-
1
-
-
84955557456
-
Hiding routing information
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Hiding routing information," in Information Hiding: First International Workshop, Proceedings, 1996, pp. 137-150.
-
(1996)
Information Hiding: First International Workshop, Proceedings
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
2
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
3
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association, August
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in Proceedings of the 13th USENIX Security Symposium. USENIX Association, August 2004, pp. 303-319.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
4
-
-
84937565289
-
Towards an analysis of onion routing security
-
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer-Verlag, July
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an analysis of onion routing security," in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer-Verlag, LNCS 2009, July 2000, pp. 96-114.
-
(2000)
LNCS
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
5
-
-
1542302145
-
I'm OK if you're OK: On the notion of trusting communication
-
November
-
R. Fagin and J. Y. Halpern, "I'm OK if you're OK: On the notion of trusting communication," Journal of Philosophical Logic, vol. 17, no. 4, pp. 329-354, November 1988.
-
(1988)
Journal of Philosophical Logic
, vol.17
, Issue.4
, pp. 329-354
-
-
Fagin, R.1
Halpern, J.Y.2
-
6
-
-
84974759626
-
The role of trust in information integrity protocols
-
G. J. Simmons and C. Meadows, "The role of trust in information integrity protocols," Journal of Computer Security, vol. 3, no. 1, pp. 71-84, 1994/1995.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 71-84
-
-
Simmons, G.J.1
Meadows, C.2
-
7
-
-
0029700344
-
-
M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, in In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996, pp. 164-173.
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996, pp. 164-173.
-
-
-
-
8
-
-
0031637195
-
On SDSIs linked local name spaces
-
M. Abadi, "On SDSIs linked local name spaces," Journal of Computer Security, vol. 6, no. 1/2, pp. 2-22, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 2-22
-
-
Abadi, M.1
-
9
-
-
0034823078
-
A state-transition model of trust management and access control
-
IEEE Computer Society
-
A. Chander, J. C. Mitchell, and D. Dean, "A state-transition model of trust management and access control," in Proceedings of the 14th IEEE Computer Security Foundations Workshop, CSFW '01. IEEE Computer Society, 2001, pp. 27-43.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop, CSFW '01
, pp. 27-43
-
-
Chander, A.1
Mitchell, J.C.2
Dean, D.3
-
10
-
-
11944249167
-
Reputation-based trust management
-
V. Shmatikov and C. Talcott, "Reputation-based trust management," Journal of Computer Security, vol. 13, no. 1, pp. 167-190, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 167-190
-
-
Shmatikov, V.1
Talcott, C.2
-
11
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Online, Available
-
A. J. sang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8S-4GJK82P-1/2/ a9a6e96414fa04641c1d31a57989618d
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
sang, A.J.1
Ismail, R.2
Boyd, C.3
-
12
-
-
34748852515
-
Trust management services in relational databases
-
New York, NY, USA: ACM
-
S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Trust management services in relational databases," in ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security. New York, NY, USA: ACM, 2007, pp. 149-160.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
, pp. 149-160
-
-
De Capitani di Vimercati, S.1
Jajodia, S.2
Paraboschi, S.3
Samarati, P.4
-
13
-
-
70350555463
-
-
The Tor project home page
-
"The Tor project home page," https://www.torproject.org/.
-
-
-
-
15
-
-
79959681025
-
Low-resource routing attacks against tor
-
T. Yu, Ed. ACM Press, October
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Low-resource routing attacks against tor," in WPES'07: Proceedings of the Workshop on Privacy in the Electronic Society, T. Yu, Ed. ACM Press, October 2007, pp. 11-20.
-
(2007)
WPES'07: Proceedings of the Workshop on Privacy in the Electronic Society
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
17
-
-
35248878897
-
On the economics of anonymity
-
Financial Cryptography, 7th International Conference, FC 2003, R. N. Wright, Ed. Springer-Verlag
-
A. Acquisti, R. Dingledine, and P. Syverson, "On the economics of anonymity," in Financial Cryptography, 7th International Conference, FC 2003, R. N. Wright, Ed. Springer-Verlag, LNCS 2742, 2003, pp. 84-102.
-
(2003)
LNCS
, vol.2742
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
20
-
-
50249119735
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
S. D. C. di Vimercati, P. Syverson, and D. Evans, Eds, October
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, "Denial of service or denial of security? How attacks on reliability can compromise anonymity," in CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security, S. D. C. di Vimercati, P. Syverson, and D. Evans, Eds., October 2007, pp. 92-102.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
21
-
-
70349692738
-
How much anonymity does network latency leak?
-
S. De Capitani di Vimercati, P. Syverson, and D. Evans, Eds. ACM Press
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin, "How much anonymity does network latency leak?" in CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security, S. De Capitani di Vimercati, P. Syverson, and D. Evans, Eds. ACM Press, 2007, pp. 82-91.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
22
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
Privacy Enhancing Technologies: Second International Workshop, PET 2002, R. Dingledine and P. Syverson, Eds. San Francisco, CA, USA: Springer-Verlag, April
-
A. Hintz, "Fingerprinting websites using traffic analysis," in Privacy Enhancing Technologies: Second International Workshop, PET 2002, R. Dingledine and P. Syverson, Eds. San Francisco, CA, USA: Springer-Verlag, LNCS 2482, April 2002, pp. 171-178.
-
(2002)
LNCS
, vol.2482
, pp. 171-178
-
-
Hintz, A.1
-
23
-
-
34547350876
-
-
M. Liberatore and B. N. Levine, Inferring the source of encrypted HTTP connections, in CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, Eds. ACM Press, 2006, pp. 255-263.
-
M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, Eds. ACM Press, 2006, pp. 255-263.
-
-
-
-
24
-
-
50249115176
-
Probabilistic analysis of onion routing in a black-box model [extended abstract]
-
T. Yu, Ed. ACM Press, October
-
J. Feigenbaum, A. Johnson, and P. Syverson, "Probabilistic analysis of onion routing in a black-box model [extended abstract]," in WPES'07: Proceedings of the Workshop on Privacy in the Electronic Society, T. Yu, Ed. ACM Press, October 2007, pp. 1-10.
-
(2007)
WPES'07: Proceedings of the Workshop on Privacy in the Electronic Society
, pp. 1-10
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.3
-
25
-
-
20444439634
-
Location diversity in anonymity networks
-
S. De Capitani di Vimercati and P. Syverson, Eds
-
N. Feamster and R. Dingledine, "Location diversity in anonymity networks," in Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004), S. De Capitani di Vimercati and P. Syverson, Eds., 2004, pp. 66-76.
-
(2004)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)
, pp. 66-76
-
-
Feamster, N.1
Dingledine, R.2
-
26
-
-
38149130456
-
Sampled traffic analysis by internet-exchange-level adversaries
-
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies PET 2007, N. Borisov and P. Golle, Eds. Ottawa, Canada: Springer-Verlag, June
-
S. J. Murdoch and P. Zieliński, "Sampled traffic analysis by internet-exchange-level adversaries," in Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), N. Borisov and P. Golle, Eds. Ottawa, Canada: Springer-Verlag, LNCS 4776, June 2007.
-
(2007)
LNCS
, vol.4776
-
-
Murdoch, S.J.1
Zieliński, P.2
-
27
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. Reiter and A. Rubin, "Crowds: Anonymity for web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
|