
institution = {Zero Knowledge Systems, {Inc.}},
year = {2000},
month = {December},
type = {White Paper},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf},
day = {18},
}
|
freedom21-security@techreport{freedom21-security,
title = {Freedom Systems 2.1 Security Issues and Analysis},
author = {Adam Back and Ian Goldberg and Adam Shostack},
institution = {Zero Knowledge Systems, {Inc.}},
year = {2001},
month = {May},
type = {White Paper},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf},
day = {3},
}
|
freehaven-berk@inproceedings{freehaven-berk,
title = {The Free Haven Project: Distributed Anonymous Storage Service},
author = {Roger Dingledine and Michael J. Freedman and David Molnar},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_ps_url = {http://freehaven.net/doc/berk/freehaven-berk.ps},
www_section = {Anonymous publication},
}
|
freenet@inproceedings{freenet,
title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval System},
author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
volume = {2009},
year = {2000},
month = {July},
pages = {46--66},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
series = {Lecture Notes in Computer Science},
doi = {10.1007/3-540-44702-4_4},
isbn = {978-3-540-41724-8},
url = {http://dx.doi.org/10.1007/3-540-44702-4_4},
www_section = {Anonymous publication},
www_tags = {selected},
www_pdf_url = {http://www.facweb.iitkgp.ernet.in/~niloy/COURSE/Autumn2010/UC/Resource/freenet1-big.pdf},
}
|
fte-usenix14@inproceedings{fte-usenix14,
title = {LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption
Schemes},
author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and
Thomas Shrimpton},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://kpdyer.com/publications/usenix2014-fte.pdf},
www_section = {Communications Censorship},
}
|
fu-active@inproceedings{fu-active,
title = {Active Traffic Analysis Attacks and Countermeasures},
author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the 2003 International Conference on Computer Networks and
Mobile Computing},
year = {2003},
pages = {31--39},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf},
}
|
fu-analytical@inproceedings{fu-analytical,
title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis
Attacks},
author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
booktitle = {Proceedings of the 2003 International Conference on Parallel Processing},
year = {2003},
pages = {483--492},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf},
}
|
garmandecentralized@inproceedings{garmandecentralized,
title = {Decentralized Anonymous Credentials},
author = {Christina Garman and Matthew Green and Ian Miers},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/07_3_1.pdf},
www_section = {E-Cash / Anonymous Credentials},
}
|
george-thesis@phdthesis{george-thesis,
title = {Better Anonymous Communications},
author = {George Danezis},
school = {University of Cambridge},
year = {2004},
month = {July},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
}
|
gfw-foci14@inproceedings{gfw-foci14,
title = {Towards a Comprehensive Picture of the Great Firewall's {DNS} Censorship},
author = {Anonymous},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
www_section = {Communications Censorship},
}
|
gnunetencoding@inproceedings{gnunetencoding,
title = {{Efficient Sharing of Encrypted Data}},
author = {Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu},
booktitle = {{Proceedings of ASCIP 2002}},
year = {2002},
month = {July},
pages = {107--120},
publisher = {Springer-Verlag},
www_tags = {selected},
www_ps_url = {http://www.ovmj.org/GNUnet/download/esed.ps},
www_section = {Anonymous publication},
}
|
goldberg-2007@inproceedings{goldberg-2007,
title = {{Improving the Robustness of Private Information Retrieval}},
author = {Ian Goldberg},
booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy},
year = {2007},
month = {May},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf},
www_section = {Private Information Retrieval},
}
|
goldberg97privacyenhancing@inproceedings{goldberg97privacyenhancing,
title = {Privacy-enhancing Technologies for the Internet},
author = {Ian Goldberg and David Wagner and Eric Brewer},
booktitle = {Proceedings of the 42nd IEEE Spring COMPCON},
year = {1997},
month = {February},
publisher = {IEEE Computer Society Press},
isbn = {0-8186-7804-6},
www_tags = {selected},
www_ps_url = {http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps},
www_section = {Misc},
}
|
golle:ccs2004@inproceedings{golle:ccs2004,
title = {Parallel Mixing},
author = {Philippe Golle and Ari Juels},
booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications
Security (CCS 2004)}},
year = {2004},
month = {October},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/parallel.pdf},
www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/parallel.ps},
www_section = {Anonymous communication},
}
|
golle:eurocrypt2004@inproceedings{golle:eurocrypt2004,
title = {Dining Cryptographers Revisited},
author = {Philippe Golle and Ari Juels},
booktitle = {Proceedings of Eurocrypt 2004},
year = {2004},
month = {May},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/nim.pdf},
www_section = {Anonymous communication},
}
|
golle:pet2004@inproceedings{golle:pet2004,
title = {Reputable Mix Networks},
author = {Philippe Golle},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {51--63},
series = {LNCS},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/reputable.pdf},
}
|
gosain2017devil@inproceedings{gosain2017devil,
title = {The Devil's in The Details: Placing Decoy Routers in the Internet},
author = {Gosain, Devashish and Agarwal, Anshika and Chakravarty, Sambuddho and Acharya,
HB},
booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference},
organization = {ACM},
year = {2017},
pages = {577--589},
www_section = {Traffic analysis},
www_pdf_url = {https://arxiv.org/pdf/1710.05527.pdf},
}
|
gosain2017mending@inproceedings{gosain2017mending,
title = {Mending wall: On the implementation of censorship in india},
author = {Gosain, Devashish and Agarwal, Anshika and Shekhawat, Sahil and Acharya, HB and
Chakravarty, Sambuddho},
booktitle = {Proceedings of the International Conference on Security and Privacy in
Communication Systems},
organization = {Springer},
year = {2017},
pages = {418--437},
www_section = {Communications Censorship},
www_pdf_url = {https://arxiv.org/pdf/1806.06518.pdf},
}
|
guardsets-pets2015@article{guardsets-pets2015,
title = {Guard Sets for Onion Routing},
author = {Jamie Hayes and George Danezis},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
pages = {65--80},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2015/papers/05_Hayes.pdf},
www_section = {Anonymous communication},
}
|
guha-pet2007@inproceedings{guha-pet2007,
title = {Identity Trail: Covert Surveillance Using DNS},
author = {Saikat Guha and Paul Francis},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf},
www_section = {Traffic analysis},
}
|
gulyas-thesis@phdthesis{gulyas-thesis,
title = {Protecting Privacy Against Structural De-anonymization Attacks in Social
Networks},
author = {G{\'a}bor Gy{\"o}rgy Guly{\'a}s},
school = {CrySyS Lab, Budapest University of Technology and Economics},
year = {2015},
month = {May},
www_section = {Misc},
www_pdf_url = {http://www.omikk.bme.hu/collections/phd/Villamosmernoki_es_Informatikai_Kar/2015/Gulyas_Gabor_Gyorgy/ertekezes.pdf},
}
|
gup@inproceedings{gup,
title = {Authentic Attributes with Fine-Grained Anonymity Protection},
author = {Stuart Stubblebine and Paul Syverson},
booktitle = {Proceedings of Financial Cryptography (FC 2000)},
year = {2001},
pages = {276--294},
editor = {Yair Frankel},
publisher = {Springer-Verlag, LNCS 1962},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps},
}
|
gupta16scalable@inproceedings{gupta16scalable,
title = {Scalable and Private Media Consumption with Popcorn},
author = {Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and
Lorenzo Alvisi and Michael Walfish},
booktitle = {Proceedings of the 13th USENIX Symposium on Networked Systems Design and
Implementation (NSDI 16)},
year = {2016},
month = {March},
address = {Santa Clara, CA},
pages = {91--107},
www_section = {Private Information Retrieval},
www_pdf_url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-gupta-trinabh-update.pdf},
}
|
gupta2006uns@article{gupta2006uns,
title = {{Utilizing node's selfishness for providing complete anonymity in peer-to-peer
based grids}},
author = {R. Gupta and S. Ray and A.K. Somani and Z. Zhang},
journal = {Multiagent and Grid Systems},
volume = {2},
number = {1},
year = {2006},
pages = {11--27},
publisher = {IOS Press},
www_pdf_url = {http://www.public.iastate.edu/~rsouvik/Article531.pdf},
www_section = {Economics},
}
|
halpern-oneill-2003@article{halpern-oneill-2003,
title = {Anonymity and Information Hiding in Multiagent Systems},
author = {Joseph Y. Halpern and Kevin R. O'Neill},
journal = {Journal of Computer Security},
volume = {},
number = {},
year = {2004},
www_tags = {selected},
www_pdf_url = {http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf},
www_section = {Formal methods},
}
|
herbivore:tr@techreport{herbivore:tr,
title = {{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}},
author = {Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer},
institution = {Cornell University},
number = {2003-1890},
year = {2003},
month = {February},
address = {Ithaca, NY},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf},
}
|
herd-sigcomm2015@inproceedings{herd-sigcomm2015,
title = {Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP
Systems},
author = {Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and
Nicholas Merritt},
booktitle = {Proceedings of the ACM SIGCOMM 2015 Conference},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p639.pdf},
www_section = {Anonymous communication},
}
|
hermann2011-mthesis@mastersthesis{hermann2011-mthesis,
title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A
Real-World Case Study using I2P},
author = {Michael Hermann},
school = {TU-Munich},
year = {2011},
month = {March},
www_section = {Traffic analysis},
}
|
hevia-pet2008@inproceedings{hevia-pet2008,
title = {An Indistinguishability-Based Characterization of Anonymous Channels},
author = {Alejandro Hevia and Daniele Micciancio},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {24--43},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
bookurl = {http://petsymposium.org/2008/},
www_section = {Misc},
}
|
heydt-benjamin:pet2006@inproceedings{heydt-benjamin:pet2006,
title = {Privacy for Public Transportation},
author = {Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {1--19},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf},
www_section = {E-Cash / Anonymous Credentials},
}
|
hintz02@inproceedings{hintz02,
title = {Fingerprinting Websites Using Traffic Analysis},
author = {Andrew Hintz},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_html_url = {http://guh.nu/projects/ta/safeweb/safeweb.html},
www_pdf_url = {http://guh.nu/projects/ta/safeweb/safeweb.pdf},
www_ps_url = {http://guh.nu/projects/ta/safeweb/safeweb.ps},
www_section = {Traffic analysis},
}
|
hirt2004thesis@mastersthesis{hirt2004thesis,
title = {A Practical Buses Protocol for Anonymous Network Communication},
author = {Andreas Hirt},
school = {The University of Calgary},
year = {2004},
month = {June},
doi = {10.1.1.90.4163},
www_abstract_url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.4163},
www_section = {comm},
www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.4163&rep=rep1&type=pdf},
}
|
hirt2005practical@inproceedings{hirt2005practical,
title = {A Practical Buses Protocol for Anonymous Internet Communication},
author = {Hirt, Andreas and Jacobson Jr, Michael J and Williamson, Carey L},
booktitle = {Proceedings of the Third Annual Conference on Privacy, Security and Trust
(PST)},
year = {2005},
www_pdf_url = {http://pages.cpsc.ucalgary.ca/~carey/papers/2005/pst2005.pdf},
www_section = {comm},
}
|
hirt2008taxis@inproceedings{hirt2008taxis,
title = {Taxis: scalable strong anonymous communication},
author = {Hirt, Andreas and Jacobson, M and Williamson, Carey},
booktitle = {Proceedings of the IEEE International Symposium on Modeling, Analysis and
Simulation of Computers and Telecommunication Systems, 2008. (MASCOTS)},
organization = {IEEE},
year = {2008},
pages = {1--10},
www_section = {comm},
www_pdf_url = {http://pages.cpsc.ucalgary.ca/~carey/papers/2008/mascots08-paper113.pdf},
}
|
histore-ndss2017@inproceedings{histore-ndss2017,
title = {HisTor{\varepsilon}: Differentially Private and Robust Statistics Collection for
Tor},
author = {Akshaya Mani and Micah Sherr},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://www.internetsociety.org/sites/default/files/ndss2017_06B-4_Mani_paper.pdf},
www_section = {Traffic analysis},
}
|
hitting-set04@inproceedings{hitting-set04,
title = {The Hitting Set Attack on Anonymity Protocols},
author = {Dogan Kesdogan and Lexi Pimenidis},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf},
www_section = {Traffic analysis},
}
|
hornet-ccs2015@inproceedings{hornet-ccs2015,
title = {{HORNET}: High-speed Onion Routing at the Network Layer},
author = {Chen Chen and Daniele E. Asoni and David Barrera and George Danezis and Adrian
Perrig},
booktitle = {Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS '15)},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {http://www.scion-architecture.net/pdf/2015-HORNET.pdf},
www_section = {Anonymous communication},
}
|
houmansadrnodirection@inproceedings{houmansadrnodirection,
title = {No Direction Home: The True Cost of Routing Around Decoys},
author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/01_2_1.pdf},
www_section = {Communications Censorship},
}
|
hs-attack06@inproceedings{hs-attack06,
title = {Locating Hidden Servers},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
year = {2006},
month = {May},
publisher = {IEEE CS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
www_remarks = {Motivates and describes Tor's entry guard design.},
www_section = {Traffic analysis},
}
|
huang2006sce@article{huang2006sce,
title = {{Silent cascade: Enhancing location privacy without communication qos
degradation}},
author = {L. Huang and K. Matsuura and H. Yamane and K. Sezaki},
journal = {Proc. of Security in Pervasive Computing (SPC)},
year = {2006},
pages = {165--180},
www_section = {Misc},
}
|
huber2010tor@inproceedings{huber2010tor,
title = {{Tor HTTP Usage and Information Leakage}},
author = {Markus Huber and Martin Mulazzani and Edgar Weippl},
booktitle = {Proceedings of the 11th IFIP TC 6/TC 11 International Conference on
Communications and Multimedia Security (CMS 2010)},
volume = {6109},
year = {2010},
month = {May},
location = {Linz, Austria},
pages = {245--255},
publisher = {Springer},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf},
}
|
huhta-thesis@phdthesis{huhta-thesis,
title = {Linking Tor Circuits},
author = {Otto Huhta},
booktitle = {},
year = {2014},
month = {September},
www_pdf_url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/students/Huhta14-UCL-Msc.pdf},
www_section = {Traffic analysis},
}
|
hybrid-mix@inproceedings{hybrid-mix,
title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
author = {Miyako Ohkubo and Masayuki Abe},
booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
ian-thesis@phdthesis{ian-thesis,
title = {A Pseudonymous Communications Infrastructure for the Internet},
author = {Ian Goldberg},
school = {UC Berkeley},
year = {2000},
month = {December},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf},
}
|
icdcs2006:m2@inproceedings{icdcs2006:m2,
title = {M2: Multicasting Mixes for Efficient and Anonymous Communication},
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems},
year = {2006},
month = {July},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf},
day = {4--7},
}
|
idemix@inproceedings{idemix,
title = {Design and implementation of the idemix anonymous credential system},
author = {Jan Camenisch and Els Van Herreweghen},
booktitle = {Proceedings of the 9th ACM conference on Computer and communications
security (CCS 2002)},
year = {2002},
address = {New York, NY, USA},
location = {Washington, DC, USA},
pages = {21--30},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/586110.586114},
isbn = {1-58113-612-9},
www_section = {E-Cash / Anonymous Credentials},
www_pdf_url = {http://www.zurich.ibm.com/~jca/papers/camvan02.pdf},
}
|
ih05-Klonowski@inproceedings{ih05-Klonowski,
title = {Provable Anonymity for Networks of Mixes},
author = {Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {26--38},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
}
|
ih05-Luke@inproceedings{ih05-Luke,
title = {On Blending Attacks For Mixes with Memory},
author = {Luke O'Connor},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {39--52},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://lukejamesoconnor.googlepages.com/blending-attacks.pdf},
}
|
ih05-csispir@inproceedings{ih05-csispir,
title = {Censorship Resistance Revisited},
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {62--76},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://gnunet.org/papers/IHW-CR.pdf},
}
|
ih05-danezisclulow@inproceedings{ih05-danezisclulow,
title = {Compulsion Resistant Anonymous Communications},
author = {George Danezis and Jolyon Clulow},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {11--25},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf},
}
|
improved-clockskew@inproceedings{improved-clockskew,
title = {An Improved Clock-skew Measurement Technique for Revealing Hidden Services},
author = {Sebastian Zander and Steven J. Murdoch},
booktitle = {Proceedings of the 17th USENIX Security Symposium},
year = {2008},
month = {July},
location = {San Jose, CA, US},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf},
www_section = {Traffic analysis},
}
|
incentives-fc10@inproceedings{incentives-fc10,
title = {{Building Incentives into Tor}},
author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/incentives-fc10.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
incomparable-pkeys@inproceedings{incomparable-pkeys,
title = {Receiver Anonymity via Incomparable Public Keys},
author = {Brent Waters and Ed Felten and Amit Sahai},
booktitle = {{Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS 2003)}},
year = {2003},
month = {October},
pages = {112--121},
editor = {Vijay Atluri and Peng Liu},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf},
www_ps_url = {http://www.cs.princeton.edu/~bwaters/research/incomparable.ps},
}
|
infranet@inproceedings{infranet,
title = {Infranet: Circumventing Web Censorship and Surveillance},
author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan
and David Karger},
booktitle = {Proceedings of the 11th USENIX Security Symposium},
year = {2002},
month = {August},
www_tags = {selected},
www_pdf_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf},
www_ps_gz_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz},
www_section = {Communications Censorship},
}
|
insidejob-ndss2018@inproceedings{insidejob-ndss2018,
title = {Inside Job: Applying Traffic Analysis to Measure Tor from Within},
author = {Jansen, Rob and Juarez, Marc and G{\'a}lvez, Rafa and Elahi, Tariq and Diaz,
Claudia},
booktitle = {Proceedings of the 25th Symposium on Network and Distributed System Security
({NDSS} '18)},
year = {2018},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/insidejob-ndss2018.pdf},
www_section = {Anonymous communication},
}
|
ipccc12-performance@inproceedings{ipccc12-performance,
title = {Improving Performance and Anonymity in the Tor Network},
author = {Andriy Panchenko and Fabian Lanze and Thomas Engel},
booktitle = {Proceedings of the 31st IEEE International Performance Computing and
Communications Conference (IPCCC 2012)},
year = {2012},
month = {December},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ishai2006ca@article{ishai2006ca,
title = {{Cryptography from Anonymity}},
author = {Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai},
journal = {Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer
Science (FOCS'06)-Volume 00},
year = {2006},
month = {October},
pages = {239--248},
publisher = {IEEE Computer Society Washington, DC, USA},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf},
}
|
jakobsson-optimally@inproceedings{jakobsson-optimally,
title = {An Optimally Robust Hybrid Mix Network (Extended Abstract)},
author = {Markus Jakobsson and Ari Juels},
booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01},
year = {2001},
publisher = {ACM Press},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/492015.html},
www_section = {Provable shuffles},
}
|
jansen-phd-thesis@phdthesis{jansen-phd-thesis,
title = {Privacy Preserving Performance Enhancements for Anonymous Communication
Systems},
author = {Rob Jansen},
school = {University of Minnesota},
year = {2012},
month = {October},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://www.robgjansen.com/publications/jansen-phd-dissertation.pdf},
www_tags = {selected},
}
|
jansen14-kist@inproceedings{jansen14-kist,
title = {Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed
Socket Transport},
author = {Rob Jansen and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/kist-sec2014.pdf},
www_section = {Tor Performance},
}
|
johnson-pet2007@inproceedings{johnson-pet2007,
title = {Nymble: Anonymous IP-address Blocking},
author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf},
www_remarks = {Superseded by nymble-tdsc.},
www_section = {Misc},
}
|
joss-thesis@phdthesis{joss-thesis,
title = {Characterising Anonymity Systems},
author = {Joss Wright},
school = {Department of Computer Science, University of York, York},
year = {2007},
month = {November},
www_section = {Formal methods},
www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf},
}
|
k-anonymous:ccs2003@inproceedings{k-anonymous:ccs2003,
title = {k-Anonymous Message Transmission},
author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper},
booktitle = {{Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS 2003)}},
year = {2003},
month = {October},
pages = {122--130},
editor = {Vijay Atluri and Peng Liu},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf},
}
|
karger77@techreport{karger77,
title = {Non-Discretionary Access Control for Decentralized Computing Systems},
author = {Paul A. Karger},
institution = {Laboratory for Computer Science, Massachusetts Institute of Technology},
number = {MIT/LCS/TR-179},
year = {1977},
month = {May},
address = {Cambridge, MA},
type = {S. M. \& E. E. thesis},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf},
www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early
discussion of traffic analysis issues.},
}
|
kate-pet2007@inproceedings{kate-pet2007,
title = {Pairing-Based Onion Routing},
author = {Aniket Kate and Greg Zaverucha and Ian Goldberg},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Pairing_based.pdf},
www_remarks = {Describes a circuit-establishment protocol for a Tor-like network. Uses
Pairing- and Identity-Based crypto for efficiency, at the expense of having all
private keys generated by a trusted IBE authority.},
www_section = {Anonymous communication},
}
|
kesdogan2006tcn@article{kesdogan2006tcn,
title = {{Technical challenges of network anonymity}},
author = {D. Kesdogan and C. Palmer},
journal = {Computer Communications},
volume = {29},
number = {3},
year = {2006},
pages = {306--324},
publisher = {Elsevier},
www_section = {Anonymous communication},
}
|
kesdogan:pet2002@inproceedings{kesdogan:pet2002,
title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
alternative to the MIX based Approach?},
author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf},
www_section = {Anonymous communication},
}
|
kevin-thesis@phdthesis{kevin-thesis,
title = {Improving Security and Performance in Low Latency Anonymity Networks},
author = {Kevin Bauer},
school = {University of Colorado},
year = {2011},
month = {May},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf},
}
|
kissner04private@article{kissner04private,
title = {Private keyword-based push and pull with applications to anonymous
communication},
author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang},
journal = {Applied Cryptography and Network Security},
year = {2004},
www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf},
www_section = {Private Information Retrieval},
}
|
koch-7433346@article{koch-7433346,
title = {How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation},
author = {R. Koch and M. Golling and G. D. Rodosek},
journal = {Computer},
volume = {49},
number = {3},
year = {2016},
month = {March},
pages = {42--49},
doi = {10.1109/MC.2016.73},
www_pdf_url = {https://www.unibw.de/inf3/personen/wimis/koch/how-anonymous-is-the-tor-network-a-long-term-black-box-investigation},
keywords = {Communication networks; Computer hacking; Computer security; IP networks;
Internet; Privacy; Relays; Routing protocols; Surveillance; Tor; anonymous
communication; de-anonymization; hackers; network security; network surveillance;
networking; networks; onion routing; routers; security},
www_section = {comm},
issn = {0018-9162},
}
|
koepsell:wpes2004@inproceedings{koepsell:wpes2004,
title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web
Surfing},
author = {Stefan K\"opsell and Ulf Hilling},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2004)}},
year = {2004},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/p103-koepsell.pdf},
www_section = {Communications Censorship},
}
|
koot2012@phdthesis{koot2012,
title = {Measuring and Predicting Anonymity},
author = {Matthijs R. Koot},
school = {University of Amsterdam},
year = {2012},
month = {June},
address = {Amsterdam, The Netherlands},
www_section = {Traffic analysis},
www_pdf_url = {http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf},
}
|
kopsell2006ra@article{kopsell2006ra,
title = {{Revocable Anonymity}},
author = {S. Kopsell and R. Wendolsky and H. Federrath},
journal = {Emerging Trends in Information and Communication Security-ETRICS, LNCS},
volume = {3995},
year = {2006},
pages = {206--220},
www_section = {Anonymous communication},
}
|
kostas-thesis@phdthesis{kostas-thesis,
title = {Probabilistic and Information-Theoretic Approaches to Anonymity},
author = {Konstantinos Chatzikokolakis},
school = {Laboratoire d'Informatique (LIX), {\'E}cole Polytechnique, Paris},
year = {2007},
month = {October},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.lix.polytechnique.fr/~kostas/thesis.pdf},
}
|
kuesters-rpc@inproceedings{kuesters-rpc,
title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
author = {Ralf K\"usters and Tomasz Truderung and Andreas Vogt},
booktitle = {Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy},
year = {2014},
month = {May},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://infsec.uni-trier.de/publications/paper/KuestersTruderungVogt-SP-2014.pdf},
www_section = {Anonymous communication},
}
|
kugler:pet2003@inproceedings{kugler:pet2003,
title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant
Networks}},
author = {Dennis K\"ugler},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {161--176},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf},
}
|
kugler:pet2004@inproceedings{kugler:pet2004,
title = {On the Anonymity of Banknotes},
author = {Dennis K{\"u}gler},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {108--120},
series = {LNCS},
www_section = {Misc},
}
|
langos02@inproceedings{langos02,
title = {Dummy Traffic Against Long Term Intersection Attacks},
author = {Oliver Berthold and Heinrich Langos},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
month = {April},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
www_tags = {selected},
www_pdf_url = {http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf},
www_section = {Traffic analysis},
}
|
leastsquares-pets12@inproceedings{leastsquares-pets12,
title = {Understanding Statistical Disclosure: A Least Squares approach},
author = {Fernando Perez-Gonzalez and Carmela Troncoso},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf},
www_section = {Traffic analysis},
}
|
leet2011:TorBunchApple@inproceedings{leet2011:TorBunchApple,
title = {One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile
Tor Users},
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar
and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
booktitle = {Proceedings of the 4th USENIX conference on Large-scale exploits and
emergent threats},
year = {2011},
publisher = {USENIX Association},
series = {LEET'11},
www_pdf_url = {http://arxiv.org/pdf/1103.1518},
www_section = {Traffic analysis},
}
|
lenhard2009hidserv-lowbw@inproceedings{lenhard2009hidserv-lowbw,
title = {Performance Measurements of Tor Hidden Services in Low-Bandwidth Access
Networks},
author = {J{\"o}rg Lenhard and Karsten Loesing and Guido Wirtz},
booktitle = {Proceedings of the 7th International Conference on Applied Cryptography and
Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009},
volume = {5536},
year = {2009},
month = {June},
editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque and Damien
Vergnaud},
series = {Lecture Notes in Computer Science},
isbn = {978-3-642-01956-2},
www_tags = {selected},
www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
limits-open@inproceedings{limits-open,
title = {Limits of Anonymity in Open Environments},
author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_tags = {selected},
www_pdf_url = {http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf},
www_section = {Traffic analysis},
}
|
loesing2008performance@inproceedings{loesing2008performance,
title = {{Performance Measurements and Statistics of Tor Hidden Services}},
author = {Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz},
booktitle = {Proceedings of the 2008 International Symposium on Applications and the
Internet (SAINT)},
year = {2008},
month = {July},
location = {Turku, Finland},
publisher = {IEEE CS Press},
www_tags = {selected},
www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
loesing2009thesis@phdthesis{loesing2009thesis,
title = {Privacy-enhancing Technologies for Private Services},
author = {Karsten Loesing},
school = {University of Bamberg},
year = {2009},
month = {May},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf},
}
|
loopix2017@inproceedings{loopix2017,
title = {The Loopix Anonymity System},
author = {Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George
Danezis},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-piotrowska.pdf},
www_section = {Anonymous communication},
}
|
mailet-pets2016@article{mailet-pets2016,
title = {Mailet: Instant Social Networking under Censorship},
author = {Shuai Li and Nicholas Hopper},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Mailet__Instant_Social_Networking_under_Censorship.pdf},
www_section = {Communications Censorship},
}
|
marionette2015@inproceedings{marionette2015,
title = {Marionette: A Programmable Network Traffic Obfuscation System},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
booktitle = {Proceedings of the 24th Usenix Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf},
www_section = {Communications Censorship},
}
|
mators-pets2016@article{mators-pets2016,
title = {Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path
Selection Algorithms against Structural Attacks},
author = {Michael Backes and Sebastian Meiser and Marcin Slowik},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Your_Choice_MATor(s).pdf},
www_section = {Traffic analysis},
}
|
mccoy-pet2008@inproceedings{mccoy-pet2008,
title = {Shining Light in Dark Places: Understanding the {Tor} Network},
author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas
Sicker},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {63--76},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf},
www_section = {Misc},
}
|
melchor2006dnp@article{melchor2006dnp,
title = {{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}},
author = {C.A. Melchor and Y. Deswarte},
journal = {Proceedings of the Fifth IEEE International Symposium on Network Computing and
Applications},
year = {2006},
pages = {163--172},
publisher = {IEEE Computer Society Washington, DC, USA},
www_section = {Anonymous communication},
}
|
miab-acsac13@inproceedings{miab-acsac13,
title = {Message In A Bottle: Sailing Past Censorship},
author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
booktitle = {Proceedings of the Annual Computer Security Applications Conference
(ACSAC)},
year = {2013},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.ucsb.edu/~vigna/publications/2013_ACSAC_MITB.pdf},
www_section = {Communications Censorship},
}
|
minion-design@inproceedings{minion-design,
title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}},
author = {George Danezis and Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {2--15},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://mixminion.net/minion-design.pdf},
}
|
mitkuro@inproceedings{mitkuro,
title = {{Attack for Flash MIX}},
author = {Masashi Mitomo and Kaoru Kurosawa},
booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
www_tags = {selected},
www_html_url = {http://citeseer.nj.nec.com/450148.html},
www_section = {Provable shuffles},
}
|
mix-acc@inproceedings{mix-acc,
title = {{A Reputation System to Increase MIX-net Reliability}},
author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {126--141},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/doc/mix-acc/mix-acc.pdf},
www_ps_url = {http://freehaven.net/doc/mix-acc/mix-acc.ps},
}
|
mixcoin-fc14@inproceedings{mixcoin-fc14,
title = {Mixcoin: Anonymity for Bitcoin with accountable mixes},
author = {Joseph Bonneau and Jeremy Clark and Joshua A. Kroll and Andrew Miller and
Arvind Narayanan},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
year = {2014},
month = {March},
www_pdf_url = {http://fc14.ifca.ai/papers/fc14_submission_170.pdf},
www_section = {E-Cash / Anonymous Credentials},
}
|
mixmaster-reliable@inproceedings{mixmaster-reliable,
title = {Comparison between two practical mix designs},
author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte},
booktitle = {Proceedings of ESORICS 2004},
year = {2004},
month = {September},
location = {France},
series = {LNCS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-98.pdf},
www_ps_gz_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz},
www_section = {Traffic analysis},
}
|
mixmaster-spec@misc{mixmaster-spec,
title = {Mixmaster {P}rotocol --- {V}ersion 2},
author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman},
year = {2003},
month = {July},
howpublished = {IETF Internet Draft},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_txt_url = {http://www.abditum.com/mixmaster-spec.txt},
}
|
mixminion-fc2004@inproceedings{mixminion-fc2004,
title = {Mixminion: Strong Anonymity for Financial cryptography},
author = {Nick Mathewson and Roger Dingledine},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {227--232},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/doc/fc04/minion-systems.pdf},
}
|
mmsec04-Klonowski@inproceedings{mmsec04-Klonowski,
title = {DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion
Protocols},
author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of the IFIP TC-6 TC-11 Conference on Communications and
Multimedia Security 2004},
year = {2004},
month = {September},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
modular-approach@article{modular-approach,
title = {Information Hiding, Anonymity and Privacy: A Modular Approach},
author = {Dominic Hughes and Vitaly Shmatikov},
journal = {Journal of Computer Security},
volume = {12},
number = {1},
year = {2004},
pages = {3--36},
www_tags = {selected},
www_ps_url = {http://www.csl.sri.com/users/shmat/shmat_anon.ps},
www_section = {Formal methods},
}
|
montieri2017anonymity@inproceedings{montieri2017anonymity,
title = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark},
author = {Montieri, Antonio and Ciuonzo, Domenico and Aceto, Giuseppe and Pescap{\'e},
Antonio},
booktitle = {Proceedings of Teletraffic Congress (ITC 29), 2017 29th International},
organization = {IEEE},
volume = {1},
year = {2017},
pages = {81--89},
www_section = {Traffic analysis},
www_pdf_url = {https://domenicociuonzo.files.wordpress.com/2013/08/pid4874931_final.pdf},
}
|
mop2mop-fc14@inproceedings{mop2mop-fc14,
title = {MoP-2-MoP -- Mobile private microblogging},
author = {Marius Senftleben and Mihai Bucicoiu and Erik Tews and Frederik Armknecht and
Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
year = {2014},
month = {March},
www_pdf_url = {http://fc14.ifca.ai/papers/fc14_submission_99.pdf},
www_section = {Anonymous communication},
}
|
morphing09@inproceedings{morphing09,
title = {Traffic Morphing: An efficient defense against statistical traffic analysis},
author = {Charles Wright and Scott Coull and Fabian Monrose},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '09},
year = {2009},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/morphing09.pdf},
www_section = {Traffic analysis},
}
|
morphmix-fc2004@inproceedings{morphmix-fc2004,
title = {Practical Anonymity for the Masses with MorphMix},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {233--250},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://home.zhwin.ch/~rer/publications/FC2004.pdf},
}
|
morphmix:pet2006@inproceedings{morphmix:pet2006,
title = {Breaking the Collusion Detection Mechanism of MorphMix},
author = {Parisa Tabriz and Nikita Borisov},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {368--384},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_21.pdf},
www_section = {Traffic analysis},
}
|
morphmix:wpes2002@inproceedings{morphmix:wpes2002,
title = {{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with
Collusion Detection}},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2002)}},
year = {2002},
month = {November},
location = {Washington, DC, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf},
www_ps_gz_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz},
www_section = {Anonymous communication},
}
|
mtor-pets2016@article{mtor-pets2016,
title = {Scalable and Anonymous Group Communication with MTor},
author = {Dong Lin and Micah Sherr and Boon Thau Loo},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Scalable_and_Anonymous_Group_Communication_with_MTor.pdf},
www_section = {Anonymous communication},
}
|
muffler-fc14@inproceedings{muffler-fc14,
title = {Multi-Class Traffic Morphing for Encrypted VoIP Communication},
author = {W. Brad Moore and Henry Tan and Micah Sherr and Marcus A. Maloof},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'15)},
year = {2015},
month = {February},
www_pdf_url = {http://fc15.ifca.ai/preproceedings/paper_108.pdf},
www_section = {Traffic analysis},
}
|
murdoch-pet2007@inproceedings{murdoch-pet2007,
title = {Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries},
author = {Steven J. Murdoch and Piotr Zieli{\'n}ski},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_important = {1},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf},
www_remarks = {Examines efficacy of traffic analysis against a low-latency anonymity
network by an adversary who controls Internet exchanges, and who can only sample
a fraction of traffic.},
www_section = {Traffic analysis},
}
|
murdoch-pet2008@inproceedings{murdoch-pet2008,
title = {Metrics for Security and Performance in Low-Latency Anonymity Networks},
author = {Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {115--132},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf},
www_section = {Traffic analysis},
}
|
nagaraja-pet2007@inproceedings{nagaraja-pet2007,
title = {Anonymity in the wild: Mixes on unstructured networks},
author = {Shishir Nagaraja},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf},
www_section = {Anonymous communication},
}
|
ndss09-rainbow@inproceedings{ndss09-rainbow,
title = {RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows},
author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'09},
year = {2009},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf},
www_section = {Traffic analysis},
}
|
ndss11-swirl@inproceedings{ndss11-swirl,
title = {SWIRL: A Scalable Watermark to Detect Correlated Network Flows},
author = {Amir Houmansadr and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11},
year = {2011},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf},
www_section = {Traffic analysis},
}
|
ndss12:mittal@inproceedings{ndss12:mittal,
title = {X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks},
author = {Prateek Mittal and Matthew Caesar and Nikita Borisov},
booktitle = {Proceedings of the 19th Annual Network and Distributed System Security
Symposium (NDSS2012)},
year = {2012},
month = {January},
location = {San Diego, California, USA},
editor = {},
publisher = {The Internet Society 2013},
www_section = {Anonymous communication},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/02_2.pdf},
}
|
ndss13-freewave@inproceedings{ndss13-freewave,
title = {{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship
Circumvention}},
author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf},
www_section = {Communications Censorship},
}
|
ndss13-lira@inproceedings{ndss13-lira,
title = {{LIRA: Lightweight Incentivized Routing for Anonymity}},
author = {Rob Jansen and Aaron Johnson and Paul Syverson},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/lira-ndss2013.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ndss13-rbridge@inproceedings{ndss13-rbridge,
title = {{rBridge: User Reputation based Tor Bridge Distribution with Privacy
Preservation}},
author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf},
www_section = {Anonymous communication},
}
|
ndss13-relay-selection@inproceedings{ndss13-relay-selection,
title = {{An Empirical Evaluation of Relay Selection in Tor}},
author = {Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
ndss13-website-fingerprinting@inproceedings{ndss13-website-fingerprinting,
title = {{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}},
author = {Michael Backes and Goran Doychev and Boris K\"opf},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'13},
year = {2013},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://software.imdea.org/~bkoepf/papers/ndss13.pdf},
www_section = {Anonymous communication},
}
|
ndss13:mittal:a@inproceedings{ndss13:mittal:a,
title = {Pisces: Anonymous Communication Using Social Networks},
author = {Prateek Mittal and Matthew Wright and Nikita Borisov},
booktitle = {Proceedings of the 20th Annual Network and Distributed System Security
Symposium (NDSS2013)},
year = {2013},
month = {February},
location = {San Diego, California, USA},
editor = {},
publisher = {The Internet Society 2013},
www_section = {Anonymous communication},
www_pdf_url = {http://internetsociety.org/sites/default/files/05_1_0.pdf},
www_tags = {selected},
}
|
ndss13:mittal:b@inproceedings{ndss13:mittal:b,
title = {Preserving Link Privacy in Social Network Based Systems},
author = {Prateek Mittal and Charalampos Papamanthou and Dawn Song},
booktitle = {Proceedings of the 20th Annual Network and Distributed System Security
Symposium (NDSS2013)},
year = {2013},
month = {February},
location = {San Diego, California, USA},
editor = {},
publisher = {The Internet Society 2013},
www_section = {Anonymous communication},
www_pdf_url = {http://internetsociety.org/sites/default/files/05_2_0.pdf},
}
|
newman:pet2003@inproceedings{newman:pet2003,
title = {Metrics for Traffic Analysis Prevention},
author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {48--65},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://www.cise.ufl.edu/~nemo/papers/PET2003.ps},
}
|
newman:pet2004@inproceedings{newman:pet2004,
title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls},
author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {1--16},
series = {LNCS},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf},
www_remarks = {If we think about leaked anonymity as a covert channel between the sender
Alice and the adversary Eve, then by measuring covert channel capacity we can get
an upper bound on the amount of information Alice could leak.},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps},
}
|
nfattackpam14@inproceedings{nfattackpam14,
title = {On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow
Records},
author = {S. Chakravarty and M. V. Barbera and G. Portokalidis and M. Polychronakis and
A. D. Keromytis},
booktitle = {Proceedings of the 15th Passive and Active Measurements Conference (PAM
'14)},
year = {2014},
month = {March},
www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/pam2014-tor-nfattack.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
nguyen2006vsf@article{nguyen2006vsf,
title = {{Verifiable shuffles: a formal model and a Paillier-based three-round
construction with provable security}},
author = {L. Nguyen and R. Safavi-Naini and K. Kurosawa},
journal = {International Journal of Information Security},
volume = {5},
number = {4},
year = {2006},
pages = {241--255},
publisher = {Springer},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
nguyen:pet2003@inproceedings{nguyen:pet2003,
title = {Breaking and Mending Resilient Mix-nets},
author = {Lan Nguyen and Rei Safavi-Naini},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {66--80},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://www.petworkshop.org/2003/preproc/05-preproc.pdf},
}
|
nowlanreducing@inproceedings{nowlanreducing,
title = {Reducing Latency in Tor Circuits with Unordered Delivery},
author = {Nowlan, Michael F and Wolinsky, David and Ford, Bryan},
booktitle = {Proceedings of the 3rd USENIX Workshop on Free and Open Communications on
the Internet},
organization = {USENIX},
year = {2013},
www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/papers/foci13.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
nym-alias-net@inproceedings{nym-alias-net,
title = {{The Design, Implementation and Operation of an Email Pseudonym Server}},
author = {David Mazi\`eres and M. Frans Kaashoek},
booktitle = {{Proceedings of the 5th ACM Conference on Computer and Communications
Security (CCS 1998)}},
year = {1998},
month = {November},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf},
www_ps_gz_url = {ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz},
www_section = {Pseudonymity},
}
|
nymble-tdsc@article{nymble-tdsc,
title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks},
author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith},
journal = {IEEE Transactions on Dependable and Secure Computing},
volume = {8},
number = {2},
year = {2011},
month = {March--April},
pages = {256--269},
doi = {10.1109/TDSC.2009.38},
www_tags = {selected},
www_important = {1},
www_remarks = {Describes Nymble, a system that allows services to block anonymous users
that misbehave, without making their transactions linkable.},
www_section = {Misc},
}
|
nymbler@inproceedings{nymbler,
title = {{Making a Nymbler Nymble using VERBS (Extended Version)}},
author = {Ryan Henry and Kevin Henry and Ian Goldberg},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf},
www_section = {Misc},
}
|
oakland11-extending@inproceedings{oakland11-extending,
title = {Extending Nymble-like Systems},
author = {Ryan Henry and Ian Goldberg},
booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy},
year = {2011},
month = {May},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf},
www_section = {Misc},
}
|
oakland11-formalizing@inproceedings{oakland11-formalizing,
title = {Formalizing Anonymous Blacklisting Systems},
author = {Ryan Henry and Ian Goldberg},
booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy},
year = {2011},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf},
www_section = {Misc},
}
|
oakland2012-lap@inproceedings{oakland2012-lap,
title = {{LAP}: Lightweight Anonymity and Privacy},
author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and
Sam Nelson and Marco Gruteser and Wei Ming},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://freehaven.net/anonbib/papers/LAP.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
oakland2012-lastor@inproceedings{oakland2012-lastor,
title = {{LASTor: A Low-Latency AS-Aware Tor Client}},
author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
oakland2012-peekaboo@inproceedings{oakland2012-peekaboo,
title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures
Fail},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_pdf_url = {http://kpdyer.com/publications/oakland2012.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
oakland2013-parrot@inproceedings{oakland2013-parrot,
title = {The Parrot is Dead: Observing Unobservable Network Communications},
author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov},
booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy},
year = {2013},
month = {May},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/parrot.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
oakland2013-trawling@inproceedings{oakland2013-trawling,
title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization},
author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy},
year = {2013},
month = {May},
www_pdf_url = {http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
offpath2016@inproceedings{offpath2016,
title = {Off-Path TCP Exploits: Global Rate Limit Considered Dangerous},
author = {Yue Cao and Zhiyun Qian and Zhongjie Wang and Tuan Dao and Srikanth V.
Krishnamurthy and Lisa M. Marvel},
booktitle = {Proceedings of the 25th Usenix Security Symposium},
year = {2016},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf},
www_section = {Traffic analysis},
}
|
onion-discex00@inproceedings{onion-discex00,
title = {{O}nion {R}outing Access Configurations},
author = {Paul Syverson and Michael Reed and David Goldschlag},
booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
(DISCEX 2000)},
volume = {1},
year = {2000},
pages = {34--40},
publisher = {IEEE CS Press},
www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
www_tags = {selected},
www_abstract_url = {http://www.onion-router.net/Publications.html},
www_section = {Anonymous communication},
www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
}
|
onion-ns-pets2017@article{onion-ns-pets2017,
title = {The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services},
author = {Jesse Victors and Ming Li and Xinwen Fu},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper05-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
onion-routing:ih96@inproceedings{onion-routing:ih96,
title = {{Hiding Routing Information}},
author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson},
booktitle = {Proceedings of Information Hiding: First International Workshop},
year = {1996},
month = {May},
pages = {137--150},
editor = {R. Anderson},
publisher = {Springer-Verlag, LNCS 1174},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.onion-router.net/Publications/IH-1996.pdf},
www_ps_gz_url = {http://www.onion-router.net/Publications/IH-1996.ps.gz},
}
|
onion-routing:pet2000@inproceedings{onion-routing:pet2000,
title = {{Towards an Analysis of Onion Routing Security}},
author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {96--114},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
}
|
overlier-pet2007@inproceedings{overlier-pet2007,
title = {Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden
services},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf},
www_remarks = {Introduces Diffie-Hellman-based handshakes to build Tor circuits with
fewer exponentiations than the original circuit-establishment protocol.},
www_section = {Anonymous communication,Tor Performance},
}
|
padlipky78@techreport{padlipky78,
title = {Limitations of End-to-End Encryption in Secure Computer Networks},
author = {Michael A. Padlipsky and David W. Snow and Paul A. Karger},
institution = {The MITRE Corporation: Bedford MA, HQ Electronic Systems Division},
number = {ESD-TR-78-158},
year = {1978},
month = {August},
address = {Hanscom AFB, MA},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf},
}
|
patterns-failure@inproceedings{patterns-failure,
title = {Real World Patterns of Failure in Anonymity Systems},
author = {Richard Clayton and George Danezis and Markus G. Kuhn},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
pages = {230--244},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf},
}
|
payguard-fc14@inproceedings{payguard-fc14,
title = {Paying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper)},
author = {Paolo Palmieri and Johan Pouwelse},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'15)},
year = {2015},
month = {February},
www_pdf_url = {http://fc15.ifca.ai/preproceedings/paper_112.pdf},
www_section = {Tor Performance},
}
|
peerflow-pets2017@article{peerflow-pets2017,
title = {PeerFlow: Secure Load Balancing in Tor},
author = {Aaron Johnson and Rob Jansen and Nicholas Hopper and Aaron Segal and Paul
Syverson},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/peerflow-popets2017.pdf},
www_section = {Tor Performance},
}
|
perea-tissec11@article{perea-tissec11,
title = {{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous
users},
author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia},
journal = {ACM Transactions on Information and System Security ({ACM TISSEC})},
volume = {14},
year = {2011},
month = {December},
address = {New York, NY, USA},
pages = {29:1--29:34},
publisher = {ACM},
numpages = {34},
issue_date = {December 2011},
issn = {1094-9224},
www_tags = {selected},
acmid = {204363},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf},
url = {http://doi.acm.org/10.1145/2043628.2043630},
www_section = {Misc},
doi = {http://doi.acm.org/10.1145/2043628.2043630},
keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced
revocation, user misbehavior},
articleno = {29},
issue = {4},
}
|
perm-ccs12@inproceedings{perm-ccs12,
title = {{PERM}: Practical Reputation-Based Blacklisting without {TTPs}},
author = {Man Ho Au and Apu Kapadia},
booktitle = {Proceedings of The 19th ACM Conference on Computer and Communications
Security (CCS)},
year = {2012},
month = {October},
pages = {929--940},
publisher = {ACM},
doi = {10.1145/2382196.2382294},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf},
}
|
pescape2018anonymity@article{pescape2018anonymity,
title = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)},
author = {Pescape, Antonio and Montieri, Antonio and Aceto, Giuseppe and Ciuonzo,
Domenico},
journal = {IEEE Transactions on Dependable and Secure Computing},
year = {2018},
publisher = {IEEE},
www_pdf_url = {https://domenicociuonzo.files.wordpress.com/2018/02/ieee_tdsc.pdf},
www_section = {Traffic analysis},
}
|
pet05-bissias@inproceedings{pet05-bissias,
title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {1--11},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf},
}
|
pet05-borisov@inproceedings{pet05-borisov,
title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs},
author = {Nikita Borisov},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {12--25},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf},
}
|
pet05-camenisch@inproceedings{pet05-camenisch,
title = {Mix-network with Stronger Security},
author = {Jan Camenisch and Anton Mityagin},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {128--147},
www_tags = {selected},
www_section = {Provable shuffles},
}
|
pet05-serjantov@inproceedings{pet05-serjantov,
title = {Message Splitting Against the Partial Adversary},
author = {Andrei Serjantov and Steven J. Murdoch},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {26--39},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf},
}
|
pet05-zhu@inproceedings{pet05-zhu,
title = {Unmixing Mix Traffic},
author = {Ye Zhu and Riccardo Bettati},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
year = {2005},
month = {May},
pages = {110--127},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf},
}
|
petcon2009-schomburg@inproceedings{petcon2009-schomburg,
title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks},
author = {Jens Schomburg},
booktitle = {Proceedings of PET-CON 2009.1},
year = {2009},
month = {March},
location = {Dresden, Germany},
pages = {49--49},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/~karsten/volatile/petcon-proceedings-2009.1.pdf},
}
|
petcon2009-zzz@inproceedings{petcon2009-zzz,
title = {Peer Profiling and Selection in the I2P Anonymous Network},
author = {zzz (Pseudonym) and Lars Schimmer},
booktitle = {Proceedings of PET-CON 2009.1},
year = {2009},
month = {March},
location = {Dresden, Germany},
pages = {59--59},
www_section = {Anonymous communication},
www_pdf_url = {http://www.i2p2.i2p/_static/pdf/I2P-PET-CON-2009.1.pdf},
}
|
pets13-flow-fingerprints@inproceedings{pets13-flow-fingerprints,
title = {The need for flow fingerprints to link correlated network flows},
author = {Amir Houmansadr and Nikita Borisov},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/Fancy.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets13-how-low@inproceedings{pets13-how-low,
title = {How Low Can You Go: Balancing Performance with Anonymity in Tor},
author = {John Geddes and Rob Jansen and Nicholas Hopper},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets13-oss@inproceedings{pets13-oss,
title = {{OSS}: Using Online Scanning Services for Censorship Circumvention},
author = {David Fifield and Gabi Nakibly and Dan Boneh},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
pets13-splitting@inproceedings{pets13-splitting,
title = {The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting},
author = {Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg},
booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS
2013)},
year = {2013},
month = {July},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
pets14-cellular-ident@inproceedings{pets14-cellular-ident,
title = {Exploiting Delay Patterns for User IPs Identification in Cellular Networks},
author = {Vasile Claudiu Perta and Marco Valerio Barbera and Alessandro Mei},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Perta.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets14-cloudtransport@inproceedings{pets14-cloudtransport,
title = {CloudTransport: Using Cloud Storage for Censorship-Resistant Networking},
author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Brubaker.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
pets14-combining-pir@inproceedings{pets14-combining-pir,
title = {The Best of Both Worlds: Combining Information-Theoretic and Computational PIR
for Communication Efficiency},
author = {Casey Devet and Ian Goldberg},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Devet.pdf},
www_section = {Private Information Retrieval},
}
|
pets14-dovetail@inproceedings{pets14-dovetail,
title = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing},
author = {Jody Sankey and Matthew Wright},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Sankey.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
pets14-dummy-traffic@inproceedings{pets14-dummy-traffic,
title = {Do dummies pay off? Limits of dummy traffic protection in anonymous
communications},
author = {Simon Oya, Carmela Troncoso and Fernando P{\'e}rez-Gonz\'alez},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Oya.pdf},
www_tags = {selected},
www_section = {Traffic analysis,Anonymous communication},
}
|
pets14-https-traffic-analysis@inproceedings{pets14-https-traffic-analysis,
title = {I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic
Analysis},
author = {Brad Miller and Ling Huang and A. D. Joseph and J. D. Tygar},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Miller.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
|
pets14-measuring-freenet@inproceedings{pets14-measuring-freenet,
title = {Measuring Freenet in the Wild: Censorship-resilience under Observation},
author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Roos.pdf},
www_tags = {selected},
www_section = {Anonymous publication},
}
|
pets14-spoiled-onions@inproceedings{pets14-spoiled-onions,
title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
author = {Philipp Winter and Richard K\"ower and Martin Mulazzani and Markus Huber and
Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS
2014)},
year = {2014},
month = {July},
www_pdf_url = {https://www.petsymposium.org/2014/papers/Winter.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
pets2010:eckersley2010unique@inproceedings{pets2010:eckersley2010unique,
title = {How unique is your web browser?},
author = {Peter Eckersley},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium},
year = {2010},
month = {July},
location = {Berlin, Germany},
pages = {1--18},
www_tags = {selected},
www_section = {Misc},
www_pdf_url = {http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf},
}
|
pets2011-bagai@inproceedings{pets2011-bagai,
title = {An Accurate System-Wide Anonymity Metric for Probabilistic Attacks},
author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf},
www_section = {Traffic analysis},
}
|
pets2011-defenestrator@inproceedings{pets2011-defenestrator,
title = {DefenestraTor: Throwing out Windows in Tor},
author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon
McCoy and Stefan Savage and Geoffrey Voelker},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
pets2011-i2p@inproceedings{pets2011-i2p,
title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A
Real-World Case Study using I2P},
author = {Michael Herrmann and Christian Grothoff},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf},
www_section = {Traffic analysis},
}
|
pets2011:TorUsernames@inproceedings{pets2011:TorUsernames,
title = {How Unique and Traceable are Usernames?},
author = {Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium},
year = {2011},
month = {July},
www_pdf_url = {http://arxiv.org/pdf/1101.5578},
www_section = {Pseudonymity},
}
|
pfitzmann85@inproceedings{pfitzmann85,
title = {Networks Without User Observability -- Design Options},
author = {Andreas Pfitzmann and Michael Waidner},
booktitle = {Proceedings of {EUROCRYPT} 1985},
year = {1985},
month = {April},
publisher = {Springer-Verlag, LNCS 219},
www_tags = {selected},
www_html_url = {http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html},
www_section = {Anonymous communication},
}
|
pfitzmann90how@inproceedings{pfitzmann90how,
title = {How to Break the Direct {RSA}-Implementation of {MIXes}},
author = {Birgit Pfitzmann and Andreas Pfitzmann},
booktitle = {Proceedings of {EUROCRYPT} 1989},
year = {1990},
publisher = {Springer-Verlag, LNCS 434},
www_ps_gz_url = {http://www.semper.org/sirene/lit/abstr90.html#PfPf_90},
www_section = {Traffic analysis},
}
|
phi-pets2017@article{phi-pets2017,
title = {PHI: a Path-Hidden Lightweight Anonymity Protocol at Network Layer},
author = {Chen Chen and Adrian Perrig},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper15-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
phonion-pets2017@article{phonion-pets2017,
title = {Phonion: Practical Protection of Metadata in Telephony Networks},
author = {Stephan Heuser and Bradley Reaves and Praveen Kumar Pendyala and Henry Carter
and Alexandra Dmitrienko and William Enck and Negar Kiyavash and Ahmad-Reza
Sadeghi and Patrick Traynor},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {1},
year = {2017},
month = {January},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue1/paper27-2017-1-source.pdf},
www_section = {Anonymous communication},
}
|
pipenet@misc{pipenet,
title = {PipeNet 1.1},
author = {Wei Dai},
year = {1998},
month = {November},
howpublished = {Post to Cypherpunks mailing list},
www_tags = {selected},
www_section = {Anonymous communication},
www_txt_url = {http://www.eskimo.com/~weidai/pipenet.txt},
www_remarks = {Cypherpunks post at
http://cypherpunks.venona.com/date/1998/11/msg00941.html},
day = {26},
}
|
pipenet10@misc{pipenet10,
title = {PipeNet 1.0},
author = {Wei Dai},
year = {1998},
month = {January},
howpublished = {Post to Cypherpunks mailing list},
www_tags = {selected},
www_html_url = {http://cypherpunks.venona.com/date/1998/01/msg00878.html},
www_section = {Anonymous communication},
www_remarks = {First written in 1996 based on cypherpunks posts in 1995.},
day = {19},
}
|
pir@inproceedings{pir,
title = {Private Information Retrieval},
author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan},
booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science},
year = {1995},
pages = {41--50},
www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps},
www_section = {Private Information Retrieval},
}
|
pool-dummy04@inproceedings{pool-dummy04,
title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy
Traffic},
author = {Claudia Diaz and Bart Preneel},
booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
year = {2004},
month = {May},
location = {Toronto},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-95.pdf},
www_section = {Anonymous communication},
}
|
prifi-wpes16@inproceedings{prifi-wpes16,
title = {PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous
Communication},
author = {Ludovic Barman and Mahdi Zamani and Italo Dacosta and Joan Feigenbaum and Bryan
Ford and Jean-Pierre Hubaux and David Wolinsky},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/wpes16-prifi.pdf},
www_section = {Anonymous communication},
}
|
privcount-ccs2016@inproceedings{privcount-ccs2016,
title = {Safely Measuring Tor},
author = {Rob Jansen and Aaron Johnson},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/privcount-ccs2016.pdf},
www_section = {Misc},
}
|
pro-pro:pet2000@inproceedings{pro-pro:pet2000,
title = {Protection Profiles for Remailer Mixes},
author = {Kai Rannenberg and Giovanni Iachello},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf},
www_section = {Anonymous communication},
}
|
proximax11@inproceedings{proximax11,
title = {Proximax: Fighting Censorship With an Adaptive System for Distribution of Open
Proxies},
author = {Kirill Levchenko and Damon McCoy},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf},
www_tags = {selected},
www_section = {Communications Censorship},
}
|
publius@inproceedings{publius,
title = {Publius: {A} robust, tamper-evident, censorship-resistant and source-anonymous
web publishing system},
author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
booktitle = {Proceedings of the 9th USENIX Security Symposium},
year = {2000},
month = {August},
pages = {59--72},
www_tags = {selected},
www_section = {Anonymous publication},
www_pdf_url = {http://www.cs.nyu.edu/~waldman/publius/publius.pdf},
}
|
quant-adhoc@inproceedings{quant-adhoc,
title = {Quantification of Anonymity for Mobile Ad Hoc Networks},
author = {Marie Elisabeth Gaup Moe},
booktitle = {Proceedings of the 4th International Workshop on Security and Trust
Management (STM 08)},
year = {2008},
month = {June},
location = {Trondheim, Norway},
pages = {25--36},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf},
}
|
rackoff93cryptographic@inproceedings{rackoff93cryptographic,
title = {Cryptographic Defense Against Traffic Analysis},
author = {Charles Rackoff and Daniel R. Simon},
booktitle = {Proceedings of {ACM} Symposium on Theory of Computing},
year = {1993},
pages = {672--681},
www_tags = {selected},
www_section = {Traffic analysis},
www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps},
}
|
raid2011:chakravartydetecting@inproceedings{raid2011:chakravartydetecting,
title = {Detecting Traffic Snooping in Tor Using Decoys},
author = {Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and
Angelos D. Keromytis},
booktitle = {Proceedings of the 14th International Conference on Recent Advances in
Intrusion Detection},
year = {2011},
month = {September},
address = {Berlin, Heidelberg},
location = {Menlo Park, CA},
pages = {222--241},
publisher = {Springer-Verlag},
series = {RAID'11},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf},
}
|
randomized-checking@inproceedings{randomized-checking,
title = {Making mix nets robust for electronic voting by randomized partial checking},
author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest},
booktitle = {Proceedings of the 11th USENIX Security Symposium},
year = {2002},
month = {August},
www_tags = {selected},
www_important = {1},
www_pdf_url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf},
www_section = {Provable shuffles},
}
|
rao-pseudonymity@inproceedings{rao-pseudonymity,
title = {Can Pseudonymity Really Guarantee Privacy?},
author = {Josyula R. Rao and Pankaj Rohatgi},
booktitle = {Proceedings of the 9th USENIX Security Symposium},
year = {2000},
month = {August},
pages = {85--96},
publisher = {USENIX},
www_tags = {selected},
www_section = {Pseudonymity},
www_pdf_url = {http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf},
}
|
raptor-sec2015@inproceedings{raptor-sec2015,
title = {{RAPTOR}: Routing Attacks on Privacy in {Tor}},
author = {Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer
Rexford and Mung Chiang and Prateek Mittal},
booktitle = {Proceedings of the 24th USENIX Security Symposium},
year = {2015},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-sun.pdf},
www_section = {Traffic analysis},
}
|
raykova-pet2008@inproceedings{raykova-pet2008,
title = {PAR: Payment for Anonymous Routing},
author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou
and Steven M. Bellovin},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {219--236},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf},
www_section = {Anonymous communication},
}
|
raymond00@inproceedings{raymond00,
title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}},
author = {Jean-Fran\c{c}ois Raymond},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {10--29},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf},
www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps},
}
|
realtime-mix@article{realtime-mix,
title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and Birgit Pfitzmann and
Michael Waidner},
journal = {IEEE Journal on Selected Areas in Communications},
volume = {16},
number = {4},
year = {1998},
www_tags = {selected},
www_html_url = {http://www.zurich.ibm.com/security/publications/1998.html},
www_section = {Anonymous communication},
}
|
reardon-thesis@mastersthesis{reardon-thesis,
title = {Improving {Tor} using a {TCP}-over-{DTLS} Tunnel},
author = {Reardon, Joel},
school = {University of Waterloo},
year = {2008},
month = {September},
www_tags = {selected},
www_abstract_url = {http://hdl.handle.net/10012/4011},
www_section = {Anonymous communication,Tor Performance},
www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf},
}
|
redblue@inproceedings{redblue,
title = {The Economics of Censorship Resistance},
author = {George Danezis and Ross Anderson},
booktitle = {Proceedings of Workshop on Economics and Information Security (WEIS04)},
year = {2004},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/redblue.pdf},
www_section = {Economics},
}
|
regroup2006@article{regroup2006,
title = {Regroup-And-Go mixes to counter the $(n-1)$ attack},
author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao},
journal = {Journal of Internet Research},
volume = {16},
number = {2},
year = {2006},
pages = {213--223},
publisher = {Emerald Group Publishing Limited},
doi = {http://dx.doi.org/10.1108/10662240610656528},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
reiter:ccs2004@inproceedings{reiter:ccs2004,
title = {Fragile Mixing},
author = {Michael Reiter and XiaoFeng Wang},
booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications
Security (CCS 2004)}},
year = {2004},
month = {October},
publisher = {ACM Press},
www_tags = {selected},
www_pdf_url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf},
www_section = {Anonymous communication},
}
|
relay-anon-micropay-fc14@inproceedings{relay-anon-micropay-fc14,
title = {Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay [short paper]},
author = {Alex Biryukov and Ivan Pustogarov},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'15)},
year = {2015},
month = {February},
www_pdf_url = {http://fc15.ifca.ai/preproceedings/paper_71.pdf},
www_section = {Tor Performance},
}
|
remailer-history@article{remailer-history,
title = {Prospects for Remailers},
author = {Sameer Parekh},
journal = {First Monday},
volume = {1},
number = {2},
year = {1996},
month = {August},
www_tags = {selected},
www_html_url = {http://www.firstmonday.dk/issues/issue2/remailers/},
www_section = {Anonymous communication},
}
|
remote-traffic-pets12@inproceedings{remote-traffic-pets12,
title = {Website Detection Using Remote Traffic Analysis},
author = {Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf},
www_section = {Traffic analysis},
}
|
rep-anon@inproceedings{rep-anon,
title = {{Reputation in P2P Anonymity Systems}},
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
booktitle = {Proceedings of Workshop on Economics of Peer-to-Peer Systems},
year = {2003},
month = {June},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/econp2p03/econp2p03.pdf},
www_section = {Economics},
}
|
reusable-channels:wpes2003@inproceedings{reusable-channels:wpes2003,
title = {Reusable Anonymous Return Channels},
author = {Philippe Golle and Markus Jakobsson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2003)}},
year = {2003},
month = {October},
location = {Washington, DC, USA},
www_tags = {selected},
www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf},
www_remarks = {Reencryption mix-nets can allow users to use a single reply channel even
when they maintain multiple separate nyms (think of it like a reply block but it
looks different each time you give it to somebody).},
www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/return.ps},
www_section = {Anonymous communication},
}
|
rewebber@article{rewebber,
title = {{TAZ servers and the rewebber network: Enabling anonymous publishing on the
world wide web}},
author = {Ian Goldberg and David Wagner},
journal = {First Monday},
volume = {3},
number = {4},
year = {1998},
month = {August},
www_tags = {selected},
www_html_url = {http://www.firstmonday.dk/issues/issue3_4/goldberg/},
www_ps_url = {http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps},
www_section = {Anonymous publication},
}
|
riffle-pets2016@article{riffle-pets2016,
title = {Riffle: An Efficient Communication System With Strong Anonymity},
author = {Albert Kwon and David Lazar and Srinivas Devadas and Bryan Ford},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {2},
year = {2016},
month = {April},
pages = {115--134},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Riffle.pdf},
www_section = {Anonymous communication},
}
|
ringstwice07@inproceedings{ringstwice07,
title = {Subliminal Channels in the Private Information Retrieval Protocols},
author = {Meredith L. Patterson and Len Sassaman},
booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux},
year = {2007},
location = {Enschede, NL},
publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf},
www_section = {Private Information Retrieval},
}
|
riposte2015@inproceedings{riposte2015,
title = {{Riposte}: An anonymous messaging system handling millions of users},
author = {Corrigan-Gibbs, Henry and Boneh, Dan and Mazi{\`e}res, David},
booktitle = {Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P
2015)},
year = {2015},
month = {May},
location = {San Jose, California, USA},
pages = {321--338},
editor = {},
publisher = {IEEE Computer Society},
isbn = {978-1-4673-6949-7},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {https://www.henrycg.com/files/academic/papers/oakland15riposte.pdf},
}
|
rook-wpes15@inproceedings{rook-wpes15,
title = {Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication
Platform},
author = {Paul Vines and Tadayoshi Kohno},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2015)}},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://homes.cs.washington.edu/~yoshi/papers/wpes-rook.pdf},
www_section = {Communications Censorship},
}
|
roos15impossibility@inproceedings{roos15impossibility,
title = {On the Impossibility of Efficient Self-Stabilization in Virtual Overlays with
Churn},
author = {Stefanie Roos and Thorsten Strufe},
booktitle = {Proceedings of IEEE INFOCOM 2015},
year = {2015},
month = {April},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {https://www.researchgate.net/profile/Stefanie_Roos/publication/280623435_On_the_Impossibility_of_Efficient_Self-Stabilization_in_Virtual_Overlays_with_Churn/links/55bf708108ae092e96669065.pdf},
www_section = {Anonymous publication},
}
|
roos16anonymous@inproceedings{roos16anonymous,
title = {{Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays}},
author = {Stefanie Roos and Martin Beck and Thorsten Strufe},
booktitle = {Proceedings of IEEE INFOCOM 2016},
year = {2016},
month = {April},
publisher = {IEEE},
www_pdf_url = {https://secure-redaktion.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_informatik/sysa/ps/forschung/Publications/roos16anonymous},
www_section = {Anonymous publication},
}
|
roos16dealing@article{roos16dealing,
title = {Dealing with Dead Ends -- Efficient Routing in Darknets},
author = {Stefanie Roos and Thorsten Strufe},
journal = {Transactions on Modeling and Performance Evaluation of Computing Systems
(ToMPECS)},
organization = {ACM},
year = {2016},
www_pdf_url = {https://secure-redaktion.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_informatik/sysa/ps/forschung/Publications/roos16dealing},
www_section = {Anonymous publication},
}
|
safeplug-foci@inproceedings{safeplug-foci,
title = {{Security Audit of Safeplug ``Tor in a Box''}},
author = {Anne Edmundson and Anna Kornfeld Simpson and Joshua A. Kroll and Edward W.
Felten},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-edmundson.pdf},
www_section = {Anonymous communication},
}
|
salmon-pets2016@article{salmon-pets2016,
title = {Salmon: Robust Proxy Distribution for Censorship Circumvention},
author = {Frederick Douglas and Rorshach and Weiyang Pan and Matthew Caesar},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/Salmon__Robust_Proxy_Distribution_for_Censorship_Circumvention.pdf},
www_section = {Communications Censorship},
}
|
sassaman-pet2008@inproceedings{sassaman-pet2008,
title = {How to Bypass Two Anonymity Revocation Systems},
author = {George Danezis and Len Sassaman},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {187--201},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://research.microsoft.com/~gdane/papers/KWF.pdf},
www_section = {Anonymous communication},
}
|
sassaman:wpes2005@inproceedings{sassaman:wpes2005,
title = {The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval},
author = {Len Sassaman and Bram Cohen and Nick Mathewson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2005)}},
year = {2005},
month = {November},
location = {Arlington, VA, USA},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf},
www_section = {Pseudonymity},
}
|
search-engine-pets2017@article{search-engine-pets2017,
title = {Fingerprinting Past the Front Page: Identifying Keywords in Search Engine
Queries over Tor},
author = {Se Eun Oh and Shuai Li and Nicholas Hopper},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper59-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
seidena2005busing@article{seidena2005busing,
title = {New bounds for randomized busing},
author = {Seidena, Steven S and Chena, Peter P and Laxb, RF and Chena, J and Dingb,
Guoli},
journal = {Theoretical Computer Science},
volume = {332},
year = {2005},
pages = {63--81},
www_section = {comm},
www_pdf_url = {https://www.math.lsu.edu/~lax/TCS.pdf},
}
|
serjantov-pet2007@inproceedings{serjantov-pet2007,
title = {A Fresh Look at the Generalized Mix Framework},
author = {Andrei Serjantov},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf},
www_section = {Anonymous communication},
}
|
shadow-ndss12@inproceedings{shadow-ndss12,
title = {{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}},
author = {Rob Jansen and Nicholas Hopper},
booktitle = {Proceedings of the Network and Distributed System Security Symposium -
{NDSS}'12},
year = {2012},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.internetsociety.org/sites/default/files/09_3.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
shalon-anon@inproceedings{shalon-anon,
title = {{SHALON}: Lightweight Anonymization based on Open Standards},
author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer
Andersson},
booktitle = {Proceedings of 18th International Conference on Computer Communications and
Networks},
year = {2009},
month = {August},
location = {San Francisco, CA, USA},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf},
www_section = {Anonymous communication},
}
|
sherwood-protocol@inproceedings{sherwood-protocol,
title = {P5: A Protocol for Scalable Anonymous Communication},
author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
year = {2002},
month = {May},
www_tags = {selected},
www_pdf_url = {http://www.cs.umd.edu/projects/p5/p5.pdf},
www_ps_url = {http://www.cs.umd.edu/projects/p5/p5.ps},
www_section = {Anonymous communication},
}
|
shimshock-pet2008@inproceedings{shimshock-pet2008,
title = {Breaking and Provably Fixing Minx},
author = {Eric Shimshock and Matt Staats and Nicholas Hopper},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {99--114},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf},
www_section = {Anonymous communication},
}
|
shsm03@article{shsm03,
title = {Using Caching for Browsing Anonymity},
author = {Anna Shubina and Sean Smith},
journal = {ACM SIGEcom Exchanges},
volume = {4},
number = {2},
year = {2003},
month = {September},
www_tags = {selected},
www_pdf_url = {http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf},
www_section = {Anonymous communication},
}
|
shuffle:ccs01@inproceedings{shuffle:ccs01,
title = {A Verifiable Secret Shuffle and its Application to E-Voting},
author = {C. Andrew Neff},
booktitle = {{Proceedings of the 8th ACM Conference on Computer and Communications
Security (CCS 2001)}},
year = {2001},
month = {November},
pages = {116--125},
editor = {P. Samarati},
publisher = {ACM Press},
www_tags = {selected},
www_section = {Provable shuffles},
www_pdf_url = {http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf},
}
|
singh2006ama@article{singh2006ama,
title = {{Agyaat: mutual anonymity over structured P2P networks}},
author = {A. Singh and B. Gedik and L. Liu},
journal = {Internet Research},
volume = {16},
number = {2},
year = {2006},
pages = {189--212},
www_section = {Anonymous communication},
}
|
slicing07@inproceedings{slicing07,
title = {Information Slicing: Anonymity Using Unreliable Overlays},
author = {Sachin Katti and Jeffery Cohen and Dina Katabi},
booktitle = {Proceedings of the 4th USENIX Symposium on Network Systems Design and
Implementation (NSDI)},
year = {2007},
month = {April},
www_tags = {selected},
www_pdf_url = {http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf},
www_section = {Anonymous communication},
}
|
slitheen-ccs2016@inproceedings{slitheen-ccs2016,
title = {Slitheen: Perfectly imitated decoy routing through traffic replacement},
author = {Cecylia Bocovich and Ian Goldberg},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '16)},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf},
www_section = {Communications Censorship},
}
|
snader08@inproceedings{snader08,
title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network},
author = {Robin Snader and Nikita Borisov},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08},
year = {2008},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
sniper14@inproceedings{sniper14,
title = {The Sniper Attack: Anonymously Deanonymizing and Disabling the {T}or Network},
author = {Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\"{o}}rn
Scheuermann},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14},
year = {2014},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/sniper-ndss2014.pdf},
www_section = {Traffic analysis},
}
|
sofem05-Klonowski@inproceedings{sofem05-Klonowski,
title = {Anonymous Communication with On-line and Off-line Onion Encoding},
author = {Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski},
booktitle = {Proceedings of Conference on Current Trends in Theory and Practice of
Informatics (SOFSEM 2005)},
year = {2005},
month = {January},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf},
www_section = {Anonymous communication},
}
|
space-efficient@inproceedings{space-efficient,
title = {Space-Efficient Private Search},
author = {George Danezis and Claudia Diaz},
booktitle = {Proceedings of Financial Cryptography (FC2007)},
year = {2007},
month = {February},
location = {Tobago},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science},
www_section = {Private Information Retrieval},
}
|
sphinx-onion-fc10@inproceedings{sphinx-onion-fc10,
title = {Using Sphinx to Improve Onion Routing Circuit Construction},
author = {Aniket Kate and Ian Goldberg},
booktitle = {Proceedings of Financial Cryptography (FC '10)},
year = {2010},
month = {January},
editor = {Radu Sion},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
statistical-disclosure@inproceedings{statistical-disclosure,
title = {Statistical Disclosure Attacks: Traffic Confirmation in Open Environments},
author = {George Danezis},
booktitle = {Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})},
organization = {{IFIP TC11}},
year = {2003},
month = {May},
location = {Athens},
pages = {421--426},
editor = {Gritzalis and Vimercati and Samarati and Katsikas},
publisher = {Kluwer},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf},
}
|
steinbrecher:pet2003@inproceedings{steinbrecher:pet2003,
title = {Modelling Unlinkability},
author = {Sandra Steinbrecher and Stefan K\"opsell},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
year = {2003},
month = {March},
pages = {32--47},
editor = {Roger Dingledine},
publisher = {Springer-Verlag, LNCS 2760},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf},
}
|
stepping-stones@inproceedings{stepping-stones,
title = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through
Stepping Stones},
author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu},
booktitle = {Proceedings of ESORICS 2002},
year = {2002},
month = {October},
pages = {244--263},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf},
}
|
steven-thesis@phdthesis{steven-thesis,
title = {Covert channel vulnerabilities in anonymity systems},
author = {Steven J. Murdoch},
school = {University of Cambridge},
year = {2007},
month = {December},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf},
}
|
stop-and-go@inproceedings{stop-and-go,
title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System},
author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes},
booktitle = {Proceedings of Information Hiding Workshop (IH 1998)},
year = {1998},
publisher = {Springer-Verlag, LNCS 1525},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.uow.edu.au/~ldn01/infohide98.pdf},
www_section = {Anonymous communication},
}
|
strong-eternity@inproceedings{strong-eternity,
title = {The Strong Eternity Service},
author = {Tonda Benes},
booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
year = {2001},
month = {April},
editor = {Ira S. Moskowitz},
publisher = {Springer-Verlag, LNCS 2137},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/strong-eternity.pdf},
www_section = {Anonymous publication},
}
|
sublinearpir-fc14@inproceedings{sublinearpir-fc14,
title = {Sublinear Scaling for Multi-Client Private Information Retrieval},
author = {Wouter Lueks and Ian Goldberg},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'15)},
year = {2015},
month = {February},
www_pdf_url = {http://fc15.ifca.ai/preproceedings/paper_48.pdf},
www_section = {Private Information Retrieval},
}
|
sybil@inproceedings{sybil,
title = {{The Sybil Attack}},
author = {John Douceur},
booktitle = {Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS
2002)},
year = {2002},
month = {March},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf},
www_section = {Traffic analysis},
}
|
sync-batching@inproceedings{sync-batching,
title = {Synchronous Batching: From Cascades to Free Routes},
author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {186--206},
series = {LNCS},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://freehaven.net/doc/sync-batching/sync-batching.pdf},
www_ps_url = {http://freehaven.net/doc/sync-batching/sync-batching.ps},
}
|
systems-anon-communication@incollection{systems-anon-communication,
title = {{Systems for Anonymous Communication}},
author = {George Danezis and Claudia Diaz and Paul F. Syverson},
booktitle = {CRC Handbook of Financial Cryptography and Security},
volume = {},
year = {2010},
month = {August},
pages = {341--390},
editor = {B. Rosenberg and D. Stinson},
publisher = {Chapman \& Hall},
series = {CRC Cryptography and Network Security Series},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf},
}
|
syverson99@inproceedings{syverson99,
title = {Group Principals and the Formalization of Anonymity},
author = {Paul F. Syverson and Stuart G. Stubblebine},
booktitle = {Proceedings of the World Congress on Formal Methods (1)},
year = {1999},
pages = {814--833},
www_tags = {selected},
www_section = {Formal methods},
www_pdf_url = {http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf},
www_ps_url = {http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps},
}
|
tagit-pets2017@article{tagit-pets2017,
title = {TagIt: Tagging Network Flows using Blind Fingerprints},
author = {Fatemeh Rezaei and Amir Houmansadr},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {4},
year = {2017},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue4/paper66-2017-4-source.pdf},
www_section = {Traffic analysis},
}
|
tap:pet2006@inproceedings{tap:pet2006,
title = {On the Security of the {Tor} Authentication Protocol},
author = {Ian Goldberg},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {316--331},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/torsec.pdf},
www_section = {Formal methods},
}
|
tapdance-foci17@inproceedings{tapdance-foci17,
title = {An ISP-Scale Deployment of TapDance},
author = {Sergey Frolov and Fred Douglas and Will Scott and Allison McDonald and Benjamin
VanderSloot and Rod Hynes and Adam Kruger and Michalis Kallitsis and David G.
Robinson and Nikita Borisov and Alex Halderman and Eric Wustrow},
booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet},
year = {2017},
month = {August},
location = {Vancouver, Canada},
series = {FOCI '17},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci17/foci17-paper-frolov_0.pdf},
www_section = {Communications Censorship},
}
|
taps-ndss2017@inproceedings{taps-ndss2017,
title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path
Selection},
author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul
Syverson},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '17},
year = {2017},
month = {February},
publisher = {Internet Society},
www_tags = {selected},
www_pdf_url = {http://www.robgjansen.com/publications/taps-ndss2017.pdf},
www_section = {Anonymous communication},
}
|
tarzan:ccs02@inproceedings{tarzan:ccs02,
title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
author = {Michael J. Freedman and Robert Morris},
booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications
Security (CCS 2002)}},
year = {2002},
month = {November},
location = {Washington, DC},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf},
www_section = {Anonymous communication},
}
|
tasp-wpes16@inproceedings{tasp-wpes16,
title = {TASP: Towards Anonymity Sets that Persist},
author = {Jamie Hayes and Carmela Troncoso and George Danezis},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2016)}},
year = {2016},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.homepages.ucl.ac.uk/~ucabaye/papers/TASP.pdf},
www_section = {Anonymous communication},
}
|
tau-indy@inproceedings{tau-indy,
title = {A Random Server Model for Private Information Retrieval or How to Achieve
Information Theoretic PIR Avoiding Database Replication},
author = {Yael Gertner and Shafi Goldwasser and Tal Malkin},
booktitle = {Proceedings of the Second International Workshop on Randomization and
Approximation Techniques in Computer Science (RANDOM '98)},
year = {1998},
location = {London, UK},
pages = {200--217},
publisher = {Springer-Verlag},
isbn = {3-540-65142-X},
www_section = {Private Information Retrieval},
www_ps_gz_url = {http://eprint.iacr.org/1998/013.ps.gz},
}
|
taxonomy-dummy@inproceedings{taxonomy-dummy,
title = {Taxonomy of Mixes and Dummy Traffic},
author = {Claudia Diaz and Bart Preneel},
booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity
in Networked and Distributed Systems},
year = {2004},
month = {August},
location = {Toulouse, France},
www_tags = {selected},
www_pdf_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf},
www_section = {Anonymous communication},
}
|
tcp-tor-pets12@inproceedings{tcp-tor-pets12,
title = {{Spying in the Dark: TCP and Tor Traffic Analysis}},
author = {Yossi Gilad and Amir Herzberg},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf},
www_section = {Traffic analysis},
}
|
terminology@misc{terminology,
title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for
Terminology},
author = {Andreas Pfitzmann and Marit Hansen},
year = {2000},
month = {July},
howpublished = {Draft},
www_tags = {selected},
www_section = {Misc},
optnote = {For date of the latest version, see the document itself},
www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml},
}
|
throttling-sec12@inproceedings{throttling-sec12,
title = {{Throttling Tor Bandwidth Parasites}},
author = {Rob Jansen and Paul Syverson and Nicholas Hopper},
booktitle = {Proceedings of the 21st USENIX Security Symposium},
year = {2012},
month = {August},
www_pdf_url = {http://www.robgjansen.com/publications/throttling-sec2012.pdf},
www_tags = {selected},
www_section = {Traffic analysis,Tor Performance},
}
|
timing-fc2004@inproceedings{timing-fc2004,
title = {Timing Attacks in Low-Latency Mix-Based Systems},
author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
booktitle = {Proceedings of Financial Cryptography (FC '04)},
year = {2004},
month = {February},
pages = {251--265},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS 3110},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
}
|
timpanaro:hal-00744919@inproceedings{timpanaro:hal-00744919,
title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 6th International Conference on Network and System
Security}},
year = {2012},
month = {November},
address = {Wu Yi Shan, China},
hal_id = {hal-00744919},
language = {English},
url = {http://hal.inria.fr/hal-00744919},
abstract = {{Anonymous communications have been gaining more and more interest from
Internet users as privacy and anonymity problems have emerged. Among anonymous
enabled services, anonymous file-sharing is one of the most active one and is
increasingly growing. Large scale monitoring on these systems allows us to grasp
how they behave, which type of data is shared among users, the overall behaviour
in the system. But does large scale monitoring jeopardize the system anonymity?
In this work we present the first large scale monitoring architecture and
experiments on the I2P network, a low-latency message-oriented anonymous network.
We characterize the file-sharing environment within I2P, and evaluate if this
monitoring affects the anonymity provided by the network. We show that most
activities within the network are file-sharing oriented, along with anonymous
web-hosting. We assess the wide geographical location of nodes and network
popularity. We also demonstrate that group-based profiling is feasible on this
particular network.}},
www_section = {Traffic analysis},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing},
}
|
timpanaro:hal-00744922@inproceedings{timpanaro:hal-00744922,
title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and
Security}},
volume = {4},
year = {2012},
month = {December},
address = {Melbourne, Australia},
pages = {77--92},
publisher = {Springer},
hal_id = {hal-00744922},
doi = {10.1007/978-3-642-35362-8},
language = {English},
url = {http://hal.inria.fr/hal-00744922},
abstract = {{Anonymous communication has gained more and more interest from Internet
users as privacy and anonymity problems have emerged. Dedicated anonymous
networks such as Freenet and I2P allow anonymous file-sharing among users.
However, one major problem with anonymous file-sharing networks is that the
available content is highly reduced, mostly with outdated files, and
non-anonymous networks, such as the BitTorrent network, are still the major
source of content: we show that in a 30-days period, 21648 new torrents were
introduced in the BitTorrent community, whilst only 236 were introduced in the
anonymous I2P network, for four different categories of content. Therefore, how
can a user of these anonymous networks access this varied and non-anonymous
content without compromising its anonymity? In this paper, we improve content
availability in an anonymous environment by proposing the first internetwork
model allowing anonymous users to access and share content in large public
communities while remaining anonymous. We show that our approach can efficiently
interconnect I2P users and public BitTorrent swarms without affecting their
anonymity nor their performance. Our model is fully implemented and freely
usable.}},
www_section = {Anonymous communication},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
}
|
timpanaro:inria-00632259@techreport{timpanaro:inria-00632259,
title = {{Monitoring the I2P network}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
institution = {MADYNES - INRIA Lorraine - LORIA},
year = {2011},
month = {October},
hal_id = {inria-00632259},
language = {English},
url = {http://hal.inria.fr/inria-00632259},
abstract = {{We present the first monitoring study aiming to characterize the usage of
the I2P network, a low-latency anonymous network based on garlic routing. We
design a distributed monitoring architecture for the I2P network and we show
through a one week long experiment that we are able to identify 32\% of all
running applications, among web servers and file- sharing clients. Additionally,
we identify 37\% of published I2P applications, which turn out to be unreachable
after its publication on the I2P distributed database.}},
www_section = {Traffic analysis},
affiliation = {MADYNES - INRIA Lorraine - LORIA},
www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf},
}
|
ting-imc2015@inproceedings{ting-imc2015,
title = {Ting: Measuring and Exploiting Latencies Between All Tor Nodes},
author = {Frank Cangialosi and Dave Levin and Neil Spring},
booktitle = {Proceedings of the 2015 Internet Measurement Conference},
year = {2015},
month = {October},
www_tags = {selected},
www_pdf_url = {https://www.cs.umd.edu/~dml/papers/ting_imc15.pdf},
www_section = {Traffic analysis},
}
|
tissec-latency-leak@article{tissec-latency-leak,
title = {How Much Anonymity does Network Latency Leak?},
author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin},
journal = {ACM Transactions on Information and System Security},
volume = {13},
number = {2},
year = {2010},
month = {February},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf},
www_section = {Traffic analysis},
}
|
topology-pet2010@inproceedings{topology-pet2010,
title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity
Networks},
author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS
2010)},
year = {2010},
month = {July},
location = {Berlin, Germany},
www_tags = {selected},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf},
www_section = {Traffic analysis},
}
|
tor-blocking@techreport{tor-blocking,
title = {Design of a blocking-resistant anonymity system},
author = {Roger Dingledine and Nick Mathewson},
institution = {The Tor Project},
number = {2006-1},
year = {2006},
month = {November},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
}
|
tor-design@inproceedings{tor-design,
title = {{Tor}: The Second-Generation Onion Router},
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
booktitle = {Proceedings of the 13th USENIX Security Symposium},
year = {2004},
month = {August},
www_important = {1},
www_tags = {selected},
www_html_url = {https://svn.torproject.org/svn/projects/design-paper/tor-design.html},
www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf},
www_section = {Anonymous communication},
}
|
tor-soups07@inproceedings{tor-soups07,
title = {{Usability of anonymous web browsing: an examination of Tor interfaces and
deployability}},
author = {Jeremy Clark and P. C. van Oorschot and Carlisle Adams},
booktitle = {{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS
'07)}},
year = {2007},
month = {July},
address = {New York, NY, USA},
location = {Pittsburgh, Pennsylvania},
pages = {41--51},
publisher = {ACM},
doi = {http://doi.acm.org/10.1145/1280680.1280687},
isbn = {978-1-59593-801-5},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf},
}
|
tor-sybils2016@inproceedings{tor-sybils2016,
title = {Identifying and Characterizing Sybils in the Tor Network},
author = {Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster},
booktitle = {Proceedings of the 25th Usenix Security Symposium},
year = {2016},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_winter.pdf},
www_section = {Traffic analysis},
}
|
torspinISC08@inproceedings{torspinISC08,
title = {Compromising Anonymity Using Packet Spinning},
author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P.
Markatos},
booktitle = {Proceedings of the 11th Information Security Conference (ISC 2008)},
year = {2008},
month = {September},
location = {Taipei, Taiwan},
www_tags = {selected},
www_pdf_url = {http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf},
www_section = {Anonymous communication},
}
|
torta05@inproceedings{torta05,
title = {Low-Cost Traffic Analysis of {Tor}},
author = {Steven J. Murdoch and George Danezis},
booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy},
year = {2005},
month = {May},
publisher = {IEEE CS},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf},
www_section = {Traffic analysis},
}
|
tortraceroutes-pets2015@article{tortraceroutes-pets2015,
title = {Defending Tor from Network Adversaries: A Case Study of Network Path
Prediction},
author = {Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew
Caesar},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {2},
year = {2015},
month = {June},
pages = {171--187},
doi = {10.1515/popets-2015-0021},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/tortraceroutes-pets15.pdf},
www_section = {Traffic analysis},
}
|
traffic-padding-pets12@inproceedings{traffic-padding-pets12,
title = {k-Indistinguishable Traffic Padding in Web Applications},
author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi},
booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS
2012)},
year = {2012},
month = {July},
publisher = {Springer},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf},
www_section = {Traffic analysis},
}
|
trickle02@inproceedings{trickle02,
title = {From a Trickle to a Flood: Active Attacks on Several Mix Types},
author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
month = {October},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS 2578},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf},
www_ps_url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.ps},
www_section = {Traffic analysis},
}
|
trist-foci@inproceedings{trist-foci,
title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image
Steganography},
author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran},
booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the
Internet ({FOCI} 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf},
www_section = {Communications Censorship},
}
|
troncoso-ih2007@inproceedings{troncoso-ih2007,
title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File
System},
author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel},
booktitle = {Proceedings of Information Hiding Workshop (IH 2007)},
volume = {4567},
number = {},
year = {2007},
month = {June},
location = {Saint-Malo,FR},
pages = {220--236},
editor = {T. Furon et al},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-890.pdf},
www_section = {Misc},
}
|
troncoso-pet2008@inproceedings{troncoso-pet2008,
title = {Perfect Matching Statistical Disclosure Attacks},
author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid
Verbauwhede},
booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing
Technologies (PETS 2008)},
year = {2008},
month = {July},
location = {Leuven, Belgium},
pages = {2--23},
editor = {Nikita Borisov and Ian Goldberg},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petsymposium.org/2008/},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf},
www_section = {Traffic analysis},
}
|
trustrep-pets2015@article{trustrep-pets2015,
title = {20,000 In League Under the Sea: Anonymous Communication, Trust, {MLAT}s, and
Undersea Cables},
author = {Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan
Feigenbaum},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2015},
number = {1},
year = {2015},
month = {April},
pages = {4--24},
www_tags = {selected},
www_pdf_url = {http://ohmygodel.com/publications/trustrep-popets15.pdf},
www_section = {Traffic analysis},
}
|
tsai2006sas@article{tsai2006sas,
title = {{A Scalable Anonymous Server Overlay Network}},
author = {H. Tsai and A. Harwood},
journal = {Proceedings of the 20th International Conference on Advanced Information
Networking and Applications-Volume 1 (AINA'06)-Volume 01},
year = {2006},
pages = {973--978},
publisher = {IEEE Computer Society Washington, DC, USA},
www_section = {Anonymous communication},
}
|
tschorsch:translayeranon@inproceedings{tschorsch:translayeranon,
title = {How (not) to build a transport layer for anonymity overlays},
author = {Florian Tschorsch and Bj{\"{o}}rn Scheurmann},
booktitle = {Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and
Anonymity for the Digital Economy},
year = {2012},
month = {June},
www_pdf_url = {http://pade12.mytestbed.net/pade12-final6.pdf},
www_tags = {selected},
www_section = {Anonymous communication,Tor Performance},
}
|
tsudik-pet2007@inproceedings{tsudik-pet2007,
title = {A Family of Dunces},
author = {Gene Tsudik},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Family_dunces.pdf},
www_section = {Misc},
}
|
unique-ccs2017@inproceedings{unique-ccs2017,
title = {How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion
Services},
author = {Rebekah Overdorf and Marc Juarez and Gunes Acar and Rachel Greenstadt and
Claudia Diaz},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications
Security (CCS '17)},
year = {2017},
month = {November},
www_tags = {selected},
www_pdf_url = {https://cosic.esat.kuleuven.be/fingerprintability/fingerprintability.pdf},
www_section = {Traffic analysis},
}
|
usability:weis2006@inproceedings{usability:weis2006,
title = {Anonymity Loves Company: Usability and the Network Effect},
author = {Roger Dingledine and Nick Mathewson},
booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
(WEIS 2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
editor = {Ross Anderson},
www_section = {Economics},
bookurl = {http://weis2006.econinfosec.org/},
www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf},
www_tags = {selected},
}
|
usableTor@inproceedings{usableTor,
title = {Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in
Anonymity Systems},
author = {Greg Norcie and Jim Blythe and Kelly Caine and L Jean Camp},
booktitle = {Proceedings of the 2014 Workshop on Usable Security (USEC)},
year = {2014},
month = {February},
www_pdf_url = {http://www.norcie.com/papers/torUSEC.pdf},
www_tags = {selected},
www_section = {Misc},
}
|
usenix11-pirtor@inproceedings{usenix11-pirtor,
title = {PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval},
author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and
Ian Goldberg},
booktitle = {Proceedings of the 20th USENIX Security Symposium},
year = {2011},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
usenix11-telex@inproceedings{usenix11-telex,
title = {Telex: Anticensorship in the Network Infrastructure},
author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
booktitle = {Proceedings of the 20th USENIX Security Symposium},
year = {2011},
month = {August},
www_important = {1},
www_tags = {selected},
www_pdf_url = {http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf},
www_section = {Communications Censorship},
}
|
usenix2010:aggarwal2010analysis@inproceedings{usenix2010:aggarwal2010analysis,
title = {An Analysis of Private Browsing Modes in Modern Browsers},
author = {Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh},
booktitle = {Proceedings of the 19th Usenix Security Symposium},
year = {2010},
month = {August},
www_tags = {selected},
www_pdf_url = {http://www.collinjackson.com/research/private-browsing.pdf},
www_section = {Misc},
}
|
valet:pet2006@inproceedings{valet:pet2006,
title = {Valet Services: Improving Hidden Servers with a Personal Touch},
author = {Lasse {\O}verlier and Paul Syverson},
booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET
2006)},
year = {2006},
month = {June},
location = {Cambridge, UK},
pages = {223--244},
editor = {George Danezis and Philippe Golle},
publisher = {Springer},
www_tags = {selected},
bookurl = {http://petworkshop.org/2006/},
www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf},
www_section = {Pseudonymity},
}
|
vuvuzela:sosp15@inproceedings{vuvuzela:sosp15,
title = {Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis},
author = {Jelle van den Hooff and David Lazar and Matei Zaharia and Nickolai Zeldovich},
booktitle = {Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP
2015)},
year = {2015},
month = {October},
address = {Monterey, California},
www_tags = {selected},
www_pdf_url = {https://pdos.csail.mit.edu/papers/vuvuzela:sosp15.pdf},
www_section = {Anonymous communication},
}
|
w09@inproceedings{w09,
title = {Security Analysis of {AN.ON}'s Payment Scheme},
author = {Benedikt Westermann},
booktitle = {Proceedings of NordSec 2009},
volume = {5838/2009},
year = {2009},
month = {October},
pages = {255--270},
editor = {Audun J{\o}sang and Torleiv Maseng and Svein Johan Knapskog},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
www_section = {Anonymous communication},
}
|
wagner@article{wagner,
title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}},
author = {Robyn Wagner},
journal = {New Mexico Law Review},
volume = {32},
number = {Winter},
year = {2002},
pages = {99--142},
www_tags = {selected},
www_section = {Misc},
}
|
waldman01tangler@inproceedings{waldman01tangler,
title = {Tangler: a censorship-resistant publishing system based on document
entanglements},
author = {Marc Waldman and David Mazi\`eres},
booktitle = {{Proceedings of the 8th ACM Conference on Computer and Communications
Security (CCS 2001)}},
year = {2001},
month = {November},
pages = {126--135},
www_important = {1},
www_tags = {selected},
www_section = {Anonymous publication},
www_ps_url = {http://www.cs.nyu.edu/~waldman/tangler.ps},
}
|
walkie-talkie2017@inproceedings{walkie-talkie2017,
title = {Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting
Attacks},
author = {Tao Wang and Ian Goldberg},
booktitle = {Proceedings of the 26th Usenix Security Symposium},
year = {2017},
month = {August},
www_tags = {selected},
www_pdf_url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang-tao.pdf},
www_section = {Anonymous communication},
}
|
wan2012priv@inproceedings{wan2012priv,
title = {Priv-Code: Preserving privacy against traffic analysis through network coding
for multihop wireless networks},
author = {Wan, Zhiguo and Xing, Kai and Liu, Yunhao},
booktitle = {Proceedings of the 31st Annual IEEE Conference on Computer Communications
(INFOCOM 2012)},
organization = {IEEE},
year = {2012},
pages = {73--81},
www_section = {Misc},
www_pdf_url = {http://www.cse.ust.hk/~liu/Infocom_12_Zhiguo.pdf},
}
|
wang14-fingerprinting-defenses@inproceedings{wang14-fingerprinting-defenses,
title = {Effective Attacks and Provable Defenses for Website Fingerprinting},
author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {http://cacr.uwaterloo.ca/techreports/2014/cacr2014-05.pdf},
www_section = {Traffic analysis},
}
|
wang2006sam@misc{wang2006sam,
title = {{System and method for protecting privacy and anonymity of parties of network
communications}},
author = {Y.M. Wang and Q. Sun and D.R. Simon and W. Russell},
year = {2006},
howpublished = {US Patent 6,986,036},
publisher = {Google Patents},
note = {US Patent 6,986,036},
www_section = {Anonymous communication},
}
|
wang2011anonymous@inproceedings{wang2011anonymous,
title = {Anonymous communication with network coding against traffic analysis attack},
author = {Wang, Jin and Wang, Jianping and Wu, Chuan and Lu, Kejie and Gu, Naijie},
booktitle = {Proceedings of the 30th Annual IEEE Conference on Computer Communications
(INFOCOM 2011)},
organization = {IEEE},
year = {2011},
pages = {1008--1016},
www_section = {Misc},
www_pdf_url = {http://i.cs.hku.hk/~cwu/papers/jwang-infocom11.pdf},
}
|
warta04-Klonowski@inproceedings{warta04-Klonowski,
title = {Universal Re-encryption of Signatures and Controlling Anonymous Information
Flow},
author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski},
booktitle = {Proceedings of WARTACRYPT '04},
year = {2004},
month = {July},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
www_section = {Misc},
}
|
waterfilling-pets2017@article{waterfilling-pets2017,
title = {Waterfilling: Balancing the Tor network with maximum diversity},
author = {Florentin Rochet and Olivier Pereira},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2017},
number = {2},
year = {2017},
month = {April},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2017/papers/issue2/paper05-2017-2-source.pdf},
www_section = {Tor Performance},
}
|
web-mix:pet2000@inproceedings{web-mix:pet2000,
title = {Web {MIX}es: A system for anonymous and unobservable {I}nternet access},
author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {115--129},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_tags = {selected},
www_section = {Anonymous communication},
www_pdf_url = {http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf},
}
|
websitefingerprinting-pets2016@article{websitefingerprinting-pets2016,
title = {On Realistically Attacking Tor with Website Fingerprinting},
author = {Tao Wang and Ian Goldberg},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2016},
number = {4},
year = {2016},
month = {October},
www_tags = {selected},
www_pdf_url = {https://petsymposium.org/2016/files/papers/On_Realistically_Attacking_Tor_with_Website_Fingerprinting.pdf},
www_section = {Traffic analysis},
}
|
wecsr10measuring-tor@inproceedings{wecsr10measuring-tor,
title = {A Case Study on Measuring Statistical Data in the {T}or Anonymity Network},
author = {Karsten Loesing and Steven J. Murdoch and Roger Dingledine},
booktitle = {Proceedings of the Workshop on Ethics in Computer Security Research (WECSR
2010)},
year = {2010},
month = {January},
location = {Tenerife, Canary Islands, Spain},
publisher = {Springer},
series = {LNCS},
www_tags = {selected},
www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf},
www_section = {Anonymous communication},
}
|
wendolsky-pet2007@inproceedings{wendolsky-pet2007,
title = {Performance Comparison of low-latency Anonymisation Services from a User
Perspective},
author = {Rolf Wendolsky and Dominik Herrmann and Hannes Federrath},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Performance_comparison.pdf},
www_section = {Anonymous communication},
}
|
wiangsripanawan-acsw07@inproceedings{wiangsripanawan-acsw07,
title = {Design principles for low latency anonymous network systems secure against
timing attacks},
author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini},
booktitle = {Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW
'07)},
year = {2007},
address = {Darlinghurst, Australia, Australia},
location = {Ballarat, Australia},
pages = {183--191},
publisher = {Australian Computer Society, Inc},
isbn = {1-920-68285-X},
www_section = {Traffic analysis},
www_tags = {selected},
www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=},
}
|
wileydust@techreport{wileydust,
title = {Dust: A Blocking-Resistant Internet Transport Protocol},
author = {Brandon Wiley},
institution = {School of Information, University of Texas at Austin},
year = {2011},
www_section = {Communications Censorship},
www_pdf_url = {http://blanu.net/Dust.pdf},
www_tags = {selected},
}
|
wisa04-Klonowski@inproceedings{wisa04-Klonowski,
title = {Anonymous Communication with On-line and Off-line Onion Encoding},
author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski},
booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)},
year = {2004},
month = {August},
www_tags = {selected},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf},
www_section = {Anonymous communication},
}
|
wk11-malice-vs-anon@inproceedings{wk11-malice-vs-anon,
title = {Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection},
author = {Benedikt Westermann and Dogan Kesdogan},
booktitle = {Proceedings of Financial Cryptography and Data Security (FC'11)},
year = {2011},
month = {February},
www_pdf_url = {http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf},
www_tags = {selected},
www_section = {Anonymous communication},
}
|
wpes06:heydt-benjamin@inproceedings{wpes06:heydt-benjamin,
title = {Nonesuch: a mix network with sender unobservability},
author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2006)}},
year = {2006},
month = {October},
address = {New York, NY, USA},
location = {Alexandria, Virginia, USA},
pages = {1--8},
publisher = {ACM Press},
doi = {http://doi.acm.org/10.1145/1179601.1179603},
isbn = {1-59593-556-8},
www_section = {Anonymous communication},
www_tags = {selected},
www_pdf_url = {http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf},
}
|
wpes09-bridge-attack@inproceedings{wpes09-bridge-attack,
title = {{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking
resistance design}},
author = {Jon McLachlan and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf},
www_section = {Traffic analysis},
}
|
wpes09-dht-attack@inproceedings{wpes09-dht-attack,
title = {{Hashing it out in public: Common failure modes of DHT-based anonymity
schemes}},
author = {Andrew Tran and Nicholas Hopper and Yongdae Kim},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf},
www_section = {Traffic analysis},
}
|
wpes09-xpay@inproceedings{wpes09-xpay,
title = {{XPay: Practical anonymous payments for Tor routing and other networked
services}},
author = {Yao Chen and Radu Sion and Bogdan Carbunar},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2009)},
year = {2009},
month = {November},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf},
www_section = {Anonymous communication},
}
|
wpes10-jack@inproceedings{wpes10-jack,
title = {Jack: Scalable Accumulator-based Nymble System},
author = {Zi Lin and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2010)},
year = {2010},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf},
www_section = {Misc},
}
|
wpes10-shadows@inproceedings{wpes10-shadows,
title = {Balancing the Shadows},
author = {Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas
Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2010)},
year = {2010},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf},
www_section = {Anonymous communication},
}
|
wpes10-unraveling@inproceedings{wpes10-unraveling,
title = {Unraveling an Old Cloak: k-anonymity for Location Privacy},
author = {Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and
Jean-Pierre Hubaux},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2010)},
year = {2010},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2},
www_section = {Anonymous communication},
}
|
wpes11-bridgespa@inproceedings{wpes11-bridgespa,
title = {{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization},
author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs
Hengartner},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
www_section = {Anonymous communication},
}
|
wpes11-faust@inproceedings{wpes11-faust,
title = {FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting},
author = {Peter Lofgren and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf},
www_section = {Anonymous communication},
}
|
wpes11-panchenko@inproceedings{wpes11-panchenko,
title = {Website Fingerprinting in Onion Routing Based Anonymization Networks},
author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2011)},
year = {2011},
month = {October},
location = {Chicago, IL, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf},
www_section = {Traffic analysis},
}
|
wpes12-cogs@inproceedings{wpes12-cogs,
title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard
Selection in Tor},
author = {Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian
Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2012)},
year = {2012},
month = {October},
location = {Raleigh, NC, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/~arma/cogs-wpes.pdf},
www_section = {Traffic analysis},
}
|
wpes12-torchestra@inproceedings{wpes12-torchestra,
title = {Torchestra: Reducing interactive traffic delays over Tor},
author = {Deepika Gopal and Nadia Heninger},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2012)},
year = {2012},
month = {October},
location = {Raleigh, NC, USA},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/torchestra-wpes.pdf},
www_section = {Anonymous communication,Tor Performance},
}
|
wpes13-blac@inproceedings{wpes13-blac,
title = {Thinking Inside the {BLAC} Box: Smarter Protocols for Faster Anonymous
Blacklisting},
author = {Ryan Henry and Ian Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf},
www_section = {Pseudonymity},
}
|
wpes13-conscript@inproceedings{wpes13-conscript,
title = {Conscript Your Friends into Larger Anonymity Sets with {J}ava{S}cript},
author = {Henry Corrigan-Gibbs and Bryan Ford},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/wpes13.pdf},
www_section = {Anonymous communication},
}
|
wpes13-fingerprinting@inproceedings{wpes13-fingerprinting,
title = {Improved Website Fingerprinting on Tor},
author = {Tao Wang and Ian Goldberg},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/webfingerprint-wpes.pdf},
www_section = {Traffic analysis},
}
|
wpes13-gotr@inproceedings{wpes13-gotr,
title = {Improved Group Off-The-Record Messaging},
author = {Hong Liu and Eugene Y. Vasserman and Nicholas Hopper},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/gotr.pdf},
www_section = {Anonymous communication},
}
|
wpes13-hide@inproceedings{wpes13-hide,
title = {You Cannot Hide for Long: De-Anonymization of Real-World Dynamic Behaviour},
author = {George Danezis and Carmela Troncoso},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/DanezisTroncoso13.pdf},
www_section = {Traffic analysis},
}
|
wpes13-scramblesuit@inproceedings{wpes13-scramblesuit,
title = {ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship},
author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2013)},
year = {2013},
month = {November},
location = {Berlin, Germany},
publisher = {ACM},
www_tags = {selected},
www_pdf_url = {http://www.cs.kau.se/philwint/pdf/wpes2013.pdf},
www_section = {Traffic analysis},
}
|
wpes14-csbuflo@inproceedings{wpes14-csbuflo,
title = {{CS-BuFLO}: A Congestion Sensitive Website Fingerprinting Defense},
author = {Xiang Cai and Rishab Nithyanand and Rob Johnson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://pub.cs.sunysb.edu/~rob/papers/csbuflo.pdf},
www_section = {Anonymous communication},
}
|
wpes14-facet@inproceedings{wpes14-facet,
title = {Facet: Streaming over Videoconferencing for Censorship Circumvention},
author = {Shuai Li and Mike Schliep and Nick Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
www_section = {Communications Censorship},
}
|
wpes14-farb@inproceedings{wpes14-farb,
title = {{FARB}: Fast Anonymous Reputation-Based Blacklisting without {TTPs}},
author = {Li Xi and Dengguo Feng},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {},
www_section = {Pseudonymity},
}
|
wpes14-glove@inproceedings{wpes14-glove,
title = {Glove: A Bespoke Website Fingerprinting Defense},
author = {Rishab Nithyanand and Xiang Cai and Rob Johnson},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/glove.pdf},
www_section = {Anonymous communication},
}
|
wpes14-imux@inproceedings{wpes14-imux,
title = {Tor {IMUX}: Managing Connections from Two to Infinity, and Beyond},
author = {John Geddes and Rob Jansen and Nicholas Hopper},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf},
www_section = {Tor Performance},
}
|
wpes14-leakage@inproceedings{wpes14-leakage,
title = {Measuring the Leakage of Onion at the Root},
author = {Aziz Mohaisen and Matthew Thomas},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_tags = {selected},
www_pdf_url = {https://labs.verisigninc.com/assets/labs/Measuring-the-Leakage-of-Onion-at-the-Root.pdf},
www_section = {Anonymous communication},
}
|
wpes14-webbrowsers@inproceedings{wpes14-webbrowsers,
title = {Identifying Webbrowsers in Encrypted Communications},
author = {Jiangmin Yu and Eric Chan-Tin},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES
2014)}},
year = {2014},
month = {November},
www_pdf_url = {http://www.cs.okstate.edu/~chantin/WPES2014.pdf},
www_section = {Traffic analysis},
}
|
wright02@inproceedings{wright02,
title = {An Analysis of the Degradation of Anonymous Protocols},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
year = {2002},
month = {February},
publisher = {IEEE},
www_tags = {selected},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf},
www_section = {Traffic analysis},
}
|
wright03@inproceedings{wright03,
title = {Defending Anonymous Communication Against Passive Logging Attacks},
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
year = {2003},
month = {May},
pages = {28--43},
www_important = {1},
www_tags = {selected},
www_section = {Traffic analysis},
www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf},
}
|
wustrow14-tapdance@inproceedings{wustrow14-tapdance,
title = {TapDance: End-to-Middle Anticensorship without Flow Blocking},
author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)},
year = {2014},
month = {August},
address = {San Diego, CA},
publisher = {USENIX Association},
www_tags = {selected},
www_pdf_url = {https://jhalderm.com/pub/papers/tapdance-sec14.pdf},
www_section = {Communications Censorship},
}
|
xor-trees@article{xor-trees,
title = {Xor-trees for efficient anonymous multicast and reception},
author = {Shlomi Dolev and Rafail Ostrobsky},
journal = {ACM Trans. Inf. Syst. Secur},
volume = {3},
number = {2},
year = {2000},
address = {New York, NY, USA},
pages = {63--84},
publisher = {ACM Press},
www_section = {Anonymous communication},
www_tags = {selected},
www_ps_url = {ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps},
}
|
young2014drunkmotorcyclist@inproceedings{young2014drunkmotorcyclist,
title = {The drunk motorcyclist protocol for anonymous communication},
author = {Young, Adam L and Yung, Moti},
booktitle = {Proceedings of the IEEE Conference on Communications and Network Security
(CNS), 2014},
organization = {IEEE},
year = {2014},
pages = {157--165},
www_section = {comm},
}
|
zerocash@inproceedings{zerocash,
title = {Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin},
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and
Ian Miers and Eran Tromer and Madars Virza},
booktitle = {Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy},
year = {2014},
month = {May},
publisher = {IEEE},
www_pdf_url = {http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf},
www_section = {E-Cash / Anonymous Credentials},
}
|
zhong-pet2007@inproceedings{zhong-pet2007,
title = {Louis, Lester, and Pierre: Three Protocols for Location Privacy},
author = {Ge Zhong and Ian Goldberg and Urs Hengartner},
booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET
2007)},
year = {2007},
month = {June},
location = {Ottawa, Canada},
editor = {Nikita Borisov and Philippe Golle},
publisher = {Springer},
bookurl = {http://petworkshop.org/2007/},
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Louis_Lester.pdf},
www_section = {Anonymous communication},
}
|
zugenmaier:pet2004@inproceedings{zugenmaier:pet2004,
title = {{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users},
author = {Alf Zugenmaier},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
volume = {3424},
year = {2004},
month = {May},
pages = {121--141},
series = {LNCS},
www_section = {Anonymous communication},
}
|