-
1
-
-
35248878897
-
On the economics of anonymity
-
R. N. Wright, editor, Springer-Verlag, LNCS 2742
-
A. Acquisti, R. Dingledine, and P. Syverson. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography, 7th International Conference, FC 2003, pages 84-102. Springer-Verlag, LNCS 2742, 2003.
-
(2003)
Financial Cryptography, 7th International Conference, FC 2003
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
4
-
-
84860034184
-
-
Anonymizer. http://www.anonymizer.com/.
-
-
-
-
5
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, editor. Springer-Verlag, LNCS 2137
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
-
(2001)
Information Hiding (IH 2001)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
6
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
7
-
-
0037974470
-
Dummy traffic against long term intersection attacks
-
R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
-
O. Berthold and H. Langos. Dummy traffic against long term intersection attacks. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Berthold, O.1
Langos, H.2
-
8
-
-
0038684291
-
-
White paper, Zero Knowledge Systems, Inc., December
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom system 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
Freedom System 2.0 Architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
11
-
-
0003302799
-
The Free Haven Project: Distributed anonymous storage service
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed anonymous storage service. In H. Federrath, editor, Designing Privacy Enhancing Technologies; Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Designing Privacy Enhancing Technologies; Workshop on Design Issues in Anonymity and Unobservability
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
14
-
-
84957023357
-
Reliable MIX cascade networks through reputation
-
M. Blaze, editor, Springer-Verlag, LNCS 2357
-
R. Dingledine and P. Syverson. Reliable MIX Cascade Networks through Reputation. In M. Blaze, editor, Financial. Cryptography, 6th International Conference, FC2002, pages 253-268. Springer-Verlag, LNCS 2357, 2002.
-
(2002)
Financial. Cryptography, 6th International Conference, FC2002
, pp. 253-268
-
-
Dingledine, R.1
Syverson, P.2
-
16
-
-
84955557456
-
Hiding routing information
-
R. Anderson, editor. Springer-Verlag, LNCS 1174, May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
-
(1996)
Proceedings of Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
17
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
(extended abstract). A. Juels, editor. Springer-Verlag, LNCS 3110
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright. Timing attacks in low-latency mix-based systems (extended abstract). In A. Juels, editor, Financial. Cryptography, 8th International Conference, FC 2004, pages 251-265. Springer-Verlag, LNCS 3110, 2004.
-
(2004)
Financial. Cryptography, 8th International Conference, FC 2004
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
20
-
-
0028532812
-
Denial of service: An example
-
R. M. Needham. Denial of service: an example. Communications of the ACM, 37(11):42-46, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
21
-
-
33744794886
-
Non-expanding transaction specific pseudonymization for IP traffic monitoring
-
Springer-Verlag, LNCS 3810, December
-
L. Øverlier, T. Brekne, and A. Åmes. Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. In Cryptology and Network Security: 4th International Conference (CANS 2005), pages 261-273. Springer-Verlag, LNCS 3810, December 2005.
-
(2005)
Cryptology and Network Security: 4th International Conference (CANS 2005)
, pp. 261-273
-
-
Øverlier, L.1
Brekne, T.2
Åmes, A.3
-
24
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
E. Snekkenes and D. Gollmann, editors. Springer-Verlag, LNCS 2808, October
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In E. Snekkenes and D. Gollmann, editors, Computer Security - ESORICS 2003, pages 116-131. Springer-Verlag, LNCS 2808, October 2003.
-
(2003)
Computer Security - ESORICS 2003
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
25
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
26
-
-
84860033083
-
-
Tor Manual, http://tor.eff.org/tor-manual.html.en.
-
Tor Manual
-
-
-
27
-
-
84860036992
-
-
Torwiki
-
Torwiki. http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ.
-
-
-
-
30
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
IEEE CS Press, May
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. Defending anonymous communication against passive logging attacks. In IEEE Symposium on Security and Privacy, pages 28-41. IEEE CS Press, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
31
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
A preliminary version of this paper appeared in [29]
-
M. K. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [29].
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|