-
1
-
-
79959681025
-
Low-resource routing attacks against tor
-
Washington, DC, USA, October
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)
-
-
Bauer, K.1
Mccoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
2
-
-
68949221468
-
Probabilistic and nondeterministic aspects of anonymity
-
R. Beauxis and C. Palamidessi. Probabilistic and nondeterministic aspects of anonymity. Theoretical Computer Science, 410(41):4006-4025, 2009.
-
(2009)
Theoretical Computer Science
, vol.410
, Issue.41
, pp. 4006-4025
-
-
Beauxis, R.1
Palamidessi, C.2
-
3
-
-
13644250069
-
Buses for anonymous message delivery
-
DOI 10.1007/s00145-002-0128-6
-
A. Beimel and S. Dolev. Buses for anonymous message delivery. Journal of Cryptology, 16(1):25-39, 2003. (Pubitemid 41201214)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.1
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
5
-
-
33745174191
-
A formal treatment of onion routing
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
J. Camenisch and A. Lysyanskaya. A formal treatment of onion routing. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, pages 169-187. Springer-Verlag, LNCS 3621, August 2005. (Pubitemid 43902113)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3621
, pp. 169-187
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
7
-
-
0023861309
-
Dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology: The Journal of the International Association for Cryptologic Research, 1(1):65-75, 1988. (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
9
-
-
35248866624
-
Mix-networks with restricted routes
-
R. Dingledine, editor PET 2003 Springer-Verlag, LNCS 2760
-
G. Danezis. Mix-networks with restricted routes. In R. Dingledine, editor, Privacy Enhancing Technologies: Third International Workshop, PET 2003, pages 1-17. Springer-Verlag, LNCS 2760, 2003.
-
(2003)
Privacy Enhancing Technologies: Third International Workshop
, pp. 1-17
-
-
Danezis, G.1
-
14
-
-
84957800033
-
Towards Measuring Anonymity
-
Privacy Enhancing Technologies
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies, Second International Workshop, PET 2002, Revised Papers, pages 54-68. Springer-Verlag, LNCS 2482, 2003. (Pubitemid 36309879)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
15
-
-
84947287486
-
A Reputation System to Increase MIX-Net Reliability
-
Information Hiding
-
R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar. A reputation system to increase MIX-net reliability. In I. S. Moskowitz, editor, Information Hiding: 4th International Workshop, IH 2001, pages 126-141, Pittsburgh, PA, USA, April 2001. Springer-Verlag, LNCS 2137. (Pubitemid 33367663)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 126-141
-
-
Dingledine, R.1
Freedman, M.J.2
Hopwood, D.3
Molnar, D.4
-
18
-
-
34948854809
-
Deploying low-latency anonymity: Design challenges and social factors
-
September/October
-
R. Dingledine, N. Mathewson, and P. Syverson. Deploying low-latency anonymity: Design challenges and social factors. IEEE Security & Privacy, 5(5):83-87, September/October 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.5
, pp. 83-87
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
84957023357
-
Reliable MIX Cascade Networks through Reputation
-
Financial Cryptography
-
R. Dingledine and P. Syverson. Reliable MIX cascade networks through reputation. In M. Blaze, editor, Financial Cryptography, 6th International Conference, FC 2002, pages 253-268. Springer-Verlag, LNCS 2357, 2003. (Pubitemid 36316784)
-
(2003)
Lecture Notes in Computer Science
, Issue.2357
, pp. 253-268
-
-
Dingledine, R.1
Syverson, P.2
-
21
-
-
74049136866
-
AS-awareness in tor path selection
-
S. Jha, A. D. Keromytis, and H. Chen, editors ACM Press
-
M. Edman and P. Syverson. AS-awareness in Tor path selection. In S. Jha, A. D. Keromytis, and H. Chen, editors, CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 380-389. ACM Press, 2009.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 380-389
-
-
Edman, M.1
Syverson, P.2
-
22
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
M. Edman and B. Yener. On anonymity in an electronic society: A survey of anonymous communication systems. ACM Computing Surveys, 42(1), 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
23
-
-
85076290610
-
A practical congestion attack on tor using long paths
-
Montreal, Canada, August USENIX Association
-
N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th USENIX Security Symposium, pages 33-50, Montreal, Canada, August 2009. USENIX Association.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 33-50
-
-
Evans, N.S.1
Dingledine, R.2
Grothoff, C.3
-
25
-
-
4944262982
-
Herbivore: A scalable and efficient protocol for anonymous communication
-
Ithaca, NY, February
-
S. Goel, M. Robson, M. Polte, and E. G. Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report 2003-1890, Cornell University, Ithaca, NY, February 2003.
-
(2003)
Technical Report 2003-1890, Cornell University
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
26
-
-
84955557456
-
Hiding routing information
-
Proceedings Springer-Verlag, LNCS 1174
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In Information Hiding: First International Workshop, Proceedings, pages 137-150. Springer-Verlag, LNCS 1174, 1996.
-
(1996)
Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
27
-
-
35048865464
-
Dining cryptographers revisited
-
Interlaken, Switzerland, May Springer-Verlag, LNCS 3027
-
P. Golle and A. Juels. Dining cryptographers revisited. In Advances in Cryptology - EUROCRYPT 2004, pages 456-473, Interlaken, Switzerland, May 2004. Springer-Verlag, LNCS 3027.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 456-473
-
-
Golle, P.1
Juels, A.2
-
29
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
R. Dingledine and P. Syverson, editors PET 2002 San Francisco, CA, USA, April Springer-Verlag, LNCS 2482
-
A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies: Second International Workshop, PET 2002, pages 171-178, San Francisco, CA, USA, April 2002. Springer-Verlag, LNCS 2482.
-
(2002)
Privacy Enhancing Technologies: Second International Workshop
, pp. 171-178
-
-
Hintz, A.1
-
30
-
-
77949464624
-
How much anonymity does network latency leak?
-
February
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? ACM Transactions on Information and System Security, 13(2):13-28, 2010. February.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
, pp. 13-28
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
31
-
-
70350543794
-
More anonymous onion routing through trust
-
CSF 2009 Port Jefferson, New York, July IEEE Computer Society
-
A. Johnson and P. Syverson. More anonymous onion routing through trust. In 22nd IEEE Computer Security Foundations Symposium, CSF 2009, pages 3-12, Port Jefferson, New York, July 2009. IEEE Computer Society.
-
(2009)
22nd IEEE Computer Security Foundations Symposium
, pp. 3-12
-
-
Johnson, A.1
Syverson, P.2
-
33
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
DOI 10.1145/1180405.1180437, 1180437, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, editors, CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 255-263. ACM Press, 2006. (Pubitemid 47131374)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
34
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
Privacy Enhancing Technologies - 4th International Workshop, PET 2004
-
N. Mathewson and R. Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In D. Martin and A. Serjantov, editors, Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Revised Selected Papers, pages 17-34. Springer Verlag, LNCS 3424, 2005. (Pubitemid 41251994)
-
(2005)
Lecture Notes in Computer Science
, vol.3424
, pp. 17-34
-
-
Mathewson, N.1
Dingledine, R.2
-
36
-
-
27544454707
-
Low-cost traffic analysis of Tor
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 183-195, 2005. (Pubitemid 41543655)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
37
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
N. Borisov and P. Golle, editors Ottawa, Canada, June Springer
-
S. J. Murdoch and P. Zieliński. Sampled traffic analysis by internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
Murdoch, S.J.1
Zieliński, P.2
-
42
-
-
78249256062
-
Trust in anonymity networks
-
P. Gastin and F. Laroussinie, editors Springer-Verlag, LNCS 6269
-
V. Sassone, S. Hamadou, and M. Yang. Trust in anonymity networks. In P. Gastin and F. Laroussinie, editors, CONCUR 2010 - Concurrency Theory: 21st International Conference, pages 48-70. Springer-Verlag, LNCS 6269, 2010.
-
(2010)
CONCUR 2010 - Concurrency Theory: 21St International Conference
, pp. 48-70
-
-
Sassone, V.1
Hamadou, S.2
Yang, M.3
-
44
-
-
84957802536
-
Towards an Information Theoretic Metric for Anonymity
-
Privacy Enhancing Technologies
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies, Second International Workshop, PET 2002, Revised Papers, pages 41-53. Springer-Verlag, LNCS 2482, 2003. (Pubitemid 36309878)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
47
-
-
80755144191
-
Trust-based anonymous communication: Adversary models and routing algorithms
-
P. Syverson, A. Johnson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: Adversary models and routing algorithms. Technical report, University of Texas at Austin, 2011.
-
(2011)
Technical Report, University of Texas at Austin
-
-
Syverson, P.1
Johnson, A.2
Dingledine, R.3
Mathewson, N.4
-
48
-
-
84937565289
-
Towards an Analysis of Onion Routing Security
-
Designing Privacy Enhancing Technologies
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Proceedings, pages 96-114. Springer-Verlag, LNCS 2009, July 2001. (Pubitemid 33241789)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
49
-
-
80755145252
-
-
The Tor project home page. https://www.torproject.org/.
-
-
-
-
50
-
-
80755134989
-
-
April
-
Tor metrics portal. https://metrics.torproject.org/, April 2011.
-
(2011)
-
-
-
51
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Privacy Enhancing Technologies - 4th International Workshop, PET 2004
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), pages 207-225, 2004. (Pubitemid 41252005)
-
(2005)
Lecture Notes in Computer Science
, vol.3424
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|