-
1
-
-
0038650844
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the IH, 2001.
-
(2001)
Proceedings of the IH
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
4
-
-
34547319583
-
-
PhD thesis, University of California at Berkeley, Berkeley, CA, USA
-
N. Borisov. Anonymous routing in structured peer-to-peer overlays. PhD thesis, University of California at Berkeley, Berkeley, CA, USA, 2005.
-
(2005)
Anonymous routing in structured peer-to-peer overlays
-
-
Borisov, N.1
-
5
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
October
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS, October 2007.
-
(2007)
Proceedings of CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
6
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of OSDI, December 2002.
-
(2002)
Proceedings of OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
7
-
-
84958740468
-
Möbius: An extensible tool for performance and dependability modeling
-
B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Schaumburg, IL, Mar, Springer
-
D. Daly, D. D. Deavours, J. M. Doyle, P. G. Webster, and W. H. Sanders. Möbius: An extensible tool for performance and dependability modeling. In B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Computer Performance Evaluation: Modelling Techniques and Tools, volume 1786, pages 332-336, Schaumburg, IL, Mar. 2000. Springer.
-
(2000)
Computer Performance Evaluation: Modelling Techniques and Tools
, vol.1786
, pp. 332-336
-
-
Daly, D.1
Deavours, D.D.2
Doyle, J.M.3
Webster, P.G.4
Sanders, W.H.5
-
8
-
-
35248866624
-
Mix-networks with restricted routes
-
R. Dingledine, editor, Proceedings of PET, Springer-Verlag, March
-
G. Danezis. Mix-networks with restricted routes. In R. Dingledine, editor, Proceedings of PET, pages 1-17. Springer-Verlag, LNCS 2760, March 2003.
-
(2003)
LNCS
, vol.2760
, pp. 1-17
-
-
Danezis, G.1
-
10
-
-
0037810717
-
Mixminion: Design of a Type III Anonymous Remailer Protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of S & P, pages 2-15, May 2003.
-
(2003)
Proceedings of S & P
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
11
-
-
33646038920
-
Sybil-resistant dht routing
-
G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. J. Anderson. Sybil-resistant dht routing. In Proceedings of ESORICS, pages 305-318, 2005.
-
(2005)
Proceedings of ESORICS
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.J.4
-
12
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. In Proceedings of NDSS, 2009.
-
(2009)
Proceedings of NDSS
-
-
Danezis, G.1
Mittal, P.2
-
13
-
-
74049122156
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
Leuven, Belgium, July
-
G. Danezis and P. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of PET, Leuven, Belgium, July 2008.
-
(2008)
Proceedings of PET
-
-
Danezis, G.1
Syverson, P.2
-
15
-
-
84957800033
-
Towards measuring anonymity
-
R. Dingledine and P. Syverson, editors, Proceedings of PET, San Diego, CA, April, Springer-Verlag
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of PET, San Diego, CA, April 2002. Springer-Verlag, LNCS 2482.
-
(2002)
LNCS
, vol.2482
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
18
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Washington, DC, November
-
M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of CCS, Washington, DC, November 2002.
-
(2002)
Proceedings of CCS
-
-
Freedman, M.J.1
Morris, R.2
-
19
-
-
70349298073
-
Tor at heart of embassy passwords leak
-
September 10
-
D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
-
(2007)
The Register
-
-
Goodin, D.1
-
20
-
-
4544382846
-
King: Estimating latency between arbitrary internet end hosts
-
K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: estimating latency between arbitrary internet end hosts. SIGCOMM CCR., 32(3):11-11, 2002.
-
(2002)
SIGCOMM CCR
, vol.32
, Issue.3
, pp. 11-11
-
-
Gummadi, K.P.1
Saroiu, S.2
Gribble, S.D.3
-
21
-
-
54049088801
-
Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peer publishing systems
-
Cambridge, MA, Mar
-
S. Hazel and B. Wiley. Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peer publishing systems. In Proceedings of IPTPS, Cambridge, MA, Mar. 2002.
-
(2002)
Proceedings of IPTPS
-
-
Hazel, S.1
Wiley, B.2
-
22
-
-
85180784621
-
Halo: High-assurance locate for distributed hash tables
-
February
-
A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In Proceedings of NDSS, pages 61-79, February 2008.
-
(2008)
Proceedings of NDSS
, pp. 61-79
-
-
Kapadia, A.1
Triandopoulos, N.2
-
23
-
-
55849153186
-
A sybilproof distributed identity management for p2p networks
-
F. Lesueur, L. Me, and V. V. T. Tong. A sybilproof distributed identity management for p2p networks. In Computers and Communications, 2008. ISCC 2008. IEEE Symposium on, pages 246-253, 2008.
-
(2008)
Computers and Communications, 2008. ISCC 2008. IEEE Symposium on
, pp. 246-253
-
-
Lesueur, F.1
Me, L.2
Tong, V.V.T.3
-
24
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
A. Juels, editor, Proceedings of FC, Springer-Verlag, February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of FC, pages 251-265. Springer-Verlag, LNCS 3110, February 2004.
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
26
-
-
74049120310
-
Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes
-
January
-
J. McLachlan and N. Hopper. Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes. In Proceedings of FC, January 2008.
-
(2008)
Proceedings of FC
-
-
McLachlan, J.1
Hopper, N.2
-
27
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. Merkle. Protocols for public key cryptosystems. In Proceedings of S & P, pages 122-133, 1980.
-
(1980)
Proceedings of S & P
, pp. 122-133
-
-
Merkle, R.1
-
28
-
-
77951462266
-
AP3: Cooperative, decentralized anonymous communication
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In Proceedings of the ACM SIGOPS European Workshop, 2004.
-
(2004)
Proceedings of the ACM SIGOPS European Workshop
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
29
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication
-
October
-
P. Mittal and N. Borisov. Information leaks in structured peer-to-peer anonymous communication. In Proceedings of CCS, October 2008.
-
(2008)
Proceedings of CCS
-
-
Mittal, P.1
Borisov, N.2
-
30
-
-
74049085662
-
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol, Version 2. IETF Internet Draft, July 2003
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol - Version 2. IETF Internet Draft, July 2003.
-
-
-
-
33
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
New York, NY, USA, ACM
-
A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Proceedings of CCS, pages 17-26, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of CCS
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
35
-
-
74049154029
-
-
T. T. Project. Torstatus-tor network status. http://torstatus.kgprog.com/ .
-
T. T. Project. Torstatus-tor network status. http://torstatus.kgprog.com/ .
-
-
-
-
36
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 10-29
-
-
Raymond, J.-F.1
-
37
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
June
-
M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1), June 1998.
-
(1998)
ACM TISSEC
, vol.1
, Issue.1
-
-
Reiter, M.1
Rubin, A.2
-
38
-
-
20444437836
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
Washington, DC, USA, November
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Proceedings of WPES, Washington, DC, USA, November 2002.
-
(2002)
Proceedings of WPES
-
-
Rennhard, M.1
Plattner, B.2
-
39
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
November
-
A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Middleware, pages 329-350, November 2001.
-
(2001)
Middleware
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
41
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of PET, 2002.
-
(2002)
Proceedings of PET
-
-
Serjantov, A.1
Danezis, G.2
-
42
-
-
70349301114
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
September
-
V. Shmatikov and M.-H. Wang. Timing analysis in low-latency mix networks: Attacks and defenses. In Proceedings of ESORICS, September 2006.
-
(2006)
Proceedings of ESORICS
-
-
Shmatikov, V.1
Wang, M.-H.2
-
43
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables
-
London, UK, Springer-Verlag
-
E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS, pages 261-269, London, UK, 2002. Springer-Verlag.
-
(2002)
IPTPS
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
44
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw., 11(1):17-32, 2003.
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
45
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
46
-
-
0030676973
-
Anonymous connections and onion routing
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. Security & Privacy, IEEE, 4-7:44-54, 1997.
-
(1997)
Security & Privacy, IEEE
, vol.4-7
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
47
-
-
77049097177
-
Breaking the collusion detection mechanism of MorphMix
-
G. Danezis and P. Golle, editors, Cambridge, UK, June, Springer
-
P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In G. Danezis and P. Golle, editors, Proceedings of PET, pages 368-384, Cambridge, UK, June 2006. Springer.
-
(2006)
Proceedings of PET
, pp. 368-384
-
-
Tabriz, P.1
Borisov, N.2
-
49
-
-
74049141616
-
Bt admits misleading customers over Phorm experiments
-
March 17
-
C. Williams. Bt admits misleading customers over Phorm experiments. The Register, March 17 2008.
-
(2008)
The Register
-
-
Williams, C.1
-
52
-
-
40049087740
-
Passive logging attacks against anonymous communications
-
May
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. Passive logging attacks against anonymous communications. ACM TISSEC, 11(2), May 2008.
-
(2008)
ACM TISSEC
, vol.11
, Issue.2
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
53
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
P
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proceedings of S & P, 2008.
-
Proceedings of S &
, pp. 2008
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
54
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM CCR., 36(4):267-278, 2006.
-
(2006)
SIGCOMM CCR
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
55
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of PET, 2004.
-
(2004)
Proceedings of PET
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|