-
2
-
-
1642287876
-
-
http://www.anonymizer.com/.
-
-
-
-
3
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137
-
Back, A., Möller, U., and Stiglic, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding (IH 2001) (2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245-257. http://www.cypherspace.org/adam/pubs/traffic.pdf.
-
(2001)
Information Hiding (IH 2001)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
4
-
-
9244233770
-
GAP - Practical anonymous networking
-
March, R. Dingledine, Ed., Springer-Verlag, LNCS 2760
-
Bennett, K., and Grothoff, C. GAP - practical anonymous networking. In Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (March 2003), R. Dingledine, Ed., Springer-Verlag, LNCS 2760.
-
(2003)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2003)
-
-
Bennett, K.1
Grothoff, C.2
-
5
-
-
0009435080
-
Uniform resource locators (URL)
-
RFC, Internet Engineering Task Force, December
-
Berners-Lee, T., Masinter, L., and MCCahill, M. Uniform resource locators (URL). RFC, Internet Engineering Task Force, December 1994. RFC 1738.
-
(1994)
RFC
, vol.1738
-
-
Berners-Lee, T.1
Masinter, L.2
McCahill, M.3
-
6
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable internet access
-
H. F. (Ed.), Ed., Springer. LNCS 2009
-
Berthold, O., Federrath, H., and Köpsell, S. Web MIXes: A system for anonymous and unobservable internet access. In Designing Privacy Enhancing Technologies. Proc. Workshop on Design Issues in Anonymity and Unobservability (2001), H. F. (Ed.), Ed., Springer, pp. 115-129. LNCS 2009.
-
(2001)
Designing Privacy Enhancing Technologies. Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
7
-
-
0037974470
-
Dummy traffic against long term intersection attacks
-
R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482
-
Berthold, O., and Langos, H. Dummy traffic against long term intersection attacks. In Privacy Enhancing Technologies (PET 2002) (2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482.
-
(2002)
Privacy Enhancing Technologies (PET 2002)
-
-
Berthold, O.1
Langos, H.2
-
12
-
-
1642393548
-
Convention on cybercrime
-
European Union
-
Council of Europe. Convention on cybercrime. Tech. rep., European Union, 2001. available from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
-
(2001)
Tech. Rep.
-
-
-
14
-
-
1642294383
-
-
DART
-
Doubleclick, I. DART. http://www.doubleclick.com/us/corporate/privacy/privacy/internet-ads/dart.asp, 2003.
-
(2003)
-
-
Doubleclick, I.1
-
15
-
-
1642356149
-
-
KaZaA BV
-
KaZaA BV. http://www.fasttrack.nu/.
-
-
-
-
16
-
-
85084161295
-
Infranet: Circumventing Censorship and Surveillance
-
San Francisco, CA, August
-
Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., and Karger, D. Infranet: Circumventing Censorship and Surveillance. In Proceedings of the 11th USENIX Security Symposium (San Francisco, CA, August 2002).
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
17
-
-
35248897534
-
Eliminating Steganography in Internet Traffic with Active Wardens
-
Springer
-
Fisk, G., Fisk, M., Papadopoulos, C., and Neil, J. Eliminating Steganography in Internet Traffic with Active Wardens. In Information Hiding 2002 (2002), Springer, pp. 18-35.
-
(2002)
Information Hiding 2002
, pp. 18-35
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
18
-
-
0003365506
-
HTTP Authentication: Basic and Digest Access Authentication
-
RFC, Internet Engeneering Task Force, June
-
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and Stewart, L. HTTP Authentication: Basic and Digest Access Authentication. RFC, Internet Engeneering Task Force, June 1999. RFC 2617.
-
(1999)
RFC
, vol.2617
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
20
-
-
0003317098
-
How to make personalized web browsing simple, secure, and anonymous
-
February, Springer. LNCS 1318
-
Gabber, E., Gibbons, P., Matias, Y., , and Mayer, A. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography 97 (February 1997), Springer. LNCS 1318.
-
(1997)
Proceedings of Financial Cryptography 97
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
Mayer, A.4
-
21
-
-
54649083230
-
TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web
-
August
-
Goldberg, I., and Wagner, D. TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web. First Monday 3, 4 (August 1998).
-
(1998)
First Monday
, vol.3
, pp. 4
-
-
Goldberg, I.1
Wagner, D.2
-
22
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
February
-
Goldschlag, D. M., Reed, M. G., and Syverson, P. F. Onion routing for anonymous and private internet connections. Communications of the ACM 42, 2 (February 1999).
-
(1999)
Communications of the ACM
, vol.42
, pp. 2
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
23
-
-
23944464224
-
-
Golle, P., Jakobsson, M., Juels, A., and Syverson, P. Universal re-encryption for mixnets. preprint at https://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/univrenc/univrenc.ps, 2003.
-
(2003)
Universal Re-encryption for Mixnets
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
24
-
-
0003518498
-
-
java.sun.com/docs/books/jls/
-
Gosling, J., Joy, B., Steele, G., and Bracha, G. The Java Language Specification. java.sun.com/docs/books/jls/.
-
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
25
-
-
0003355701
-
Hypertext transfer protocol - HTTP/1.1
-
June
-
Irvine, U., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. Hypertext transfer protocol - HTTP/1.1. http://www.ietf.org/rfc/rfc2616.txt, June 1999. RFC 2616.
-
(1999)
RFC
, vol.2616
-
-
Irvine, U.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
26
-
-
0006913907
-
Stop-and-go MIXes providing probabilistic anonymity in an open system
-
Springer-Verlag, LNCS 1525
-
Kesdogan, D., Egner, M., and Büschkes, T. Stop-and-go MIXes providing probabilistic anonymity in an open system. In Information Hiding (IH 1998) (1998), Springer-Verlag, LNCS 1525. http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf.
-
(1998)
Information Hiding (IH 1998)
-
-
Kesdogan, D.1
Egner, M.2
Büschkes, T.3
-
27
-
-
0008144259
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
July, Springer
-
Köhntopp, M., and Pfitzmann, A. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies (July 2000), Springer.
-
(2000)
Designing Privacy Enhancing Technologies
-
-
Köhntopp, M.1
Pfitzmann, A.2
-
28
-
-
0012209329
-
HTTP state management mechanism
-
February
-
Kristol, D., and Montulli, L. HTTP state management mechanism. http://www.ietf.org/rfc/rfc2109.txt, February 1997. RFC 2109.
-
(1997)
RFC
, vol.2109
-
-
Kristol, D.1
Montulli, L.2
-
29
-
-
0015672289
-
A note on the confinement problem
-
October
-
Lampson, B. W. A note on the confinement problem. Communications of the ACM 16, 10 (October 1973), 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
31
-
-
1642370897
-
Distributions of traffic stratified by application
-
Cooperative Association for Internet Data Analysis (CAIDA), September
-
Modeling, N., and Project, S. Distributions of traffic stratified by application. Tech. rep., Cooperative Association for Internet Data Analysis (CAIDA), September 2002.
-
(2002)
Tech. Rep.
-
-
Modeling, N.1
Project, S.2
-
32
-
-
20444447364
-
-
Unfinished draft, January 2000
-
Möller, U., and Cottrell, L. Mixmaster Protocol - Version 2. Unfinished draft, January 2000., 2000. http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol-00. txt.
-
(2000)
Mixmaster Protocol - Version 2
-
-
Möller, U.1
Cottrell, L.2
-
33
-
-
1642404793
-
On the use of HTTP as a substrate
-
Tech. rep., Internet Engineering Task Force, February
-
Moore, K. On the use of HTTP as a substrate. Tech. rep., Internet Engineering Task Force, February 2002. RFC 3205.
-
(2002)
RFC
, vol.3205
-
-
Moore, K.1
-
34
-
-
53349102286
-
Prospects for remailers
-
August
-
Parekh, S. Prospects for remailers. First Monday 1, 2 (August 1996). http://www.firstmonday.dk/issues/issue2/remailers/.
-
(1996)
First Monday
, vol.1
, pp. 2
-
-
Parekh, S.1
-
35
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
H. Federrath, Ed., Springer-Verlag. LNCS 2009
-
Raymond, J.-F. Traffic analysis: Protocols, attacks, design issues and open problems. In Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (2001), H. Federrath, Ed., Springer-Verlag, pp. 10-29. LNCS 2009.
-
(2001)
Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability
, pp. 10-29
-
-
Raymond, J.-F.1
-
36
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
Nov.
-
Reiter, M. K., and Rubin, A. D. Crowds: anonymity for Web transactions. TISSEC 1, 1 (Nov. 1998), 66-92.
-
(1998)
TISSEC
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
37
-
-
20444437836
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
Washington, DC, USA, November
-
Rennhard, M., and Plattner, B. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Proceedings of the Workshop on Privacy in the Electronic Society (Washington, DC, USA, November 2002).
-
(2002)
Proceedings of the Workshop on Privacy in the Electronic Society
-
-
Rennhard, M.1
Plattner, B.2
-
38
-
-
0012054514
-
Covert channels in the TCP/IP protocol suite
-
May
-
Rowland, C. H. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (May 1997).
-
(1997)
First Monday
, vol.2
, pp. 5
-
-
Rowland, C.H.1
-
39
-
-
1642387170
-
From a trickle to a flood: Active attacks on several mix types
-
October, F. Petitcolas, Ed., Springer-Verlag, LNCS 2578
-
Serjantov, A., Dingledine, R., and Syverson, P. From a trickle to a flood: Active attacks on several mix types. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
-
(2002)
Proceedings of Information Hiding Workshop (IH 2002)
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
40
-
-
0003213193
-
IP Network Address Translator (NAT) Terminology and Considerations
-
RFC, Internet Engineering Task Force, August
-
Srisuresh, P., and Holdrege, M. IP Network Address Translator (NAT) Terminology and Considerations. RFC, Internet Engineering Task Force, August 1999. RFC 2663.
-
(1999)
RFC
, vol.2663
-
-
Srisuresh, P.1
Holdrege, M.2
|