-
1
-
-
50249119735
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
De Capitani di Vimercati, S, Syverson, P, Evans, D, eds, ACM Press, New York
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: De Capitani di Vimercati, S., Syverson, P., Evans, D. (eds.) CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92-102. ACM Press, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
2
-
-
34547239349
-
Freedom systems 2.0 architecture
-
December
-
Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (December 2000)
-
(2000)
White paper, Zero Knowledge Systems, Inc
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
70349301122
-
Route fingerprinting in anonymous communications
-
P, IEEE Computer Society Press, Los Alamitos
-
Danezis, G., Clayton, R.: Route fingerprinting in anonymous communications. In: Sixth IEEE International Conference on Peer-to-Peer Computing, P2P 2006, pp. 69-72. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Sixth IEEE International Conference on Peer-to-Peer Computing
-
-
Danezis, G.1
Clayton, R.2
-
5
-
-
84957800033
-
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-319. USENIX Association (2004)
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-319. USENIX Association (2004)
-
-
-
-
7
-
-
50249115176
-
A probabilistic analysis of onion routing in a black-box model
-
Yu, T, ed, ACM Press, New York
-
Feigenbaum, J., Johnson, A., Syverson, P.: A probabilistic analysis of onion routing in a black-box model. In: Yu, T. (ed.) WPES 2007: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, pp. 1-10. ACM Press, New York (2007)
-
(2007)
WPES 2007: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society
, pp. 1-10
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.3
-
8
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Atluri, V, ed, November, ACM Press, New York () 2002
-
Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Atluri, V. (ed.) Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, November 2002, pp. 193-206. ACM Press, New York (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
9
-
-
84910595881
-
Introducing Tarzan, a peer-to-peer anonymizing network layer
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing Tarzan, a peer-to-peer anonymizing network layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 121-129. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 121-129
-
-
Freedman, M.J.1
Sit, E.2
Cates, J.3
Morris, R.4
-
10
-
-
84955557456
-
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 137-150. Springer, Heidelberg (1996)
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
-
-
-
-
11
-
-
38149130456
-
-
Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007, 4776, pp. 167-183. Springer, Heidelberg (2007)
-
Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007, vol. 4776, pp. 167-183. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
34547281136
-
-
Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, October 2006, pp. 17-26. ACM Press, New York (2006)
-
Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, October 2006, pp. 17-26. ACM Press, New York (2006)
-
-
-
-
13
-
-
33750277833
-
Locating hidden servers
-
May, IEEE Computer Society Press, Los Alamitos () 2006
-
Øverlier, L., Syverson, P.: Locating hidden servers. In: IEEE Symposium on Security and Privacy (S&P 2006), May 2006, pp. 100-114. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
IEEE Symposium on Security and Privacy (S&P
, pp. 100-114
-
-
Øverlier, L.1
Syverson, P.2
-
15
-
-
35048897629
-
-
Rennhard, M., Plattner, B.: Practical anonymity for the masses with morphmix. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 233-250. Springer, Heidelberg (2004)
-
Rennhard, M., Plattner, B.: Practical anonymity for the masses with morphmix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 233-250. Springer, Heidelberg (2004)
-
-
-
-
16
-
-
84957802536
-
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
-
-
-
17
-
-
35248841429
-
-
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 36-52. Springer, Heidelberg (2003)
-
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 36-52. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
19
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security 12(3-4), 355-377 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
20
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw. 11(1), 17-32 (2003)
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
21
-
-
84961707899
-
Onion Routing access configurations
-
IEEE Computer Society Press, Los Alamitos
-
Syverson, P., Reed, M., Goldschlag, D.: Onion Routing access configurations. In: Proceedings of the DARPA Information Survivability Conference & Exposition, DISCEX 2000, vol. 1, pp. 34-40. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proceedings of the DARPA Information Survivability Conference & Exposition, DISCEX
, vol.1
, pp. 34-40
-
-
Syverson, P.1
Reed, M.2
Goldschlag, D.3
-
22
-
-
84937565289
-
Towards an analysis of onion routing security
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
23
-
-
50249163851
-
-
Venkitasubramaniam, P., He, T., Tong, L.: Anonymous networking amidst eavesdroppers (October 2007) arXiv:0710.4903v1 at arxiv.org
-
Venkitasubramaniam, P., He, T., Tong, L.: Anonymous networking amidst eavesdroppers (October 2007) arXiv:0710.4903v1 at arxiv.org
-
-
-
-
24
-
-
0038148416
-
Defending anonymous communication against passive logging attacks. In: 2003 IEEE Symposium on Security and Privacy, May 2003
-
Los Alamitos
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 28-43. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Computer Society Press
, pp. 28-43
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
25
-
-
14544273666
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC) 4(7), 489-522 (2004)
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.7
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
26
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
USENIX Association
-
Zhuang, L., Zhou, F., Zhao, B.Y., Rowstron, A.I.T.: Cashmere: Resilient anonymous routing. In: 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), pp. 301-314. USENIX Association (2005)
-
(2005)
2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI
, pp. 301-314
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.I.T.4
|