-
1
-
-
3242775234
-
On the economics of anonymity
-
R. N. Wright, Ed. Lecture Notes in Computer Science, vol. 2742. Springer-Verlag, Berlin, Germany
-
ACQUISTI, A., DINGLEDINE, R., ANDSYVERSON, P. 2003. On the economics of anonymity. In Proceedings of the Financial Cryptography (FC'03), R. N. Wright, Ed. Lecture Notes in Computer Science, vol. 2742. Springer-Verlag, Berlin, Germany.
-
(2003)
Proceedings of the Financial Cryptography (FC'03)
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
3
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany
-
BACK, A., MÖLLER, U., ANDSTIGLIC, A. 2001. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the Information Hiding Workshop (IH'01), I. S. Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany, 245-257.
-
(2001)
Proceedings of the Information Hiding Workshop (IH'01)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
4
-
-
13644250069
-
Buses for anonymous message delivery
-
BEIMEL, A. ANDDOLEV, S. 2003. Buses for anonymous message delivery. J. Cryptol. 16, 1, 25-39.
-
(2003)
J. Cryptol.
, vol.16
, Issue.1
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
5
-
-
84946837370
-
Key-privacy in public-key encryption
-
Springer-Verlag, London, U.K.
-
BELLARE, M., BOLDYREVA, A., DESAI, A., ANDPOINTCHEVAL, D. 2001. Key-privacy in public-key encryption. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01). Springer-Verlag, London, U.K., 566-582.
-
(2001)
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01)
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
7
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany
-
BERTHOLD, O., FEDERRATH, H., ANDKÖPSELL, S. 2000a. Web MIXes: A system for anonymous and unobservable Internet access. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany, 115-129.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
8
-
-
0037974470
-
Dummy traffic against long term intersection attacks
-
R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany
-
BERTHOLD, O. ANDLANGOS, H. 2002. Dummy traffic against long term intersection attacks. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET'02)
-
-
Berthold, O.1
Langos, H.2
-
9
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany
-
BERTHOLD, O., PFITZMANN, A., ANDSTANDTKE, R. 2000b. The disadvantages of free MIX routes and how to overcome them. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany, 30-45.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
11
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
BORISOV, N., DANEZIS, G.,MITTAL, P., ANDTABRIZ, P. 2007. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS.
-
(2007)
Proceedings of CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
12
-
-
0038684291
-
-
White paper. Zero Knowledge Systems, Inc. December. Zero Knowledge Systems, Inc., Montreal, P.Q., Canada
-
BOUCHER, P., SHOSTACK, A., ANDGOLDBERG, I. 2000. Freedom systems 2.0 architecture. White paper. Zero Knowledge Systems, Inc. December. Zero Knowledge Systems, Inc., Montreal, P.Q., Canada.
-
(2000)
Freedom Systems 2.0 Architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
14
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
ACM Press, New York, NY
-
CAMENISCH, J., HOHENBERGER, S., KOHLWEISS, M., LYSYANSKAYA, A., ANDMEYEROVICH, M. 2006. How to win the clonewars: Efficient periodic n-times anonymous authentication. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). ACM Press, New York, NY, 201-210.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS)
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
15
-
-
24944435537
-
Compact e-cash
-
R. Cramer, Ed. Lecture Notes in Computer Science, vol. 3494. Springer, Berlin, Germany
-
CAMENISCH, J.,HOHENBERGER, S., ANDLYSYANSKAYA, A. 2005. Compact e-cash. In Proceedings of EUROCRYPT 2005, R. Cramer, Ed. Lecture Notes in Computer Science, vol. 3494. Springer, Berlin, Germany, 302-321.
-
(2005)
Proceedings of EUROCRYPT 2005
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
16
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Springer-Verlag, London, U.K.
-
CAMENISCH, J. ANDLYSYANSKAYA, A. 2001. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'01). Springer-Verlag, London, U.K., 93-118.
-
(2001)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'01)
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88.
-
(1981)
Commun. ACM
, vol.24
, Issue.2 FEBRUARY
, pp. 84-88
-
-
Chaum, D.1
-
18
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1, 65-75.
-
(1988)
J. Cryptol.
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
19
-
-
0029541045
-
Private information retrieval
-
CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN,M. 1995. Private information retrieval. In Proceedings of the IEEE Symposium on Foundations of Computer Science. 41-50.
-
(1995)
Proceedings of the IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
20
-
-
77955913009
-
-
CITIZEN LAB
-
CITIZEN LAB. 2008. Psiphon. http://psiphon.civisec.org.
-
(2008)
-
-
-
21
-
-
36849011539
-
Usability of anonymousWeb browsing: An examination of Tor interfaces and deployability
-
ACM Press, New York, NY
-
CLARK, J., VAN OORSCHOT, P. C., ANDADAMS, C. 2007. Usability of anonymousWeb browsing: An examination of Tor interfaces and deployability. In Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS). ACM Press, New York, NY, 41-51.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS)
, pp. 41-51
-
-
Clark, J.1
Van Oorschot, P.C.2
Adams, C.3
-
22
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
CLARKE, I., SANDBERG, O., WILEY, B., AND HONG, T. W. 2000. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability. 46-66.
-
(2000)
Proceedings of the Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
23
-
-
84947289387
-
Real world patterns of failure in anonymity systems
-
I. S.Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany
-
CLAYTON, R., DANEZIS, G., ANDKUHN, M. G. 2001. Real world patterns of failure in anonymity systems. In Proceedings of the Information HidingWorkshop (IH'01), I. S.Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany, 230-244.
-
(2001)
Proceedings of the Information HidingWorkshop (IH'01)
, pp. 230-244
-
-
Clayton, R.1
Danezis, G.2
Kuhn, M.G.3
-
24
-
-
77049101744
-
Ignoring the great firewall of China
-
G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K.
-
CLAYTON, R., MURDOCH, S. J., ANDWATSON, R. N. M. 2006. Ignoring the Great Firewall of China. In Proceedings of the sixth Workshop on Privacy Enhancing Technologies (PET'06), G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K., 20-35.
-
(2006)
Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET'06)
, pp. 20-35
-
-
Clayton, R.1
Murdoch, S.J.2
Watson, R.N.M.3
-
25
-
-
74049132005
-
ConceptDoppler: A weather tracker for internet censorship
-
ACM Press, New York, NY
-
CRANDALL, J. R., ZINN, D., BYRD, M., BARR, E., ANDEAST, R. 2007. ConceptDoppler: A weather tracker for internet censorship. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM Press, New York, NY, 352-365.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 352-365
-
-
Crandall, J.R.1
Zinn, D.2
Byrd, M.3
Barr, E.4
East, R.5
-
27
-
-
35248866624
-
Mix-networks with restricted routes
-
R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany
-
DANEZIS, G. 2003a. Mix-networks with restricted routes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03), R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany, 1-17.
-
(2003)
Proceedings of Privacy Enhancing Technologies Workshop (PET'03)
, pp. 1-17
-
-
Danezis, G.1
-
28
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
G. Gritzalis, Vimercati, Samarati, and Katsikas, Eds. IFIP TC11. Kluwer, Dordrecht, The Netherlands
-
DANEZIS, G. 2003b. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty (SEC'03), G. Gritzalis, Vimercati, Samarati, and Katsikas, Eds. IFIP TC11. Kluwer, Dordrecht, The Netherlands, 421-426.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty (SEC'03)
, pp. 421-426
-
-
Danezis, G.1
-
29
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany
-
DANEZIS, G. 2004. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany, 35-50.
-
(2004)
Proceedings of Privacy Enhancing Technologies Workshop (PET'04)
, pp. 35-50
-
-
Danezis, G.1
-
30
-
-
84865507939
-
Introducing traffic analysis
-
A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, Eds. Auerbach Publications, Boca Raton, FL, Chapter 5
-
DANEZIS, G. ANDCLAYTON, R. 2007. Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, Eds. Auerbach Publications, Boca Raton, FL, Chapter 5, 95-117.
-
(2007)
Digital Privacy: Theory, Technologies, and Practices
, pp. 95-117
-
-
Danezis, G.1
Clayton, R.2
-
31
-
-
77952355622
-
Two-sided statistical disclosure attack
-
N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada
-
DANEZIS, G., DIAZ, C., ANDTRONCOSO, C. 2007. Two-sided statistical disclosure attack. In Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET'07), N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET'07)
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
-
36
-
-
35248882142
-
Generalising mixes
-
R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany
-
DÍAZ, C. ANDSERJANTOV, A. 2003. Generalising mixes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03), R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany, 18-31.
-
(2003)
Proceedings of Privacy Enhancing Technologies Workshop (PET'03)
, pp. 18-31
-
-
Díaz, C.1
Serjantov, A.2
-
37
-
-
0003302799
-
The Free Haven project: Distributed anonymous storage service
-
H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany
-
DINGLEDINE, R., FREEDMAN, M. J., ANDMOLNAR, D. 2000. The Free Haven project: Distributed anonymous storage service. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
41
-
-
34748836057
-
-
NRL CHACS rep. 5540-625. U.S. Naval Research Laboratory, Washington, DC
-
DINGLEDINE, R., MATHEWSON, N., ANDSYVERSON, P. 2005. Challenges in deploying low-latency anonymity. NRL CHACS rep. 5540-625. U.S. Naval Research Laboratory, Washington, DC.
-
(2005)
Challenges in Deploying Low-latency Anonymity
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
42
-
-
34948854809
-
Deploying low-latency anonymity: Design challenges and social factors
-
DINGLEDINE, R., MATHEWSON, N., ANDSYVERSON, P. 2007. Deploying low-latency anonymity: Design challenges and social factors. IEEE Sec. Priv. 5, 5, 83-87.
-
(2007)
IEEE Sec. Priv.
, vol.5
, Issue.5
, pp. 83-87
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
43
-
-
77049083422
-
Blending different latency traffic with alpha-mixing
-
G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K.
-
DINGLEDINE, R., SERJANTOV, A., ANDSYVERSON, P. 2006. Blending different latency traffic with alpha-mixing. In Proceedings of the 6thWorkshop on Privacy Enhancing Technologies (PET'06), G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K., 245-257.
-
(2006)
Proceedings of the 6thWorkshop on Privacy Enhancing Technologies (PET'06)
, pp. 245-257
-
-
Dingledine, R.1
Serjantov, A.2
Syverson, P.3
-
44
-
-
24344487256
-
Synchronous batching: From cascades to free routes
-
Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany
-
DINGLEDINE, R., SHMATIKOV, V., ANDSYVERSON, P. 2004b. Synchronous batching: From cascades to free routes. In Proceedings of the Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany, 186-206.
-
(2004)
Proceedings of the Privacy Enhancing Technologies Workshop (PET'04)
, pp. 186-206
-
-
Dingledine, R.1
Shmatikov, V.2
Syverson, P.3
-
45
-
-
77955914776
-
-
ELECTRONIC PRIVACY INFORMATION CENTER
-
ELECTRONIC PRIVACY INFORMATION CENTER. 2005. Carnivore. http://epic.org/privacy/carnivore/.
-
(2005)
Carnivore
-
-
-
48
-
-
4944262982
-
-
Tech. rep. 2003-1890. Cornell University, Ithaca, NY. February
-
GOEL, S., ROBSON, M., POLTE, M., ANDSIRER, E. G. 2003. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Tech. rep. 2003-1890. Cornell University, Ithaca, NY. February.
-
(2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
49
-
-
0012880835
-
-
Ph.D. dissertation. University, of California, Berkeley, Berkeley, CA
-
GOLDBERG, I. 2000. A pseudonymous communications infrastructure for the internet. Ph.D. dissertation. University, of California, Berkeley, Berkeley, CA.
-
(2000)
A Pseudonymous Communications Infrastructure for the Internet
-
-
Goldberg, I.1
-
50
-
-
84955557456
-
Hiding routing information
-
R. Anderson, Ed. Lecture Notes in Computer Science, vol. 1174. Springer-Verlag, Berlin, Germany
-
GOLDSCHLAG, D. M., REED, M. G., ANDSYVERSON, P. F. 1996. Hiding routing information. In Proceedings of Information Hiding: First International Workshop, R. Anderson, Ed. Lecture Notes in Computer Science, vol. 1174. Springer-Verlag, Berlin, Germany, 137-150.
-
(1996)
Proceedings of Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
53
-
-
85031542311
-
Mixing e-mail with Babel
-
IEEE, Los Alamitos, CA
-
GÜLÜ, C. ANDTSUDIK, G. 1996. Mixing E-mail with Babel. In Proceedings of the Network and Distributed Security Symposium (NDSS). IEEE, Los Alamitos, CA, 2-16.
-
(1996)
Proceedings of the Network and Distributed Security Symposium (NDSS)
, pp. 2-16
-
-
Gülü, C.1
Tsudik, G.2
-
54
-
-
85094835061
-
Electronic auctions with private bids
-
USENIX Association, Berkeley, CA
-
HARKAVY, M., TYGAR, J., ANDKIKUCHI, H. 1998. Electronic auctions with private bids. In Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce (WOEC'98). USENIX Association, Berkeley, CA, 61-74.
-
(1998)
Proceedings of the 3rd Conference on USENIX Workshop on Electronic Commerce (WOEC'98)
, pp. 61-74
-
-
Harkavy, M.1
Tygar, J.2
Kikuchi, H.3
-
56
-
-
84885234613
-
Nonesuch: A mix network with sender unobservability
-
ACM Press, New York, NY
-
HEYDT-BENJAMIN, T. S., SERJANTOV, A., ANDDEFEND, B. 2006. Nonesuch: A mix network with sender unobservability. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES). ACM Press, New York, NY, 1-8.
-
(2006)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES)
, pp. 1-8
-
-
Heydt-Benjamin, T.S.1
Serjantov, A.2
Defend, B.3
-
57
-
-
6344251217
-
Fingerprinting websites using traffic analysis
-
R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany
-
HINTZ, A. 2002. Fingerprinting websites using traffic analysis. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET'02)
-
-
Hintz, A.1
-
59
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
JONDOS GMBH. 2008. Jondonym
-
JAKOBSSON, M., JUELS, A., ANDRIVEST, R. L. 2002. Making mix nets robust for electronic voting by randomized partial checking. In Proceedings of the 11th USENIX Security Symposium. JONDOS GMBH. 2008. Jondonym. https://www.jondos.de/ en/.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.L.3
-
60
-
-
77958026049
-
Pairing-based onion routing
-
N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada
-
KATE, A., ZAVERUCHA, G., ANDGOLDBERG, I. 2007. Pairing-based onion routing. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07), N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada.
-
(2007)
Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07)
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
61
-
-
1642380665
-
Limits of anonymity in open environments
-
F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany
-
KESDOGAN, D., AGRAWAL, D., ANDPENZ, S. 2002. Limits of anonymity in open environments. In Proceedings of Information HidingWorkshop (IH'02), F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany.
-
(2002)
Proceedings of Information HidingWorkshop (IH'02)
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
62
-
-
84890010554
-
Stop-and-go MIXes: Providing probabilistic anonymity in an open system
-
Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, Berlin, Germany
-
KESDOGAN, D., EGNER, J., ANDBÜSCHKES, R. 1998. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In Proceedings of Information Hiding Workshop (IH'98). Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, Berlin, Germany.
-
(1998)
Proceedings of Information Hiding Workshop (IH'98)
-
-
Kesdogan, D.1
Egner, J.2
Büschkes, R.3
-
64
-
-
0001574460
-
Receipt-free MIX-type voting scheme-a practical solution to the implementation of a voting booth
-
Springer-Verlag, Berlin, Germany
-
KILIAN, J. ANDSAKO, K. 1995. Receipt-free MIX-type voting scheme-a practical solution to the implementation of a voting booth. In Proceedings of EUROCRYPT 1995. Springer-Verlag, Berlin, Germany.
-
(1995)
Proceedings of EUROCRYPT 1995
-
-
Kilian, J.1
Sako, K.2
-
66
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
A. Juels, Ed. Lecture Notes in Computer Science, vol. 3110. Springer-Verlag, Berlin, Germany
-
LEVINE, B. N., REITER, M. K., WANG, C., ANDWRIGHT, M. K. 2004. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC'04), A. Juels, Ed. Lecture Notes in Computer Science, vol. 3110. Springer-Verlag, Berlin, Germany, 251-265.
-
(2004)
Proceedings of Financial Cryptography (FC'04)
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
68
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
Lecture Notes in Computer Science, vol. 3424. Berlin, Germany
-
MATHEWSON, N. ANDDINGLEDINE, R. 2004. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of Privacy Enhancing Technologies workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Berlin, Germany, 17-34.
-
(2004)
Proceedings of Privacy Enhancing Technologies Workshop (PET'04)
, pp. 17-34
-
-
Mathewson, N.1
Dingledine, R.2
-
69
-
-
49049097183
-
Mixmaster protocol-version 2
-
MÒLLER, U., COTTRELL, L., PALFRADER, P., ANDSASSAMAN, L. 2003. Mixmaster Protocol-Version 2. IETF Internet draft. www.ietf.org.
-
(2003)
IETF Internet Draft
-
-
Mòller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
72
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
NAMBIAR, A. ANDWRIGHT, M. 2006. Salsa: A structured approach to large-scale anonymity. In Proceedings of CCS.
-
(2006)
Proceedings of CCS
-
-
Nambiar, A.1
Wright, M.2
-
74
-
-
35248877248
-
Metrics for traffic analysis prevention
-
R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany
-
NEWMAN, R. E., MOSKOWITZ, I. S., SYVERSON, P., ANDSERJANTOV, A. 2003. Metrics for traffic analysis prevention. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03), R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany.
-
(2003)
Proceedings of Privacy Enhancing Technologies Workshop (PET'03)
-
-
Newman, R.E.1
Moskowitz, I.S.2
Syverson, P.3
Serjantov, A.4
-
77
-
-
77955854309
-
Improving efficiency and simplicity of Tor circuit establishment and hidden services
-
N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada
-
ØVERLIER, L. AND SYVERSON, P. 2007. Improving efficiency and simplicity of Tor circuit establishment and hidden services. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07), N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada.
-
(2007)
Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07)
-
-
Øverlier, L.1
Syverson, P.2
-
78
-
-
53349102286
-
Prospects for remailers
-
PAREKH, S. 1996. Prospects for remailers. First Monday 1, 2 (Aug).
-
(1996)
First Monday
, vol.1
, Issue.2 AUGUST
-
-
Parekh, S.1
-
79
-
-
85052820050
-
Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology
-
PFITZMANN, A. ANDHANSEN, M. 2008. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft.
-
(2008)
Draft
-
-
Pfitzmann, A.1
Hansen, M.2
-
80
-
-
85032859691
-
How to break the direct RSA-implementation of mixes
-
Springer-Verlag, Berlin, Germany
-
PFITZMANN, B. ANDPFITZMANN, A. 1990. How to break the direct RSA-implementation of mixes. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT'89). Springer-Verlag, Berlin, Germany, 373-381.
-
(1990)
Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT'89)
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
81
-
-
85084161175
-
Can pseudonymity really guarantee privacy?
-
USENIX, Berkeley, CA
-
RAO, J. R. ANDROHATGI, P. 2000. Can pseudonymity really guarantee privacy? In Proceedings of the 9th USENIX Security Symposium. USENIX, Berkeley, CA, 85-96.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 85-96
-
-
Rao, J.R.1
Rohatgi, P.2
-
82
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany
-
RAYMOND, J.-F. 2000. Traffic analysis: Protocols, attacks, design issues, and open problems. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany, 10-29.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 10-29
-
-
Raymond, J.-F.1
-
83
-
-
0002054934
-
Crowds: Anonymity forWeb transactions
-
REITER, M. ANDRUBIN, A. 1998. Crowds: Anonymity forWeb transactions. ACM Trans. Inform. Syst. Sec. 1, 1 (Nov.), 66-92.
-
(1998)
ACM Trans. Inform. Syst. Sec.
, vol.1
, Issue.1 NOVEMBER
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
85
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
RIVEST, R. L., SHAMIR, A., ANDADLEMAN, L. 1983. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26, 1, 96-99.
-
(1983)
Commun. ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
87
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany
-
SERJANTOV, A., DINGLEDINE, R., ANDSYVERSON, P. 2002. From a trickle to a flood: Active attacks on several mix types. In Proceedings of the Information Hiding Workshop (IH'02), F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany.
-
(2002)
Proceedings of the Information Hiding Workshop (IH'02)
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
88
-
-
84904317338
-
On the anonymity of timed pool mixes
-
Kluwer, Athens, Greece
-
SERJANTOV, A. ANDNEWMAN, R. E. 2003. On the anonymity of timed pool mixes. In Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems. Kluwer, Athens, Greece, 427-434.
-
(2003)
Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems
, pp. 427-434
-
-
Serjantov, A.1
Newman, R.E.2
-
89
-
-
27944452198
-
Passive attack analysis for connection-based anonymity systems
-
SERJANTOV, A. ANDSEWELL, P. 2003. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS.
-
(2003)
Proceedings of ESORICS
-
-
Serjantov, A.1
Sewell, P.2
-
91
-
-
70349301114
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
SHMATIKOV, V. ANDWANG, M.-H. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. In Proceedings of ESORICS.
-
(2006)
Proceedings of ESORICS
-
-
Shmatikov, V.1
Wang, M.-H.2
-
94
-
-
84864253438
-
Statistical identification of encrypted Web browsing traffic
-
SUN, Q., SIMON, D. R., WANG, Y.-M., RUSSELL, W., PADMANABHAN, V. N., ANDQIU, L. 2002. Statistical identification of encrypted Web browsing traffic. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
95
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany
-
SYVERSON, P., TSUDIK, G., REED, M., ANDLANDWEHR, C. 2000. Towards an analysis of onion routing security. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin, Germany, 96-114.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
96
-
-
77049097177
-
Breaking the collusion detection mechanism of morphmix
-
G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K.
-
TABRIZ, P. ANDBORISOV, N. 2006. Breaking the collusion detection mechanism of morphmix. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET'06), G. Danezis and P. Golle, Eds. Springer, Cambridge, U.K., 368-384.
-
(2006)
Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET'06)
, pp. 368-384
-
-
Tabriz, P.1
Borisov, N.2
-
97
-
-
6244294214
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability
-
Lecture Notes in Computer Science, vol. 434. Springer-Verlag, Berlin, Germany
-
WAIDNER, M. ANDPFITZMANN, B. 1990. The dining cryptographers in the disco: Unconditional sender and recipient untraceability. In Proceedings of EUROCRYPT 1989. Lecture Notes in Computer Science, vol. 434. Springer-Verlag, Berlin, Germany.
-
(1990)
Proceedings of EUROCRYPT 1989
-
-
Waidner, M.1
Pfitzmann, B.2
-
99
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous Web publishing system
-
WALDMAN, M., RUBIN, A., ANDCRANOR, L. 2000. Publius: A robust, tamper-evident, censorship-resistant and source-anonymous Web publishing system. In Proceedings of the 9th USENIX Security Symposium. 59-72.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 59-72
-
-
Waldman, M.1
Rubin, A.2
Cranor, L.3
-
100
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
WRIGHT, M., ADLER, M., LEVINE, B. N., ANDSHIELDS, C. 2003. Defending anonymous communication against passive logging attacks. In Proceedings of the IEEE Symposium on Security and Privacy. 28-43.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 28-43
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
101
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
WRIGHT, M., ADLER, M., LEVINE, B. N., ANDSHIELDS, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inform. Syst. Sec. 4, 7 (Nov.), 489-522.
-
(2004)
ACM Trans. Inform. Syst. Sec.
, vol.4
, Issue.7 NOVEMBER
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
102
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Lecture Notes in Computer Science, vol. 3424. Berlin, Germany
-
ZHU, Y., FU, X., GRAHAM, B., BETTATI, R., ANDZHAO, W. 2004. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Berlin, Germany, 207-225.
-
(2004)
Proceedings of Privacy Enhancing Technologies Workshop (PET'04)
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|