-
1
-
-
35248878897
-
On the economics of anonymity
-
Wright, R. N. ed., Springer, Heidelberg
-
Acquisti, A., Dingledine, R., Syverson, P. F.: On the Economics of Anonymity. In: Wright, R. N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84-102. Springer, Heidelberg (2003)
-
(2003)
FC 2003. LNCS
, vol.2742
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.F.3
-
3
-
-
70349811111
-
Prying data out of a social network
-
Memon, N., Alhajj, R. eds. ASONAM
-
Bonneau, J., Anderson, J., Danezis, G.: Prying data out of a social network. In: Memon, N., Alhajj, R. (eds.) ASONAM, pp. 249-254. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
IEEE Computer Society, los Alamitos
, pp. 249-254
-
-
Bonneau, J.1
Anderson, J.2
Danezis, G.3
-
4
-
-
50249119735
-
Denial of service or denial of security?
-
Ning, P., De Capitani di Vimercati, S., Syverson, P. F. eds., ACM, New York
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Ning, P., De Capitani di Vimercati, S., Syverson, P. F. (eds.) ACM Conference on Computer and Communications Security, pp. 92-102. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
5
-
-
77955460015
-
-
Borisov, N., Golle, P. eds. :, Springer, Heidelberg
-
Borisov, N., Golle, P. (eds.) : PET 2007. LNCS, vol. 4776. Springer, Heidelberg (2007)
-
(2007)
PET 2007. LNCS
, vol.4776
-
-
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
35248866624
-
Mix-networks with restricted routes
-
Dingledine, R. ed., Springer, Heidelberg
-
Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1-17. Springer, Heidelberg (2003)
-
(2003)
PET 2003. LNCS
, vol.2760
, pp. 1-17
-
-
Danezis, G.1
-
8
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
IEEE Computer Society, Los Alamitos
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy, pp. 2-15. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
9
-
-
70449674640
-
Sphinx: A compact and provably secure mix format
-
IEEE Computer Society, Los Alamitos
-
Danezis, G., Goldbergp, I.: Sphinx: A compact and provably secure mix format. In: IEEE Symposium on Security and Privacy, pp. 269-282. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 269-282
-
-
Danezis, G.1
Goldbergp, I.2
-
10
-
-
74049135841
-
Sybilinfer: Detecting sybil nodes using social networks
-
The Internet Society
-
Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: NDSS. The Internet Society (2009)
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
11
-
-
84957800033
-
Towards measuring anonymity
-
Dingledine, R., Syverson, P. F. eds., Springer, Heidelberg
-
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
-
(2003)
PET 2002. LNCS
, vol.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
12
-
-
50249117750
-
On the impact of social network profiling on anonymity
-
Borisov, N., Goldberg, I. eds., Springer, Heidelberg
-
Díaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44-62. Springer, Heidelberg (2008)
-
(2008)
PETS 2008. LNCS
, vol.5134
, pp. 44-62
-
-
Díaz, C.1
Troncoso, C.2
Serjantov, A.3
-
13
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, vol. 2 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, vol.2
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX
-
Dingledine, R., Mathewson, N., Syverson, P. F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303-320. USENIX (2004)
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
15
-
-
20444439634
-
Location diversity in anonymity networks
-
Atluri, V., Syverson, P. F., De Capitani di Vimercati, S. eds., ACM, New York
-
Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Atluri, V., Syverson, P. F., De Capitani di Vimercati, S. (eds.) WPES, pp. 66-76. ACM, New York (2004)
-
(2004)
WPES
, pp. 66-76
-
-
Feamster, N.1
Dingledine, R.2
-
16
-
-
72849147698
-
On the security of the tor authentication protocol
-
Danezis, G., Golle, P. eds., Springer, Heidelberg
-
Goldberg, I.: On the security of the tor authentication protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006)
-
(2006)
PET 2006. LNCS
, vol.4258
, pp. 316-331
-
-
Goldberg, I.1
-
17
-
-
70350543794
-
More anonymous onion routing through trust
-
IEEE Computer Society, Los Alamitos
-
Johnson, A., Syverson, P. F.: More anonymous onion routing through trust. In: CSF, pp. 3-12. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
CSF
, pp. 3-12
-
-
Johnson, A.1
Syverson, P.F.2
-
18
-
-
77955452446
-
-
Borisov, Golle eds.
-
Kate, A., Zaverucha, G. M., Goldberg, I.: Pairing-based onion routing. In: Borisov, Golle (eds.) [5], pp. 95-112
-
Pairing-based Onion Routing
, vol.5
, pp. 95-112
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
19
-
-
33751039759
-
Fundamental limits on the anonymity provided by the mix technique
-
IEEE Computer Society, Los Alamitos
-
Kesdogan, D., Agrawal, D., Pham, D. V., Rautenbach, D.: Fundamental limits on the anonymity provided by the mix technique. In: IEEE Symposium on Security and Privacy, pp. 86-99. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 86-99
-
-
Kesdogan, D.1
Agrawal, D.2
Pham, D.V.3
Rautenbach, D.4
-
20
-
-
77955450879
-
-
Apres - a system for anonymous presence. Technical report
-
Laurie, B.: Apres - a system for anonymous presence. Technical report
-
-
-
Laurie, B.1
-
21
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication systems
-
Syverson, P., Jha, S., Zhang, X. eds., Alexandria, Virginia, USA, October 2008, ACM Press, New York
-
Mittal, P., Borisov, N.: Information leaks in structured peer-to-peer anonymous communication systems. In: Syverson, P., Jha, S., Zhang, X. (eds.) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pp. 267-278. ACM Press, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 267-278
-
-
Mittal, P.1
Borisov, N.2
-
22
-
-
20444447364
-
-
Draft July
-
Möller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol - Version 2. Draft (July 2003)
-
(2003)
Mixmaster Protocol - Version 2
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
23
-
-
27544454707
-
Low-cost traffic analysis of tor
-
IEEE Computer Society, Los Alamitos
-
Murdoch, S. J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
24
-
-
38149130456
-
Sampled traffic analysis by internet-exchange-level adversaries
-
Golle eds.
-
Murdoch, S. J., Zielinski, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, Golle (eds.) [5], pp. 167-183
-
Borisov
, vol.5
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
25
-
-
70350655384
-
Entropy bounds for traffic confirmation
-
IACR October
-
O'Connor, L.: Entropy bounds for traffic confirmation. Technical Report 2008/365, IACR (October 2008)
-
(2008)
Technical Report 2008/365
-
-
O'Connor, L.1
-
26
-
-
0011702966
-
ISDN-MIXes: Untraceable communication with small bandwidth overhead
-
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Informatik-Fachberichte, pp. 451-463 (1991)
-
(1991)
Informatik-Fachberichte
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
27
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
Federrath, H. ed., Springer, Heidelberg
-
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) PET 2000. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
-
(2001)
PET 2000. LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
29
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M. K., Rubin, A. D.: Anonymous web transactions with crowds. Commun. ACM 42 (2), 32-38 (1999)
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, M.K.1
Rubin, A.D.2
-
30
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Dingledine, R., Syverson, P. F. eds., Springer, Heidelberg
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
(2003)
PET 2002. LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
31
-
-
84937565289
-
Towards an analysis of onion routing security
-
Federrath, H. ed., Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) PET 2000. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
PET 2000. LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
32
-
-
74049160327
-
The bayesian traffic analysis of mix networks
-
Al- Shaer, E., Jha, S., Keromytis, A. D. eds., ACM, New York
-
Troncoso, C., Danezis, G.: The bayesian traffic analysis of mix networks. In: Al- Shaer, E., Jha, S., Keromytis, A. D. (eds.) ACM Conference on Computer and Communications Security, pp. 369-379. ACM, New York (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 369-379
-
-
Troncoso, C.1
Danezis, G.2
-
33
-
-
77953723457
-
Greek intelligence and the capture of PKK leader abdullah ocalan in 1999
-
Extracts March
-
Varouhakis, M.: Greek intelligence and the capture of PKK leader abdullah ocalan in 1999. Studies in Intelligence 53 (1) (Extracts) (March 2009)
-
(2009)
Studies in Intelligence
, vol.53
, Issue.1
-
-
Varouhakis, M.1
-
35
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
Watts, D. J., Strogatz, S. H.: Collective dynamics of 'small-world' networks. Nature 393, 440-442 (1998)
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
36
-
-
74049138076
-
Traffic morphing: An efficient defense against statistical traffic analysis
-
February 2009. IEEE, Los Alamitos
-
Wright, C. V., Coull, S. E., Monrose, F.: Traffic morphing: An efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2009, February 2009. IEEE, Los Alamitos (2009)
-
(2009)
Proceedings of the Network and Distributed Security Symposium - NDSS 2009
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
-
37
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
IEEE Computer Society, Los Alamitos
-
Wright, C. V., Ballard, L., Coull, S. E., Monrose, F., Masson, G. M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: IEEE Symposium on Security and Privacy, pp. 35-49. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
|