-
2
-
-
84888999400
-
-
The Anonymizer. http://www.anonymizer.com/.
-
The Anonymizer
-
-
-
3
-
-
35248893039
-
GAP - practical anonymous networking
-
Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop PET 2003, Springer-Verlag, March
-
Krista Bennett and Christian Grothoff. GAP - practical anonymous networking. In Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, March 2003.
-
(2003)
LNCS
, vol.2760
-
-
Bennett, K.1
Grothoff, C.2
-
4
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
6
-
-
34547239349
-
Freedom systems 2.0 architecture
-
Inc, December
-
Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
White paper, Zero Knowledge Systems
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
8
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
July
-
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46-66, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
10
-
-
0003302799
-
The Free Haven Project: Distributed anonymous storage service
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, July
-
Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed anonymous storage service. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
12
-
-
0003415244
-
-
IETF RFC 2616, June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext transfer protocol - http/1.1. IETF RFC 2616, June 1999.
-
(1999)
Hypertext transfer protocol - http/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
14
-
-
84955557456
-
Hiding Routing Information
-
R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
-
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
15
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant, web publishing system
-
August
-
Aviel D. Rubin Marc Waldman and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceedings of the 9th USENIX Security Symposium, pages 59-72, August 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 59-72
-
-
Rubin, A.D.1
Waldman, M.2
Faith Cranor, L.3
-
17
-
-
33750277833
-
-
Lasse ∅verlier and Paul Syverson. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006.
-
Lasse ∅verlier and Paul Syverson. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006.
-
-
-
-
19
-
-
77049083327
-
-
Proxify.com. http://www.proxify.com/.
-
Proxify.com
-
-
-
20
-
-
0034775826
-
A scalable content-addressable network
-
New York, NY, USA, ACM Press
-
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. A scalable content-addressable network. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 161-172, New York, NY, USA, 2001. ACM Press.
-
(2001)
SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
21
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 10-29
-
-
Raymond, J.-F.1
-
24
-
-
20444435333
-
Passive attack analysis for connection-based anonymity systems
-
October
-
Andrei Serjantov and Peter Sewell. Passive attack analysis for connection-based anonymity systems. In Computer Security - ESORICS 2003, October 2003.
-
(2003)
Computer Security - ESORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
-
25
-
-
33745781163
-
Countering DoS attacks with stateless multipath overlays
-
New York, NY, USA, ACM Press
-
Angelos Stavrou and Angelos D. Keromytis. Countering DoS attacks with stateless multipath overlays. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 249-259, New York, NY, USA, 2005. ACM Press.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 249-259
-
-
Stavrou, A.1
Keromytis, A.D.2
-
26
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
New York, NY, USA, ACM Press
-
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 149-160, New York, NY, USA, 2001. ACM Press.
-
(2001)
SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Frans Kaashoek, M.4
Balakrishnan, H.5
-
29
-
-
14544273666
-
-
Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [28].
-
Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [28].
-
-
-
-
30
-
-
0742267177
-
Tapestry: A resilient global-scale overlay for service deployment
-
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 22(1):41-53, 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 41-53
-
-
Zhao, B.Y.1
Huang, L.2
Stribling, J.3
Rhea, S.C.4
Joseph, A.D.5
Kubiatowicz, J.6
|