-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, editor, Information Hiding Workshop, of, Springer-Verlag, Apr
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding Workshop, volume 2137 of Lecture Notes in Computer Science, pages 245-247. Springer-Verlag, Apr. 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 245-247
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
2
-
-
79959681025
-
Low-resource routing attacks against Tor. In T. Yu, editor
-
November
-
K. Bauer, D. McCoy. D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against Tor. In T. Yu, editor, Workshop on Privacy in Electronic Society, pages 11-20, November 2007.
-
(2007)
Workshop on Privacy in Electronic Society
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
3
-
-
70349291847
-
-
S. M. Bellovin and D. A. Wagner, editors, May
-
S. M. Bellovin and D. A. Wagner, editors. IEEE Symposium on Security and Privacy, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
-
4
-
-
84963503600
-
-
O. Berthold, H. Federrath, and M. Köhntopp. Project anonymity and unobservability in the Internet. In L. Cranor, editor, Tenth conference on Computers, Freedom and Privacy, pages 57-65, New York, NY. USA, 2000. ACM.
-
O. Berthold, H. Federrath, and M. Köhntopp. Project "anonymity and unobservability in the Internet". In L. Cranor, editor, Tenth conference on Computers, Freedom and Privacy, pages 57-65, New York, NY. USA, 2000. ACM.
-
-
-
-
6
-
-
70349281177
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Wright and Syverson [52], pages 92-102.
-
Wright and Syverson
, vol.52
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
7
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
D. Culler and P. Druschel, editors, USENIX, Dec
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In D. Culler and P. Druschel, editors, Symposium on Operating Systems Design and Implementation, pages 299-314. USENIX, Dec. 2002.
-
(2002)
Symposium on Operating Systems Design and Implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
8
-
-
70349299597
-
Improving sender anonymity in a structured overlay with imprecise routing
-
G. Ciaccio. Improving sender anonymity in a structured overlay with imprecise routing. In Danezis and Golle [13], pages 190-207.
-
Danezis and Golle
, vol.13
, pp. 190-207
-
-
Ciaccio, G.1
-
9
-
-
84958740468
-
Mobius: An extensible tool for performance and dependability modeling
-
B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Schaumburg, IL, Mar, Springer
-
D. Daly, D. D. Deavours, J. M. Doyle, P. G. Webster, and W. H. Sanders. Mobius: An extensible tool for performance and dependability modeling. In B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Computer Performance Evaluation: Modelling Techniques and Tools, volume 1786, pages 332-336, Schaumburg, IL, Mar. 2000. Springer.
-
(2000)
Computer Performance Evaluation: Modelling Techniques and Tools
, vol.1786
, pp. 332-336
-
-
Daly, D.1
Deavours, D.D.2
Doyle, J.M.3
Webster, P.G.4
Sanders, W.H.5
-
10
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
and, editors, Athens, May, IFIP TC11, Kluwer
-
G. Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Gritzalis, Vimercati, Samarati, and Katsikas, editors, Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
Danezis, G.1
-
11
-
-
70349301122
-
Route fingerprinting in anonymous communications
-
IEEE Computer Society, Sept
-
G. Danezis and R. Clayton. Route fingerprinting in anonymous communications. In IEEE Conference on Peer-to-Peer Computing, pages 69-72. IEEE Computer Society, Sept. 2006.
-
(2006)
IEEE Conference on Peer-to-Peer Computing
, pp. 69-72
-
-
Danezis, G.1
Clayton, R.2
-
13
-
-
70349291848
-
Sixth Workshop on Privacy Enhancing Technologies
-
G. Danezis and P. Golle, editors, of, Cambridge, UK, June, Springer
-
G. Danezis and P. Golle, editors. Sixth Workshop on Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, Cambridge, UK, June 2006. Springer.
-
(2006)
Lecture Notes in Computer Science
, vol.4258
-
-
-
14
-
-
50249147866
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
N. Borisov and I. Goldberg, editors, Privacy Enhancing Technologies Symposium, of, Springer, July
-
G. Danezis and P. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In N. Borisov and I. Goldberg, editors, Privacy Enhancing Technologies Symposium, volume 5134 of Lecture Notes in Computer Science, pages 151-166. Springer, July 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.5134
, pp. 151-166
-
-
Danezis, G.1
Syverson, P.2
-
15
-
-
3242815149
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Dingledine and Syverson [17], pages 184-188.
-
Dingledine and Syverson
, vol.17
, pp. 184-188
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
M. Blaze, editor, USENIX Association, Aug
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In M. Blaze, editor, USENIX Security Symposium, pages 303-320. USENIX Association, Aug. 2004.
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
17
-
-
24944524538
-
Privacy Enhancing Technologies Workshop
-
R. Dingledine and P. Syverson, editors, of, Springer, April
-
R. Dingledine and P. Syverson, editors. Privacy Enhancing Technologies Workshop, volume 2482 of Lecture Notes in Computer Science. Springer, April 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
-
-
-
18
-
-
24944498611
-
-
Druschel et al, 19
-
J. Douceur. The Sybil Attack. In Druschel et al. [19], pages 251-260.
-
The Sybil Attack
, pp. 251-260
-
-
Douceur, J.1
-
19
-
-
70349298074
-
International Workshop on Peer-to-Peer Systems (IPTPS)
-
P. Druschel, F. Kaashoek, and A. Rowstron, editors, of, Springer, Mar
-
P. Druschel, F. Kaashoek, and A. Rowstron, editors. International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer-Science. Springer, Mar. 2002.
-
(2002)
Lecture Notes in Computer-Science
, vol.2429
-
-
-
20
-
-
84937611260
-
International Workshop on Design Issues in Anonymity and Unobservability
-
H. Federrath, editor, of, Springer, July
-
H. Federrath, editor. International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science. Springer, July 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
-
-
-
21
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
R. Sandhu, editor, New York, NY, USA, ACM
-
M. J, Freedman and R, Morris. Tarzan: A peer-to-peer anonymizing network layer. In R. Sandhu, editor, ACM Conference on Computer and Communications Security, pages 193-206, New York, NY, USA, 2002. ACM.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
22
-
-
70349298073
-
Tor at heart of embassy passwords leak
-
September 10
-
D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
-
(2007)
The Register
-
-
Goodin, D.1
-
24
-
-
35248866616
-
Koorde: A simple degree-optimal distributed hash table
-
F. Kaashoek and I. Stoica, editors. International Workshop on Peer-to-Peer Systems IPTPS, of, Springer, Feb
-
M. F. Kaashoek and D, R. Karger. Koorde: A simple degree-optimal distributed hash table. In F. Kaashoek and I. Stoica, editors. International Workshop on Peer-to-Peer Systems (IPTPS), volume 2735 of Lecture Notes in Computer Science, pages 98-107. Springer, Feb. 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2735
, pp. 98-107
-
-
Kaashoek, M.F.1
Karger, D.R.2
-
25
-
-
70349265715
-
-
A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In C. Cowan and G. Vigna, editors. Network and Distributed System Security Symposium, pages 61-79, Feb. 2008.
-
A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In C. Cowan and G. Vigna, editors. Network and Distributed System Security Symposium, pages 61-79, Feb. 2008.
-
-
-
-
26
-
-
35248900308
-
Limits of anonymity in open environments
-
F. A. Petitcolas, editor. Information Hiding Workshop, of, Springer-Verlag, October
-
D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. A. Petitcolas, editor. Information Hiding Workshop, volume 2578 of Lecture Notes in Computer Science, pages 53-69. Springer-Verlag, October 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 53-69
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
27
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, of, Springer, May
-
N. Mathewson and R. Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 17-24. Springer, May 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3424
, pp. 17-24
-
-
Mathewson, N.1
Dingledine, R.2
-
28
-
-
77951462266
-
AP3: Cooperative, decentralized anonymous communication
-
M. Castro, editor, ACM
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In M. Castro, editor, ACM SIGOPS European Workshop. ACM, 2004.
-
(2004)
ACM SIGOPS European Workshop
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
29
-
-
70349290301
-
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol-Version 2. IETF Internet Draft, July 2003
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol-Version 2. IETF Internet Draft, July 2003.
-
-
-
-
30
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
S. J. Murdoch. Hot or not: Revealing hidden services by their clock skew. In Wright and di Vimercati [51], pages 27-36.
-
Wright and di Vimercati
, vol.51
, pp. 27-36
-
-
Murdoch, S.J.1
-
31
-
-
27544454707
-
-
S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy, pages 183-195, May 2005.
-
S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy, pages 183-195, May 2005.
-
-
-
-
32
-
-
38149130456
-
Sampled traffic analysis by Internet-exchange-level adversaries
-
N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Symposium, of, Springer, June
-
S. J. Murdoch and P. Zielinski. Sampled traffic analysis by Internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, June 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
33
-
-
70349276454
-
-
A. Nambiar and M. Wright. The Salsa simulator. http: //ranger.uta.edu/ ̃mwright/code/salsa-sims.zip.
-
A. Nambiar and M. Wright. The Salsa simulator. http: //ranger.uta.edu/ ̃mwright/code/salsa-sims.zip.
-
-
-
-
34
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Wright and di Vimercati [51], pages 17-26.
-
Wright and di Vimercati
, vol.51
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
35
-
-
70349281176
-
-
P. Palfrader. Number of running Tor routers
-
P. Palfrader. Number of running Tor routers.
-
-
-
-
36
-
-
65549153230
-
News briefs
-
April
-
L. D. Paulson. News briefs. IEEE Computer, 39(4): 17-19, April 2006.
-
(2006)
IEEE Computer
, vol.39
, Issue.4
, pp. 17-19
-
-
Paulson, L.D.1
-
37
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Federrath [20], pages 10-29.
-
In Federrath
, vol.20
, pp. 10-29
-
-
Raymond, J.-F.1
-
39
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
-
Washington, DC, USA, November
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection. In Workshop on Privacy in Electronic Society, pages 91-102, Washington, DC, USA, November 2002.
-
(2002)
Workshop on Privacy in Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
40
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
G. Goos, J. Hartmanis, and J. van Leeuwen, editors, IFIP/ACM International Conference on Distributed Systems Platforms Middleware, of, Springer. Nov
-
A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In G. Goos, J. Hartmanis, and J. van Leeuwen, editors, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), volume 2218 of Lecture Notes in Computer Science, pages 329-350. Springer. Nov. 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
42
-
-
85091906531
-
Towards application-aware anonymous routing
-
T. Jaeger, editor, USENIX Association, Aug
-
M. Sherr, B. T. Loo, and M. Blaze. Towards application-aware anonymous routing. In T. Jaeger, editor, Workshop on Hot Topics in Security. USENIX Association, Aug. 2007.
-
(2007)
Workshop on Hot Topics in Security
-
-
Sherr, M.1
Loo, B.T.2
Blaze, M.3
-
44
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for Internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, ll(l):17-32, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.100
, Issue.L
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
45
-
-
0038311861
-
Towards an analysis of onion routing security
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In Federrath [20], pages 96-114.
-
In Federrath
, vol.20
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
46
-
-
70349296537
-
Breaking the collusion detection mechanism of MorphMix
-
P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In Danezis and Golle [13], pages 368-383.
-
Danezis and Golle
, vol.13
, pp. 368-383
-
-
Tabriz, P.1
Borisov, N.2
-
47
-
-
3242703749
-
A survey of peer-to-peer security issues
-
M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, International Symposium on Software Security, of, Springer
-
D. Wallach. A survey of peer-to-peer security issues. In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, International Symposium on Software Security, volume 2609 of Lecture Notes in Computer Science, pages 253-258. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2609
, pp. 253-258
-
-
Wallach, D.1
-
48
-
-
70349301121
-
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In P. van oorschot and V. Gligor, editors, Network and Distributed System Security Symposium, pages 39-50. Feb. 2002.
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In P. van oorschot and V. Gligor, editors, Network and Distributed System Security Symposium, pages 39-50. Feb. 2002.
-
-
-
-
49
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. Defending anonymous communication against passive logging attacks. In Bellovin and Wagner [3], pages 28-41.
-
Bellovin and Wagner
, vol.3
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
50
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
November
-
M. Wrright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security, 4(7):489-522, November 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.4
, Issue.7
, pp. 489-522
-
-
Wrright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
51
-
-
70349274939
-
-
R. Wright and S. D. C. di Vimercati, editors, New York, NY, USA, Oct, ACM
-
R. Wright and S. D. C. di Vimercati, editors. The 13th ACM Conference on Computer and Communications Security, New York, NY, USA, Oct. 2006. ACM.
-
(2006)
The 13th ACM Conference on Computer and Communications Security
-
-
-
52
-
-
70349285733
-
-
R. Wright and P. Syverson, editors, New York, NY, USA, ACM
-
R. Wright and P. Syverson, editors. The U,th ACM Conference on Computer and Communications Security, New York, NY, USA, 2007. ACM.
-
(2007)
The U,th ACM Conference on Computer and Communications Security
-
-
|