diff --git a/i2p2www/__init__.py b/i2p2www/__init__.py index 5d020494..6d150a5e 100644 --- a/i2p2www/__init__.py +++ b/i2p2www/__init__.py @@ -50,6 +50,8 @@ BLOG_DIR = os.path.join(os.path.dirname(__file__), 'blog') MEETINGS_DIR = os.path.join(os.path.dirname(__file__), 'meetings/logs') SITE_DIR = os.path.join(TEMPLATE_DIR, 'site') MIRRORS_FILE = os.path.join(TEMPLATE_DIR, 'downloads/mirrors') +ANONBIB_CFG = os.path.join(TEMPLATE_DIR, 'papers/anonbib.cfg') +ANONBIB_FILE = os.path.join(TEMPLATE_DIR, 'papers/anonbib.bib') ################### diff --git a/i2p2www/anonbib/__init__.py b/i2p2www/anonbib/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/i2p2www/anonbib/_template_.html b/i2p2www/anonbib/_template_.html deleted file mode 100644 index b0eb5619..00000000 --- a/i2p2www/anonbib/_template_.html +++ /dev/null @@ -1,74 +0,0 @@ - - - - - - - - - - -%(title)s - - - - - - - -

%(short_title)s

-

%(otherbibs)s

-

%(choices)s

- - - - - - - - - - - -
- - - - - - - - -

Publications by %(field)s

- -
    -%(entries)s -
- -

- - -

Please send new or corrected entries to - -. -
-If you can, please format them as BibTeX; see our -BibTeX source page for examples.
-Remember to include URLs if possible: -offline papers are -less useful. -

-

The source code to anonbib is now in Git. See the anonbib gitweb page for more information. -

- - - diff --git a/i2p2www/anonbib/anonbib.bib b/i2p2www/anonbib/anonbib.bib deleted file mode 100644 index 67ca41e6..00000000 --- a/i2p2www/anonbib/anonbib.bib +++ /dev/null @@ -1,6293 +0,0 @@ -% -% -% Magic fields: -% -% www_tags -- used to control which page groups the paper appears in. -% This is a space-separated list. -% www_section -- the topic used under 'topics.html' -% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of -% an entry. -% www_important -- set for important entries -% www_remarks -- annotation for an entry - -%% List of sections -@string{comm = "Anonymous communication"} -@string{traffic = "Traffic analysis"} -@string{pub = "Anonymous publication"} -@string{proofs = "Provable shuffles"} -@string{methods = "Formal methods"} -@string{nym = "Pseudonymity"} -@string{pir = "Private Information Retrieval"} -@string{economics = "Economics"} -@string{censorship = "Communications Censorship"} -@string{credentials = "E-Cash / Anonymous Credentials"} -@string{misc = "Misc"} - -# -# Proposed new sections: application privacy, data anonymization, ... -# - -@string{lncs = "Lecture Notes in Computer Science"} - -%% Section: Mix Networks: Design - -@Article{chaum-mix, - author = {David Chaum}, - title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, - journal = {Communications of the ACM}, - year = {1981}, - volume = {24}, - number = {2}, - month = {February}, - www_section = comm, - www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt}, - www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html}, - www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf}, - www_important = {1}, - www_tags={selected}, -} -% www_remarks = {Chaum's paper that has all the big ideas.}, - -@ARTICLE{chaum-dc, - author = {David Chaum}, - title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability}, - journal = {Journal of Cryptology}, - year = {1988}, - volume = {1}, - pages = {65--75}, - www_section = comm, - www_tags={selected}, - www_pdf_url={http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf}, -} - -@InProceedings{ISDN-mixes, - author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, - title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, - booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems}, - year = 1991, - month = {February}, - pages = {451--463}, - www_section = comm, - www_ps_gz_url = "http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz", - www_tags={selected}, -} - -@InProceedings{BM:mixencrypt, - author = {Bodo M{\"o}ller}, - title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, - booktitle = {Proceedings of {CT-RSA} 2003}, - publisher = {Springer-Verlag, LNCS 2612}, - year = 2003, - month = {April}, - www_section = comm, - www_pdf_url = "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", - www_tags={selected}, -} - -@Misc{mixmaster-spec, - author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman}, - title = {Mixmaster {P}rotocol --- {V}ersion 2}, - howpublished = {IETF Internet Draft}, - year = 2003, - month = {July}, - www_section = comm, - www_txt_url = "http://www.abditum.com/mixmaster-spec.txt", - www_tags={selected}, - www_important = {1}, -} - -@InProceedings{abe, - author = {Masayuki Abe}, - title = {Universally Verifiable mix-net With Verification Work Independent of - The Number of mix Servers}, - booktitle = {Proceedings of {EUROCRYPT} 1998}, - year = {1998}, - publisher = {Springer-Verlag, LNCS 1403}, - www_section = proofs, - www_tags={selected}, -} - -@InProceedings{disco, - author = {Michael Waidner and Birgit Pfitzmann}, - title = {The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability}, - booktitle = {Proceedings of {EUROCRYPT} 1989}, - year = {1990}, - publisher = {Springer-Verlag, LNCS 434}, - www_section = comm, - www_ps_gz_url = "http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz", - www_tags={selected}, -} - - -@InProceedings{desmedt, - author = {Yvo Desmedt and Kaoru Kurosawa}, - title = {How To Break a Practical {MIX} and Design a New One}, - booktitle = {Proceedings of {EUROCRYPT} 2000}, - year = {2000}, - publisher = {Springer-Verlag, LNCS 1803}, - www_section = proofs, - www_html_url = "http://citeseer.nj.nec.com/447709.html", - www_tags={selected}, -} - -@InProceedings{hybrid-mix, - author = {Miyako Ohkubo and Masayuki Abe}, - title = {A {L}ength-{I}nvariant {H}ybrid {MIX}}, - booktitle = {Proceedings of {ASIACRYPT} 2000}, - year = {2000}, - publisher = {Springer-Verlag, LNCS 1976}, - www_section = proofs, - www_tags={selected}, -} - -@InProceedings{jakobsson-optimally, - author = "Markus Jakobsson and Ari Juels", - title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)", - booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01}, - year = "2001", - publisher = {ACM Press}, - www_section = proofs, - www_html_url = "http://citeseer.nj.nec.com/492015.html", - www_tags={selected}, -} - -@InProceedings{stop-and-go, - author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes}, - title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open - System}, - booktitle = {Proceedings of Information Hiding Workshop (IH 1998)}, - year = {1998}, - publisher = {Springer-Verlag, LNCS 1525}, - www_section = comm, - www_pdf_url = "http://www.uow.edu.au/~ldn01/infohide98.pdf", - www_tags={selected}, -} -% www_important = {1}, - -@InProceedings{flash-mix, - author = {Markus Jakobsson}, - title = {Flash {M}ixing}, - booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99}, - year = {1999}, - publisher = {ACM Press}, - www_section = proofs, - www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{babel, - author = {Ceki G\"ulc\"u and Gene Tsudik}, - title = {Mixing {E}-mail With {B}abel}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96}, - year = {1996}, - month = {February}, - publisher = {IEEE}, - pages = {2--16}, - www_section = comm, - www_html_url = "http://citeseer.nj.nec.com/2254.html", - www_ps_url = "http://www.isoc.org/conferences/ndss96/gulcu.ps", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{wright02, - author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, - title = {An Analysis of the Degradation of Anonymous Protocols}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02}, - year = {2002}, - month = {February}, - publisher = {IEEE}, - www_section = traffic, - www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf", - www_tags={selected}, -} - -@InProceedings{minion-design, - author = {George Danezis and Roger Dingledine and Nick Mathewson}, - title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}}, - booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, - year = 2003, - month = {May}, - pages = {2--15}, - www_important = {1}, - www_section = comm, - www_pdf_url = "http://mixminion.net/minion-design.pdf", - www_tags={selected}, -} - -@InProceedings{agrawal03, - author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz}, - title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}}, - booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, - year = 2003, - month = {May}, - pages = {16--27}, - www_pdf_url = "http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf", - www_section = traffic, - www_tags={selected}, -} - -@InProceedings{wright03, - author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, - title = {Defending Anonymous Communication Against Passive Logging Attacks}, - booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, - year = 2003, - month = {May}, - pages = {28--43}, - www_section = traffic, - www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf", - www_tags={selected}, -} - -@inproceedings{sherwood-protocol, - author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan}, - title = {P5: A Protocol for Scalable Anonymous Communication}, - booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, - year = 2002, - month = {May}, - www_section = comm, - www_pdf_url = "http://www.cs.umd.edu/projects/p5/p5.pdf", - www_ps_url = "http://www.cs.umd.edu/projects/p5/p5.ps", - www_tags={selected}, -} - -@Article{remailer-history, - author = {Sameer Parekh}, - title = {Prospects for Remailers}, - journal = {First Monday}, - volume = {1}, - number = {2}, - month = {August}, - year = {1996}, - www_section = comm, - www_html_url = "http://www.firstmonday.dk/issues/issue2/remailers/", - www_tags={selected}, -} - -@InProceedings{pfitzmann85, - author = {Andreas Pfitzmann and Michael Waidner}, - title = {Networks Without User Observability -- Design Options}, - booktitle = {Proceedings of {EUROCRYPT} 1985}, - month = {April}, - year = {1985}, - publisher = {Springer-Verlag, LNCS 219}, - www_section = comm, - www_html_url = "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html", - www_tags={selected}, -} - -@Article{chaum85, - author = {David Chaum}, - title = {Security without Identification: Transaction Systems to Make Big Brother Obsolete}, - journal = CACM, - year = 1985, - volume = 28, - number = 10, - month = {October}, - www_section = misc, - www_tags={selected}, -} - -@Article{rewebber, - author = {Ian Goldberg and David Wagner}, - title = {{TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web}}, - journal = {First Monday}, - volume = {3}, - number = {4}, - month = {August}, - year = {1998}, - www_section = pub, - www_html_url = "http://www.firstmonday.dk/issues/issue3_4/goldberg/", - www_ps_url = "http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps", - www_tags={selected}, -} - -@InProceedings{mix-acc, - author = {Roger Dingledine and Michael J. Freedman and David - Hopwood and David Molnar}, - title = {{A Reputation System to Increase MIX-net - Reliability}}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, - pages = {126--141}, - year = 2001, - month = "April", - editor = {Ira S. Moskowitz}, - publisher = {Springer-Verlag, LNCS 2137}, - www_section = comm, - www_ps_url = "http://freehaven.net/doc/mix-acc/mix-acc.ps", - www_pdf_url = "http://freehaven.net/doc/mix-acc/mix-acc.pdf", - www_tags={selected}, -} - -@InProceedings{patterns-failure, - author = {Richard Clayton and George Danezis and Markus G. Kuhn}, - title = {Real World Patterns of Failure in Anonymity Systems}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, - pages = {230--244}, - year = 2001, - month = "April", - editor = {Ira S. Moskowitz}, - publisher = {Springer-Verlag, LNCS 2137}, - www_section = misc, - www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf", - www_tags={selected}, -} - -@InProceedings{casc-rep, - author = {Roger Dingledine and Paul Syverson}, - title = {{Reliable MIX Cascade Networks through Reputation}}, - booktitle = {Proceedings of Financial Cryptography (FC '02)}, - year = 2002, - month = {March}, - editor = {Matt Blaze}, - publisher = {Springer-Verlag, LNCS 2357}, - www_section = comm, - www_ps_url = "http://freehaven.net/doc/casc-rep/casc-rep.ps", - www_pdf_url = "http://freehaven.net/doc/casc-rep/casc-rep.pdf", - www_tags={selected}, -} - -%% Section: Mix Networks: Attacks - -@InProceedings{pfitzmann90how, - author = "Birgit Pfitzmann and Andreas Pfitzmann", - title = "How to Break the Direct {RSA}-Implementation of {MIXes}", - booktitle = {Proceedings of {EUROCRYPT} 1989}, - publisher = {Springer-Verlag, LNCS 434}, - year = {1990}, - www_section = traffic, - www_ps_gz_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90" -} - -@InProceedings{back01, - author = {Adam Back and Ulf M\"oller and Anton Stiglic}, - title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, - pages = {245--257}, - year = 2001, - month = "April", - editor = {Ira S. Moskowitz}, - publisher = {Springer-Verlag, LNCS 2137}, - www_section = traffic, - www_important = 1, - www_pdf_url = "http://www.cypherspace.org/adam/pubs/traffic.pdf", - www_tags={selected}, -} - -@Misc{terminology, - author = {Andreas Pfitzmann and Marit Hansen}, - title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology}, - www_section = misc, - www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml}, - howpublished = "Draft", - year = 2000, - month = {July}, - OPTnote = {For date of the latest version, see the document itself}, - www_tags={selected}, -} -% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf}, - - -@inproceedings{goldberg97privacyenhancing, - author = "Ian Goldberg and David Wagner and Eric Brewer", - title = "Privacy-enhancing Technologies for the Internet", - booktitle = "Proceedings of the 42nd IEEE Spring COMPCON", - year = "1997", - month = {February}, - publisher = {IEEE Computer Society Press}, - isbn = { 0-8186-7804-6 }, - www_section = misc, - www_ps_url = "http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps", - www_tags={selected}, -} - -@InProceedings{fiveyearslater, - author = {Ian Goldberg}, - title = {{Privacy-enhancing technologies for the Internet, II: Five years later}}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = misc, - www_pdf_url = "http://freehaven.net/anonbib/papers/petfive.pdf", - www_ps_url = "http://freehaven.net/anonbib/papers/petfive.ps", - www_tags={selected}, -} - -@InProceedings{hintz02, - author = {Andrew Hintz}, - title = {Fingerprinting Websites Using Traffic Analysis}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = traffic, - www_html_url = "http://guh.nu/projects/ta/safeweb/safeweb.html", - www_pdf_url = "http://guh.nu/projects/ta/safeweb/safeweb.pdf", - www_ps_url = "http://guh.nu/projects/ta/safeweb/safeweb.ps", - www_tags={selected}, -} - -@InProceedings{mitkuro, - author = {Masashi Mitomo and Kaoru Kurosawa}, - title = {{Attack for Flash MIX}}, - booktitle = {Proceedings of {ASIACRYPT} 2000}, - year = {2000}, - publisher = {Springer-Verlag, LNCS 1976}, - www_section = proofs, - www_html_url = "http://citeseer.nj.nec.com/450148.html", - www_tags={selected}, -} - -%% Section : nymservers - -@InProceedings{nym-alias-net, - author = {David Mazi\`eres and M. Frans Kaashoek}, - title = {{The Design, Implementation and Operation of an Email - Pseudonym Server}}, - booktitle = {{Proceedings of the 5th ACM Conference on Computer and - Communications Security (CCS 1998)}}, - year = 1998, - month = {November}, - publisher = {ACM Press}, - www_section = nym, - www_ps_gz_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", - www_pdf_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", - www_tags={selected}, -} - -%techreport{freedom-nyms, -% author = {Russell Samuels}, -% title = {Untraceable Nym Creation on the {F}reedom {N}etwork}, -% year = {1999}, -% month = {November}, -% day = {21}, -% type = {White Paper}, -% institution = {Zero Knowledge}, -% number = {11}, -% www_section = nym, -% www_html_url = "http://www.freedom.net/products/whitepapers/white11.html", -%} - -%% Section: Traffic analysis - -@InProceedings{rackoff93cryptographic, - author = {Charles Rackoff and Daniel R. Simon}, - title = {Cryptographic Defense Against Traffic Analysis}, - booktitle = {Proceedings of {ACM} Symposium on Theory of Computing}, - pages = {672--681}, - year = {1993}, - www_section = traffic, - www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps}, - www_tags={selected}, -} -% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", -% www_important = {1}, - - -@InProceedings{raymond00, - author = {Jean-Fran\c{c}ois Raymond}, - title = {{Traffic Analysis: Protocols, Attacks, Design Issues, - and Open Problems}}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - year = 2000, - month = {July}, - pages = {10--29}, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - www_section = traffic, - www_important = {1}, - www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps}, - www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf}, - www_tags={selected}, -} - -@InProceedings{trickle02, - author = {Andrei Serjantov and Roger Dingledine and Paul Syverson}, - title = {From a Trickle to a Flood: Active Attacks on Several - Mix Types}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, - year = {2002}, - month = "October", - editor = {Fabien Petitcolas}, - publisher = {Springer-Verlag, LNCS 2578}, - www_section = traffic, - www_ps_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.ps", - www_pdf_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", - www_tags={selected}, - www_important = {1}, -} - -@InProceedings{limits-open, - author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, - title = {Limits of Anonymity in Open Environments}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, - year = {2002}, - month = "October", - editor = {Fabien Petitcolas}, - publisher = {Springer-Verlag, LNCS 2578}, - www_section = traffic, - www_pdf_url = "http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf", - www_tags={selected}, -} - -@InProceedings{chaffinch, - author = {Richard Clayton and George Danezis}, - title = {Chaffinch: Confidentiality in the Face of Legal Threats}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, - year = {2002}, - month = "October", - editor = {Fabien Petitcolas}, - publisher = {Springer-Verlag, LNCS 2578}, - www_section = misc, - www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf", - www_html_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html", - www_tags={selected}, -} - -@InProceedings{langos02, - author = {Oliver Berthold and Heinrich Langos}, - title = {Dummy Traffic Against Long Term Intersection Attacks}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = traffic, - www_pdf_url = "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf", - www_tags={selected}, -} - -@InProceedings{disad-free-routes, - author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, - title = {The disadvantages of free {MIX} routes and how to overcome - them}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - pages = {30--45}, - month = {July}, - year = 2000, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - www_section = traffic, - www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", - www_tags={selected}, -} -% www_important = {1}, - -%% Section: Anonymous publication - -@InProceedings{freehaven-berk, - author = {Roger Dingledine and Michael J. Freedman and David Molnar}, - title = {The Free Haven Project: Distributed Anonymous Storage Service}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - year = {2000}, - month = {July}, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - www_section = pub, - www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{freenet, - author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong}, - title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval - System}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - pages = {46--66}, - year = {2000}, - month = "July", - www_section = pub, - www_html_url = "http://citeseer.nj.nec.com/clarke00freenet.html", - www_tags={selected}, -} - -@InProceedings{publius, - author = {Marc Waldman and Aviel Rubin and Lorrie Cranor}, - title = {Publius: {A} robust, tamper-evident, censorship-resistant and - source-anonymous web publishing system}, - booktitle = {Proceedings of the 9th USENIX Security Symposium}, - pages = {59--72}, - year = {2000}, - month = {August}, - www_section = pub, - www_pdf_url = "http://www.cs.nyu.edu/~waldman/publius/publius.pdf", - www_tags={selected}, -} - -@InProceedings{randomized-checking, - author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, - title = {Making mix nets robust for electronic voting by randomized partial checking}, - booktitle = {Proceedings of the 11th USENIX Security Symposium}, - year = {2002}, - month = {August}, - www_important = {1}, - www_section = proofs, - www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf", - www_tags={selected}, -} - -@InProceedings{infranet, - author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, - title = {Infranet: Circumventing Web Censorship and Surveillance}, - booktitle = {Proceedings of the 11th USENIX Security Symposium}, - year = {2002}, - month = {August}, - www_section = censorship, - www_pdf_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf", - www_ps_gz_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz", - www_tags={selected}, -} - -%% Section: Stream-based anonymity - -@InProceedings{onion-discex00, - author = {Paul Syverson and Michael Reed and David Goldschlag}, - title = {{O}nion {R}outing Access Configurations}, - booktitle = {Proceedings of the DARPA Information Survivability Conference and - Exposition (DISCEX 2000)}, - year = {2000}, - publisher = {IEEE CS Press}, - pages = {34--40}, - volume = {1}, - www_section = comm, - www_abstract_url = "http://www.onion-router.net/Publications.html", - www_ps_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps", - www_ps_gz_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", - www_pdf_url = "http://www.onion-router.net/Publications/DISCEX-2000.pdf", - www_tags={selected}, -} - -@inproceedings{onion-routing:ih96, - title = {{Hiding Routing Information}}, - author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson}, - booktitle = {Proceedings of Information Hiding: First International Workshop}, - year = {1996}, - month = {May}, - pages = {137--150}, - editor = {R. Anderson}, - publisher = {Springer-Verlag, LNCS 1174}, - www_section = comm, - www_ps_gz_url = {http://www.onion-router.net/Publications/IH-1996.ps.gz}, - www_pdf_url = {http://www.onion-router.net/Publications/IH-1996.pdf}, - www_tags={selected}, -} - -@InProceedings{onion-routing:pet2000, - author = {Paul Syverson and Gene Tsudik and Michael Reed - and Carl Landwehr}, - title = {{Towards an Analysis of Onion Routing Security}}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - year = 2000, - month = {July}, - pages = {96--114}, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - www_section = comm, - www_ps_gz_url = "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{web-mix:pet2000, - author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, - title = {Web {MIX}es: A system for anonymous and unobservable - {I}nternet access}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop - on Design Issues in Anonymity and Unobservability}, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - pages = {115--129}, - year = 2000, - month = {July}, - www_section = comm, - www_pdf_url = "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf", - www_tags={selected}, -} - -@Article{crowds:tissec, - author = {Michael Reiter and Aviel Rubin}, - title = {Crowds: Anonymity for Web Transactions}, - journal = {ACM Transactions on Information and System Security}, - volume = {1}, - number = {1}, - month = {June}, - year = {1998}, - www_section = comm, - www_ps_gz_url = "http://avirubin.com/crowds.ps.gz", - www_pdf_url = "http://avirubin.com/crowds.pdf", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{tarzan:ccs02, - title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer", - author = "Michael J. Freedman and Robert Morris", - booktitle = {{Proceedings of the 9th ACM Conference on Computer and - Communications Security (CCS 2002)}}, - location = "Washington, DC", - month = "November", - year = "2002", - www_section = comm, - www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", - www_important = {1}, - www_tags={selected}, -} - -@inproceedings{BonehGolle:psp2002, - title = {Almost Entirely Correct Mixing With Application to Voting}, - author = {Dan Boneh and Philippe Golle}, - booktitle = {{Proceedings of the 9th ACM Conference on Computer and - Communications Security (CCS 2002)}}, - year = {2002}, - month = {November}, - location = {Washington, DC}, - pages = {68--77}, - editor = {Vijay Atluri}, - www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.pdf}, - www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps}, - www_section = proofs, - www_tags={selected}, -} - -@techreport{freedom2-arch, - author = {Philippe Boucher and Adam Shostack and Ian Goldberg}, - title = {Freedom Systems 2.0 Architecture}, - year = {2000}, - month = {December}, - day = {18}, - type = {White Paper}, - institution = {Zero Knowledge Systems, {Inc.}}, - www_section = comm, - www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf}, - www_tags={selected}, -} - -@techreport{freedom21-security, - author = {Adam Back and Ian Goldberg and Adam Shostack}, - title = {Freedom Systems 2.1 Security Issues and Analysis}, - year = {2001}, - month = {May}, - day = {3}, - type = {White Paper}, - institution = {Zero Knowledge Systems, {Inc.}}, - www_section = comm, - www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf}, - www_tags={selected}, -} - -@Article{realtime-mix, - author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and - Birgit Pfitzmann and Michael Waidner}, - title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, - journal = {IEEE Journal on Selected Areas in Communications}, - year = 1998, - volume = {16}, - number = {4}, - www_section = comm, - www_html_url = "http://www.zurich.ibm.com/security/publications/1998.html", - www_tags={selected}, -} - -%% Section: Misc - -@inproceedings{rao-pseudonymity, - author = "Josyula R. Rao and Pankaj Rohatgi", - title = "Can Pseudonymity Really Guarantee Privacy?", - booktitle = "Proceedings of the 9th USENIX Security Symposium", - year = {2000}, - month = {August}, - publisher = {USENIX}, - pages = "85--96", - www_section = nym, - www_pdf_url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", - www_tags={selected}, -} - -@InProceedings{SK, - author = {Joe Kilian and Kazue Sako}, - title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to - the Implementation of a Voting Booth}, - booktitle = {Proceedings of {EUROCRYPT} 1995}, - www_section = proofs, - month = {May}, - year = {1995}, - publisher = {Springer-Verlag}, - www_tags={selected}, -} - -%Misc{rprocess, -% author = {RProcess}, -% title = {Selective Denial of Service Attacks}, -% www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html", -% www_section = traffic, -% month = {September}, -% year = 1999, -% howpublished = "Usenet post", -% www_tags={selected}, -%} - -@Misc{pipenet10, - author = {Wei Dai}, - title = {PipeNet 1.0}, - howpublished = "Post to Cypherpunks mailing list", - year = 1998, - month = {January}, - day = 19, - www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html", - www_section = comm, - www_remarks = "First written in 1996 based on cypherpunks posts in 1995.", - www_tags={selected}, -} - -@Misc{pipenet, - author = {Wei Dai}, - title = {PipeNet 1.1}, - howpublished = "Post to Cypherpunks mailing list", - year = 1998, - month = {November}, - day = 26, - www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt", - www_section = comm, - www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}, - www_tags={selected}, -} - -@InProceedings{PIK, - author = {C. Park and K. Itoh and K. Kurosawa}, - title = {Efficient anonymous channel and all/nothing election scheme}, - booktitle = {Proceedings of {EUROCRYPT} 1993}, - month = {May}, - year = {1993}, - pages = {248--259}, - publisher = {Springer-Verlag, LNCS 765}, - www_section = proofs, - www_tags={selected}, -} - -% PhdThesis{malkin-thesis, -% author = {Tal Malkin}, -% school = {{MIT}}, -% title = {Private {I}nformation {R}etrieval}, -% year = {2000}, -% www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html", -% www_tags={selected}, -%} - -@PhdThesis{ian-thesis, - author = {Ian Goldberg}, - title = {A Pseudonymous Communications Infrastructure for the Internet}, - school = {UC Berkeley}, - year = 2000, - month = {December}, - www_section = comm, - www_pdf_url = "http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf", - www_tags={selected}, -} - -@PhdThesis{george-thesis, - author = {George Danezis}, - title = {Better Anonymous Communications}, - school = {University of Cambridge}, - year = {2004}, - month = {July}, - www_section = comm, - www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/thesis.pdf", - www_tags={selected}, -} - -@PhdThesis{andrei-thesis, - author = {Andrei Serjantov}, - title = {On the Anonymity of Anonymity Systems}, - school = {University of Cambridge}, - year = {2004}, - month = {June}, - www_section = comm, - www_ps_url = "http://home.arachsys.com/~aas/Thesis/2.ps", - www_tags={selected}, -} - -@InProceedings{shuffle:ccs01, - author = {C. Andrew Neff}, - title = {A Verifiable Secret Shuffle and its Application to E-Voting}, - booktitle = {{Proceedings of the 8th ACM Conference on Computer and - Communications Security (CCS 2001)}}, - pages = {116--125}, - year = 2001, - editor = {P. Samarati}, - month = {November}, - publisher = {ACM Press}, - www_section = proofs, - www_pdf_url = {http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf}, - www_tags={selected}, -} - -@InProceedings{PShuffle, - author = {Jun Furukawa and Kazue Sako}, - title = {An Efficient Scheme for Proving a Shuffle}, - editor = {Joe Kilian}, - booktitle = {Proceedings of {CRYPTO} 2001}, - year = {2001}, - publisher = {Springer-Verlag, LNCS 2139}, - www_pdf_url = {http://www.iacr.org/archive/crypto2001/21390366.pdf}, - www_section = proofs, - www_tags={selected}, -} - -@InProceedings{econymics, - author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}, - title = {{On the Economics of Anonymity}}, - booktitle = {Proceedings of Financial Cryptography (FC '03)}, - year = 2003, - month = "January", - editor = {Rebecca N. Wright}, - publisher = {Springer-Verlag, LNCS 2742}, - www_section = economics, - www_pdf_url = "http://freehaven.net/doc/fc03/econymics.pdf", - www_important = {1}, - www_tags={selected}, -} - -@article{cheap-pseudonyms, - author = {Eric Friedman and Paul Resnick}, - title = {The social cost of cheap pseudonyms}, - journal = {Journal of Economics and Management Strategy}, - year = "2001", - volume = "10", - number = "2", - pages = "173--199", - www_section = economics, - www_pdf_url = "http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf", - www_tags={selected}, -} - -@InProceedings{Diaz02, - author = {Claudia Diaz and Stefaan Seys and Joris Claessens - and Bart Preneel}, - title = {Towards measuring anonymity}, - booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, - year = 2002, - month = "April", - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = traffic, - www_important = {1}, - www_ps_gz_url = "http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz", - www_tags={selected}, -} - -@InProceedings{Serj02, - author = {Andrei Serjantov and George Danezis}, - title = {Towards an Information Theoretic Metric for Anonymity}, - booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, - year = 2002, - month = "April", - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = traffic, - www_important = {1}, - www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps", - www_tags={selected}, -} - -@InProceedings{sybil, - author = "John Douceur", - title = {{The Sybil Attack}}, - booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", - month = {March}, - year = 2002, - www_section = traffic, - www_important = {1}, - www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf", - www_tags={selected}, -} - -@InProceedings{Serj02-iptps, - author = {Andrei Serjantov}, - title = {Anonymizing censorship resistant systems}, - booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", - month = {March}, - year = 2002, - www_ps_url= {http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps}, - www_section = pub, - www_tags={selected}, -} - -%InProceedings{Freedman-iptps, -% author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris}, -% title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, -% booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", -% month = {March}, -% year = 2002, -% www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf", -% www_section = comm, -% www_tags={selected}, -%} - -@InProceedings{gup, - author = {Stuart Stubblebine and Paul Syverson}, - title = {Authentic Attributes with Fine-Grained Anonymity Protection}, - booktitle = {Proceedings of Financial Cryptography (FC 2000)}, - pages = {276--294}, - year = 2001, - editor = {Yair Frankel}, - publisher = {Springer-Verlag, LNCS 1962}, - www_section = nym, - www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps", - www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf", - www_tags={selected}, -} - -@InProceedings{syverson99, - author = "Paul F. Syverson and Stuart G. Stubblebine", - title = "Group Principals and the Formalization of Anonymity", - booktitle = "Proceedings of the World Congress on Formal Methods (1)", - pages = "814--833", - year = "1999", - www_section = methods, - www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps", - www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf", - www_tags={selected}, -} - -@Article{crowds-model, - author = {Vitaly Shmatikov}, - title = {Probabilistic Model Checking of an Anonymity System}, - journal = {Journal of Computer Security}, - volume = {12}, - number = {3-4}, - pages = {355--377}, - year = {2004}, - www_section = methods, - www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_crowds.ps", - www_remarks = -{Uses formal methods to analyze probabilistic anonymity systems like - Crowds. Confirms that anonymity degrades - with a larger crowd: as N grows, the fact that the request came from - you becomes more suspicious.}, - www_tags={selected}, -} - -@Article{modular-approach, - author = {Dominic Hughes and Vitaly Shmatikov}, - title = {Information Hiding, Anonymity and Privacy: A Modular Approach}, - journal = {Journal of Computer Security}, - volume = {12}, - number = {1}, - pages = {3--36}, - year = {2004}, - www_section = methods, - www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_anon.ps", - www_tags={selected}, -} - -@InProceedings{kesdogan:pet2002, - author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, - title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = comm, - www_pdf_url = "http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf", - www_tags={selected}, -} - -@InProceedings{danezis:pet2003, - author = {George Danezis}, - title = {Mix-networks with Restricted Routes}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {1--17}, - www_section = traffic, - www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf", - www_important = 1, - www_tags={selected}, -} - -@InProceedings{diaz:pet2003, - author = {Claudia Diaz and Andrei Serjantov}, - title = {Generalising Mixes}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {18--31}, - www_section = comm, - www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz", - www_important = {1}, - www_tags={selected}, -} - -@InProceedings{steinbrecher:pet2003, - author = {Sandra Steinbrecher and Stefan K\"opsell}, - title = {Modelling Unlinkability}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {32--47}, - www_section = traffic, - www_pdf_url = "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf", - www_tags={selected}, -} - -@InProceedings{newman:pet2003, - author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov}, - title = {Metrics for Traffic Analysis Prevention}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {48--65}, - www_section = traffic, - www_ps_url = "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps", - www_tags={selected}, -} - -@InProceedings{nguyen:pet2003, - author = {Lan Nguyen and Rei Safavi-Naini}, - title = {Breaking and Mending Resilient Mix-nets}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {66--80}, - www_section = proofs, - www_pdf_url = "http://www.petworkshop.org/2003/preproc/05-preproc.pdf", - www_tags={selected}, -} - -@InProceedings{clayton:pet2003, - author = {Richard Clayton}, - title = {Improving Onion Notation}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {81--87}, - www_section = comm, - www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/onions.pdf", - www_tags={selected}, -} - -@InProceedings{bennett:pet2003, - author = {Krista Bennett and Christian Grothoff}, - title = {{GAP} -- Practical anonymous networking}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {141--160}, - www_section = pub, - www_ps_url = "http://www.ovmj.org/GNUnet/download/aff.ps", - www_tags={selected}, -} - -@article{ebe2003, - author = {Christian Grothoff}, - title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}}, - journal = "Wirtschaftsinformatik", - publisher = "Springer-Verlag", - year = "2003", - month = "June", - www_section = economics, - www_ps_url = "http://www.ovmj.org/GNUnet/download/ebe.ps", - www_tags={selected}, -} - -@inproceedings{gnunetencoding, - author = "Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu", - title = "{Efficient Sharing of Encrypted Data}", - booktitle = {{Proceedings of ASCIP 2002}}, - publisher = "Springer-Verlag", - pages = "107--120", - www_ps_url = "http://www.ovmj.org/GNUnet/download/esed.ps", - www_section = pub, - year = "2002", - month = {July}, - www_tags={selected}, -} - -@InProceedings{kugler:pet2003, - author = {Dennis K\"ugler}, - title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {161--176}, - www_section = pub, - www_pdf_url = "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf", - www_tags={selected}, -} - -@InProceedings{feamster:pet2003, - author = {Nick Feamster and Magdalena Balazinska and Winston Wang and - Hari Balakrishnan and David Karger}, - title = {{Thwarting Web Censorship with Untrusted Messenger Delivery}}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, - year = {2003}, - month = {March}, - editor = {Roger Dingledine}, - publisher = {Springer-Verlag, LNCS 2760}, - pages = {125--140}, - www_section = censorship, - www_pdf_url = "http://nms.lcs.mit.edu/papers/disc-pet2003.pdf", - www_tags={selected}, -} - -@InProceedings{waldman01tangler, - author = "Marc Waldman and David Mazi\`eres", - title = "Tangler: a censorship-resistant publishing system based on document entanglements", - booktitle = {{Proceedings of the 8th ACM Conference on Computer and - Communications Security (CCS 2001)}}, - pages = "126--135", - year = "2001", - month = "November", - www_section = pub, - www_important = {1}, - www_ps_url = "http://www.cs.nyu.edu/~waldman/tangler.ps", - www_tags={selected}, -} - -@InProceedings{anderson96eternity, - author = "Ross Anderson", - title = "The Eternity Service", - booktitle = {Proceedings of Pragocrypt '96}, - year = "1996", - www_section = pub, - www_important = {1}, - www_ps_url = "http://www.ovmj.org/GNUnet/papers/eternity.ps", - www_html_url = "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html", - www_tags={selected}, -} - -@InProceedings{strong-eternity, - author = {Tonda Benes}, - title = {The Strong Eternity Service}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, - year = {2001}, - month = "April", - editor = {Ira S. Moskowitz}, - publisher = {Springer-Verlag, LNCS 2137}, - www_section = pub, - www_pdf_url = "http://freehaven.net/anonbib/papers/strong-eternity.pdf", - www_tags={selected}, -} - -@inproceedings{RRMPH02-1, - author={Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison}, - title={{Analysis of an Anonymity Network for Web Browsing}}, - booktitle={{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}}, - location={Pittsburgh, USA}, - pages={49--54}, - month={June}, - year={2002}, - www_section = comm, - www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz", - www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", - www_tags={selected}, -} -% month={June 10--12}, - -@inproceedings{morphmix:wpes2002, - author={Marc Rennhard and Bernhard Plattner}, - title={{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}}, - location={Washington, DC, USA}, - month={November}, - year={2002}, - www_important = {1}, - www_section = comm, - www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf}, - www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", - www_tags={selected}, -} -% month={November 21}, - -@inproceedings{RP03-1, - author={Marc Rennhard and Bernhard Plattner}, - title={{Practical Anonymity for the Masses with Mix-Networks}}, - booktitle={{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}}, - location={Linz, Austria}, - month={June}, - year={2003}, - www_section = comm, - www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz", - www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", - www_tags={selected}, -} -% month={June 9--11}, - -@inproceedings{rep-anon, - author={Roger Dingledine and Nick Mathewson and Paul Syverson}, - title={{Reputation in P2P Anonymity Systems}}, - booktitle={Proceedings of Workshop on Economics of Peer-to-Peer Systems}, - month={June}, - year={2003}, - www_section = economics, - www_pdf_url = "http://freehaven.net/doc/econp2p03/econp2p03.pdf", - www_tags={selected}, -} - -@InProceedings{statistical-disclosure, - author = {George Danezis}, - title = {Statistical Disclosure Attacks: Traffic Confirmation in Open Environments}, - booktitle = {Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})}, - pages = {421--426}, - year = {2003}, - editor = {Gritzalis and Vimercati and Samarati and Katsikas}, - location= {Athens}, - month = {May}, - organization = {{IFIP TC11}}, - publisher = {Kluwer}, - www_section = traffic, - www_pdf_url={http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf}, - www_tags={selected}, -} - -@InProceedings{TrafHTTP, - author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu}, - title = {Statistical Identification of Encrypted Web Browsing Traffic}, - booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, - year = {2002}, - location= {Berkeley, California}, - month = {May}, - www_section = traffic, - www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}, - www_tags={selected}, -} - -@InProceedings{Dan:SFMix03, - author = {George Danezis}, - title = {Forward Secure Mixes}, - booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems}, - pages = {195--207}, - year = {2002}, - editor = {Fisher-Hubner, Jonsson}, - location= {Karlstad, Sweden}, - month = {November}, - day = {7}, - www_section = comm, - www_pdf_url="http://www.cl.cam.ac.uk/~gd216/fsmix.pdf", - www_tags={selected}, -} - -@InProceedings{SN03, - author = {Andrei Serjantov and Richard E. Newman}, - title = {On the Anonymity of Timed Pool Mixes}, - booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems}, - pages = {427--434}, - year = {2003}, - location= {Athens, Greece}, - month = {May}, - publisher = {Kluwer}, - www_section=traffic, - www_ps_url="http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", - www_tags={selected}, -} -% booktitle = {Security and Privacy in the Age of Uncertainty}, - -@techreport{herbivore:tr, - author = "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", - title = "{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}", - number = "2003-1890", - institution = "Cornell University", - address = "Ithaca, NY", - month = "February", - year = "2003", - www_section = comm, - www_pdf_url = "http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf", - www_tags={selected}, -} - -@inproceedings{reusable-channels:wpes2003, - author={Philippe Golle and Markus Jakobsson}, - title={Reusable Anonymous Return Channels}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, - location={Washington, DC, USA}, - month={October}, - year={2003}, - www_section = comm, - www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf}, - www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/return.ps}, - www_remarks = -{Reencryption mix-nets can allow users to use a single reply channel - even when they maintain multiple separate nyms (think of it like a reply - block but it looks different each time you give it to somebody).}, - www_tags={selected}, -} - -@inproceedings{danezis:wpes2003, - author={George Danezis and Len Sassaman}, - title={Heartbeat Traffic to Counter (n-1) Attacks}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, - location={Washington, DC, USA}, - month={October}, - year={2003}, - www_section = comm, - www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf}, - www_remarks = -{Mix nodes should send out "heartbeat" messages (dummies that start and - end at that node). By measuring how many return in a given time, they - can detect whether the adversary is dropping or delaying traffic coming - into them (possibly so he can launch an active blending attack).}, - www_tags={selected}, -} - -@inproceedings{bauer:wpes2003, - author={Matthias Bauer}, - title={{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, - location={Washington, DC, USA}, - month={October}, - year={2003}, - www_section = comm, - www_ps_url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps}, - www_important = 1, - www_remarks = -{Anonymity sets in deployed systems are small because few people think - it's worthwhile to use them. But we can take advantage of ordinary web - users to transfer messages (that is, mix them) from one webserver to - another via cookies and http redirect tricks. Senders and receivers - should also look like ordinary web users, so anonymity sets are large.}, - www_tags={selected}, -} - -@inproceedings{GolleJakobssonJuelsSyverson:universal04, - title = {Universal Re-Encryption for Mixnets}, - author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson}, - booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track}, - year = {2004}, - month = {February}, - location= {San Francisco, USA}, - www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf}, - www_section = comm, - www_tags={selected}, -} - %editor = {}, - - -@InProceedings{cebolla, - author={Zach Brown}, - title={{Cebolla: Pragmatic IP Anonymity}}, - booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, - year = {2002}, - month = {June}, - www_section = comm, - www_pdf_url = "http://cypherspace.org/cebolla/cebolla.pdf", - www_remarks = -{Written by a former Freedom developer, Cebolla has a UDP-based design - similar to second-generation Freedom. The initiator incrementally builds - her circuit, giving her end-to-end forward-secrecy and also better - recovery from broken nodes.}, - www_tags={selected}, -} - -@InProceedings{SS03, - author = {Andrei Serjantov and Peter Sewell}, - title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, - booktitle = {Proceedings of ESORICS 2003}, - year = {2003}, - month = {October}, - www_section = traffic, - www_ps_url = "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps", - www_remarks = -{An investigation of packet counting attacks (which work best on lightly - loaded networks) and connection-start timing attacks.}, - www_tags={selected}, -} - -@InProceedings{GKK03, - author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, - title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting}, - booktitle = {Proceedings of ESORICS 2003}, - year = {2003}, - month = {October}, - www_section = proofs, - www_pdf_url = "http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf", - www_tags={selected}, -} - -@Article{shsm03, - author = {Anna Shubina and Sean Smith}, - title = {Using Caching for Browsing Anonymity}, - journal = {ACM SIGEcom Exchanges}, - year = {2003}, - volume = {4}, - number = {2}, - month = {September}, - www_section = comm, - www_pdf_url = "http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf", - www_tags={selected}, -} - -@InProceedings{incomparable-pkeys, - author = {Brent Waters and Ed Felten and Amit Sahai}, - title = {Receiver Anonymity via Incomparable Public Keys}, - booktitle = {{Proceedings of the 10th ACM Conference on Computer and - Communications Security (CCS 2003)}}, - pages = {112--121}, - year = 2003, - editor = {Vijay Atluri and Peng Liu}, - month = {October}, - publisher = {ACM Press}, - www_section = comm, - www_pdf_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf", - www_ps_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.ps", - www_tags={selected}, -} - -@InProceedings{k-anonymous:ccs2003, - author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper}, - title = {k-Anonymous Message Transmission}, - booktitle = {{Proceedings of the 10th ACM Conference on Computer and - Communications Security (CCS 2003)}}, - pages = {122--130}, - year = 2003, - editor = {Vijay Atluri and Peng Liu}, - month = {October}, - publisher = {ACM Press}, - www_section = comm, - www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf}, - www_tags={selected}, -} - -@Article{halpern-oneill-2003, - author = {Joseph Y. Halpern and Kevin R. O'Neill}, - title = {Anonymity and Information Hiding in Multiagent Systems}, - journal = {Journal of Computer Security}, - volume = {}, - number = {}, - year = {2004}, - www_section = methods, - www_pdf_url = "http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf", - www_tags={selected}, -} - -@InProceedings{berman-fc2004, - author = {Ron Berman and Amos Fiat and Amnon Ta-Shma}, - title = {Provable Unlinkability Against Traffic Analysis}, - booktitle = {Proceedings of Financial Cryptography (FC '04)}, - year = {2004}, - month = {February}, - editor = {Ari Juels}, - publisher = {Springer-Verlag, LNCS 3110}, - pages = {266--280}, - www_section = comm, - www_pdf_url = "http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf", - www_tags={selected}, -} - -@InProceedings{timing-fc2004, - author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, - title = {Timing Attacks in Low-Latency Mix-Based Systems}, - booktitle = {Proceedings of Financial Cryptography (FC '04)}, - year = {2004}, - month = {February}, - editor = {Ari Juels}, - publisher = {Springer-Verlag, LNCS 3110}, - pages = {251--265}, - www_section = traffic, - www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf", - www_tags={selected}, -} - -@InProceedings{morphmix-fc2004, - author = {Marc Rennhard and Bernhard Plattner}, - title = {Practical Anonymity for the Masses with MorphMix}, - booktitle = {Proceedings of Financial Cryptography (FC '04)}, - year = {2004}, - month = {February}, - editor = {Ari Juels}, - publisher = {Springer-Verlag, LNCS 3110}, - pages = {233--250}, - www_section = comm, - www_pdf_url = "http://home.zhwin.ch/~rer/publications/FC2004.pdf", - www_tags={selected}, -} - -@InProceedings{mixminion-fc2004, - author = {Nick Mathewson and Roger Dingledine}, - title = {Mixminion: Strong Anonymity for Financial cryptography}, - booktitle = {Proceedings of Financial Cryptography (FC '04)}, - year = {2004}, - month = {February}, - editor = {Ari Juels}, - publisher = {Springer-Verlag, LNCS 3110}, - pages = {227--232}, - www_section = comm, - www_pdf_url = "http://freehaven.net/doc/fc04/minion-systems.pdf" -} -% Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM - - -@InProceedings{credentials-fc2004, - author = {Guiseppe Persiano and Ivan Visconti}, - title = {An Efficient and Usable Multi-show Non-transferable Anonymous Credential System}, - booktitle = {Proceedings of Financial Cryptography (FC '04)}, - year = {2004}, - month = {February}, - editor = {Ari Juels}, - publisher = {Springer-Verlag, LNCS 3110}, - pages = {196--211}, - www_section = credentials -} - -@InProceedings{tor-design, - author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, - title = {{Tor}: The Second-Generation Onion Router}, - booktitle = {Proceedings of the 13th USENIX Security Symposium}, - year = {2004}, - month = {August}, - www_section = comm, - www_important = 1, - www_pdf_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf", - www_html_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.html", - www_tags={selected}, -} - -@InProceedings{redblue, - author = {George Danezis and Ross Anderson}, - title = {The Economics of Censorship Resistance}, - booktitle = {Proceedings of Workshop on Economics and Information Security (WEIS04)}, - year = {2004}, - month = {May}, - www_section = economics, - www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", - www_tags={selected}, -} - -@InProceedings{DanSer04, - author = {George Danezis and Andrei Serjantov}, - title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, - booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, - year = {2004}, - series = {LNCS}, - location= {Toronto}, - month = {May}, - www_section = traffic, - www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps", - www_tags={selected}, -} - -@InProceedings{pool-dummy04, - author = {Claudia Diaz and Bart Preneel}, - title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic}, - booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, - year = {2004}, - series = {LNCS}, - location= {Toronto}, - month = {May}, - www_section = comm, - www_pdf_url = "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", - www_tags={selected}, -} -% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz", - - -@InProceedings{hitting-set04, - author = {Dogan Kesdogan and Lexi Pimenidis}, - title = {The Hitting Set Attack on Anonymity Protocols}, - booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, - year = {2004}, - series = {LNCS}, - location= {Toronto}, - month = {May}, - www_section = traffic, - www_pdf_url = "http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf", - www_tags={selected}, -} - -@InProceedings{taxonomy-dummy, - author = {Claudia Diaz and Bart Preneel}, - title = {Taxonomy of Mixes and Dummy Traffic}, - booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems}, - year = {2004}, - location= {Toulouse, France}, - month = {August}, - www_section = comm, - www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf", - www_tags={selected}, -} - -@InProceedings{newman:pet2004, - author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz}, - title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {1--16}, - www_section = traffic, - www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf", - www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps", - www_remarks = -{If we think about leaked anonymity as a covert channel between the sender - Alice and the adversary Eve, then by measuring covert channel capacity - we can get an upper bound on the amount of information Alice could leak.}, - www_tags={selected}, -} - -@InProceedings{e2e-traffic, - author = {Nick Mathewson and Roger Dingledine}, - title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {17--34}, - www_section = traffic, - www_pdf_url = "http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf", - www_important = 1, - www_tags={selected}, -} - -@InProceedings{danezis:pet2004, - author = {George Danezis}, - title = {The Traffic Analysis of Continuous-Time Mixes}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {35--50}, - www_section = traffic, - www_important = {1}, - www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf", - www_tags={selected}, -} - -@InProceedings{golle:pet2004, - author = {Philippe Golle}, - title = {Reputable Mix Networks}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {51--63}, - www_section = proofs, - www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/reputable.pdf", - www_tags={selected}, -} - -@InProceedings{fairbrother:pet2004, - author = {Peter Fairbrother}, - title = {An Improved Construction for Universal Re-encryption}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {79--87}, - www_section = comm, - www_pdf_url = "http://www.m-o-o-t.org/ICUR.pdf", - www_tags={selected}, -} - -@InProceedings{kugler:pet2004, - author = {Dennis K{\"u}gler}, - title = {On the Anonymity of Banknotes}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {108--120}, - www_section = misc -} - -@InProceedings{zugenmaier:pet2004, - author = {Alf Zugenmaier}, - title = {{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {121--141}, - www_section = comm -} - -@InProceedings{sync-batching, - author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}, - title = {Synchronous Batching: From Cascades to Free Routes}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {186--206}, - www_section = comm, - www_pdf_url = "http://freehaven.net/doc/sync-batching/sync-batching.pdf", - www_ps_url = "http://freehaven.net/doc/sync-batching/sync-batching.ps", - www_tags={selected}, -} - -@InProceedings{flow-correlation04, - author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, - title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - month = {May}, - series = {LNCS}, - volume = {3424}, - pages = {207--225}, - www_section = traffic, - www_pdf_url = "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf", - www_tags={selected}, -} - -@InProceedings{TH04, - author = {Gergely T\'oth and Zolt\'an Horn\'ak}, - title = {Measuring Anonymity in a Non-adaptive, Real-time System}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - series = {Springer-Verlag, LNCS}, - volume = {3424}, - pages = {226--241}, - www_section = traffic, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}, - www_tags={selected}, -} - -@InProceedings{cascades-vs-p2p:pet2004, - author = {Rainer B\"ohme and George Danezis and Claudia Diaz - and Stefan K\"opsell and Andreas Pfitzmann}, - title = {On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: - Is One Concept Superior?''}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, - year = {2004}, - series = {Springer-Verlag, LNCS}, - volume = {3424}, - pages = {226--241}, - www_section = comm, - www_pdf_url ={http://www.cosic.esat.kuleuven.be/publications/article-523.pdf}, -} - -@InProceedings{mixmaster-reliable, - author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte}, - title = {Comparison between two practical mix designs}, - booktitle = {Proceedings of ESORICS 2004}, - year = {2004}, - series = {LNCS}, - location= {France}, - month = {September}, - www_section = traffic, - www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz", - www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-98.pdf", - www_tags={selected}, - www_important = {1}, -} - -@inproceedings{danezis:wpes2004, - author={George Danezis and Ben Laurie}, - title={Minx: A simple and efficient anonymous packet format}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, - location={Washington, DC, USA}, - month={October}, - year={2004}, - www_section = comm, - www_pdf_url = {http://research.microsoft.com/~gdane/papers/minx.pdf}, - www_tags={selected}, -} - -@inproceedings{feamster:wpes2004, - author={Nick Feamster and Roger Dingledine}, - title={Location Diversity in Anonymity Networks}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, - location={Washington, DC, USA}, - month={October}, - year={2004}, - www_section = comm, - www_ps_url = {http://freehaven.net/doc/routing-zones/routing-zones.ps}, - www_tags={selected}, -} - -@inproceedings{koepsell:wpes2004, - author={Stefan K\"opsell and Ulf Hilling}, - title={How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, - location={Washington, DC, USA}, - month={October}, - year={2004}, - www_section = censorship, - www_pdf_url = {http://freehaven.net/anonbib/papers/p103-koepsell.pdf}, - www_tags={selected}, -} - -@InProceedings{reiter:ccs2004, - author = {Michael Reiter and XiaoFeng Wang}, - title = {Fragile Mixing}, - booktitle = {{Proceedings of the 11th ACM Conference on Computer and - Communications Security (CCS 2004)}}, - year = 2004, - month = {October}, - publisher = {ACM Press}, - www_section = comm, - www_pdf_url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf}, - www_tags={selected}, -} - -@InProceedings{golle:ccs2004, - author = {Philippe Golle and Ari Juels}, - title = {Parallel Mixing}, - booktitle = {{Proceedings of the 11th ACM Conference on Computer and - Communications Security (CCS 2004)}}, - year = 2004, - month = {October}, - publisher = {ACM Press}, - www_section = comm, - www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.pdf", - www_ps_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.ps", - www_tags={selected}, -} - -@InProceedings{golle:eurocrypt2004, - author = {Philippe Golle and Ari Juels}, - title = {Dining Cryptographers Revisited}, - booktitle = "Proceedings of Eurocrypt 2004", - year = 2004, - month = {May}, - www_section = comm, - www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/nim.pdf", - www_tags={selected}, -} - -@InProceedings{THV04, - author = {Gergely T\'oth and Zolt\'an Horn\'ak and Ferenc Vajda}, - title = {Measuring Anonymity Revisited}, - booktitle = {Proceedings of the Ninth Nordic Workshop on Secure IT Systems}, - pages = {85--90}, - year = {2004}, - location= {Espoo, Finland}, - month = {November}, - editor = {Sanna Liimatainen and Teemupekka Virtanen}, - www_section = traffic, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf}, - www_tags={selected}, -} - -@inproceedings{torta05, - title = {Low-Cost Traffic Analysis of {Tor}}, - author = {Steven J. Murdoch and George Danezis}, - booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy}, - year = {2005}, - month = {May}, - publisher = {IEEE CS}, - www_section = traffic, - www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf}, - www_important = 1, - www_tags={selected}, -} - -@inproceedings{pet05-bissias, - author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine}, - title = {Privacy Vulnerabilities in Encrypted HTTP Streams}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, - month = {May}, - year = {2005}, - pages = {1--11}, - www_section = traffic, - www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", - www_tags={selected}, -} - -@inproceedings{pet05-borisov, - author = {Nikita Borisov}, - title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, - month = {May}, - year = {2005}, - pages = {12--25}, - www_section = traffic, - www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf", - www_tags={selected}, -} - -@inproceedings{pet05-serjantov, - title = {Message Splitting Against the Partial Adversary}, - author = {Andrei Serjantov and Steven J. Murdoch}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, - year = {2005}, - month = {May}, - pages = {26--39}, - www_section = comm, - www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf}, - www_tags={selected}, -} - -@inproceedings{pet05-zhu, - author = {Ye Zhu and Riccardo Bettati}, - title = {Unmixing Mix Traffic}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, - month = {May}, - year = {2005}, - pages = {110--127}, - www_section = traffic, - www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf}, - www_tags={selected}, -} - -@inproceedings{pet05-camenisch, - author = {Jan Camenisch and Anton Mityagin}, - title = {Mix-network with Stronger Security}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, - month = {May}, - year = {2005}, - pages = {128--147}, - www_section = proofs, - www_tags={selected}, -} - -@inproceedings{ih05-danezisclulow, - title = {Compulsion Resistant Anonymous Communications}, - author = {George Danezis and Jolyon Clulow}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, - year = {2005}, - month = {June}, - pages = {11--25}, - www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{ih05-Klonowski, - title = {Provable Anonymity for Networks of Mixes}, - author = {Marek Klonowski and Miroslaw Kutylowski}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, - year = {2005}, - month = {June}, - pages = {26--38}, - www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{ih05-Luke, - title = {On Blending Attacks For Mixes with Memory}, - author = {Luke O'Connor}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, - year = {2005}, - month = {June}, - pages = {39--52}, - www_section = traffic, - www_tags={selected}, - www_pdf_url={http://lukejamesoconnor.googlepages.com/blending-attacks.pdf}, -} - -@inproceedings{ih05-csispir, - title = {Censorship Resistance Revisited}, - author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, - year = {2005}, - month = {June}, - pages = {62--76}, - www_section = pub, - www_pdf_url = "http://gnunet.org/papers/IHW-CR.pdf", - www_tags={selected}, -} - -@inproceedings{esorics05-Klonowski, - title = {Local View Attack on Anonymous Communication}, - author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski}, - booktitle = {Proceedings of ESORICS 2005}, - year = {2005}, - month = {September}, - www_ps_url = {http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps}, - www_section = traffic, - www_tags={selected}, -} - -@inproceedings{warta04-Klonowski, - title = {Universal Re-encryption of Signatures and Controlling Anonymous Information Flow}, - author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski}, - booktitle = {Proceedings of WARTACRYPT '04}, - year = {2004}, - month = {July}, - www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, - www_section = misc, - www_tags={selected}, -} - -@inproceedings{sofem05-Klonowski, - title = {Anonymous Communication with On-line and Off-line Onion Encoding}, - author = { Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski}, - booktitle = {Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005)}, - year = {2005}, - month = {January}, - www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{wisa04-Klonowski, - title = {Anonymous Communication with On-line and Off-line Onion Encoding}, - author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, - booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)}, - year = {2004}, - month = {August}, - www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{mmsec04-Klonowski, - title = {DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion Protocols}, - author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski}, - booktitle = {Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004}, - year = {2004}, - month = {September}, - www_section = comm, - www_tags={selected}, -} - -@InProceedings{camlys05, - author = "Jan Camenisch and Anna Lysyanskaya", - title = "A Formal Treatment of Onion Routing", - booktitle = {Proceedings of {CRYPTO} 2005}, - year = {2005}, - month = {August}, - editor = {Victor Shoup}, - publisher = {Springer-Verlag, LNCS 3621}, - pages = "169--187", - www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf}, - www_section = proofs, - www_tags={selected}, -} - -@inproceedings{sassaman:wpes2005, - title = {The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval}, - author = {Len Sassaman and Bram Cohen and Nick Mathewson}, - booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005)}}, - year = {2005}, - month = {November}, - location= {Arlington, VA, USA}, - www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf}, - www_section = nym, - www_important = {1}, - www_tags={selected}, -} - -@INPROCEEDINGS{GHPvR05, - AUTHOR = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum}, - TITLE = {Provable Anonymity}, - BOOKTITLE = {{Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)}}, - YEAR = "2005", - location= "Alexandria, VA, USA", - month = "November", - www_pdf_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf}, - www_ps_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.ps}, - www_section = methods, - www_tags={selected}, -} - -@article{xor-trees, - author = {Shlomi Dolev and Rafail Ostrobsky}, - title = {Xor-trees for efficient anonymous multicast and reception}, - journal = {ACM Trans. Inf. Syst. Secur}, - volume = {3}, - number = {2}, - year = {2000}, - pages = {63--84}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_section = comm, - www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps", - www_tags={selected}, -} - -@article{buses03, - author = {Amos Beimel and Shlomi Dolev}, - title = {Buses for Anonymous Message Delivery}, - journal = {Journal of Cryptology}, - pages = {25--39}, - volume = {16}, - year = {2003}, - number = {1}, - www_section = comm, - www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", - www_tags={selected}, -} - -@inproceedings{usability:weis2006, - title = {Anonymity Loves Company: Usability and the Network Effect}, - author = {Roger Dingledine and Nick Mathewson}, - crossref = {weis2006}, - www_section = economics, - www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf}, - www_tags={selected}, -} - -@misc{cryptoeprint:2005:394, - author = {Ben Adida and Douglas Wikstr\"om}, - title = {Obfuscated Ciphertext Mixing}, - howpublished = {Cryptology ePrint Archive, Report 2005/394}, - year = {2005}, - month = {November}, - www_section = proofs, - www_html_url = {http://eprint.iacr.org/2005/394}, - www_pdf_url = {http://eprint.iacr.org/2005/394.pdf}, - www_tags={selected}, -} - -@PhDThesis{DiazThesis05, - AUTHOR = {Claudia Diaz}, - YEAR = {2005}, - TITLE = {Anonymity and Privacy in Electronic Services}, - SCHOOL = {Katholieke Universiteit Leuven}, - address = {Leuven, Belgium}, - month = {December}, - www_section = comm, - www_pdf_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf}, - www_tags={selected}, -} - -@inproceedings{HanLLHP05, - author = {Jinsong Han and - Yunhao Liu and - Li Lu and - Lei Hu and - Abhishek Patil}, - title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design}, - booktitle = {Proceedings of ICCNMC}, - year = {2005}, - pages = {143--152}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{XuFZBCZ05, - author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao}, - title = {SAS: A Scalar Anonymous Communication System}, - booktitle = {Proceedings of ICCNMC}, - year = {2005}, - pages = {452--461}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{LuFSG05, - author = {Tianbo Lu and - Binxing Fang and - Yuzhong Sun and - Li Guo}, - title = {Some Remarks on Universal Re-encryption and A Novel Practical - Anonymous Tunnel}, - booktitle = {Proceedings of ICCNMC}, - year = {2005}, - pages = {853--862}, - www_section = comm, - www_tags = {selected}, - www_abstract_url = {http://www.springerlink.com/content/b3x4na87xbmcextx/}, -} - -@inproceedings{WangCJ05, - author = {Xinyuan Wang and - Shiping Chen and - Sushil Jajodia}, - title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, - booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, - month = {November}, - year = {2005}, - pages = {81--91}, - www_section = comm, - www_pdf_url = "http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf", - www_tags={selected}, -} - -@InProceedings{hs-attack06, - title = {Locating Hidden Servers}, - author = {Lasse {\O}verlier and Paul Syverson}, - booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, - year = {2006}, - month = {May}, - publisher = {IEEE CS}, - www_pdf_url = "http://www.onion-router.net/Publications/locating-hidden-servers.pdf", - www_section = traffic, - www_important = {1}, - www_remarks = {Motivates and describes Tor's entry guard design.}, - www_tags={selected}, -} - -@InProceedings{esorics04-mauw, - title = {A formalization of anonymity and onion routing}, - author = {S. Mauw and J. Verschuren and E.P. de Vink}, - publisher = {LNCS 3193}, - www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, - booktitle = {Proceedings of ESORICS 2004}, - editor = {P. Samarati, P. Ryan, D. Gollmann, and R. Molva}, - location = {Sophia Antipolis}, - year = {2004}, - pages = {109--124}, - www_section = methods, - www_tags={selected}, -} - -@inproceedings{UREbreak06, - title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption}, - author = {George Danezis}, - booktitle = {Proceedings of Information Security Conference 2006}, - year = {2006}, - month = {September}, - publisher = {Springer-Verlag}, - www_pdf_url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf}, - www_section = proofs, - www_tags={selected}, -} - -@inproceedings{Golle:sp2006, - title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks}, - author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow}, - booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, - year = {2006}, - month = {May}, - location = {Oakland, CA}, - pages = {121--131}, - publisher = {IEEE CS}, - www_section = comm, - www_pdf_url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf}, - www_tags={selected}, -} - -@inproceedings{icdcs2006:m2, - title = {M2: Multicasting Mixes for Efficient and Anonymous Communication}, - author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, - booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems}, - year = {2006}, - month = {July}, - day = {4--7}, - www_section = comm, - www_pdf_url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf}, - www_tags={selected}, -} - -@inproceedings{danezis:weis2006, - title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications}, - author = {George Danezis and Bettina Wittneben}, - crossref = {weis2006}, - www_section = traffic, - www_important = 1, - www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-788.pdf}, - www_tags={selected}, -} - -@inproceedings{heydt-benjamin:pet2006, - title = {Privacy for Public Transportation}, - author = {Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - www_section = credentials, - pages = {1--19}, - www_pdf_url = {http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf}, - www_tags={selected}, -} - -@inproceedings{ciaccio:pet2006, - author = {Giuseppe Ciaccio}, - title = {Improving Sender Anonymity in a Structured Overlay with Imprecise Routing}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {190--207}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_11.pdf}, - www_tags={selected}, -} - -@inproceedings{valet:pet2006, - author = {Lasse {\O}verlier and Paul Syverson}, - title = {Valet Services: Improving Hidden Servers with a Personal Touch}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {223--244}, - www_section = nym, - www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf}, - www_tags={selected}, -} - -@inproceedings{alpha-mixing:pet2006, - author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, - title = {Blending Different Latency Traffic with Alpha-Mixing}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {245--257}, - www_section = comm, - www_pdf_url = {http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf}, - www_tags={selected}, -} - -@inproceedings{tap:pet2006, - author = {Ian Goldberg}, - title = {On the Security of the {Tor} Authentication Protocol}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {316--331}, - www_section = methods, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}, - www_tags={selected}, -} - -@inproceedings{morphmix:pet2006, - author = {Parisa Tabriz and Nikita Borisov}, - title = {Breaking the Collusion Detection Mechanism of MorphMix}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {368--384}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_21.pdf}, - www_tags={selected}, -} - -@inproceedings{clayton:pet2006, - author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, - title = {{Ignoring the Great Firewall of China}}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {20--35}, - www_section = censorship, - www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, - www_tags={selected}, -} - -@inproceedings{cview:pet2006, - author = {Andreas Pashalidis and Bernd Meyer}, - title = {Linking Anonymous Transactions: The Consistent View Attack}, - editor = {George Danezis and Philippe Golle}, - booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", - month = {June}, - year = {2006}, - publisher = {Springer}, - location = {Cambridge, UK}, - bookurl = {http://petworkshop.org/2006/}, - pages = {384--392}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_22.pdf}, - www_tags={selected}, -} - -@techreport{karger77, - Author="Paul A. Karger", - Title="Non-Discretionary Access Control for Decentralized Computing Systems", - Institution="Laboratory for Computer Science, Massachusetts Institute of Technology", - Address="Cambridge, MA", - Number="MIT/LCS/TR-179", - Type="S. M. & E. E. thesis", - Month="May", - Year=1977, - - www_section = traffic, - www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf}, - www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.}, - www_tags={selected}, -} - -@techreport{padlipky78, - Author={Michael A. Padlipsky and David W. Snow and Paul A. Karger}, - Title="Limitations of End-to-End Encryption in Secure Computer Networks", - Institution="The MITRE Corporation: Bedford MA, HQ Electronic Systems Division", - Address="Hanscom AFB, MA", - Number="ESD-TR-78-158", - Month="August", - Year=1978, - www_section = traffic, - www_pdf_url = {http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf}, - www_tags={selected}, -} - -@InProceedings{stepping-stones, - author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu}, - title = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones}, - Booktitle = {Proceedings of ESORICS 2002}, - Year = {2002}, - month = {October}, - pages = {244--263}, - www_section = traffic, - www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf}, - www_tags={selected}, -} - -@InProceedings{fu-active, - author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, - title = {Active Traffic Analysis Attacks and Countermeasures}, - booktitle = {Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing}, - year = {2003}, - pages = {31--39}, - www_section = traffic, - www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf}, - www_tags={selected}, -} - -@InProceedings{fu-analytical, - author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, - title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks}, - Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}, - year = {2003}, - pages={483--492}, - www_section = traffic, - www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf}, - www_tags={selected}, -} - -@inproceedings{Fu::FlowMarking::2005, - author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao}, - title = {On Flow Marking Attacks in Wireless Anonymous Communication Networks}, - booktitle = {Proceedings of the IEEE International Conference on -Distributed Computing Systems (ICDCS)}, - year = {2005}, - month = {April}, - www_section = traffic, - www_pdf_url = {http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf}, - www_tags={selected}, -} - -@inproceedings{ShWa-Timing06, - title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses}, - author = {Vitaly Shmatikov and Ming-Hsiu Wang}, - booktitle = {Proceedings of ESORICS 2006}, - year = {2006}, - month = {September}, - www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf}, - www_section = traffic, - www_tags = {selected}, - www_important = 1, -} - -@inproceedings{ShWa-Relationship, - title = {Measuring Relationship Anonymity in Mix Networks}, - author = {Vitaly Shmatikov and Ming-Hsiu Wang}, - booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, - year = {2006}, - month = {October}, - www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf}, - www_section = traffic, - www_tags = {selected}, -} - -@inproceedings{Salsa, - title = {Salsa: A Structured Approach to Large-Scale Anonymity}, - author = {Arjun Nambiar and Matthew Wright}, - booktitle = {Proceedings of CCS 2006}, - year = {2006}, - month = {November}, - www_pdf_url = {http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf}, - www_section = comm, - www_tags = {selected}, -} - -@inproceedings{HotOrNot, - title = {Hot or Not: Revealing Hidden Services by their Clock Skew}, - author = {Steven J. Murdoch}, - booktitle = {Proceedings of CCS 2006}, - year = {2006}, - month = {November}, - www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf}, - www_section = traffic, - www_tags = {selected}, -} - -@inproceedings{goldberg-2007, - title = {{Improving the Robustness of Private Information Retrieval}}, - author = {Ian Goldberg}, - booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, - year = {2007}, - month = {May}, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf}, - www_section = pir, - www_tags = {selected}, -} - -@inproceedings{beimel-robust, - author = {A. Beimel and Y. Stahl}, - title = {Robust information-theoretic private information retrieval}, - booktitle = {Proceedings of the 3rd Conference on Security in Communication Networks}, - editor = {S. Cimato C. Galdi G. Persiano }, - publisher = {Springer-Verlag}, - series = {Lecture Notes in Computer Science}, - pages = {326--341}, - volume = {2576}, - year = {2002}, - www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf}, - www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps}, - www_section = pir, - www_important = {1}, - www_tags = {selected}, -} - -@techreport{cosic-2007-001, - author = {Len Sassaman and Bart Preneel}, - title = {{The Byzantine Postman Problem: A Trivial Attack Against - PIR-based Nym Servers}}, - year = {2007}, - month = {February}, - institution = {Katholieke Universiteit Leuven}, - number = {ESAT-COSIC 2007-001}, - www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf}, - www_section = pir, - www_tags = {selected}, -} - -@article{beimel01informationtheoretic, - author = {Amos Beimel and Yuval Ishai}, - title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, - journal = {Lecture Notes in Computer Science}, - volume = {2076}, - pages = {89--98}, - year = {2001}, - www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf}, - www_section = pir, - www_important = {1}, - www_tags = {selected}, -} - -@inproceedings{CPIR, - author = {Benny Chor and Niv Gilboa}, - title = {Computationally private information retrieval (extended abstract)}, - booktitle = {Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97)}, - month = {May}, - year = {1997}, - isbn = {0-89791-888-6}, - pages = {304--313}, - location = {El Paso, Texas, United States}, - doi = {http://doi.acm.org/10.1145/258533.258609}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf}, - www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}, - www_section = pir, - www_tags = {selected}, -} - -@inproceedings{pir, - title = {Private Information Retrieval}, - author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu -Sudan}, - booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science}, - pages = {41--50}, - year = {1995}, - www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps}, - www_section = pir, - www_important = {1}, - www_tags = {selected}, -} - -@inproceedings{beimel-barrier, - title = {{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private Information Retrieval}}, - author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\c{c}ois Raymond}, - booktitle = {Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02)}, - month = {November}, - year = {2002}, - www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf}, - www_section = pir, - www_tags = {selected}, -} - -@inproceedings{tau-indy, - author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, - title = {A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication}, - booktitle = {Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98)}, - year = {1998}, - isbn = {3-540-65142-X}, - pages = {200--217}, - publisher = {Springer-Verlag}, - location = {London, UK}, - www_ps_url = {http://eprint.iacr.org/1998/013.ps.gz}, - www_section = pir, - www_tags = {selected}, -} - -@article{kissner04private, - author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang}, - title = {Private keyword-based push and pull with applications to anonymous communication}, - journal = {Applied Cryptography and Network Security}, - year = {2004}, - www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf}, - www_section = pir, - www_tags = {selected}, -} - -@inproceedings{wpes06:heydt-benjamin, - author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend}, - title = {Nonesuch: a mix network with sender unobservability}, - booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, - month = {October}, - year = {2006}, - isbn = {1-59593-556-8}, - pages = {1--8}, - location = {Alexandria, Virginia, USA}, - doi = {http://doi.acm.org/10.1145/1179601.1179603}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_pdf_url = "http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf", - www_section = comm, - www_tags = {selected}, -} - -@inproceedings{clonewars, - author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich}, - title = {How to win the clonewars: efficient periodic n-times anonymous authentication}, - booktitle = {Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006)}, - month = {November}, - year = {2006}, - isbn = {1-59593-518-5}, - pages = {201--210}, - location = {Alexandria, Virginia, USA}, - doi = {http://doi.acm.org/10.1145/1180405.1180431}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-812.pdf", - www_section = credentials, - www_important = {1}, - www_tags = {selected}, -} - -@inproceedings{idemix, - author = {Jan Camenisch and Els Van Herreweghen}, - title = {Design and implementation of the idemix anonymous credential system}, - booktitle = {Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002)}, - year = {2002}, - isbn = {1-58113-612-9}, - pages = {21--30}, - location = {Washington, DC, USA}, - doi = {http://doi.acm.org/10.1145/586110.586114}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_section = credentials, - www_pdf_url = "http://www.zurich.ibm.com/~jca/papers/camvan02.pdf", - www_important = {1}, - www_tags = {selected}, -} - -@inproceedings{cl01a, - author = {Jan Camenisch and Anna Lysyanskaya}, - title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, - booktitle = {Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01)}, - year = {2001}, - isbn = {3-540-42070-3}, - pages = {93--118}, - publisher = {Springer-Verlag}, - location = {London, UK}, - www_section = credentials, - www_pdf_url = "http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf", - www_tags = {selected}, -} - -@inproceedings{chl05-full:eurocrypt2005, - author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, - title = {Compact E-Cash}, - pages = {302--321}, - ee = {http://dx.doi.org/10.1007/11426639_18}, - crossref = {eurocrypt2005}, - www_section = credentials, - www_pdf_url = "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", - www_important = {1}, - www_tags = {selected}, -} -% booktitle = {Proceedings of EUROCRYPT 2005}, -% year = {2005}, -% bibsource = {DBLP, http://dblp.uni-trier.de} - - -@article{adams06, - title = {A Classification for Privacy Techniques}, - author = {Carlisle Adams}, - journal = {University of Ottawa Law & Technology Journal}, - volume = {3}, - issue = {1}, - year = {2006}, - pages = {35--52}, - www_pdf_url = -{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf}, - www_section = {Misc}, - www_tags = {selected}, -} - -@article{brands06, - title = {Secure User Identification Without Privacy Erosion}, - author = {Stefan Brands}, - journal = {University of Ottawa Law & Technology Journal}, - volume = {3}, - issue = {1}, - year = {2006}, - pages = {205--223}, - www_pdf_url = -{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf}, - www_section = {Misc}, - www_tags = {selected}, -} - -@inproceedings{adida07, - author = {Ben Adida and Douglas Wikstr\"om}, - title = {How to Shuffle in Public}, - booktitle = {Proceedings of the Theory of Cryptography 2007}, - year = {2007}, - month = {February}, - www_section = proofs, - www_pdf_url = {http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf}, - www_tags = {selected}, -} - -@InProceedings{slicing07, - author = {Sachin Katti and Jeffery Cohen and Dina Katabi}, - title = {Information Slicing: Anonymity Using Unreliable Overlays}, - booktitle = {Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI)}, - year = {2007}, - month = {April}, - www_section = comm, - www_pdf_url = "http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf", - www_tags = {selected}, -} - -% -% PET 2007 PAPERS. Links are to pre-procedings versions. -% -@InProceedings{franz-pet2007, - author = {Matthias Franz and Bernd Meyer and Andreas Pashalidis}, - title = {Attacking Unlinkability: The Importance of Context}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = methods, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf}, -} - -@InProceedings{serjantov-pet2007, - author = {Andrei Serjantov}, - title = {A Fresh Look at the Generalized Mix Framework}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf}, -} - -@InProceedings{danezis-pet2007, - author = {George Danezis and Claudia Diaz and Carmela Troncoso}, - title = {Two-Sided Statistical Disclosure Attack}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf}, - www_tags = {selected}, - www_remarks = {Extends the Statistical Disclosure attack to take advantage of reply messages.}, -} - -@InProceedings{tsudik-pet2007, - author = {Gene Tsudik}, - title = {A Family of Dunces}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = misc, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Family_dunces.pdf}, -} - -@InProceedings{zhong-pet2007, - author = {Ge Zhong and Ian Goldberg and Urs Hengartner}, - title = {Louis, Lester, and Pierre: Three Protocols for Location Privacy}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Louis_Lester.pdf}, -} - -@InProceedings{faust-pet2007, - author = {Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and Bart Preneel}, - title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf}, -} - -@InProceedings{kate-pet2007, - author = {Aniket Kate and Greg Zaverucha and Ian Goldberg}, - title = {Pairing-Based Onion Routing}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Pairing_based.pdf}, - www_remarks = {Describes a circuit-establishment protocol for a Tor-like - network. Uses Pairing- and Identity-Based crypto for efficiency, at the - expense of having all private keys generated by a trusted IBE authority.}, -} - -@InProceedings{johnson-pet2007, - title = {Nymble: Anonymous IP-address Blocking}, - author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and - Sean W. Smith}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = misc, - www_pdf_url= {http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf}, - www_remarks = {Superseded by nymble-tdsc.}, -} - -@Inproceedings{overlier-pet2007, - title = {Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden services}, - author = {Lasse {\O}verlier and Paul Syverson}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = comm, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf}, - www_tags = {selected}, - www_remarks = {Introduces Diffie-Hellman-based handshakes to build - Tor circuits with fewer exponentiations than the original - circuit-establishment protocol.}, -} - -@Inproceedings{guha-pet2007, - author = {Saikat Guha and Paul Francis}, - title = {Identity Trail: Covert Surveillance Using DNS}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf}, -} - -@Inproceedings{murdoch-pet2007, - title={Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries}, - author={Steven J. Murdoch and Piotr Zieli{\'n}ski}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf}, - www_tags = {selected}, - www_important = {1}, - www_remarks = {Examines efficacy of traffic analysis against a - low-latency anonymity network by an adversary who - controls Internet exchanges, and who can only - sample a fraction of traffic.}, -} - -@InProceedings{abbott-pet2007, - title = {Browser-Based Attacks on {Tor}}, - author = {Timothy G and Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf}, -} - -@InProceedings{wendolsky-pet2007, - title={Performance Comparison of low-latency Anonymisation Services from a User Perspective}, - author={Rolf Wendolsky and Dominik Herrmann and Hannes Federrath}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section=comm, - www_pdf_url ={http://petworkshop.org/2007/papers/PET2007_preproc_Performance_comparison.pdf}, -} - -@Inproceedings{nagaraja-pet2007, - title={Anonymity in the wild: Mixes on unstructured networks}, - author={Shishir Nagaraja}, - editor = {Nikita Borisov and Philippe Golle}, - booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", - month = {June}, - year = {2007}, - publisher = {Springer}, - location = {Ottawa, Canada}, - bookurl = {http://petworkshop.org/2007/}, - www_section=comm, - www_pdf_url={http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf}, -} - -@inproceedings{Liberatore:2006, - Author = {Marc Liberatore and Brian Neil Levine}, - Title = {{Inferring the Source of Encrypted HTTP Connections}}, - Booktitle = {Proceedings of the 13th ACM conference on Computer and - Communications Security (CCS 2006)}, - Month = {November}, - year = {2006}, - Pages = {255--263}, - www_section = traffic, - www_tags = {selected}, - www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf}, -} - -@article{Levine:2002, - Author = {Brian Neil Levine and Clay Shields}, - Journal = {Journal of Computer Security}, - Keywords = {anonymity; routing; security; multicast; Journal Paper}, - Number = 3, - Pages = {213--240}, - Title = {{Hordes --- A Multicast Based Protocol for Anonymity}}, - Volume = 10, - Year = {2002}, - www_section = comm, - www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf}, - www_tags = {selected}, -} - -@inproceedings{Scarlata:2001, - Author = {Vincent Scarlata and Brian Neil Levine and Clay Shields}, - Title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}}, - Booktitle = {Proceedings of the IEEE International Conference on Network - Protocols (ICNP)}, - Keywords = {security; routing; peer-to-peer; anonymity}, - Month = {November}, - Pages = {272--280}, - Year = {2001}, - www_section = misc, - www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf}, -} -%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf}, - - -@article{Wright:2004, - Author = {Matthew Wright and Micah Adler and Brian Neil Levine and - Clay Shields}, - Title = {{The Predecessor Attack: An Analysis of a Threat to - Anonymous Communications Systems}}, - Journal = {ACM Transactions on Information and System Security (TISSEC)}, - Keywords = {anonymity; Journal Paper}, - Month = {November}, - Number = 7, - Pages = {489--522}, - Volume = 4, - Year = {2004}, - www_section = traffic, - www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf}, - www_tags = {selected}, -} - -@inproceedings{Wang-SP2007, - title = {{Network Flow Watermarking Attack on Low-Latency Anonymous - Communication Systems}}, - author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, - booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, - year = {2007}, - month = {May}, - pages = {116--130}, - www_section = traffic, - www_pdf_url = - {http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf}, -} - -@INPROCEEDINGS{HasuoK07a, - AUTHOR = "Ichiro Hasuo and Yoshinobu Kawabe", - TITLE = "Probabilistic Anonymity via Coalgebraic Simulations", - BOOKTITLE = "Proceedings of the European Symposium on Programming (ESOP '07)", - PAGES = "379--394", - PUBLISHER = "Springer, Berlin", - SERIES = lncs, - VOLUME = "4421", - YEAR = 2007, - www_section = methods, - www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf}, -} - -@article{regroup2006, - author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}, - title = {Regroup-And-Go mixes to counter the $(n-1)$ attack}, - journal = {Journal of Internet Research}, - pages = {213--223}, - volume = {16}, - year = {2006}, - doi = {http://dx.doi.org/10.1108/10662240610656528}, - number = {2}, - publisher = {Emerald Group Publishing Limited}, - www_section = comm, - www_tags={selected}, -} - -@INPROCEEDINGS{ringstwice07, - author = {Meredith L. Patterson and Len Sassaman}, - title = {Subliminal Channels in the Private Information Retrieval Protocols}, - year = {2007}, - booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux}, - location = {Enschede, NL}, - publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie}, - www_section = pir, - www_tags={selected}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf}, -} -%pages = {8}, % This can't be right. -NM - -@article{wagner, - author = {Robyn Wagner}, - title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}}, - journal = {New Mexico Law Review}, - volume = {32}, - number = {Winter}, - pages = {99--142}, - year = {2002}, - www_section = misc, - www_tags = {selected}, -} - -@inproceedings{cooper, - title = {Preserving Privacy in a Network of Mobile Computers}, - author = {David A. Cooper and Kenneth P. Birman}, - booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy}, - year = {1995}, - month = {May}, - www_section = pir, - www_tags = {selected}, - www_pdf_url = {http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf}, -} - -@INPROCEEDINGS{space-efficient, - author = {George Danezis and Claudia Diaz}, - title = {Space-Efficient Private Search}, - month = {February}, - year = {2007}, - booktitle = {Proceedings of Financial Cryptography (FC2007)}, - series = {Lecture Notes in Computer Science}, - location= {Tobago}, - publisher = {Springer-Verlag}, - www_section = pir, - www_tags = {selected}, -} - -% -- Below are additions from gd on 01 July 2007 -- - -@inproceedings{1166488, - author = {Ira S. Moskowitz and Richard E. Newman}, - title = {Timing channels, anonymity, mixes, and spikes}, - booktitle = {Proceedings of the 2nd IASTED international -conference on Advances in computer science and technology (ACST '06)}, - month = {January}, - year = {2006}, - isbn = {0-88986-545-0}, - pages = {251--256}, - location = {Puerto Vallarta, Mexico}, - publisher = {ACTA Press}, - address = {Anaheim, CA, USA}, - www_section = methods -} - -@inproceedings{Huang06, - author = {Dijiang Huang}, - title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems}, - booktitle = {Proceedings of the 5th ACM workshop on Wireless -security (WiSe '06)}, - year = {2006}, - isbn = {1-59593-557-6}, - pages = {65--74}, - location = {Los Angeles, California}, - doi = {http://doi.acm.org/10.1145/1161289.1161303}, - publisher = {ACM Press}, - address = {New York, NY, USA}, - www_section = traffic -} - -@article{10.1109/SP.2006.17, -author = {Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter -Rautenbach}, -title = {Fundamental Limits on the Anonymity Provided by the MIX Technique}, -journal = {sp}, -volume = {0}, -year = {2006}, -issn = {1081-6011}, -pages = {86--99}, -doi = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17}, -publisher = {IEEE Computer Society}, -address = {Los Alamitos, CA, USA}, -www_section = traffic, -www_pdf_url = {http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf} -} - -@article{ishai2006ca, - title={{Cryptography from Anonymity}}, - author={Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai}, - journal={Proceedings of the 47th Annual IEEE Symposium on Foundations -of Computer Science (FOCS'06)-Volume 00}, - pages={239--248}, - month = {October}, - year={2006}, - publisher={IEEE Computer Society Washington, DC, USA}, - www_tags = {selected}, - www_section = methods, - www_pdf_url={http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf}, -} - - -@misc{wang2006sam, - title={{System and method for protecting privacy and anonymity of parties of network communications}}, - author={Y.M. Wang and Q. Sun and D.R. Simon and W. Russell}, - year={2006}, - howpublished={US Patent 6,986,036}, - publisher={Google Patents}, - note={US Patent 6,986,036}, - www_section = comm -} - -@article{kesdogan2006tcn, - title={{Technical challenges of network anonymity}}, - author={D. Kesdogan and C. Palmer}, - journal={Computer Communications}, - volume={29}, - number={3}, - pages={306--324}, - year={2006}, - publisher={Elsevier}, - www_section = comm -} - -@article{kopsell2006ra, - title={{Revocable Anonymity}}, - author={S. Kopsell and R. Wendolsky and H. Federrath}, - journal={Emerging Trends in Information and Communication -Security-ETRICS, LNCS}, - volume={3995}, - pages={206--220}, - year={2006}, - www_section = comm -} - -@article{huang2006sce, - title={{Silent cascade: Enhancing location privacy without communication qos degradation}}, - author={L. Huang and K. Matsuura and H. Yamane and K. Sezaki}, - journal={Proc. of Security in Pervasive Computing (SPC)}, - pages={165--180}, - year={2006}, - www_section = misc -} - -@article{melchor2006dnp, - title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}}, - author={C.A. Melchor and Y. Deswarte}, - journal={Proceedings of the Fifth IEEE International Symposium on -Network Computing and Applications}, - pages={163--172}, - year={2006}, - publisher={IEEE Computer Society Washington, DC, USA}, - www_section = comm -} - -@article{clauss2006sam, - title={{Structuring anonymity metrics}}, - author={S. Clau{\ss} and S. Schiffner}, - journal={Proceedings of the second ACM workshop on Digital identity -management}, - pages={55--62}, - year={2006}, - publisher={ACM Press New York, NY, USA}, - www_section = methods -} - -@article{durresi2006tac, - title={{Tokens for Anonymous Communications in the Internet}}, - author={A. Durresi and V. Paruchuri and L. Barolli and R. Jain and -M. Takizawa}, - journal={Proceedings of the 17th International Conference on Database -and Expert Systems Applications}, - pages={83--90}, - year={2006}, - publisher={IEEE Computer Society Washington, DC, USA}, - www_section = comm, - www_pdf_url={http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf}, -} - -@article{deng2006mar, - title={{Measuring anonymity with relative entropy}}, - author={Y. Deng and J. Pang and P. Wu}, - journal={Proc. of FAST}, - year={2006}, - www_section = methods -} - -@article{tsai2006sas, - title={{A Scalable Anonymous Server Overlay Network}}, - author={H. Tsai and A. Harwood}, - journal={Proceedings of the 20th International Conference on Advanced -Information Networking and Applications-Volume 1 (AINA'06)-Volume 01}, - pages={973--978}, - year={2006}, - publisher={IEEE Computer Society Washington, DC, USA}, - www_section = comm -} - -% article{toth11aca, -% title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}}, -% author={G. Toth and Z. Hornak}, -% journal={Security and Privacy in Dynamic Environments--Proceedings of -%the IFIP TC-11 21st International Information Security Conference (SEC -%2006)}, -% year = {2006}, -% volume={201}, -% www_section = stream, -%} - -@inproceedings{TH06a, - title = {{The APROB Channel: adaptive semi-real-time anonymous communication}}, - author = {Gergely T\'oth and Zolt\'an Horn\'ak}, - booktitle = {Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and Distributed, Karlstad, Sweden}, - year = {2006}, - www_section = {stream}, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf}, -} - -@inproceedings{TH06b, - title = {{The Chances of Successful Attacks against Continuous-time Mixes}}, - author = {Gergely T\'oth and Zolt\'an Horn\'ak}, - booktitle = {Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\:oping, Sweden}, - year = {2006}, - www_section = {Traffic analysis}, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf}, -} - - - -@article{10.1109/IWNAS.2006.40, -author = {Yingwu Zhu}, -title = {Resilient P2P Anonymous Routing by Using Redundancy}, -journal = {iwnas}, -volume = {0}, -year = {2006}, -isbn = {0-7695-2651-9}, -pages = {103--110}, -doi = {http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40}, -publisher = {IEEE Computer Society}, -address = {Los Alamitos, CA, USA}, -www_section = comm -} - -@article{chatzikokolakis2006apn, - title={{Anonymity Protocols as Noisy Channels?}}, - author={K. Chatzikokolakis and C. Palamidessi and P. Panangaden}, - journal={Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. -Springer}, - year={2006}, -www_section = methods, -www_tags = {selected} -} - -@article{boukerche2005esd, - title={{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}}, - author={A. Boukerche and K. El-Khatib and L. Xu and L. Korba}, - journal={Computer Communications}, - volume={28}, - number={10}, - pages={1193--1203}, - year={2005}, - publisher={Elsevier}, - www_section = comm, - www_pdf_url={http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf}, -} - -@article{danezis2006rfa, - title={{Route Fingerprinting in Anonymous Communications}}, - author={George Danezis and Richard Clayton}, - journal={Proceedings of the Sixth IEEE International Conference on -Peer-to-Peer Computing}, - pages={69--72}, - year={2006}, - publisher={IEEE Computer Society Washington, DC, USA}, - www_section = mixattacks, - www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf" -} - -@article{singh2006ama, - title={{Agyaat: mutual anonymity over structured P2P networks}}, - author={A. Singh and B. Gedik and L. Liu}, - journal={Internet Research}, - volume={16}, - number={2}, - pages={189--212}, - year={2006}, - www_section = comm -} - -@article{gupta2006uns, - title={{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}}, - author={R. Gupta and S. Ray and A.K. Somani and Z. Zhang}, - journal={Multiagent and Grid Systems}, - volume={2}, - number={1}, - pages={11--27}, - year={2006}, - publisher={IOS Press}, - www_section = economics, - www_pdf_url={http://www.public.iastate.edu/~rsouvik/Article531.pdf}, -} - -@article{nguyen2006vsf, - title={{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}}, - author={L. Nguyen and R. Safavi-Naini and K. Kurosawa}, - journal={International Journal of Information Security}, - volume={5}, - number={4}, - pages={241--255}, - year={2006}, - publisher={Springer}, - www_section = proofs, - www_tags = {selected}, -} - -% -- end of additions from gd on 01 July 2007 -- -% -- start of additions from tshb on 16 July 2007 --- -% my thanks to Markulf Kohlweiss for his recommendations -@inproceedings{camenisch2003pve, - title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms}, - author = {Jan Camenisch and Victor Shoup}, - booktitle = {Proceedings of {CRYPTO} 2003}, - year = {2003}, - pages = {126--144}, - publisher = {Springer Verlag, LNCS 2729}, - www_section = credentials, - www_important = {0}, - www_tags = {selected}, - www_pdf_url = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2729{\&}spage=126}, -} - -@inproceedings{camenisch2002da, - title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials}, - author = {Jan Camenisch and Anna Lysyanskaya}, - booktitle = {Proceedings of {CRYPTO} 2002}, - year = {2002}, - pages = {61--76}, - publisher = {Springer Verlag, LNCS 2442}, - www_section = credentials, - www_important = {0}, - www_tags = {selected}, - www_pdf_url = {http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm}, -} - -@inproceedings{camenisch2002ssep, - title = {A Signature Scheme with Efficient Protocols}, - author = {Jan Camenisch and Anna Lysyanskaya}, - booktitle = {Proceedings of {SCN '02}, Third Conference on Security in Communication Networks}, - year = {2002}, - pages = {268--289}, - publisher = {Springer Verlag, LNCS 2576}, - www_section = credentials, - www_important = {1}, - www_tags = {selected}, - www_pdf_url = {http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf}, -} - -@inproceedings{ccs07-latency-leak, - title = {How Much Anonymity does Network Latency Leak?}, - author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, - booktitle = {Proceedings of CCS 2007}, - year = {2007}, - month = {October}, - www_pdf_url = {http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf}, - www_section = traffic -} - -@article{tissec-latency-leak, - title = {How Much Anonymity does Network Latency Leak?}, - author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, - journal = {ACM Transactions on Information and System Security}, - year = {2010}, - month = {February}, - volume={13}, - number={2}, - www_important = {1}, - www_tags = {selected}, - www_pdf_url = {http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf}, - www_section = traffic -} - -@inproceedings{ccs07-doa, - title = {Denial of Service or Denial of Security? {H}ow Attacks on Reliability can Compromise Anonymity}, - author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz}, - booktitle = {Proceedings of CCS 2007}, - year = {2007}, - month = {October}, - www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf}, - www_tags = {selected}, - www_important = {1}, - www_section = traffic -} - -@inproceedings{ccs07-blac, - title = {Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs}, - author = {Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, - booktitle = {Proceedings of CCS 2007}, - year = {2007}, - month = {October}, - www_pdf_url = {http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf}, - www_section = nym, - www_remarks = {Superseded by blac-tissec}, -} - -@inproceedings{wiangsripanawan-acsw07, - author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini}, - title = {Design principles for low latency anonymous network systems secure against timing attacks}, - booktitle = {Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07)}, - year = {2007}, - isbn = {1-920-68285-X}, - pages = {183--191}, - location = {Ballarat, Australia}, - publisher = {Australian Computer Society, Inc}, - address = {Darlinghurst, Australia, Australia}, - www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=}, - www_tags = {selected}, - www_section = traffic, -} - -@inproceedings{ChatziPP07, - author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, - title = {Probability of Error in Information-Hiding Protocols}, - booktitle = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)}, - year = {2007}, - location = {S. Servolo island, Venice - Italy}, - www_pdf_url = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}, - www_tags = {selected}, - www_section = comm -} - -@article{WrightMM06, - author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson}, - title = {On Inferring Application Protocol Behaviors in Encrypted Network Traffic}, - journal = {Journal of Machine Learning Research }, - volume = {7}, - year = {2006}, - issn = {1533-7928}, - pages = {2745--2769}, - publisher = {MIT Press}, - address = {Cambridge, MA, USA}, - www_pdf_url = {http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf}, - www_tags = {selected}, - www_section = traffic -} - -@inproceedings{AthanRAM07, - author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos}, - title = {GAS: Overloading a File Sharing Network as an Anonymizing System}, - booktitle = {Proceedings of Second International Workshop on Security, (IWSEC 2007)}, - year = {2007}, - location = {Nara, Japan}, - www_pdf_url = {http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf}, - www_tags = {selected}, - www_section = comm -} - -@inproceedings{bauer:wpes2007, - author={Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, - title={Low-Resource Routing Attacks Against {Tor}}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, - location={Washington, DC, USA}, - month={October}, - year={2007}, - www_section = traffic, - www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf}, - www_tags={selected}, - www_important = 1, -} - -@inproceedings{feigenbaum:wpes2007, - author={Joan Feigenbaum and Aaron Johnson and Paul Syverson}, - title={A Probabilistic Analysis of Onion Routing in a Black-box Model}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, - location={Washington, DC, USA}, - month={October}, - year={2007}, - www_section = proofs, - www_pdf_url = {http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf}, -} - -@inproceedings{erway:wpes2007, - author={Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna Lysyanskaya and Mira Meyerovich and Eric Rachlin}, - title={Making P2P Accountable without Losing Privacy}, - booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, - location={Washington, DC, USA}, - month={October}, - year={2007}, - www_section = economics, - www_pdf_url = {http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf}, -} - -@misc{CDFS07, -author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati}, -editor = {T. Yu and S. Jajodia}, -booktitle = {Security in Decentralized Data Management}, -title = {k-Anonymity}, -publisher = {Springer}, -year = {2007}, -address = {Berlin Heidelberg}, -howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer}, -www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf}, -www_section = pub, -www_remarks = {Discusses the original k-anonymity proposal and research results on k-anonymity. Introduces also a taxonomy of k-anonymity solutions.} -} - -@misc{VenHeTon07, -author = { Parvathinathan Venkitasubramaniam and Ting He and Lang Tong}, -title = {Anonymous Networking amidst Eavesdroppers}, -howpublished = {Pre-print available as arXiv:0710.4903v1 at arxiv.org}, -month = {October}, -year = {2007}, - www_pdf_url = {http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf}, - www_tags = {selected}, - www_section = comm -} - -@inproceedings{tor-soups07, - author = {Jeremy Clark and P. C. van Oorschot and Carlisle Adams}, - title = {{Usability of anonymous web browsing: an examination of Tor interfaces and deployability}}, - booktitle = {{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)}}, - year = {2007}, - month = {July}, - isbn = {978-1-59593-801-5}, - pages = {41--51}, - location = {Pittsburgh, Pennsylvania}, - doi = {http://doi.acm.org/10.1145/1280680.1280687}, - publisher = {ACM}, - address = {New York, NY, USA}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf}, -} - -@PhdThesis{steven-thesis, - author = {Steven J. Murdoch}, - title = {Covert channel vulnerabilities in anonymity systems}, - school = {University of Cambridge}, - year = 2007, - month = {December}, - www_section = comm, - www_pdf_url = "http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf", - www_tags={selected}, -} - -@PhdThesis{kostas-thesis, - author = {Konstantinos Chatzikokolakis}, - title = {Probabilistic and Information-Theoretic Approaches to Anonymity}, - school = {Laboratoire d'Informatique (LIX), {\'E}cole Polytechnique, Paris}, - year = 2007, - month = {October}, - www_section = comm, - www_pdf_url = "http://www.lix.polytechnique.fr/~kostas/thesis.pdf", - www_tags={selected}, -} - -@InProceedings{clog-the-queue, - author = {Jon McLachlan and Nicholas Hopper}, - title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes}, - booktitle = {Proceedings of Financial Cryptography (FC '08)}, - year = 2008, - month = {January}, - www_section = comm, - www_pdf_url = "http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf", - www_tags={selected}, -} - -@InProceedings{conf/acsac/ADC07, - title = {{Closed-Circuit Unobservable Voice Over IP}}, - author = {Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny}, - booktitle = {Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA}, - publisher = {{IEEE} Computer Society Press}, - year = {2007}, - www_section = comm, - www_pdf_url = "http://www.acsac.org/2007/papers/110.pdf", - www_tags={selected}, -} - -@article{KongHG07, - author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla}, - title = {An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks}, - journal = {IEEE Transactions on Mobile Computing}, - volume = {6}, - number = {8}, - year = {2007}, - issn = {1536-1233}, - pages = {888--902}, - publisher = {IEEE Computer Society}, - address = {Los Alamitos, CA, USA}, - www_section = comm, - www_pdf_url = "http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf", - www_tags={selected}, -} - -@inproceedings{InfDisclosureIDM07, - title = {Information Disclosure in Identity Management}, - author = {Dogan Kesdogan and Vinh Pham and Lexi Pimenidis}, - booktitle = {Proceedings of 12th Nordic Workshop on IT-Security, NordSec}, - year = {2007}, - month = {October}, - location = {Reykjavik, Iceland}, - pages = {141--152}, - editor = {Ulfar Erlingsson and Andrei Sabelfeld}, - www_section = credentials, - www_pdf_url = "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf" -} - -@ARTICLE{EdmanSY07, -title={A Combinatorial Approach to Measuring Anonymity}, -author={M. Edman and F. Sivrikaya and B. Yener}, -journal={Intelligence and Security Informatics, 2007 IEEE}, -year={2007}, -month={May}, -volume={}, -number={}, -pages={356--363}, - www_section = traffic, -www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", - www_tags={selected}, -} - -@InProceedings{snader08, - author = {Robin Snader and Nikita Borisov}, - title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08}, - year = {2008}, - month = {February}, - publisher = {Internet Society}, - www_section = comm , - www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf", - www_tags = {selected}, -} - -@TechReport{DD08Survey, - author = {George Danezis and Claudia Diaz}, - title = {A Survey of Anonymous Communication Channels}, - institution = {Microsoft Research}, - year = {2008}, - number = {MSR-TR-2008-35}, - month = {January}, - www_tags = {selected}, - www_section = {Anonymous communication}, - www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf}, -} - -@InProceedings {MarPi08, - title = {A Concept of an Anonymous Direct P2P Distribution Overlay System}, - year = {2008}, - booktitle = {Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA)}, - month = {March}, - pages = {590--597}, - publisher = {IEEE Computer Society Press}, - location = {Gino-wan, Okinawa, Japan}, - ISBN = {978-0-7695-3095-6}, - www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf}, - www_tags = {selected}, - www_section = comm, - author = {Igor Margasinski and Michal Pioro}, -} - -@inproceedings{loesing2008performance, - author={Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz}, - title={{Performance Measurements and Statistics of Tor Hidden Services}}, - booktitle={Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)}, - month={July}, - year={2008}, - location={Turku, Finland}, - publisher={IEEE CS Press}, - www_tags = {selected}, - www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf}, - www_section = {Anonymous communication}, -} - -@inproceedings{PanchenkoPR08, - author = {Andriy Panchenko and - Lexi Pimenidis and - Johannes Renner}, - title = {Performance Analysis of Anonymous Communication Channels - Provided by {Tor}}, - year = {2008}, - month = {March}, - pages = {221--228}, - booktitle = {Proceedings of the The Third International Conference on - Availability, Reliability and Security (ARES 2008)}, - location = {Barcelona, Spain}, - publisher = {IEEE Computer Society}, - www_tags = {}, - www_ps_url = {http://www.pimenidis.org/research/papers/PaPiRe08.ps}, - www_section = {Anonymous communication}, -} - -@inproceedings{PanchenkoP06, - author = {Andriy Panchenko and Lexi Pimenidis}, - title = {Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication}, - booktitle = {Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006)}, - year = {2006}, - month = {October}, - pages = {240--251}, - series = {Lecture Notes in Computer Science}, - volume = {4237}, - location = {Heraklion, Crete, Greece}, - www_section = {Anonymous communication}, -} - -@inproceedings{KesdoganPK06, - author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"o}lsch}, - title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis}, - booktitle = {Proceedings of First Workshop on Quality of Protection}, - year = {2005}, - month = {September}, - pages = {159--171}, - series = {Advances in Information Security}, - volume = {23}, - locations = {Milan, Italy}, - www_tags = {}, - www_pdf_url = {http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf}, - www_section = {Anonymous communication}, -} - -@InProceedings{improved-clockskew, - author = {Sebastian Zander and Steven J. Murdoch}, - title = {An Improved Clock-skew Measurement Technique for Revealing Hidden Services}, - booktitle = {Proceedings of the 17th USENIX Security Symposium}, - year = {2008}, - month = {July}, - location = {San Jose, CA, US}, - www_section = traffic, - www_pdf_url = "http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf", - www_tags={selected}, -} - -@InProceedings{quant-adhoc, - author = {Marie Elisabeth Gaup Moe}, - title = {Quantification of Anonymity for Mobile Ad Hoc Networks}, - booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management (STM 08)}, - year = {2008}, - pages = {25--36}, - month = {June}, - location = {Trondheim, Norway}, - www_section = traffic, - www_pdf_url = "http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf", - www_tags={selected}, -} - -@inproceedings{Shao-infocom07, - title = {{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}}, - author = { Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao }, - booktitle = {Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07)}, - year = {2007}, - month = {May}, - www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/pDCS.pdf", - www_section = {Anonymous communication}, -} - -@inproceedings{Shao-infocom08, - title = {{ Towards Statistically Strong Source Anonymity for Sensor Networks }}, - author = { Min Shao and Yi Yang and Sencun Zhu and Guohong Cao }, - booktitle = {Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08)}, - year = {2008}, - month = {May}, - www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf", - www_section = {Anonymous communication}, -} - -@inproceedings{Yang-wisec08, - title = {{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks }}, - author = { Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao }, - booktitle = { Proceedings of The ACM Conference on Wireless Network Security (WiSec)}, - year = {2008}, - month = {March}, - www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf", - www_section = {Anonymous communication}, -} - -@INPROCEEDINGS{troncoso-ih2007, - author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel}, - title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, - year = {2007}, - month = {June}, - pages = {220--236}, - booktitle = {Proceedings of Information Hiding Workshop (IH 2007)}, - editor = {T. Furon et al}, - volume = {4567}, - number = {}, - series = {Lecture Notes in Computer Science}, - location = {Saint-Malo,FR}, - publisher = {Springer-Verlag}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-890.pdf}, - www_tags = {selected}, - www_section = {misc}, -} - -@InProceedings{diaz-esorics2008, - author = {Claudia Diaz and Carmela Troncoso and Bart Preneel}, - title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, - year = {2008}, - month = {October}, - booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)}, - editor = {Sushil Jajodia and J. Lopez }, - volume = {LNCS (in print)}, - number = {}, - series = {Lecture Notes in Computer Science}, - location = {Malaga,ES}, - publisher = {Springer-Verlag}, - www_section = {misc}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf}, -} - %% pages = {18}, - -@INPROCEEDINGS{diaz-wpes2007, - author = {Claudia Diaz and Carmela Troncoso and George Danezis}, - title = {Does additional information always reduce anonymity?}, - year = {2007}, - month = {October}, - pages = {72--75}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society 2007}, - editor = {Ting Yu}, - volume = {}, - number = {}, - series = {}, - location= {Alexandria,VA,USA}, - publisher = {ACM}, - - www_tags = {selected}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-925.pdf}, - www_section = {traffic}, -} - -@inproceedings{torspinISC08, - title = {Compromising Anonymity Using Packet Spinning}, - author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos - P. Markatos}, - booktitle = {Proceedings of the 11th Information Security Conference (ISC 2008)}, - year = {2008}, - month = {September}, - location = {Taipei, Taiwan}, - www_tags = {selected}, - www_pdf_url = {http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf}, - www_section = {Anonymous communication}, -} - -@inproceedings{troncoso-pet2008, - title = {Perfect Matching Statistical Disclosure Attacks}, - author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, - pages = {2--23}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section=traffic, - www_tags={selected}, - www_pdf_url={http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf}, -} - -@inproceedings{hevia-pet2008, - title = {An Indistinguishability-Based Characterization of Anonymous Channels}, - author = {Alejandro Hevia and Daniele Micciancio}, - pages = {24--43}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section = misc -} - %NEED URL. - -@inproceedings{diaz-pet2008, - title = {On the Impact of Social Network Profiling on Anonymity}, - author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov}, - pages = {44--62}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section = traffic, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf}, - www_tags = {selected}, -} - -@inproceedings{mccoy-pet2008, - title = {Shining Light in Dark Places: Understanding the {Tor} Network}, - author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, - pages = {63--76}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section = misc, - www_tags = {selected}, - www_pdf_url = {http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf}, -} - -@inproceedings{coble-pet2008, - title = {Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover}, - author = {Aaron H. Coble}, - pages = {77--98}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section = methods -} - -@inproceedings{shimshock-pet2008, - title = {Breaking and Provably Fixing Minx}, - author = {Eric Shimshock and Matt Staats and Nicholas Hopper}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - pages = {99--114}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf}, -} - -@inproceedings{murdoch-pet2008, - title = {Metrics for Security and Performance in Low-Latency Anonymity Networks}, - author = {Steven J. Murdoch and Robert N. M. Watson }, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - pages = {115--132}, - www_section = {traffic}, - www_tags = {selected}, - www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf}, -} - -@inproceedings{danezis-pet2008, - title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection}, - author = {George Danezis and Paul Syverson}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - pages = {133--150}, - www_section = {traffic}, - www_tags = {selected}, - www_pdf_url = {http://research.microsoft.com/~gdane/papers/bridge.pdf}, - www_important = 1, -} - -@inproceedings{sassaman-pet2008, - title = {How to Bypass Two Anonymity Revocation Systems}, - author = {George Danezis and Len Sassaman}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - pages = {187--201}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://research.microsoft.com/~gdane/papers/KWF.pdf}, -} - -@inproceedings{androulaki-pet2008, - title = {Reputation Systems for Anonymous Networks}, - author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - pages={202--218}, - www_section = comm, - www_tags = {selected}, -} - -@inproceedings{raykova-pet2008, - title = {PAR: Payment for Anonymous Routing}, - author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, - pages = {219--236}, - editor = {Nikita Borisov and Ian Goldberg}, - booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, - month = {July}, - year = {2008}, - publisher = {Springer}, - location = {Leuven, Belgium}, - bookurl = {http://petsymposium.org/2008/}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf}, -} - -@inproceedings{DBLP:conf/esorics/MalleshW07, - author = {Nayantara Mallesh and - Matthew Wright}, - title = {Countering Statistical Disclosure with Receiver-Bound Cover - Traffic}, - pages = {547--562}, - www_section = comm, - www_tags = {selected}, - crossref = {esorics2007}, - www_pdf_url = {http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf}, -} - -@techreport{LOCEntropy2008, - title = {Entropy Bounds for Traffic Confirmation}, - author = {Luke O'Connor}, - institution = {IACR}, - number = {2008/365}, - year = {2008}, - month = {October}, - www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://eprint.iacr.org/2008/365.pdf}, -} - -@inproceedings{bauer:alpaca2008, - title = { {BitBlender}: {L}ight-Weight Anonymity for BitTorrent}, - author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker}, - booktitle = {{Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008)}}, - year = {2008}, - month = {September}, - location = {Istanbul, Turkey}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf}, - www_section = comm -} - -@inproceedings{DBLP:conf/acns/KlonowskiKL08, - author = {Marek Klonowski and - Miroslaw Kutylowski and - Anna Lauks}, - title = {Repelling Detour Attack Against Onions with Re-encryption}, - pages = {296--308}, - ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18}, - crossref = {DBLP:conf/acns/2008}, - www_section = comm, - www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/}, -} - -@inproceedings{DBLP:conf/pervasive/CichonKK08, - author = {Jacek Cichon and - Marek Klonowski and - Miroslaw Kutylowski}, - title = {Privacy Protection for RFID with Hidden Subset Identifiers}, - pages = {298--314}, - ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18}, - crossref = {DBLP:conf/pervasive/2008}, - www_section = misc, - www_publisher_url={http://www.springerlink.com/content/r754w32x71176057/}, -} - -@inproceedings{GTDPV-WPES08, - title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity}, - author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)}, - year = {2008}, - month = {October}, - location = {Alexandria, VA, USA}, - publisher = {ACM}, - www_tags = {}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf}, - www_section = traffic -} - -@inproceedings{FNP04, - title = "Efficient Private Matching and Set Intersection", - author = "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", - booktitle = "Proceedings of {EUROCRYPT} 2004", - location = "Interlaken, Switzerland", - month = {May}, - year = 2004, - www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf}, - www_section = misc -} - -@inproceedings{FIPR05, - title = "Keyword Search and Oblivious Pseudorandom Functions", - author = "Michael J. Freedman and Yuval Ishai and Benny Pinkas and -Omer Reingold", - booktitle = "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", - location = "Cambridge, MA", - month = {February}, - year = 2005, - www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf}, - www_section = misc -} - -@inproceedings{fof:iptps07, - title = "Efficient Private Techniques for Verifying Social Proximity", - author = "Michael J. Freedman and Antonio Nicolosi", - booktitle = "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", - location = "Bellevue, WA", - month = {February}, - year = "2007", - www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf}, - www_section = misc -} - - -@inproceedings{ccs2008:wang, - title={Dependent Link Padding Algorithms for Low Latency Anonymity Systems}, - author={Wei Wang and Mehul Motani and Vikram Srinivasan}, - crossref={ccs2008}, - pages={323--332}, - www_tags={selected}, - www_section=traffic -} - -@inproceedings{ccs2008:tsang, - title={PEREA: Towards Practical TTP-Free Revocation in Anonymous - Authentication}, - author={Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, - crossref={ccs2008}, - pages={333--345}, - www_section=misc, - www_tags={selected}, -} - -@inproceedings{ccs2008:camenisch, - title={Efficient Attributes for Anonymous Credentials}, - author={Jan Camenisch and Thomas Gross}, - crossref={ccs2008}, - pages={345--356}, - www_section=credentials, - www_pdf_url={http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf}, -} - -@inproceedings{ccs2008:mittal, - title={Information Leaks in Structured Peer-to-peer Anonymous Communication Systems}, - author={Prateek Mittal and Nikita Borisov}, - crossref={ccs2008}, - pages={267--278}, - www_pdf_url={http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf}, - www_tags={selected}, - www_section=comm, - www_remarks={Describes attacks against the SALSA and AP3 peer-to-peer - anonymity network architectures.}, -} - -@proceedings{ccs2008, - editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}, - booktitle = {{Proceedings of the 15th ACM Conference on Computer and - Communications Security (CCS 2008)}}, - location = {Alexandria, Virginia, USA}, - publisher = {ACM Press}, - day = {27--31}, - month = {October}, - year = 2008 -} - -@inproceedings{MORE, - author = {Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko -+Niedermayer and Georg Carle}, - title = {{More: A Peer-To-Peer Based Connectionless Onion Router}}, - year = {2007}, - booktitle = {Proceedings of IEEE GLOBECOM, Globalcommunications Conference}, - location= {Washington DC, USA}, - month = {November}, - day = {26}, - www_pdf_url = {http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf}, - www_section = {Anonymous communication}, -} - -@mastersthesis{reardon-thesis, - author = {Reardon, Joel}, - title = {Improving {Tor} using a {TCP}-over-{DTLS} Tunnel}, - school = {University of Waterloo}, - year = {2008}, - month = {September}, - www_abstract_url = {http://hdl.handle.net/10012/4011}, - www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf}, - www_section = comm, - www_tags = {selected}, -} - -@InProceedings{morphing09, - author = {Charles Wright and Scott Coull and Fabian Monrose}, - title = {Traffic Morphing: An efficient defense against statistical traffic analysis}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '09}, - year = {2009}, - month = {February}, - publisher = {IEEE}, - www_section = traffic, - www_pdf_url = "http://freehaven.net/anonbib/papers/morphing09.pdf", - www_tags={selected}, -} - -@phdthesis{joss-thesis, - title = {Characterising Anonymity Systems}, - author = {Joss Wright}, - school = {Department of Computer Science, University of York, York}, - year = {2007}, - month = {November}, - www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf}, - www_section = methods -} - -@PhdThesis{Douglas-thesis, - author = {Douglas Kelly}, - title = {A taxonomy for and analysis of anonymous communications networks}, - school = {Air Force Institute of Technology}, - year = 2009, - month = {March}, - www_section = comm, - www_pdf_url = "http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf", - www_tags={selected}, -} - -@InProceedings{congestion-longpaths, - author = {Nathan Evans and Roger Dingledine and Christian Grothoff}, - title = {A Practical Congestion Attack on {T}or Using Long Paths}, - booktitle = {Proceedings of the 18th USENIX Security Symposium}, - year = {2009}, - month = {August}, - www_section = traffic, - www_pdf_url = "http://freehaven.net/anonbib/papers/congestion-longpaths.pdf", - www_tags={selected}, -} - -@inproceedings{wpes09-dht-attack, - title = {{Hashing it out in public: Common failure modes of DHT-based anonymity schemes}}, - author = {Andrew Tran and Nicholas Hopper and Yongdae Kim}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, - year = {2009}, - month = {November}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf}, - www_section = traffic -} - -@inproceedings{wpes09-bridge-attack, - title = {{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design}}, - author = {Jon McLachlan and Nicholas Hopper}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, - year = {2009}, - month = {November}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf}, - www_section = traffic -} - -@inproceedings{wpes09-xpay, - title = {{XPay: Practical anonymous payments for Tor routing and other networked services}}, - author = {Yao Chen and Radu Sion and Bogdan Carbunar}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, - year = {2009}, - month = {November}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf}, - www_section = comm -} - -@inproceedings{ccsw09-fingerprinting, - title = {Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\"{\i}ve-bayes classifier}, - author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}, - booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)}, - month = {October}, - year = {2009}, - isbn = {978-1-60558-784-4}, - pages = {31--42}, - location = {Chicago, Illinois, USA}, - doi = {http://doi.acm.org/10.1145/1655008.1655013}, - publisher = {ACM}, - address = {New York, NY, USA}, - - www_tags = {selected}, - www_pdf_url = {http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf}, - www_section = traffic -} - -@Article{nymble-tdsc, - author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith}, - title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks}, - journal ={IEEE Transactions on Dependable and Secure Computing}, - volume = {8}, - number = {2}, - year = {2011}, - month = {March--April}, - pages = {256--269}, - doi = {10.1109/TDSC.2009.38}, - www_tags = {selected}, - www_important = {1}, - www_section = misc, - www_remarks = {Describes Nymble, a system that allows services to block - anonymous users that misbehave, without making their transactions - linkable.}, -} - -@InProceedings{incentives-fc10, - author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach}, - title = {{Building Incentives into Tor}}, - booktitle = {Proceedings of Financial Cryptography (FC '10)}, - year = 2010, - month = {January}, - editor = {Radu Sion}, - www_section = comm, - www_pdf_url = "http://freehaven.net/anonbib/papers/incentives-fc10.pdf", - www_tags={selected}, -} - -@InProceedings{sphinx-onion-fc10, - author = {Aniket Kate and Ian Goldberg}, - title = {Using Sphinx to Improve Onion Routing Circuit Construction}, - booktitle = {Proceedings of Financial Cryptography (FC '10)}, - year = 2010, - month = {January}, - editor = {Radu Sion}, - www_section = comm, - www_pdf_url = "http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf", - www_tags={selected}, -} - -@InProceedings{anon-fc10, - author = {Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan}, - title = {Cryptographic Protocol Analysis of {AN.ON}}, - booktitle = {Proceedings of Financial Cryptography (FC '10)}, - year = 2010, - month = {January}, - editor = {Radu Sion}, - www_section = comm, - www_pdf_url = "http://freehaven.net/anonbib/papers/wwpk2010.pdf", - www_tags={selected}, -} - -@INPROCEEDINGS{shalon-anon, - author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson}, - title = {{SHALON}: Lightweight Anonymization based on Open Standards}, - booktitle = {Proceedings of 18th International Conference on Computer Communications and Networks}, - year = {2009}, - location = {San Francisco, CA, USA}, - month = {August}, - www_section = comm, - www_pdf_url = "http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf", - www_tags={selected}, -} - -@INPROCEEDINGS{w09, - author = {Benedikt Westermann}, - title = {Security Analysis of {AN.ON}'s Payment Scheme}, - booktitle = {Proceedings of NordSec 2009}, - year = {2009}, - editor = {Audun J\osang and Torleiv Maseng and Svein Johan Knapskog}, - volume = {5838/2009}, - series = {Lecture Notes in Computer Science}, - pages = {255--270}, - month = {October}, - publisher = {Springer}, - www_section = comm, -} - -@inproceedings{Rybczynska-incos2009, - author = {Rybczy\'{n}ska, Marta}, - title = {{A Round--based Cover Traffic Algorithm for Anonymity Systems}}, - booktitle = {{Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems}}, - year = {2009}, - pages = {93--99}, - location = {Barcelona, Spain}, - month = {November}, - publisher = {IEEE Computer Society Press}, - www_pdf_url = {http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf}, - www_section = traffic -} - -@inproceedings{DBLP:conf/pet/DanezisT09, - author = {George Danezis and - Carmela Troncoso}, - title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent - Communications}, - pages = {56--72}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf}, - www_section = traffic, - www_tags={selected}, -} - -@inproceedings{DBLP:conf/pet/SherrBL09, - author = {Micah Sherr and - Matt Blaze and - Boon Thau Loo}, - title = {Scalable Link-Based Relay Selection for Anonymous Routing}, - pages = {73--93}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://micah.cis.upenn.edu/papers/pets09.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{DBLP:conf/pet/SchiffnerC09, - author = {Stefan Schiffner and - Sebastian Clau{\ss}}, - title = {Using Linkability Information to Attack Mix-Based Anonymity - Services}, - pages = {94--107}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf}, - www_section = traffic -} - -@inproceedings{DBLP:conf/pet/BauerMGGS09, - author = {Kevin S. Bauer and - Damon McCoy and - Ben Greenstein and - Dirk Grunwald and - Douglas C. Sicker}, - title = {Physical Layer Attacks on Unlinkability in Wireless LANs}, - pages = {108--127}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf}, - www_section = comm -} - -@inproceedings{DBLP:conf/pet/RaghavanKSW09, - author = {Barath Raghavan and - Tadayoshi Kohno and - Alex C. Snoeren and - David Wetherall}, - title = {Enlisting ISPs to Improve Online Privacy: IP Address Mixing - by Default}, - pages = {143--163}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf}, - www_section = comm, - www_tags={selected}, -} - -@inproceedings{DBLP:conf/pet/AndroulakiB09, - author = {Elli Androulaki and - Steven M. Bellovin}, - title = {APOD: Anonymous Physical Object Delivery}, - pages = {202--215}, - crossref = {DBLP:conf/pet/2009}, - www_pdf_url = {http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf}, - www_section = comm -} - -@proceedings{DBLP:conf/pet/2009, - editor = {Ian Goldberg and - Mikhail J. Atallah}, - booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {5672}, - month = {August}, - year = {2009}, - isbn = {978-3-642-03167-0}, -} - -@inproceedings{DBLP:conf/esorics/DanezisDKT09, - author = {George Danezis and - Claudia D\'{\i}az and - Emilia K{\"a}sper and - Carmela Troncoso}, - title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, - pages = {406--423}, - www_tags = {selected}, - crossref = {DBLP:conf/esorics/2009}, - www_pdf_url = {http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf}, - www_section = traffic -} - -@inproceedings{DBLP:conf/esorics/ModersheimV09, - author = {Sebastian M{\"o}dersheim and - Luca Vigan{\`o}}, - title = {Secure Pseudonymous Channels}, - pages = {337--354}, - crossref = {DBLP:conf/esorics/2009}, - www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf}, - www_section = comm -} - -@proceedings{DBLP:conf/esorics/2009, - editor = {Michael Backes and Peng Ning}, - booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {5789}, - month = {September}, - year = {2009}, - isbn = {978-3-642-04443-4}, -} - -@inproceedings{DBLP:conf/sp/NarayananS09, - author = {Arvind Narayanan and - Vitaly Shmatikov}, - title = {De-anonymizing Social Networks}, - pages = {173--187}, - www_tags = {selected}, - crossref = {DBLP:conf/sp/2009}, - www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf}, - www_section = misc, - www_important = 1, -} - -@inproceedings{DBLP:conf/sp/DanezisG09, - author = {George Danezis and - Ian Goldberg}, - title = {Sphinx: A Compact and Provably Secure Mix Format}, - pages = {269--282}, - ee = {http://dx.doi.org/10.1109/SP.2009.15}, - crossref = {DBLP:conf/sp/2009}, - www_tags = {selected}, - www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf}, - www_section = comm -} - -@proceedings{DBLP:conf/sp/2009, - editor = {}, - booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P 2009)}, - location = {Oakland, California, USA}, - publisher = {IEEE Computer Society}, - month = {May}, - year = {2009}, - isbn = {978-0-7695-3633-0}, - bibsource = {DBLP, http://dblp.uni-trier.de}, -} - -@inproceedings{DBLP:conf/ccs/TroncosoD09, - author = {Carmela Troncoso and - George Danezis}, - title = {The bayesian traffic analysis of mix networks}, - pages = {369--379}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf}, - www_section = traffic -} - -@inproceedings{DBLP:conf/ccs/EdmanS09, - author = {Matthew Edman and - Paul F. Syverson}, - title = {{AS}-awareness in {T}or path selection}, - pages = {380--389}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf}, - www_section = comm -} - -@inproceedings{ccs09-nisan, - author = {Andriy Panchenko and Arne Rache and Stefan Richter}, - title = {{NISAN}: Network Information Service for Anonymization Networks}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf}, - www_section = comm -} - -@inproceedings{ccs09-shadowwalker, - author = {Prateek Mittal and Nikita Borisov}, - title = {ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf}, - www_section = comm -} - -@inproceedings{ccs09-certificateless, - author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, - title = {Certificateless Onion Routing}, - crossref = {DBLP:conf/ccs/2009}, - www_pdf_url = {http://www.ippari.unict.it/~catalano/CaGeFi09.pdf}, - www_section = comm -} - -@inproceedings{ccs09-torsk, - author = {Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim}, - title = {{Scalable onion routing with Torsk}}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf}, - www_section = comm -} - -@inproceedings{DBLP:conf/ccs/VassermanJTHK09, - author = {Eugene Y. Vasserman and - Rob Jansen and - James Tyra and - Nicholas Hopper and - Yongdae Kim}, - title = {Membership-concealing overlay networks}, - pages = {390--399}, - crossref = {DBLP:conf/ccs/2009}, - www_tags = {selected}, - www_pdf_url = {http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf}, - www_section = comm -} - -@inproceedings{DBLP:conf/ccs/LingLYFXJ09, - author = {Zhen Ling and - Junzhou Luo and - Wei Yu and - Xinwen Fu and - Dong Xuan and - Weijia Jia}, - title = {A new cell counter based attack against tor}, - pages = {578--589}, - crossref = {DBLP:conf/ccs/2009}, - www_section = traffic -} - -@proceedings{DBLP:conf/ccs/2009, - editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}, - booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009}, - publisher = {ACM}, - location = {Chicago, Illinois, USA}, - month = {November}, - year = {2009}, - isbn = {978-1-60558-894-0}, - bibsource = {DBLP, http://dblp.uni-trier.de}, -} - -@inproceedings{ccs10-lookup, - author = {Qiyan Wang and Prateek Mittal and Nikita Borisov}, - title = {In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems}, - crossref = {DBLP:conf/ccs/2010}, - www_tags = {selected}, - www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf}, - www_section = traffic -} - -@inproceedings{ccs10-braids, - author = {Rob Jansen and Nicholas Hopper and Yongdae Kim}, - title = {Recruiting New {T}or Relays with {BRAIDS}}, - crossref = {DBLP:conf/ccs/2010}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf}, - www_section = comm -} - -@inproceedings{ccs10-scheduling, - author = {Can Tang and Ian Goldberg}, - title = {An Improved Algorithm for {T}or Circuit Scheduling}, - crossref = {DBLP:conf/ccs/2010}, - www_tags = {selected}, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf}, - www_section = comm -} - -@inproceedings{ccs10-dissent, - author = {Henry Corrigan-Gibbs and Bryan Ford}, - title = {Dissent: Accountable Anonymous Group Messaging}, - crossref = {DBLP:conf/ccs/2010}, - www_tags = {selected}, - www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf}, - www_section = censorship -} - -@proceedings{DBLP:conf/ccs/2010, - editor = {Angelos D. Keromytis and Vitaly Shmatikov}, - booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)}, - publisher = {ACM}, - location = {Chicago, Illinois, USA}, - month = {October}, - year = {2010}, -} - -@inproceedings{wpes10-shadows, - title = {Balancing the Shadows}, - author = {Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas Hopper}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, - year = {2010}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf}, - www_section = comm -} - -@inproceedings{wpes10-jack, - title = {Jack: Scalable Accumulator-based Nymble System}, - author = {Zi Lin and Nicholas Hopper}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, - year = {2010}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf}, - www_section = misc -} - -@inproceedings{wpes10-unraveling, - title = {Unraveling an Old Cloak: k-anonymity for Location Privacy}, - author = {Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and Jean-Pierre Hubaux}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, - year = {2010}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2}, - www_section = comm -} - -@article{edman2009survey, - author = {Matthew Edman and B\"{u}lent Yener}, - title = {On anonymity in an electronic society: A survey of anonymous - communication systems}, - journal = {ACM Computing Surveys}, - volume = {42}, - number = {1}, - year = {2009}, - issn = {0360-0300}, - pages = {1--35}, - doi = {http://doi.acm.org/10.1145/1592451.1592456}, - publisher = {ACM}, - address = {New York, NY, USA}, - www_section = misc, - www_tags = {selected}, - www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf}, -} - -@phdthesis{loesing2009thesis, - title = {Privacy-enhancing Technologies for Private Services}, - author = {Karsten Loesing}, - school = {University of Bamberg}, - year = {2009}, - month = {May}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf}, -} - -@inproceedings{lenhard2009hidserv-lowbw, - author = {J{\"o}rg Lenhard and Karsten Loesing and Guido Wirtz}, - title = {Performance Measurements of Tor Hidden Services in - Low-Bandwidth Access Networks}, - booktitle = {Proceedings of the 7th International Conference on Applied - Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, - France, June 2-5, 2009}, - year = {2009}, - month = {June}, - editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque - and Damien Vergnaud}, - volume = {5536}, - series = {Lecture Notes in Computer Science}, - isbn = {978-3-642-01956-2}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf}, -} - -@inproceedings{nymbler, - title = {{Making a Nymbler Nymble using VERBS (Extended Version)}}, - author = {Ryan Henry and Kevin Henry and Ian Goldberg}, - booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, - year = {2010}, - month = {July}, - location = {Berlin, Germany}, - www_tags = {selected}, - www_pdf_url = {http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf}, - www_section = {Misc}, -} - -@inproceedings{topology-pet2010, - title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks}, - author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso}, - booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, - year = {2010}, - month = {July}, - location = {Berlin, Germany}, - www_tags = {selected}, - www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf}, - www_section = traffic -} - -@inproceedings{active-pet2010, - title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication}, - author = {Aaron Johnson and Joan Feigenbaum and Paul Syverson}, - booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, - year = {2010}, - month = {July}, - location = {Berlin, Germany}, - www_tags = {selected}, - www_pdf_url = {http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf}, - www_section = traffic -} - -@inproceedings{drac-pet2010, - title = {Drac: An Architecture for Anonymous Low-Volume Communications}, - author = {George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie}, - booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, - year = {2010}, - month = {July}, - location = {Berlin, Germany}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf}, - www_section = comm -} - -@inproceedings{wecsr10measuring-tor, - title = {A Case Study on Measuring Statistical Data in the {T}or Anonymity Network}, - author = {Karsten Loesing and Steven J. Murdoch and Roger Dingledine}, - booktitle = {Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)}, - year = {2010}, - month = {January}, - location = {Tenerife, Canary Islands, Spain}, - publisher = {Springer}, - series = {LNCS}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = "http://metrics.torproject.org/papers/wecsr10.pdf" -} - -@inproceedings{huber2010tor, - title = {{Tor HTTP Usage and Information Leakage}}, - author = {Markus Huber and Martin Mulazzani and Edgar Weippl}, - booktitle = {Proceedings of the 11th IFIP TC 6/TC 11 International - Conference on Communications and Multimedia Security (CMS 2010)}, - year = {2010}, - month = {May}, - location = {Linz, Austria}, - publisher = {Springer}, - series = {LNCS}, - volume = {6109}, - pages = {245--255}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf}, -} - -@techreport{tor-blocking, - title = {Design of a blocking-resistant anonymity system}, - author = {Roger Dingledine and Nick Mathewson}, - institution = {The Tor Project}, - number = {2006-1}, - year = {2006}, - month = {November}, - www_tags = {selected}, - www_section = comm, - www_important = {1}, - www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, -} - -@inproceedings{wk11-malice-vs-anon, - author = {Benedikt Westermann and Dogan Kesdogan}, - title = {Malice versus AN.ON: Possible Risks of Missing Replay and -Integrity Protection}, - booktitle = {Proceedings of Financial Cryptography and Data Security -(FC'11)}, - year = {2011}, - month = {February}, - www_tags = {selected}, - www_section = comm, - www_pdf_url = {http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf}, -} - -@inproceedings{bnymble11, - author = {Peter Lofgren and Nicholas Hopper}, - title = {BNymble: More anonymous blacklisting at almost no cost}, - booktitle = {Proceedings of Financial Cryptography and Data Security -(FC'11)}, - year = {2011}, - month = {February}, - www_tags = {selected}, - www_section = misc, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/bnymble.pdf}, -} - -@inproceedings{proximax11, - author = {Kirill Levchenko and Damon McCoy}, - title = {Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies}, - booktitle = {Proceedings of Financial Cryptography and Data Security -(FC'11)}, - year = {2011}, - month = {February}, - www_tags = {selected}, - www_section = censorship, - www_pdf_url = {http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf}, -} - -@article{blac-tissec, - author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W. }, - title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs}, - journal = {ACM Transactions on Information and System Security}, - issue_date = {December 2010}, - volume = {13}, - issue = {4}, - month = {December}, - year = {2010}, - issn = {1094-9224}, - pages = {39:1--39:33}, - articleno = {39}, - numpages = {33}, - url = {http://doi.acm.org/10.1145/1880022.1880033}, - doi = {http://doi.acm.org/10.1145/1880022.1880033}, - acmid = {1880033}, - publisher = {ACM}, - address = {New York, NY, USA}, - keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, - www_tags = {selected}, - www_section = nym, - www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf} -} - -@inproceedings{dsn-09-jing, -Title = {On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks}, -Address = {Lisbon}, -Author = {Jing Jin and Xinyuan Wang}, -Pages = {429--438}, -Booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, -Year = {2009}, -month = {July}, -www_section = {Anonymous communication}, -www_tags = {selected}, -www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf}, -} - -@inproceedings{LZCLCP_NDSS11, - title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, - author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, - year = {2011}, - month = {February}, - publisher = {Internet Society}, - www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf}, - www_section = {Traffic analysis}, -} - -@inproceedings{ndss09-rainbow, - title = {RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows}, - author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'09}, - year = {2009}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf}, - www_section = traffic, -} - -@inproceedings{ndss11-swirl, - title = {SWIRL: A Scalable Watermark to Detect Correlated Network Flows}, - author = {Amir Houmansadr and Nikita Borisov}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, - year = {2011}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf}, - www_section = traffic, -} - -@inproceedings{LZPL_ESORICS10, - title = {On the Secrecy of Spread-Spectrum Flow Watermarks}, - author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, - year = {2010}, - month = {September}, - publisher = {Springer}, - www_section = traffic, -} - -@inproceedings{LZCCL_DSN11, - title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks}, - author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, - booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11}, - year = {2011}, - month = {June}, - publisher = {IEEE}, - www_section = {Anonymous communication}, -} - -@inproceedings{LCC_ICC09, - title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the International Conference on Communications - {ICC}'09}, - year = {2009}, - month = {June}, - publisher = {IEEE}, - www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf}, - www_section = {Anonymous communication}, -} - -@inproceedings{LCC_DSN08, - title = {{TCP} Covert Timing Channels: Design and Detection}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08}, - year = {2008}, - month = {June}, - publisher = {IEEE}, - www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf}, - www_section = {Anonymous communication}, -} - -@inproceedings{LCC_ESORICS07, - title = {Cloak: A Ten-fold Way for Reliable Covert Communications}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07}, - year = {2007}, - month = {September}, - publisher = {Springer}, - www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf}, - www_section = {Anonymous communication}, -} - -@inproceedings{LCC_IFIPSEC07, - title = {Crafting Web Counters into Covert Channels}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07}, - year = {2007}, - month = {May}, - publisher = {Springer}, - www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf}, - www_section = {Anonymous communication}, -} - -@INPROCEEDINGS{ReedPierce10, - title = {Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy}, - author = {Jason Reed and Benjamin C. Pierce}, - booktitle = {Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on {F}unctional {P}rogramming ({ICFP})}, - year = {2010}, - month = {September}, - location = {Baltimore, Maryland}, - publisher = {ACM Press}, - www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf}, - www_section = {Formal methods}, -} - -@INPROCEEDINGS{DPCS2010, - title = {Differential Privacy for Collaborative Security}, - author = {Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith}, - booktitle = {Proceedings of the European Workshop on System Security (EUROSEC)}, - year = {2010}, - month = {April}, - publisher = {ACM Press}, - www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf}, - www_section = {Misc} -} - -@InProceedings{pro-pro:pet2000, - author = {Kai Rannenberg and Giovanni Iachello}, - title = {Protection Profiles for Remailer Mixes}, - booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, - editor = {H. Federrath}, - publisher = {Springer-Verlag, LNCS 2009}, - year = 2000, - month = {July}, - www_section = comm, - www_pdf_url = "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", -} - - -@InProceedings{demuth:pet2002, - author = {Thomas Demuth}, - title = {A Passive Attack on the Privacy of Web Users Using Standard Log Information}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = comm, - www_pdf_url = "http://demuth.biz/veroeffentlichungen/pet02.pdf", - www_tags={selected}, -} - -@InProceedings{asonov:pet2002, - author = {Dmitri Asonov and Johann-Christoph Freytag}, - title = {Almost Optimal Private Information Retrieval}, - booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, - year = {2002}, - month = {April}, - editor = {Roger Dingledine and Paul Syverson}, - publisher = {Springer-Verlag, LNCS 2482}, - www_section = pir, - www_pdf_url = "http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf", -} - - -%%%%%%%%%%%%%%%%%% - -@inproceedings{pets2011:TorUsernames, - title={How Unique and Traceable are Usernames?}, - author={Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils}, - booktitle={Proceedings of the 11th Privacy Enhancing Technologies Symposium}, - year={2011}, - month={July}, - www_section = nym, - www_pdf_url = {http://arxiv.org/pdf/1101.5578}, -} - -@inproceedings{pets2010:eckersley2010unique, - title={How unique is your web browser?}, - author={Peter Eckersley}, - booktitle={Proceedings of the 10th Privacy Enhancing Technologies Symposium}, - pages={1--18}, - year={2010}, - month={July}, - location={Berlin, Germany}, - www_section = misc, - www_tags={selected}, - www_pdf_url = {http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf}, -} - -@inproceedings{raid2011:chakravartydetecting, - title={Detecting Traffic Snooping in Tor Using Decoys}, - author={Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis}, - booktitle = {Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection}, - series = {RAID'11}, - month = {September}, - year = {2011}, - location = {Menlo Park, CA}, - pages = {222--241}, - publisher = {Springer-Verlag}, - address = {Berlin, Heidelberg}, - publisher={Springer-Verlag}, - www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf} -} - -@inproceedings{usenix2010:aggarwal2010analysis, - title={An Analysis of Private Browsing Modes in Modern Browsers}, - author={Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh}, - booktitle={Proceedings of the 19th Usenix Security Symposium}, - month={August}, - year={2010}, - www_section = misc, - www_tags={selected}, - www_pdf_url = {http://www.collinjackson.com/research/private-browsing.pdf}, -} - -@inproceedings{leet2011:TorBunchApple, - title = {One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users}, - author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, - booktitle = {Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats}, - series = {LEET'11}, - year = {2011}, - publisher = {USENIX Association}, - www_section = traffic, - www_pdf_url = {http://arxiv.org/pdf/1103.1518}, -} - -@inproceedings{wpes11-panchenko, - title = {Website Fingerprinting in Onion Routing Based Anonymization Networks}, - author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, - year = {2011}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf}, - www_section = traffic -} - -@inproceedings{wpes11-bridgespa, - title = {{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization}, - author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, - year = {2011}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf}, - www_section = comm -} - -@inproceedings{wpes11-faust, - title = {FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting}, - author = {Peter Lofgren and Nicholas Hopper}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, - year = {2011}, - month = {October}, - location = {Chicago, IL, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf}, - www_section = comm -} - -@inproceedings{ccs2011-trust, - Author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson}, - Title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms}, - Booktitle = {Proceedings of the 18th ACM conference on Computer and - Communications Security (CCS 2011)}, - Month = {October}, - year = {2011}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf}, -} - -@inproceedings{ccs2011-cirripede, - Author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov}, - Title = {Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, - Booktitle = {Proceedings of the 18th ACM conference on Computer and - Communications Security (CCS 2011)}, - Month = {October}, - year = {2011}, - www_section = censorship, - www_tags = {selected}, - www_pdf_url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, -} - -@inproceedings{ccs2011-oneswarm, - Author = {Swagatika Prusty and Marc Liberatore and Brian N. Levine}, - Title = {Forensic Investigation of the OneSwarm Anonymous Filesharing System}, - Booktitle = {Proceedings of the 18th ACM conference on Computer and - Communications Security (CCS 2011)}, - Month = {October}, - year = {2011}, - www_section = traffic, - www_tags = {selected}, - www_pdf_url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf}, -} - -@inproceedings{ccs2011-stealthy, - Author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita Borisov}, - Title = {Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting}, - Booktitle = {Proceedings of the 18th ACM conference on Computer and - Communications Security (CCS 2011)}, - Month = {October}, - year = {2011}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf}, -} - -@InProceedings{foci11-decoy, - author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, - title = {Decoy Routing: Toward Unblockable Internet Communication}, - booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, - year = {2011}, - month = {August}, - www_section = censorship, - www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf}, - www_tags={selected}, -} - -@InProceedings{foci11-clouds, - author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman}, - title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing}, - booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, - year = {2011}, - month = {August}, - www_section = comm, - www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf}, -} - -@InProceedings{cset11-experimentor, - author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald}, - title = {ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation}, - booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011)}, - year = {2011}, - month = {August}, - www_section = comm, - www_pdf_url = {http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf}, - www_tags={selected}, -} - -@InProceedings{usenix11-telex, - author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, - title = {Telex: Anticensorship in the Network Infrastructure}, - booktitle = {Proceedings of the 20th USENIX Security Symposium}, - year = {2011}, - month = {August}, - www_section = censorship, - www_pdf_url = {http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf}, - www_tags={selected}, - www_important = {1}, -} - -@InProceedings{usenix11-pirtor, - author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and Ian Goldberg}, - title = {PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval}, - booktitle = {Proceedings of the 20th USENIX Security Symposium}, - year = {2011}, - month = {August}, - www_section = comm, - www_pdf_url = {http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf}, - www_tags={selected}, -} - -@inproceedings{pets2011-bagai, - title = {An Accurate System-Wide Anonymity Metric for Probabilistic Attacks}, - author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang}, - booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, - year = {2011}, - month = {July}, - location = {Waterloo, Canada}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf}, - www_section = traffic -} - -@inproceedings{pets2011-defenestrator, - title = {DefenestraTor: Throwing out Windows in Tor}, - author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey Voelker}, - booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, - year = {2011}, - month = {July}, - location = {Waterloo, Canada}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf}, - www_section = comm -} - -@inproceedings{pets2011-i2p, - title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P}, - author = {Michael Herrmann and Christian Grothoff}, - booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, - year = {2011}, - month = {July}, - location = {Waterloo, Canada}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf}, - www_section = traffic -} - -@InProceedings{oakland11-formalizing, - author = {Ryan Henry and Ian Goldberg}, - title = {Formalizing Anonymous Blacklisting Systems}, - booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, - year = 2011, - month = {May}, - www_section = misc, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf}, - www_tags={selected}, -} - -@InProceedings{oakland11-extending, - author = {Ryan Henry and Ian Goldberg}, - title = {Extending Nymble-like Systems}, - booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, - year = 2011, - month = {May}, - www_section = misc, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf}, -} - -@InProceedings{acsac11-tortoise, - title = {Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise}, - author = {W. Brad Moore and Chris Wacek and Micah Sherr}, - booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, - year = {2011}, - month = {December}, - www_section = comm, - www_pdf_url = {https://security.cs.georgetown.edu/papers/tortoise.pdf}, - www_tags={selected}, -} - -@InProceedings{acsac11-supernodes, - title = {"Super Nodes" in Tor: Existence and Security Implication}, - author = {Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang}, - booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, - year = {2011}, - month = {December}, - www_section = comm, - www_pdf_url = {http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf}, -} - -@InProceedings{acsac11-backlit, - title = {Exposing Invisible Timing-based Traffic Watermarks with BACKLIT}, - author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}, - booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, - year = {2011}, - month = {December}, - www_tags={selected}, - www_section = traffic, - www_pdf_url = "http://freehaven.net/anonbib/papers/backlit-acsac11.pdf", -} - -@PhdThesis{kevin-thesis, - author = {Kevin Bauer}, - title = {Improving Security and Performance in Low Latency Anonymity Networks}, - school = {University of Colorado}, - year = 2011, - month = {May}, - www_section = comm, - www_pdf_url = "http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf", - www_tags={selected}, -} - -@article{perea-tissec11, - author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia}, - title = {{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous users}, - journal = {ACM Transactions on Information and System Security ({ACM TISSEC})}, - issue_date = {December 2011}, - volume = {14}, - issue = {4}, - month = {December}, - year = {2011}, - issn = {1094-9224}, - pages = {29:1--29:34}, - articleno = {29}, - numpages = {34}, - url = {http://doi.acm.org/10.1145/2043628.2043630}, - doi = {http://doi.acm.org/10.1145/2043628.2043630}, - acmid = {204363}, - publisher = {ACM}, - address = {New York, NY, USA}, - keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, - www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf}, - www_section=misc, - www_tags={selected}, -} - -@phdthesis{Weber11, - author = {Stefan G. Weber}, - title = {Multilaterally Secure Pervasive Cooperation}, - school = {TU Darmstadt, Germany}, - year = {2011}, - month = {December}, - www_section = {comm}, - www_pdf_url = {http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf} -} - -@inproceedings{Shokri11QLP1, - title={Quantifying location privacy}, - author={Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux}, - booktitle={Proceedings of the 2011 IEEE Symposium on Security and Privacy}, - pages={247--262}, - year={2011}, - organization={IEEE}, - www_section={misc}, - www_pdf_url={http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf} -} - -@inproceedings{Shokri11QLP2, - title={Quantifying Location Privacy: The Case of Sporadic Location Exposure}, - author={Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux, Jean-Pierre and Jean-Yves Le Boudec}, - booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, - pages={57--76}, - year={2011}, - publisher={Springer}, - www_section={misc}, - www_pdf_url={http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf} -} - -@inproceedings{oakland2012-peekaboo, - title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}, - author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, - booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, - year = {2012}, - month = {May}, - www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://kpdyer.com/publications/oakland2012.pdf}, -} - -@inproceedings{oakland2012-lastor, - title = {{LASTor: A Low-Latency AS-Aware Tor Client}}, - author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}, - booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, - year = {2012}, - month = {May}, - www_tags = {selected}, - www_section = comm, - www_pdf_url = {http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf}, -} - -@inproceedings{oakland2012-lap, - title = {{LAP}: Lightweight Anonymity and Privacy}, - author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming}, - booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, - year = {2012}, - month = {May}, - www_tags = {selected}, - www_section = comm, - www_pdf_url = {http://freehaven.net/anonbib/papers/LAP.pdf}, -} - -@inproceedings{congestion-tor12, - author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg}, - title = {{Congestion-aware Path Selection for Tor}}, - booktitle = {Proceedings of Financial Cryptography and Data Security -(FC'12)}, - year = {2012}, - month = {February}, - www_tags = {selected}, - www_section = comm, - www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf}, -} - -@InProceedings{blacr-ndss, - author = {Man Ho Au and Apu Kapadia and Willy Susilo}, - title = {{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation}, - booktitle = {Proceedings of the 19th Annual Network and Distributed System Security Symposium ({NDSS})}, - year = {2012}, - month = feb, - www_tags = {selected}, - www_section = nym, - www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf} -} - -@InCollection{systems-anon-communication, - author = {George Danezis and Claudia Diaz and Paul F. Syverson}, - title = {{Systems for Anonymous Communication}}, - month = {August}, - year = {2010}, - pages = {341--390}, - editor = {B. Rosenberg and - D. Stinson}, - booktitle = {CRC Handbook of Financial Cryptography and Security}, - publisher = {Chapman \& Hall }, - series = {CRC Cryptography and Network Security Series}, - volume = {}, - www_tags = {selected}, - www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf}, - www_section = comm -} - -@inproceedings{shadow-ndss12, - title = {{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}}, - author = {Rob Jansen and Nicholas Hopper}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'12}, - year = {2012}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www.internetsociety.org/sites/default/files/09_3.pdf}, - www_section = comm -} - -@inproceedings{flashproxy-pets12, - title={Evading Censorship with Browser-Based Proxies}, - author={David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh}, - booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, - month={July}, - year={2012}, - publisher={Springer}, - www_tags = {selected}, - www_section= censorship, - www_pdf_url= {https://crypto.stanford.edu/flashproxy/flashproxy.pdf} -} - -@inproceedings{leastsquares-pets12, - title={Understanding Statistical Disclosure: A Least Squares approach}, - author={Fernando Perez-Gonzalez and Carmela Troncoso}, - booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, - month={July}, - year={2012}, - publisher={Springer}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf}, -} - -@inproceedings{tcp-tor-pets12, - title={{Spying in the Dark: TCP and Tor Traffic Analysis}}, - author={Yossi Gilad and Amir Herzberg}, - booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, - month={July}, - year={2012}, - publisher={Springer}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf}, -} - -@inproceedings{traffic-padding-pets12, - title={k-Indistinguishable Traffic Padding in Web Applications}, - author={Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, - booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, - month={July}, - year={2012}, - publisher={Springer}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf}, -} - -@inproceedings{remote-traffic-pets12, - title={Website Detection Using Remote Traffic Analysis}, - author={Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear}, - booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, - month={July}, - year={2012}, - publisher={Springer}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf}, -} - -@InProceedings{cset12-modeling, - author = {Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine}, - title = {Methodically Modeling the Tor Network}, - booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)}, - year = {2012}, - month = {August}, - www_section = comm, - www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/tormodel-cset2012.pdf}, - www_tags={selected}, -} - -@inproceedings{tschorsch:translayeranon, - author = {Florian Tschorsch and , Bj{\"{o}}rn Scheurmann}, - title = {How (not) to build a transport layer for anonymity overlays}, - month = {June}, - year = {2012}, - booktitle = {Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy}, - www_tags = {selected}, - www_pdf_url = {http://pade12.mytestbed.net/pade12-final6.pdf}, - www_section = comm -} - -@phdthesis{koot2012, - author = {Matthijs R. Koot}, - year = {2012}, - month = {June}, - school = {University of Amsterdam}, - address = {Amsterdam, The Netherlands}, - title = {Measuring and Predicting Anonymity}, - www_pdf_url={http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf}, - www_section = traffic -} - -@inproceedings{esorics10-bandwidth, - title = {Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation}, - author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, - year = {2010}, - month = {September}, - publisher = {Springer}, - www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf}, - www_tags = {selected}, - www_section = traffic -} - -@InProceedings{foci12-winter, - author = {Philipp Winter and Stefan Lindskog}, - title = {{How the Great Firewall of China is blocking Tor}}, - booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, - year = {2012}, - month = {August}, - www_section = censorship, - www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf}, - www_tags={selected}, -} - -@InProceedings{foci12-defiance, - author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh}, - title = {Bootstrapping Communications into an Anti-Censorship System}, - booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, - year = {2012}, - month = {August}, - www_section = censorship, - www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf}, - www_tags={selected}, -} - -@inproceedings{throttling-sec12, - title = {{Throttling Tor Bandwidth Parasites}}, - author = {Rob Jansen and Paul Syverson and Nicholas Hopper}, - booktitle = {Proceedings of the 21st USENIX Security Symposium}, - year = {2012}, - month = {August}, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/throttling-sec2012.pdf}, - www_section = traffic -} - -@inproceedings{wpes12-cogs, - title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor}, - author = {Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, - year = {2012}, - month = {October}, - location = {Raleigh, NC, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/~arma/cogs-wpes.pdf}, - www_section = traffic -} - -@inproceedings{wpes12-torchestra, - title = {Torchestra: Reducing interactive traffic delays over Tor}, - author = {Deepika Gopal and Nadia Heninger}, - booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, - year = {2012}, - month = {October}, - location = {Raleigh, NC, USA}, - publisher = {ACM}, - www_tags = {selected}, - www_pdf_url = {http://freehaven.net/anonbib/papers/torchestra-wpes.pdf}, - www_section = comm -} - -@inproceedings{ccs2012-classification, - Author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg}, - Title = {Enhancing Tor's Performance using Real-time Traffic Classification}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf}, -} - -@inproceedings{ccs2012-decoys, - Author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, - Title = {Routing Around Decoys}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = censorship, - www_tags = {selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf}, -} - -@inproceedings{ccs2012-skypemorph, - Author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, - Title = {SkypeMorph: Protocol Obfuscation for {T}or Bridges}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = censorship, - www_tags = {selected}, - www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf}, -} - -@inproceedings{ccs2012-stegotorus, - Author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, - Title = {{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = censorship, - www_tags = {selected}, - www_pdf_url = {http://www.owlfolio.org/media/2010/05/stegotorus.pdf}, -} - -@inproceedings{ccs2012-censorspoofer, - Author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, - Title = {CensorSpoofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = censorship, - www_tags = {selected}, - www_pdf_url = {https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf}, -} - -@inproceedings{ccs2012-fingerprinting, - Author = {Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson}, - Title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses}, - Booktitle = {Proceedings of the 19th ACM conference on Computer and - Communications Security (CCS 2012)}, - Month = {October}, - year = {2012}, - www_section = traffic, - www_tags = {selected}, - www_pdf_url = {http://www.cs.sunysb.edu/~xcai/fp.pdf}, -} - -@inproceedings{acns11-certificateless, - author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, - title = {Fully Non-Interactive Onion Routing with Forward-Secrecy}, - crossref = {DBLP:conf/acns/2011}, - www_pdf_url = {http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf}, - www_tags = {selected}, - www_section = comm -} - -@proceedings{DBLP:conf/acns/2011, - editor = {Javier Lopez and Gene Tsudik}, - booktitle = {Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011)}, - series = {Lecture Notes in Computer Science}, - location = {Malaga, Spain}, - volume = {6715}, - month = {June}, - year = {2011}, -} - -@inproceedings{ipccc12-performance, - Author = {Andriy Panchenko and Fabian Lanze and Thomas Engel}, - Title = {Improving Performance and Anonymity in the Tor Network}, - Booktitle = {Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012)}, - Month = {December}, - year = {2012}, - www_section = comm, - www_tags = {selected}, - www_pdf_url = {http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf}, -} - -@inproceedings{perm-ccs12, - author = {Man Ho Au and Apu Kapadia}, - title = {{PERM}: Practical Reputation-Based Blacklisting without {TTPs}}, - booktitle = {Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS)}, - pages = {929--940}, - month = oct, - year = {2012}, - doi = {10.1145/2382196.2382294}, - publisher = {ACM}, - www_tags = {selected}, - www_section = nym, - www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf} -} - -@inproceedings{ndss13-lira, - title = {{LIRA: Lightweight Incentivized Routing for Anonymity}}, - author = {Rob Jansen and Aaron Johnson and Paul Syverson}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, - year = {2013}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/lira-ndss2013.pdf}, - www_section = comm -} - -@inproceedings{ndss13-rbridge, - title = {{rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation}}, - author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, - year = {2013}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf}, - www_section = comm -} - -@inproceedings{ndss13-relay-selection, - title = {{An Empirical Evaluation of Relay Selection in Tor}}, - author = {Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, - year = {2013}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf}, - www_section = comm -} - -@inproceedings{ndss13-website-fingerprinting, - title = {{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}}, - author = {Michael Backes and Goran Doychev and Boris K\"opf}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, - year = {2013}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://software.imdea.org/~bkoepf/papers/ndss13.pdf}, - www_section = comm -} - -@inproceedings{ndss13-freewave, - title = {{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}}, - author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, - booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, - year = {2013}, - month = {February}, - publisher = {Internet Society}, - www_tags={selected}, - www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf}, - www_section = censorship -} - -@techreport{wileydust, - title={Dust: A Blocking-Resistant Internet Transport Protocol}, - author={Brandon Wiley}, - institution={School of Information, University of Texas at Austin}, - year={2011}, - www_tags={selected}, - www_pdf_url = {http://blanu.net/Dust.pdf}, - www_section = censorship -} - -@inproceedings{esorics12-torscan, - title = {{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks}, - author = {Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'12}, - year = {2012}, - month = {September}, - publisher = {Springer}, - www_pdf_url = {http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf}, - www_tags = {selected}, - www_section = traffic -} - -%%%%%%% Journals and proceedings: used by reference - -@Proceedings{eurocrypt-02, - editor = {Lars R. Knudsen}, - booktitle = "Proceedings of Eurocrypt 2002", - month = {May}, - year = {2002}, - bookurl = {http://www.ec2002.tue.nl/}, - www_tags={selected}, -} - -@Proceedings{weis2006, - editor = {Ross Anderson}, - booktitle = "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", - month = {June}, - year = {2006}, - location = {Cambridge, UK}, - bookurl = {http://weis2006.econinfosec.org/}, -} - -% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International -% Conference on the Theory and Applications of Cryptographic -% Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, -@Proceedings{eurocrypt2005, - editor = {Ronald Cramer}, - booktitle = {Proceedings of EUROCRYPT 2005}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {3494}, - month = {May}, - year = {2005}, - isbn = {3-540-25910-4}, - bibsource = {DBLP, http://dblp.uni-trier.de}, -} - -@proceedings{esorics2007, - editor = {Joachim Biskup and - Javier Lopez}, - booktitle = {Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007)}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {4734}, - month = {September}, - year = {2007}, - location = {Dresden, Germany}, - isbn = {978-3-540-74834-2}, -} - -@proceedings{DBLP:conf/acns/2008, - editor = {Steven M. Bellovin and - Rosario Gennaro and - Angelos D. Keromytis and - Moti Yung}, - booktitle = {Proceedings of the 6th International Conference on - Applied Cryptography and Network Security - (ACNS 2008)}, - series = {Lecture Notes in Computer Science}, - volume = {5037}, - location = {New York, NY, USA}, - month = {June}, - year = {2008}, - isbn = {978-3-540-68913-3}, - bibsource = {DBLP, http://dblp.uni-trier.de}, -} - -@proceedings{DBLP:conf/pervasive/2008, - editor = {Jadwiga Indulska and - Donald J. Patterson and - Tom Rodden and - Max Ott}, - booktitle = {Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008)}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {5013}, - location = {Sydney, Australia}, - month = {May}, - year = {2008}, - isbn = {978-3-540-79575-9}, - bibsource = {DBLP, http://dblp.uni-trier.de}, -} - -@article{Ruiz-Martinez_2012, - title={A survey on solutions and main free tools for privacy enhancing Web communications}, - volume={35}, - ISSN={1084-8045}, - DOI={10.1016/j.jnca.2012.02.011}, - number={5}, - journal={Journal of Network and Computer Applications}, - author={Ruiz-Mart{\'i}nez, A.}, - year={2012}, - month={September}, - pages={1473--1492}, - www_pdf_url={http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf}, - www_section=comm, -} - -@inproceedings{oakland2013-parrot, - title = {The Parrot is Dead: Observing Unobservable Network Communications}, - author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov}, - booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, - year = {2013}, - month = {May}, - www_tags = {selected}, - www_section = censorship, - www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/parrot.pdf}, -} - -@inproceedings{oakland2013-trawling, - title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization}, - author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann}, - booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, - year = {2013}, - month = {May}, - www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf}, -} - -@inproceedings{pets13-splitting, - title={The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting}, - author={Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg}, - booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, - month={July}, - year={2013}, - www_tags = {selected}, - www_section= comm, - www_pdf_url= {http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf}, -} - -@inproceedings{pets13-how-low, - title={How Low Can You Go: Balancing Performance with Anonymity in Tor}, - author={John Geddes and Rob Jansen and Nicholas Hopper}, - booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, - month={July}, - year={2013}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf}, -} - -@inproceedings{pets13-oss, - title={{OSS}: Using Online Scanning Services for Censorship Circumvention}, - author={David Fifield and Gabi Nakibly and Dan Boneh}, - booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, - month={July}, - year={2013}, - www_tags = {selected}, - www_section= censorship, - www_pdf_url= {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf}, -} - -@inproceedings{pets13-flow-fingerprints, - title={The need for flow fingerprints to link correlated network flows}, - author={Amir Houmansadr and Nikita Borisov}, - booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, - month={July}, - year={2013}, - www_tags = {selected}, - www_section= traffic, - www_pdf_url= {http://www.cs.utexas.edu/~amir/papers/Fancy.pdf}, -} - diff --git a/i2p2www/anonbib/views.py b/i2p2www/anonbib/views.py new file mode 100644 index 00000000..1d4aac94 --- /dev/null +++ b/i2p2www/anonbib/views.py @@ -0,0 +1,32 @@ +from flask import render_template + +from i2p2www import ANONBIB_CFG, ANONBIB_FILE +from i2p2www.anonbib import BibTeX, config + +def papers_list(): + config.load(ANONBIB_CFG) + rbib = BibTeX.parseFile(ANONBIB_FILE) + rbib = [ b for b in rbib.entries ] + rbib = BibTeX.sortEntriesByDate(rbib) + rbib = BibTeX.splitSortedEntriesBy(rbib, 'year') + + bib = {} + bib['title'] = 'Papers on I2P' + bib['short_title'] = 'I2P Papers' + bib['otherbibs'] = '' + bib['choices'] = '' + bib['sectiontypes'] = 'Dates' + bib['field'] = 'date' + + sections = [] + for section, entries in rbib: + s = {} + s['name'] = section + s['slug'] = section + s['entries'] = entries + sections.append(s) + bib['sections'] = sections + + print bib['sections'] + + return render_template('papers/list.html', bib=bib) diff --git a/i2p2www/pages/papers/anonbib.bib b/i2p2www/pages/papers/anonbib.bib new file mode 100644 index 00000000..0179f053 --- /dev/null +++ b/i2p2www/pages/papers/anonbib.bib @@ -0,0 +1,185 @@ +% +% +% Magic fields: +% +% www_tags -- used to control which page groups the paper appears in. +% This is a space-separated list. +% www_section -- the topic used under 'topics.html' +% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of +% an entry. +% www_important -- set for important entries +% www_remarks -- annotation for an entry + +%% List of sections +@string{comm = "Anonymous communication"} +@string{traffic = "Traffic analysis"} +@string{pub = "Anonymous publication"} +@string{proofs = "Provable shuffles"} +@string{methods = "Formal methods"} +@string{nym = "Pseudonymity"} +@string{pir = "Private Information Retrieval"} +@string{economics = "Economics"} +@string{censorship = "Communications Censorship"} +@string{credentials = "E-Cash / Anonymous Credentials"} +@string{misc = "Misc"} + +# +# Proposed new sections: application privacy, data anonymization, ... +# + +@string{lncs = "Lecture Notes in Computer Science"} + +@inproceedings{egger2013:practical-attacks, + title = {Practical Attacks Against the I2P Network}, + author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, + booktitle = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)}, + year = {2013}, + month = {October}, + www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf}, + www_section = traffic, +} + +%% hal-00744922, version 1 +%% http://hal.inria.fr/hal-00744922 +@inproceedings{timpanaro:hal-00744922, + hal_id = {hal-00744922}, + url = {http://hal.inria.fr/hal-00744922}, + title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.}}, + language = {English}, + affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, + booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and Security}}, + publisher = {Springer}, + pages = {77--92}, + address = {Melbourne, Australia}, + volume = {4}, + audience = {international }, + doi = {10.1007/978-3-642-35362-8 }, + year = {2012}, + month = Dec, + www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf}, + www_section = comm, +} + +%% hal-00744919, version 1 +%% http://hal.inria.fr/hal-00744919 +@inproceedings{timpanaro:hal-00744919, + hal_id = {hal-00744919}, + url = {http://hal.inria.fr/hal-00744919}, + title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous file-sharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.}}, + keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing}, + language = {English}, + affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, + booktitle = {{Proceedings of the 6th International Conference on Network and System Security}}, + address = {Wu Yi Shan, China}, + audience = {international }, + year = {2012}, + month = Nov, + www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf}, + www_section = traffic, +} + +@misc{ehlert2011:usability-comparison-i2p-tor, + title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison}, + author = {Mathias Ehlert}, + institution = {Humboldt University of Berlin}, + howpublished = {Seminar}, + year = {2011}, + month = {November}, + www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf}, + www_section = comm, +} + +%% inria-00632259, version 1 +%% http://hal.inria.fr/inria-00632259 +@unpublished{timpanaro:inria-00632259, + hal_id = {inria-00632259}, + url = {http://hal.inria.fr/inria-00632259}, + title = {{Monitoring the I2P network}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and we show through a one week long experiment that we are able to identify 32\% of all running applications, among web servers and file- sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after its publication on the I2P distributed database.}}, + language = {English}, + affiliation = {MADYNES - INRIA Lorraine - LORIA}, + year = {2011}, + month = Oct, + www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf}, + www_section = traffic, +} + +@inproceedings{pets2011-i2p, + title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P}, + author = {Michael Herrmann and Christian Grothoff}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf}, + www_section = traffic, +} + +@mastersthesis{hermann2011-mthesis, + title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P}, + author = {Michael Hermann}, + school = {TU-Munich}, + year = {2011}, + month = {March}, + www_section = traffic, +} + +@inproceedings{BlackHat2011-crenshaw, + url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers}, + title = {Darknets - I2P Identifying Hidden Servers}, + author = {Adrian Crenshaw}, + booktitle = {Proceedings of Black Hat}, + year = {2011}, + month = {January}, + location = {DC}, + www_pdf_url = {http://www.irongeek.com/downloads/Identifying\%20the\%20true\%20IP\%20of\%20I2P\%20service\%20hosts.pdf}, + www_section = traffic, +} + +@mastersthesis{delmer-mthesis, + title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes, Freenet et i2p}, + author = {Laurie Delmer}, + school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques et sociales}, + year = {2009}, + note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P. School: Catholic University of Leuven - Department of Political and Social Science}, + www_section = comm, +} + +@inproceedings{petcon2009-schomburg, + title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks}, + author = {Jens Schomburg}, + booktitle = {Proceedings of PET-CON 2009.1}, + location = {Dresden, Germany}, + year = {2009}, + month = {March}, + pages = {49--58}, + www_pdf_url = {http://freehaven.net/~karsten/volatile/petcon-proceedings-2009.1.pdf}, + www_section = comm, +} + +@inproceedings{petcon2009-zzz, + title = {Peer Profiling and Selection in the I2P Anonymous Network}, + author = {zzz (Pseudonym) and Lars Schimmer}, + booktitle = {Proceedings of PET-CON 2009.1}, + location = {Dresden, Germany}, + year = {2009}, + month = {March}, + pages = {59--70}, + www_pdf_url = {I2P-PET-CON-2009.1.pdf}, + www_section = comm, +} + +@unpublished{jrandom2003, + title = {Invisible Internet Project (I2P) Project Overview}, + author = {jrandom (Pseudonym)}, + year = {2003}, + month = Aug, + www_pdf_local = {i2p_philosophy.pdf}, + www_section = comm, +} diff --git a/i2p2www/anonbib/anonbib.cfg b/i2p2www/pages/papers/anonbib.cfg similarity index 100% rename from i2p2www/anonbib/anonbib.cfg rename to i2p2www/pages/papers/anonbib.cfg diff --git a/i2p2www/pages/papers/list.html b/i2p2www/pages/papers/list.html new file mode 100644 index 00000000..273dd18b --- /dev/null +++ b/i2p2www/pages/papers/list.html @@ -0,0 +1,60 @@ +{% extends "global/layout.html" %} +{% block title %}{{ bib.title }}{% endblock %} +{% block headextra %} + +{% endblock %} +{% block content %} +

{{ bib.short_title }}

+

{{ bib.otherbibs }}

+

{{ bib.choices }}

+ + + + + + + + + + + +
+ + + + + + + + +

Publications by {{ bib.field }}

+ +
    +{% for section in bib.sections %} +
  • {{ section.name }}

    +
      +{% for entry in section.entries %} +{{ entry.to_html()|safe }} +{% endfor %} +
  • +{% endfor %} +
+ +

+ +

{% trans email="press@i2p2.de"|safe, +bibtex = '', +citeseer = 'http://citeseer.ist.psu.edu/online-nature01/' -%} +Please send new or corrected entries to +.
+If you can, please format them as BibTeX; see our +BibTeX source page for examples.
+Remember to include URLs if possible: +offline papers are less useful. +{%- endtrans %}

+{% endblock %} diff --git a/i2p2www/anonbib/css/pubs.css b/i2p2www/static/styles/pubs.css similarity index 88% rename from i2p2www/anonbib/css/pubs.css rename to i2p2www/static/styles/pubs.css index 3bb820f4..5e234313 100644 --- a/i2p2www/anonbib/css/pubs.css +++ b/i2p2www/static/styles/pubs.css @@ -24,6 +24,8 @@ SPAN.biblio { } SPAN.biblio A { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: normal; text-decoration: underline; } @@ -105,6 +107,11 @@ TABLE.sidebar { background-color: #CFF; } +TD { + border: none !important; + vertical-align: top; +} + TD.bibtex { font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; border-width: 2px; @@ -119,3 +126,15 @@ PRE.bibtex { font-size: smaller; } +UL { + list-style: outside; +} + +UL.expand { + margin-bottom: 1em; +} + +UL.sections { + list-style: none; + vertical-align: top; +} diff --git a/i2p2www/urls.py b/i2p2www/urls.py index a68b9d6b..3bacf959 100644 --- a/i2p2www/urls.py +++ b/i2p2www/urls.py @@ -38,6 +38,8 @@ url('/', 'views.main_index') url('//', 'views.site_show', defaults={'page': 'index'}) url('//', 'views.site_show') +url('//papers/', 'anonbib.views.papers_list') + url('//blog/', 'blog.views.blog_index', defaults={'page': 1}) url('//blog/page/', 'blog.views.blog_index') url('//blog/category/', 'blog.views.blog_index', defaults={'page': 1})