-
1
-
-
56649091597
-
-
The TOR Project
-
The TOR Project, http://www.torproject.org/
-
-
-
-
2
-
-
56649083956
-
-
TorFlow, https://www.torproject.org/svn/torflow/README
-
TorFlow
-
-
-
3
-
-
84947242344
-
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
-
-
-
-
4
-
-
79959681025
-
Low-resource routing attacks against tor
-
Washington, DC, USA October
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
5
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30-45. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
6
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
October
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: Proceedings of CCS 2007 (October 2007)
-
(2007)
Proceedings of CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Febuary
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (Febuary 1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
8
-
-
33744479345
-
-
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pp. 46-66 (2000)
-
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pp. 46-66 (2000)
-
-
-
-
9
-
-
24344460554
-
-
Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 35-50. Springer, Heidelberg (2005)
-
Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 35-50. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
0037810717
-
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15 (2003)
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15 (2003)
-
-
-
-
11
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
-
-
-
-
13
-
-
84955557456
-
Hiding routing information
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137-150 (1996)
-
(1996)
Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
14
-
-
24344478834
-
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
34547281136
-
-
Nambiar, A., Wright, M.: Salsa: A Structured Approach to Large-Scale Anonymity. In: Proceedings of CCS 2006 (October 2006)
-
Nambiar, A., Wright, M.: Salsa: A Structured Approach to Large-Scale Anonymity. In: Proceedings of CCS 2006 (October 2006)
-
-
-
-
17
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
19
-
-
20444437836
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
Washington, DC, USA November
-
Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA (November 2002)
-
(2002)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES
-
-
Rennhard, M.1
Plattner, B.2
-
20
-
-
84874954212
-
-
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)
-
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)
-
-
-
-
22
-
-
84873857575
-
Cashmere: Resilient Anonymous Routing
-
Boston, MA, May, ACM/USENIX
-
Zhuang, L., Zhou, F., Zhao, B.Y., Rowstron, A.: Cashmere: Resilient Anonymous Routing. In: Proc. of NSDI, Boston, MA, May 2005, ACM/USENIX (2005)
-
(2005)
Proc. of NSDI
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.4
|