-
1
-
-
35248878897
-
On the economics of anonymity
-
R. N. Wright, editor, Financial Cryptography, Springer
-
A. Acquisti, R. Dingledine, and P. F. Syverson:. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 84-102. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.F.3
-
2
-
-
0038148419
-
Probabilistic treatment of mixes to hamper traffic analysis
-
Berkeley, CA, USA, May IEEE Computer Society
-
D. Agrawal, D. Kesdogan, and S. Penz. Probabilistic treatment of mixes to hamper traffic analysis. In IEEE Symposium on Security and Privacy, pages 16-27, Berkeley, CA, USA, May 2003. IEEE Computer Society.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 16-27
-
-
Agrawal, D.1
Kesdogan, D.2
Penz, S.3
-
3
-
-
23244463535
-
Detecting web bugs with bugnosis: Privacy advocacy through education
-
San Francisco, CA, May
-
A. Alsaid and D. Martin. Detecting web bugs with bugnosis: Privacy advocacy through education. In Privacy Enhancing Technologies (PET 2002), San Francisco, CA, May 2002.
-
(2002)
Privacy Enhancing Technologies (PET 2002)
-
-
Alsaid, A.1
Martin, D.2
-
4
-
-
20444458186
-
Freedom systems 2.1 security issues and analysis
-
Zero Knowledge Systems, Inc., May
-
A. Back, I. Goldberg, and A. Shostack. Freedom systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
-
(2001)
White Paper
-
-
Back, A.1
Goldberg, I.2
Shostack, A.3
-
5
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, editor, Information Hiding workshop (IH 2001), Springer-Verlag, April
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding workshop (IH 2001), volume 2137 of LNCS, pages 245-257. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
6
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, Designing Privacy Enhancing Technologies, Springer-Verlag, July
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of LNCS, pages 115-129. Springer-Verlag, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
7
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia Antipolis, France, September
-
A. Blum, D. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 2004.
-
(2004)
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
8
-
-
27544431592
-
Mix cascades vs. peer-to-peer: Is one concept superior?
-
Toronto, Canada, May
-
R. Bohme, G. Danezis, C. Diaz, S. Kopsell, and A. Pfitzmann. Mix cascades vs. peer-to-peer: Is one concept superior? In Privacy Enhancing Technologies (PET 2004), Toronto, Canada, May 2004.
-
(2004)
Privacy Enhancing Technologies (PET 2004)
-
-
Bohme, R.1
Danezis, G.2
Diaz, C.3
Kopsell, S.4
Pfitzmann, A.5
-
9
-
-
20444436625
-
Freedom systems 2.0 architecture
-
Zero Knowledge Systems, Inc., December
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
White Paper
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
10
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
10444287344
-
PlanetLab: An overlay testbed for broad-coverage services
-
July
-
B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman. PlanetLab: An Overlay Testbed for Broad-Coverage Services. ACM SIGCOMM Computer Communication Review, 33(3), July 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.3
-
-
Chun, B.1
Culler, D.2
Roscoe, T.3
Bavier, A.4
Peterson, L.5
Wawrzoniak, M.6
Bowman, M.7
-
12
-
-
84947289387
-
Real world patterns of failure in anonymity systems
-
I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, Springer-Verlag, April
-
R. Clayton, G. Danezis, and M. G. Kuhn. Real world patterns of failure in anonymity systems. In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of LNCS, pages 230-245. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2137
, pp. 230-245
-
-
Clayton, R.1
Danezis, G.2
Kuhn, M.G.3
-
13
-
-
84904332394
-
Statistical disclosure attacks
-
Gritzalis, Vimercati, Samarati, and Katsikas, editors. Athens, May IFIPTC11, Kluwer
-
G. Danezis. Statistical disclosure attacks. In Gritzalis, Vimercati, Samarati, and Katsikas, editors. Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIPTC11, Kluwer.
-
(2003)
Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
Danezis, G.1
-
14
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Proceedings of Privacy Enhancing Technologies workshop (PET2004), May
-
G. Danezis. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET2004), volume 3424 of LNCS, May 2004.
-
(2004)
LNCS
, vol.3424
-
-
Danezis, G.1
-
15
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
Berkeley, CA, 11-14 May
-
G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE Symposium on Security and Privacy, Berkeley, CA, 11-14 May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
17
-
-
27544449504
-
Tor spec
-
The Free Haven Project, October 20
-
R. Dingledine and N. Mathewson. Tor spec. Technical report, The Free Haven Project, October 20 2004. http://www.freehaven.net/tor/cvs/doc/tor-spec. txt.
-
(2004)
Technical Report
-
-
Dingledine, R.1
Mathewson, N.2
-
19
-
-
0003355701
-
Hypertext transfer protocol -HTTP/1.1
-
Network Working Group, June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext transfer protocol -HTTP/1.1. RFC 2616, Network Working Group, June 1999.
-
(1999)
RFC
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
20
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
V. Atluri, editor, Washington, DC, November ACM
-
M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In V. Atluri, editor, ACM Conference on Computer and Communications Security (CCS 2002), pages 193-206, Washington, DC, November 2002. ACM.
-
(2002)
ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
21
-
-
84910595881
-
Introducing tarzan, a pecr-to-peer anonymizing network layer
-
P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, International workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, March 2002. Springer-Verlag
-
M. J. Freedman, E. Sit, J. Cates, and R. Morris. Introducing tarzan, a pecr-to-peer anonymizing network layer. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, International workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of LNCS, pages 121-129, Cambridge, MA, March 2002. Springer-Verlag.
-
LNCS
, vol.2429
, pp. 121-129
-
-
Freedman, M.J.1
Sit, E.2
Cates, J.3
Morris, R.4
-
24
-
-
0005063385
-
Onion routing
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing. Communications of the ACM, 42(2):39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
25
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on Internet resources
-
Berlin, Germany, October
-
Guirguis, Mina, Bestavros, Azer, and I. Malta. Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. In Proceedings of ICNP'04: The 12th IEEE International Conference on Network Protocols, Berlin, Germany, October 2004.
-
(2004)
Proceedings of ICNP'04: The 12th IEEE International Conference on Network Protocols
-
-
Guirguis1
Mina2
Bestavros3
Azer4
Malta, I.5
-
27
-
-
35248900308
-
Limits of anonymity in open environments
-
F. A. P. Petitcolas, editor, Information Hiding workshop (IH 2002), Noordwijkerhout, The Netherlands, 7-9 October Springer-Verlag
-
D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. A. P. Petitcolas, editor, Information Hiding workshop (IH 2002), volume 2578 of LNCS, pages 53-69, Noordwijkerhout, The Netherlands, 7-9 October 2002. Springer-Verlag.
-
(2002)
LNCS
, vol.2578
, pp. 53-69
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
28
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
A. Juels, editor, Springer-Verlag, LNCS 3110, February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110, February 2004.
-
(2004)
Proceedings of Financial Cryptography (FC '04)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
30
-
-
20444447364
-
Mix-master protocol version 2
-
Network Working Group, May 25 Internet-Draft
-
U. Moeller, L. Cottrell, P. Palfrader, and L. Sassaman. Mix-master protocol version 2. Technical report, Network Working Group, May 25 2004. Internet-Draft.
-
(2004)
Technical Report
-
-
Moeller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
31
-
-
1642355346
-
Covert channels and anonymizing networks
-
Washington, DC, USA, October
-
I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller. Covert channels and anonymizing networks. In Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003.
-
(2003)
Workshop on Privacy in the Electronic Society (WPES 2003)
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
32
-
-
2642560372
-
Quasi-anonymous channels
-
New York, USA, 10-12 December
-
I. S. Moskowitz, R. E. Newman, and P. F. Syverson. Quasi-anonymous channels. In Communication, Network, and Information Security (CNIS 2003), New York, USA, 10-12 December 2003.
-
(2003)
Communication, Network, and Information Security (CNIS 2003)
-
-
Moskowitz, I.S.1
Newman, R.E.2
Syverson, P.F.3
-
33
-
-
0011702966
-
ISDN-mixes: Untraceable communication with very small bandwidth overhead
-
W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, Springer-Verlag, February
-
A. Pfltzmann, B. Pfitzmann, and M. Waidner. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, volume 267 of Informatik-Fachberichte, pages 451-463. Springer-Verlag, February 1991.
-
(1991)
Informatik-fachberichte
, vol.267
, pp. 451-463
-
-
Pfltzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
34
-
-
1842607847
-
-
R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0
-
R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria, 2004. ISBN 3-900051-07-0 http://www.R-project.org/.
-
(2004)
R: A Language and Environment for Statistical Computing
-
-
-
35
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
36
-
-
20444437836
-
Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
-
Washington, DC, USA, November
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, November 2002.
-
(2002)
Workshop on Privacy in the Electronic Society (WPES 2002)
-
-
Rennhard, M.1
Plattner, B.2
-
39
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, editor, Designing Privacy Enhancing Technologies, Berkeley, CA, USA, 25-26 July Springer-Verlag
-
P. F. Syverson, G. Tsudik, M. G. Reed, and C. E. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of LNCS, pages 96-114, Berkeley, CA, USA, 25-26 July 2000. Springer-Verlag.
-
(2000)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
-
42
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, May 2004.
-
(2004)
LNCS
, vol.3424
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|