-
1
-
-
35248878897
-
On the economics of anonymity
-
Wright, R.N. (ed.), Springer, Heidelberg, FC 2003
-
Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.2742, pp. 84-102. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2742
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
2
-
-
50349083227
-
PAR: Payment for anonymous routing
-
Borisov, N., Goldberg, I. (eds.), Springer, Heidelberg, PETS 2008
-
Androulaki, E., Raykova, M., Srivatsan, S., Stavrou, A., Bellovin, S.M.: PAR: Payment for anonymous routing. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.5134, pp. 219-236. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 219-236
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S.M.5
-
3
-
-
77955316427
-
-
The Anonymizer, http://www.anonymizer.com/
-
-
-
-
4
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Federrath, H. (ed.), Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.2009, p. 115. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 115
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
5
-
-
25844454674
-
Designing incentives for peer-to-peer routing
-
Miami FL, March
-
Blanc, A., Liu, Y.-K., Vahdat, A.: Designing incentives for peer-to-peer routing. In: Proceedings of the 24th IEEE INFOCOM, Miami, FL (March 2005)
-
(2005)
Proceedings of the 24th IEEE INFOCOM
-
-
Blanc, A.1
Liu, Y.-K.2
Vahdat, A.3
-
6
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
October
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: Proceedings of CCS 2007 (October 2007)
-
(2007)
Proceedings of CCS 2007
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
7
-
-
0038684291
-
-
White paper Zero Knowledge Systems Inc. (December
-
Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (December 2000), http://osiris.978.org/ ~brianr/crypto-research/anon/www.freedom.net/products/ whitepapers/ Freedom-System-2-Architecture.pdf
-
(2000)
Freedom Systems 2.0 Architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
10
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Martin, D., Serjantov, A. (eds.) PET 2004, Springer, Heidelberg
-
Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.3424, pp. 35-50. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3424
, pp. 35-50
-
-
Danezis, G.1
-
11
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
Oakland CA (May
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2003)
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
12
-
-
84957800033
-
Towards measuring anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002, Springer, Heidelberg
-
Däz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.2482, pp. 54-68. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2482
, pp. 54-68
-
-
Däz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA (August, Project web site
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of 13th USENIX Security Symposium, San Diego, CA (August 2004), Project web site, https://www.torproject.org/
-
(2004)
Proceedings of 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
17
-
-
34748836057
-
Challenges in deploying low-latency anonymity
-
Center for High Assurance Computer Systems, Naval Research Laboratory
-
Dingledine, R., Mathewson, N., Syverson, P.: Challenges in deploying low-latency anonymity. Technical Report 5540-6265, Center for High Assurance Computer Systems, Naval Research Laboratory (2005)
-
(2005)
Technical Report 5540-6265
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
18
-
-
77049083422
-
Blending different latency traffic with alpha-mixing
-
Danezis, G., Golle, P. (eds.) PET 2006, Springer, Heidelberg
-
Dingledine, R., Serjantov, A., Syverson, P.: Blending different latency traffic with alpha-mixing. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.4258, pp. 245-257. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 245-257
-
-
Dingledine, R.1
Serjantov, A.2
Syverson, P.3
-
19
-
-
84957023357
-
Reliable MIX cascade networks through reputation
-
Blaze M. (ed.) FC 2002, Springer, Heidelberg
-
Dingledine, R., Syverson, P.: Reliable MIX cascade networks through reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol.2357, pp. 253-268. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2357
, pp. 253-268
-
-
Dingledine, R.1
Syverson, P.2
-
20
-
-
77955322648
-
-
Electronic Frontier Foundation
-
Electronic Frontier Foundation. Tor: Legal FAQ for Tor server operators, https://www.torproject.org/eff/tor-legal-faq.html
-
Tor: Legal FAQ for Tor Server Operators
-
-
-
22
-
-
21644483415
-
SHARP: An architecture for secure resource peering
-
Bolton Landing, NY (October
-
Fu, Y., Chase, J.S., Chun, B.N., Schwab, S., Vahdat, A.: SHARP: An architecture for secure resource peering. In: Proc. 19th ACM Symp. on Operating System Principles (SOSP 2003), Bolton Landing, NY (October 2003)
-
(2003)
Proc. 19th ACM Symp. on Operating System Principles (SOSP 2003)
-
-
Fu, Y.1
Chase, J.S.2
Chun, B.N.3
Schwab, S.4
Vahdat, A.5
-
23
-
-
0242539913
-
Incentives for sharing in peer-to-peer networks
-
Tampa FL (October
-
Golle, P., Leyton-Brown, K., Mironov, I., Lillibridge, M.: Incentives for sharing in peer-to-peer networks. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL (October 2001)
-
(2001)
Proceedings of the 3rd ACM Conference on Electronic Commerce
-
-
Golle, P.1
Leyton-Brown, K.2
Mironov, I.3
Lillibridge, M.4
-
24
-
-
0014413249
-
The tragedy of the commons
-
Alternate location
-
Hardin, G.: The tragedy of the commons. Science 162 (1968), Alternate location, http://dieoff.com/page95.htm
-
(1968)
Science
, vol.162
-
-
Hardin, G.1
-
25
-
-
84947902272
-
Tracking the evolution of web traffic 1995-2003
-
Orlando, FL (October 2003
-
Hernandez-Campos, F., Jeffay, K., Smith, F.D.: Tracking the evolution of web traffic: 1995-2003. In: Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Orlando, FL (October 2003)
-
Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Hernandez-Campos, F.1
Jeffay, K.2
Smith, F.D.3
-
26
-
-
70349692738
-
How much anonymity does network latency leak?
-
VA (October
-
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: Proceedings of the 14th ACM Conference on Computer and Communication Security, Alexandria, VA (October 2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communication Security Alexandria
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
27
-
-
84880467894
-
The EigenTrust algorithm for reputation management in p2p networks
-
Hungary (May
-
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International World Wide Web Conference, Budapest, Hungary (May 2003)
-
(2003)
Proceedings of the 12th International World Wide Web Conference Budapest
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
28
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
Juels A. (ed.) FC 2004, Springer, Heidelberg
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol.3110, pp. 251-265. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
29
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
Alexandria, VA, (October
-
Liberatore, M., Levine, B.N.: Inferring the Source of Encrypted HTTP Connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, pp. 255-263 (October 2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006)
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
30
-
-
77955341168
-
Evaluation of client requests to the directories to determine total numbers and countries of users
-
June
-
Loesing, K.: Evaluation of client requests to the directories to determine total numbers and countries of users. Technical report, The Tor Project (June 2009), https://torproject.org/projects/metrics
-
(2009)
Technical Report the Tor Project
-
-
Loesing, K.1
-
32
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
Borisov, N., Goldberg, I. (eds.) PETS 2008, Springer, Heidelberg
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the Tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.5134, pp. 63-76. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
34
-
-
49049097183
-
Mixmaster protocol - Version 2
-
July
-
Möller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol - version 2. IETF Internet Draft (July 2003), http://www.abditum.com/ mixmaster-spec.txt
-
(2003)
IETF Internet Draft
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
36
-
-
38149130456
-
Sampled traffic analysis by Internet-exchange-level adversaries
-
Borisov, N., Golle, P. (eds.) PET 2007, Springer, Heidelberg
-
Murdoch, S.J., Zielinski, P.: Sampled traffic analysis by Internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.4776, pp. 167-183. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4776
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
37
-
-
33646759921
-
Scrivener: Providing incentives in cooperative content distribution systems
-
Alonso G. (ed.) Middleware 2005, Springer, Heidelberg
-
Nandi, A., Ngan, T.-W.J., Singh, A., Druschel, P., Wallach, D.S.: Scrivener: Providing incentives in cooperative content distribution systems. In: Alonso, G. (ed.) Middleware 2005. LNCS, vol.3790, pp. 270-291. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3790
, pp. 270-291
-
-
Nandi, A.1
Ngan, T.-W.J.2
Singh, A.3
Druschel, P.4
Wallach, D.S.5
-
38
-
-
33646067650
-
Enforcing fair sharing of peer-to-peer resources
-
Berkeley CA (February
-
Ngan, T.-W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), Berkeley, CA (February 2003)
-
(2003)
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS)
-
-
Ngan, T.-W.J.1
Wallach, D.S.2
Druschel, P.3
-
43
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002, Springer, Heidelberg
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.2482, pp. 41-53. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
44
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006, Springer, Heidelberg
-
Shmatikov, V.,Wang, M.-H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.4189, pp. 18-33. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.-H.2
-
45
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
Spain (April
-
Singh, A., Ngan, T.-W.J., Druschel, P., Wallach, D.S.: Eclipse attacks on overlay networks: Threats and defenses. In: Processings of IEEE INFOCOM, Barcelona, Spain (April 2006)
-
(2006)
Processings of IEEE INFOCOM Barcelona
-
-
Singh, A.1
Ngan, T.-W.J.2
Druschel, P.3
Wallach, D.S.4
-
47
-
-
84937565289
-
Towards an analysis of onion routing security
-
Federrath H. (ed.) Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
48
-
-
77955335953
-
-
The Distributed and Real-Time Systems Research Group, UNC. Data for the UNC HTTP traffic model
-
The Distributed and Real-Time Systems Research Group, UNC. Data for the UNC HTTP traffic model, http://www.cs.unc.edu/Research/dirt/proj/http-model/
-
-
-
-
49
-
-
13644274445
-
KARMA: A secure economic framework for p2p resource sharing
-
Berkeley CA (June
-
Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: KARMA: A secure economic framework for p2p resource sharing. In: Proceedings of theWorkshop on Economics of Peer-to-Peer Systems, Berkeley, CA (June 2003)
-
(2003)
Proceedings of TheWorkshop on Economics of Peer-to-Peer Systems
-
-
Vishnumurthy, V.1
Chandrakumar, S.2
Sirer, E.G.3
|