-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Proceedings of Information Hiding Workshop IH 2001, April, I. S. Moskowitz, Ed, Springer-Verlag
-
BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of Information Hiding Workshop (IH 2001) (April 2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245-257.
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
BACK, A.1
MÖLLER, U.2
STIGLIC, A.3
-
2
-
-
35248893039
-
GAP - practical anonymous networking
-
Proceedings of Privacy Enhancing Technologies workshop PET 2003, March, R. Dingledine, Ed, Springer-Verlag
-
BENNETT, K., AND GROTHOFF, C. GAP - practical anonymous networking. In Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (March 2003), R. Dingledine, Ed., Springer-Verlag, LNCS 2760, pp. 141-160.
-
(2003)
LNCS
, vol.2760
, pp. 141-160
-
-
BENNETT, K.1
GROTHOFF, C.2
-
3
-
-
84957805506
-
Dummy traffic against long term intersection attacks
-
Proceedings of Privacy Enhancing Technologies workshop PET 2002, April, R. Dingledine and P. Syverson, Eds, Springer-Verlag
-
BERTHOLD, O., AND LANGOS, H. Dummy traffic against long term intersection attacks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2002) (April 2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482.
-
(2002)
LNCS
, vol.2482
-
-
BERTHOLD, O.1
LANGOS, H.2
-
4
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
October
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS 2007 (October 2007).
-
(2007)
Proceedings of CCS 2007
-
-
BORISOV, N.1
DANEZIS, G.2
MITTAL, P.3
TABRIZ, P.4
-
5
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
New York, NY, USA, ACM, pp
-
CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. Secure routing for structured peer-to-peer overlay networks. In OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation (New York, NY, USA, 2002), ACM, pp. 299-314.
-
(2002)
OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
, pp. 299-314
-
-
CASTRO, M.1
DRUSCHEL, P.2
GANESH, A.3
ROWSTRON, A.4
WALLACH, D.S.5
-
6
-
-
60349122307
-
Identifying proxy nodes in a tor anonymization circuit
-
Washington, DC, USA, IEEE Computer Society, pp
-
CHAKRAVARTY, S., STAVROU, A., AND KEROMYTIS, A. D. Identifying proxy nodes in a tor anonymization circuit. In SITIS '08: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems (Washington, DC, USA, 2008), IEEE Computer Society, pp. 633-639.
-
(2008)
SITIS '08: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
, pp. 633-639
-
-
CHAKRAVARTY, S.1
STAVROU, A.2
KEROMYTIS, A.D.3
-
7
-
-
47949109162
-
-
CIACCIO, G. Improving sender anonymity in a structured overlay with imprecise routing. In Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006) (Cambridge, UK, June 2006), G. Danezis and P. Golle, Eds., Springer, pp. 190-207.
-
CIACCIO, G. Improving sender anonymity in a structured overlay with imprecise routing. In Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006) (Cambridge, UK, June 2006), G. Danezis and P. Golle, Eds., Springer, pp. 190-207.
-
-
-
-
8
-
-
74049134136
-
-
CLAYTON, R. A Few Design Critiques. at 3rd Workshop on Privacy Enhancing Technologies, 2003.
-
CLAYTON, R. A Few Design Critiques. at 3rd Workshop on Privacy Enhancing Technologies, 2003.
-
-
-
-
9
-
-
1642367651
-
-
online essay:, 1994, */http://obscura.com/~loki/remailer-essay.html
-
COTTRELL, L. Mixmaster and remailer attacks. online essay: http://web.archive.org/web/*/http: //obscura.com/~loki/remailer-essay. html, 1994.
-
Mixmaster and remailer attacks
-
-
COTTRELL, L.1
-
10
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
Athens, May, and, Eds, IFIP TC11, Kluwer, pp
-
DANEZIS, G. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) (Athens, May 2003), Gritzalis, Vimercati, Samarati, and Katsikas, Eds., IFIP TC11, Kluwer, pp. 421-426.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
DANEZIS, G.1
-
11
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Proceedings of Privacy Enhancing Technologies workshop PET 2004, May of
-
DANEZIS, G. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004) (May 2004), vol. 3424 of LNCS, pp. 35-50.
-
(2004)
LNCS
, vol.3424
, pp. 35-50
-
-
DANEZIS, G.1
-
12
-
-
70349301122
-
Route fingerprinting in anonymous communications
-
Washington, DC, USA, IEEE Computer Society, pp
-
DANEZIS, G., AND CLAYTON, R. Route fingerprinting in anonymous communications. In P2P '06: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (Washington, DC, USA, 2006), IEEE Computer Society, pp. 69-72.
-
(2006)
P2P '06: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
, pp. 69-72
-
-
DANEZIS, G.1
CLAYTON, R.2
-
13
-
-
35048895319
-
Statistical disclosure or intersection attacks on anonymity systems
-
Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
-
DANEZIS, G., AND SERJANTOV, A. Statistical disclosure or intersection attacks on anonymity systems. In Proceedings of 6th Information Hiding Workshop (IH 2004) (Toronto, May 2004), LNCS.
-
(2004)
LNCS
-
-
DANEZIS, G.1
SERJANTOV, A.2
-
14
-
-
74049083463
-
-
DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 133-150.
-
DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 133-150.
-
-
-
-
16
-
-
20444439634
-
Location diversity in anonymity networks
-
Washington, DC, USA, October
-
FEAMSTER, N., AND DINGLEDINE, R. Location diversity in anonymity networks. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004) (Washington, DC, USA, October 2004).
-
(2004)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)
-
-
FEAMSTER, N.1
DINGLEDINE, R.2
-
17
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
New York, NY, USA, ACM Press, pp
-
FREEDMAN, M. J., AND MORRIS, R. Tarzan: a peer-to-peer anonymizing network layer. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security (New York, NY, USA, 2002), ACM Press, pp. 193-206.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 193-206
-
-
FREEDMAN, M.J.1
MORRIS, R.2
-
18
-
-
85031542311
-
Mixing E-mail with Babel
-
February, IEEE, pp
-
GÜLCÜ, C., AND TSUDIK, G. Mixing E-mail with Babel. In Proceedings of the Network and Distributed Security Symposium - NDSS '96 (February 1996), IEEE, pp. 2-16.
-
(1996)
Proceedings of the Network and Distributed Security Symposium - NDSS '96
, pp. 2-16
-
-
GÜLCÜ, C.1
TSUDIK, G.2
-
19
-
-
70349692738
-
How much anonymity does network latency leak?
-
New York, NY, USA, ACM, pp
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN - TIN, E. How much anonymity does network latency leak? In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), ACM, pp. 82-91.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 82-91
-
-
HOPPER, N.1
VASSERMAN, E.Y.2
CHAN3
TIN, E.4
-
21
-
-
35248900308
-
Limits of anonymity in open environments
-
Proceedings of Information Hiding Workshop IH 2002, October, F. Petitcolas, Ed, Springer-Verlag
-
KESDOGAN, D., AGRAWAL, D., AND PENZ, S. Limits of anonymity in open environments. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
-
(2002)
LNCS
, vol.2578
-
-
KESDOGAN, D.1
AGRAWAL, D.2
PENZ, S.3
-
22
-
-
74049141876
-
-
LANDSIEDEL, O., PIMENIDIS, L., WEHRLE, K., NIEDERMAYER, H., AND CARLE, G. Core: A Peer-To-Peer Based Connectionless Onion Router. In Proceedings of IEEE GLOBECOM, Globalcommunications Conference (Washington DC, USA, November 2007).
-
LANDSIEDEL, O., PIMENIDIS, L., WEHRLE, K., NIEDERMAYER, H., AND CARLE, G. Core: A Peer-To-Peer Based Connectionless Onion Router. In Proceedings of IEEE GLOBECOM, Globalcommunications Conference (Washington DC, USA, November 2007).
-
-
-
-
23
-
-
12344261863
-
Wongoo: A peer-to-peer protocol for anonymous communication
-
H. R. Arabnia, Ed, CSREA Press, pp
-
LU, T., FANG, B., SUN, Y., AND CHENG, X. Wongoo: A peer-to-peer protocol for anonymous communication. In PDPTA (2004), H. R. Arabnia, Ed., CSREA Press, pp. 1102-1106.
-
(2004)
PDPTA
, pp. 1102-1106
-
-
LU, T.1
FANG, B.2
SUN, Y.3
CHENG, X.4
-
24
-
-
77951462266
-
Ap3: Cooperative, decentralized anonymous communication
-
New York, NY, USA, ACM, p
-
MISLOVE, A., OBEROI, G., POST, A., REIS, C., DRUSCHEL, P., AND WALLACH, D. S. Ap3: cooperative, decentralized anonymous communication. In EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop (New York, NY, USA, 2004), ACM, p. 30.
-
(2004)
EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
, pp. 30
-
-
MISLOVE, A.1
OBEROI, G.2
POST, A.3
REIS, C.4
DRUSCHEL, P.5
WALLACH, D.S.6
-
25
-
-
70349273917
-
-
MITTAL, P., AND BORISOV, N. Information leaks in structured peer-to-peer anonymous communication systems. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) (Alexandria, Virginia, USA, October 2008), P. Syverson, S. Jha, and X. Zhang, Eds., ACM Press, pp. 267-278.
-
MITTAL, P., AND BORISOV, N. Information leaks in structured peer-to-peer anonymous communication systems. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) (Alexandria, Virginia, USA, October 2008), P. Syverson, S. Jha, and X. Zhang, Eds., ACM Press, pp. 267-278.
-
-
-
-
26
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
October
-
MURDOCH, S. J. Hot or not: Revealing hidden services by their clock skew. In Proceedings of CCS 2006 (October 2006).
-
(2006)
Proceedings of CCS 2006
-
-
MURDOCH, S.J.1
-
27
-
-
27544454707
-
Low-cost traffic analysis of tor
-
MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of tor. IEEE SP 00 (2005), 183-195.
-
(2005)
IEEE SP 00
, pp. 183-195
-
-
MURDOCH, S.J.1
DANEZIS, G.2
-
28
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
Ottawa, Canada, June, N. Borosov and P. Golle, Eds, Springer
-
MURDOCH, S. J., AND ZIELIŃ SKI, P. Sampled traffic analysis by internet-exchange-level adversaries. In Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007) (Ottawa, Canada, June 2007), N. Borosov and P. Golle, Eds., Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
MURDOCH, S.J.1
ZIELIŃ SKI, P.2
-
29
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
October
-
NAMBIAR, A., AND WRIGHT, M. Salsa: A structured approach to large-scale anonymity. In Proceedings of CCS 2006 (October 2006).
-
(2006)
Proceedings of CCS 2006
-
-
NAMBIAR, A.1
WRIGHT, M.2
-
30
-
-
67249094910
-
Protecting anonymity in dynamic peer-to-peer networks
-
Oct
-
PUTTASWAMY, K., SALA, A., WILSON, C., AND ZHAO, B. Protecting anonymity in dynamic peer-to-peer networks. In IEEE International Conference on Network Protocols (ICNP) (Oct. 2008), pp. 104-113.
-
(2008)
IEEE International Conference on Network Protocols (ICNP)
, pp. 104-113
-
-
PUTTASWAMY, K.1
SALA, A.2
WILSON, C.3
ZHAO, B.4
-
31
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability July, H. Federrath, Ed, Springer-Verlag
-
RAYMOND, J.-F. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009, pp. 10-29.
-
(2000)
LNCS
, pp. 10-29
-
-
RAYMOND, J.-F.1
-
33
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
-
New York, NY, USA, ACM Press, pp
-
RENNHARD, M., AND PLATTNER, B. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society (New York, NY, USA, 2002), ACM Press, pp. 91-102.
-
(2002)
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
RENNHARD, M.1
PLATTNER, B.2
-
34
-
-
0003007594
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
ROWSTRON, A., AND DRUSCHEL, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Middleware (2001).
-
(2001)
Middleware
-
-
ROWSTRON, A.1
DRUSCHEL, P.2
-
35
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
Proceedings of Information Hiding Workshop IH 2002, October, F. Petitcolas, Ed, Springer-Verlag
-
SERJANTOV, A., DINGLEDINE, R., AND SYVERSON, P. From a trickle to a flood: Active attacks on several mix types. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
-
(2002)
LNCS
, vol.2578
-
-
SERJANTOV, A.1
DINGLEDINE, R.2
SYVERSON, P.3
-
36
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables
-
London, UK, Springer-Verlag, pp
-
SIT, E., AND MORRIS, R. Security considerations for peer-to-peer distributed hash tables. In IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems (London, UK, 2002), Springer-Verlag, pp. 261-269.
-
(2002)
IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems
, pp. 261-269
-
-
SIT, E.1
MORRIS, R.2
-
37
-
-
0002245383
-
Chord: A peer-to-peer lookup service for internet applications
-
STOICA, I., MORRIS, R., KARGER, D., KAASHOEK, F., AND BALAKRISHNAN, H. Chord: A peer-to-peer lookup service for internet applications. In SIGCOMM (2001).
-
(2001)
SIGCOMM
-
-
STOICA, I.1
MORRIS, R.2
KARGER, D.3
KAASHOEK, F.4
BALAKRISHNAN, H.5
-
38
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California
-
SYVERSON, P. F., GOLDSCHLAG, D. M., AND REED, M. G. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy (Oakland, California, 4-7 1997), pp. 44-54.
-
(1997)
IEEE Symposium on Security and Privacy
-
-
SYVERSON, P.F.1
GOLDSCHLAG, D.M.2
REED, M.G.3
-
39
-
-
50249128196
-
-
TRONCOSO, C., GIERLICHS, B., PRENEEL, B., AND VERBAUWHEDE, I. Perfect matching statistical disclosure attacks. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 2-23.
-
TRONCOSO, C., GIERLICHS, B., PRENEEL, B., AND VERBAUWHEDE, I. Perfect matching statistical disclosure attacks. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 2-23.
-
-
-
-
40
-
-
74049121685
-
-
WALLACH, D. S. A survey of peer-to-peer security issues. In ISSS (2002), M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds., 2609 of Lecture Notes in Computer Science, Springer, pp. 42-57.
-
WALLACH, D. S. A survey of peer-to-peer security issues. In ISSS (2002), M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds., vol. 2609 of Lecture Notes in Computer Science, Springer, pp. 42-57.
-
-
-
-
41
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
May
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. Defending anonymous communication against passive logging attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003), pp. 28-43.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 28-43
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
42
-
-
14544273666
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
-
November
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC) 4, 7 (November 2004), 489-522.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.7
, pp. 489-522
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
43
-
-
10044298435
-
Tap: A novel tunneling approach for anonymity in structured p2p systems. In ICPP
-
ZHU, Y., AND HU, Y. Tap: A novel tunneling approach for anonymity in structured p2p systems. In ICPP (2004), IEEE Computer Society, pp. 21-28.
-
IEEE Computer Society
, pp. 21-28
-
-
ZHU, Y.1
HU, Y.2
-
44
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
Berkeley, CA, USA, USENIX Association, pp
-
ZHUANG, L., ZHOU, F., ZHAO, B. Y., AND ROWSTRON, A. Cashmere: resilient anonymous routing. In NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation (Berkeley, CA, USA, 2005), USENIX Association, pp. 301-314.
-
(2005)
NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation
, pp. 301-314
-
-
ZHUANG, L.1
ZHOU, F.2
ZHAO, B.Y.3
ROWSTRON, A.4
|