-
1
-
-
84866946287
-
Provably secure and practical onion routing
-
BACKES, M., GOLDBERG, I., KATE, A., AND MOHAMMADI, E. 2012. Provably secure and practical onion routing. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 12). 369-385.
-
(2012)
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 12).
, pp. 369-385
-
-
Backes, M.1
Goldberg, I.2
Kate, A.3
Mohammadi, E.4
-
2
-
-
79959681025
-
Low-resource routing attacks against tor
-
BAUER, K., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. 2007. Low-resource routing attacks against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 07). 11-20.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 07).
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
3
-
-
13644250069
-
Buses for anonymous message delivery
-
BEIMEL, A. AND DOLEV, S. 2003. Buses for anonymous message delivery. J. Cryptol. 16, 1, 25-39.
-
(2003)
J. Cryptol.
, vol.16
, Issue.1
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
6
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
CANETTI, R. 2000. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067. http://eprint.iacr.org/.
-
(2000)
Cryptology EPrint Archive, Report 2000/067.
-
-
Canetti, R.1
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 4, 2, 84-88.
-
(1981)
Comm. ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability. International Association for Cryptology Research
-
CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. International Association for Cryptology Research. J. Cryptol. 1, 1, 65-75.
-
(1988)
J. Cryptol.
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
12
-
-
3242815149
-
Towards measuring anonymity
-
DÍAZ, C., SEYS, S., CLAESSENS, J., AND PRENEEL, B. 2002. Towards measuring anonymity. In Proceedings of the 2nd Privacy Enhancing Technologies Workshop (PET 02). 54-68.
-
(2002)
Proceedings of the 2nd Privacy Enhancing Technologies Workshop (PET 02).
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
19
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
HALPERN, J. Y. AND O'NEILL, K. R. 2005. Anonymity and information hiding in multiagent systems. J. Comput. Secur. 13, 3, 483-514.
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.3
, pp. 483-514
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
21
-
-
77949464624
-
How much anonymity does network latency leak?
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. 2010. How much anonymity does network latency leak? ACM Trans. Inf. Syst. Sec. 13, 2, 1-28.
-
(2010)
ACM Trans. Inf. Syst. Sec.
, vol.13
, Issue.2
, pp. 1-28
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
22
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
HUGHES, D. AND SHMATIKOV, V. 2004. Information hiding, anonymity and privacy: A modular approach. J. Comput. Secur. 12, 1, 3-36.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
27
-
-
84855789346
-
-
LOESING ET AL.
-
LOESING ET AL. 2011. Tor metrics portal. https://metrics.torproject.org/.
-
(2011)
Tor Metrics Portal.
-
-
-
31
-
-
74049096125
-
Scalable onion routing with Torsk
-
ACM Press
-
MCLACHLAN, J., TRAN, A., AND HOPPER, N. 2009. Scalable onion routing with Torsk. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09). ACM Press, 590-599.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
-
39
-
-
0032074579
-
Anonymous connections and onion routing
-
REED, M. G., SYVERSON, P. F., AND GOLDSCHLAG, D. M. 1998. Anonymous connections and onion routing. IEEE J. Select. Areas Comm. 16, 4, 482-494.
-
(1998)
IEEE J. Select. Areas Comm.
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
40
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
REITER, M. AND RUBIN, A. 1998. Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 1, 66-92.
-
(1998)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
43
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
SHMATIKOV, V. 2004. Probabilistic model checking of an anonymity system. J. Comput. Secur. 12, 3-4, 355-377.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
46
-
-
84937565289
-
Towards an analysis of onion routing security
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. 2000b. Towards an analysis of onion routing security. In Proceedings of the Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability. 96-114.
-
(2000)
Proceedings of the Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability.
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
50
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
WRIGHT, M. K., ADLER, M., LEVINE, B. N., AND SHIELDS, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7, 4, 489-522.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|