-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2) (February 1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
2
-
-
84943605031
-
Practical Onion Hacking: Find the real address of Tor clients
-
October
-
Christensen, A., et al.: Practical Onion Hacking: Find the real address of Tor clients. FortConsult (October 2006), http://www.fortconsult.net/images/ pdf/Practical_Onion_Hacking. pdf
-
(2006)
FortConsult
-
-
Christensen, A.1
-
6
-
-
84947273682
-
The Sybil Attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
-
-
Douceur, J.1
-
7
-
-
38149092212
-
-
Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 229-233. Springer, Heidelberg (2003)
-
Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 229-233. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
33846288517
-
Timing Attacks in Low-Latency Mix Systems (extended abstract)
-
Juels, A, ed, FC, Springer, Heidelberg
-
Levine, B.N., Reiter, M., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix Systems (extended abstract). In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
10
-
-
38149098250
-
AOL search data identified individuals
-
August
-
Martin, K.: AOL search data identified individuals. SecurityFocus (August 2006), http://www.securityfocus.com/brief/277
-
(2006)
SecurityFocus
-
-
Martin, K.1
-
13
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Raymond, J.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
14
-
-
0142250280
-
Passive Attack Analysis for Connection-Based Anonymity Systems
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Serjantov, A., Sewell, P.: Passive Attack Analysis for Connection-Based Anonymity Systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
15
-
-
84937565289
-
Towards an Analysis of Onion Routing Security
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
16
-
-
85180737609
-
An Analysis of the Degradation of Anonymous Protocols
-
February
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: An Analysis of the Degradation of Anonymous Protocols. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), pp. 38-50 (February 2002)
-
(2002)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)
, pp. 38-50
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
17
-
-
0038148416
-
Defending Anonymous Communication Against Passive Logging Attacks
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy (May
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
18
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. In: ACM Trans. Inf. Syst. Secur., pp. 489-522 (2004)
-
(2004)
ACM Trans. Inf. Syst. Secur
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
19
-
-
38149022331
-
-
Squires, S.: Firefox Add-ons: Torbutton (February 2007), https://addons.mozilla.org/firefox/2275/
-
Squires, S.: Firefox Add-ons: Torbutton (February 2007), https://addons.mozilla.org/firefox/2275/
-
-
-
-
20
-
-
38149072095
-
-
TheOnionRouter/TorFAQ (November 2006), http://wiki.noreply.org/noreply/ TheOnionRouter/TorFAQ
-
TheOnionRouter/TorFAQ (November 2006), http://wiki.noreply.org/noreply/ TheOnionRouter/TorFAQ
-
-
-
|