-
2
-
-
34047223710
-
-
PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA
-
B. Adida. Advances in cryptographic voting systems. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2006.
-
(2006)
Advances in Cryptographic Voting Systems
-
-
Adida, B.1
-
4
-
-
85076878664
-
-
September
-
Anonymizer, September 2012. http://anonymizer.com/.
-
(2012)
-
-
-
6
-
-
79959681025
-
Low-resource routing attacks against Tor
-
Oct
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against Tor. In WPES, Oct. 2007.
-
(2007)
WPES
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
7
-
-
0001868672
-
Optimal asymmetric encryption - How to encrypt with RSA
-
May
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In Eurocrypt, May 1994.
-
(1994)
Eurocrypt
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
85076876950
-
-
Apr
-
S. L. Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castellucia, and W. Dabbous. De-anonymizing BitTorrent users on Tor, Apr. 2010. http://arxiv.org/abs/1004.1267.
-
(2010)
De-Anonymizing BitTorrent Users on Tor
-
-
Blond, S.L.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Legout, A.5
Castellucia, C.6
Dabbous, W.7
-
10
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
Oct
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In ACM CCS, Oct. 2007.
-
(2007)
ACM CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
11
-
-
84863302085
-
Efficient anonymity-preserving data collection
-
Aug
-
J. Brickell and V. Shmatikov. Efficient anonymity-preserving data collection. In ACM KDD, Aug. 2006.
-
(2006)
ACM KDD
-
-
Brickell, J.1
Shmatikov, V.2
-
12
-
-
0001038609
-
Practical byzantine fault tolerance
-
Feb
-
M. Castro and B. Liskov. Practical byzantine fault tolerance. In OSDI, Feb. 1999.
-
(1999)
OSDI
-
-
Castro, M.1
Liskov, B.2
-
13
-
-
60349122307
-
Identifying proxy nodes in a Tor anonymization circuit
-
Nov
-
S. Chakravarty, A. Stavrou, and A. D. Keromytis. Identifying proxy nodes in a Tor anonymization circuit. In SITIS, Nov. 2008.
-
(2008)
SITIS
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
14
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Jan
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, Jan. 1988.
-
(1988)
Journal of Cryptology
-
-
Chaum, D.1
-
15
-
-
0002187137
-
Wallet databases with observers
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. CRYPTO, 1992.
-
(1992)
CRYPTO
-
-
Chaum, D.1
Pedersen, T.P.2
-
16
-
-
85076926921
-
Planetlab: An overlay testbed for broad-coverage services
-
July
-
B. Chun et al. PlanetLab: An overlay testbed for broad-coverage services. In ACM CCR, July 2003.
-
(2003)
ACM CCR
-
-
Chun, B.1
-
17
-
-
84894168177
-
Usability of anonymous web browsing: An examination of tor interfaces and deploy-ability
-
J. Clark, P. C. van Oorschot, and C. Adams. Usability of anonymous web browsing: an examination of tor interfaces and deploy-ability. In SOUPS, 2007.
-
(2007)
SOUPS
-
-
Clark, J.1
Van Oorschot, P.C.2
Adams, C.3
-
19
-
-
84874445658
-
Civitas: Toward a secure voting system
-
may
-
M. Clarkson, S. Chong, and A. Myers. Civitas: Toward a secure voting system. In IEEE SP, may 2008.
-
(2008)
IEEE SP
-
-
Clarkson, M.1
Chong, S.2
Myers, A.3
-
20
-
-
78650018339
-
Dissent: Accountable anonymous group messaging
-
Oct
-
H. Corrigan-Gibbs and B. Ford. Dissent: accountable anonymous group messaging. In ACM CCS, Oct. 2010.
-
(2010)
ACM CCS
-
-
Corrigan-Gibbs, H.1
Ford, B.2
-
21
-
-
80755134967
-
Mixminion: Design of a Type III anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III anonymous remailer protocol. In IEEE SP, May 2003.
-
(2003)
IEEE SP
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
24
-
-
85076882949
-
How governments have tried to block Tor
-
R. Dingledine and J. Appelbaum. How governments have tried to block Tor, 2012. Tor project presentation, https://svn.torproject.org/svn/projects/presentations/ slides-28c3.pdf.
-
(2012)
Tor Project Presentation
-
-
Dingledine, R.1
Appelbaum, J.2
-
25
-
-
80052008741
-
Design of a blocking-resistant anonymity system
-
Nov
-
R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system, Nov. 2006. Tor Project technical report, https://svn.torproject.org/svn/projects/design-paper/blocking.html.
-
(2006)
Tor Project Technical Report
-
-
Dingledine, R.1
Mathewson, N.2
-
27
-
-
84864195701
-
How unique is your web browser?
-
July
-
P. Eckersley. How unique is your web browser? In PETS, July 2010.
-
(2010)
PETS
-
-
Eckersley, P.1
-
28
-
-
74049136866
-
As-awareness in tor path selection
-
M. Edman and P. Syverson. As-awareness in tor path selection. In ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Edman, M.1
Syverson, P.2
-
30
-
-
85076880866
-
Protecting consumer privacy in an era of rapid change
-
Federal Trade Commission. Dec
-
Federal Trade Commission. Protecting consumer privacy in an era of rapid change, Dec. 2010. Preliminary FTC Staff Report.
-
(2010)
Preliminary FTC Staff Report
-
-
-
31
-
-
85076879016
-
Fast and secure distributed read-only file system
-
Feb
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM TOCS, Feb. 2002.
-
(2002)
ACM TOCS
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
32
-
-
35048813315
-
An efficient scheme for proving a shuffle
-
Aug
-
J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In CRYPTO, Aug. 2001.
-
(2001)
CRYPTO
-
-
Furukawa, J.1
Sako, K.2
-
33
-
-
78649299876
-
Location privacy in mobile systems: A personalized anonymization model
-
june
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In IEEE ICDCS, june 2005.
-
(2005)
IEEE ICDCS
-
-
Gedik, B.1
Liu, L.2
-
34
-
-
35348924316
-
Prive: Anonymous location-based queries in distributed mobile systems
-
May
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In 16th WWW, May 2007.
-
(2007)
16th WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
35
-
-
4944262982
-
-
Technical Report 2003-1890, Cornell University, February
-
S. Goel, M. Robson, M. Polte, and E. G. Sirer. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report 2003-1890, Cornell University, February 2003.
-
(2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
36
-
-
32344447491
-
Dining cryptographers revisited
-
May
-
P. Golle and A. Juels. Dining cryptographers revisited. Eurocrypt, May 2004.
-
(2004)
Eurocrypt
-
-
Golle, P.1
Juels, A.2
-
38
-
-
85084162733
-
Hiding amongst the clouds: A proposal for cloud-based onion routing
-
Aug
-
N. Jones, M. Arye, J. Cesareo, and M. J. Freedman. Hiding amongst the clouds: A proposal for cloud-based onion routing. In FOCI, Aug. 2011.
-
(2011)
FOCI
-
-
Jones, N.1
Arye, M.2
Cesareo, J.3
Freedman, M.J.4
-
40
-
-
0035522322
-
Technologies of protest: Insurgent social movements and the First Amendment in the era of the Internet
-
October
-
S. F. Kreimer. Technologies of protest: Insurgent social movements and the First Amendment in the era of the Internet. University of Pennsylvania Law Review, October 2001.
-
(2001)
University of Pennsylvania Law Review
-
-
Kreimer, S.F.1
-
41
-
-
33751069196
-
NetTop: Commercial technology in high assurance applications
-
R. Meushaw and D. Simard. NetTop: Commercial technology in high assurance applications. Tech Trend Notes, 2000.
-
(2000)
Tech Trend Notes
-
-
Meushaw, R.1
Simard, D.2
-
42
-
-
77951462266
-
AP3: Cooperative, decentralized anonymous communication
-
Sept
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In ACM SIGOPS EW, Sept. 2004.
-
(2004)
ACM SIGOPS EW
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
44
-
-
35048890924
-
A verifiable secret shuffle and its application to e-voting
-
Nov
-
C. A. Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS, Nov. 2001.
-
(2001)
ACM CCS
-
-
Neff, C.A.1
-
45
-
-
84869385723
-
Website fingerprinting in onion routing based anonymization networks
-
Oct
-
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In WPES, Oct. 2011.
-
(2011)
WPES
-
-
Panchenko, A.1
Niessen, L.2
Zinnen, A.3
Engel, T.4
-
48
-
-
85046400337
-
Rushdie runs afoul of web's real-name police
-
Nov
-
S. Sengupta. Rushdie runs afoul of web's real-name police. New York Times, Nov. 2011.
-
(2011)
New York Times
-
-
Sengupta, S.1
-
49
-
-
77951431567
-
Eluding carnivores: File sharing with strong anonymity
-
Sept
-
E. G. Sirer et al. Eluding carnivores: File sharing with strong anonymity. In ACM SIGOPS EW, Sept. 2004.
-
(2004)
ACM SIGOPS EW
-
-
Sirer, E.G.1
-
50
-
-
84970898907
-
BridgeSpa: Improving Tor bridges with single packet authorization
-
Oct
-
R. Smits et al. BridgeSPA: Improving Tor bridges with single packet authorization. In WPES, Oct. 2011.
-
(2011)
WPES
-
-
Smits, R.1
-
51
-
-
77953112077
-
-
Aug
-
A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle. Flash cookies and privacy, Aug. 2009.
-
(2009)
Flash Cookies and Privacy
-
-
Soltani, A.1
Canty, S.2
Mayo, Q.3
Thomas, L.4
Hoofnagle, C.J.5
-
52
-
-
78650018760
-
The cocaine auction protocol: On the power of anonymous broadcast
-
Sept
-
F. Stajano and R. Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In Information Hiding Workshop, Sept. 1999.
-
(1999)
Information Hiding Workshop
-
-
Stajano, F.1
Anderson, R.2
-
54
-
-
80755188477
-
Sleeping dogs lie on a bed of onions but wake when mixed
-
July
-
P. Syverson. Sleeping dogs lie on a bed of onions but wake when mixed. In HotPETs, July 2011.
-
(2011)
HotPETs
-
-
Syverson, P.1
-
56
-
-
0033244305
-
Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference
-
May
-
A. Teich, M. S. Frankel, R. Kling, and Y. Lee. Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference. Information Society, May 1999.
-
(1999)
Information Society
-
-
Teich, A.1
Frankel, M.S.2
Kling, R.3
Lee, Y.4
-
57
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
May
-
E. Volokh. Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you. Stanford Law Review, May 2000.
-
(2000)
Stanford Law Review
-
-
Volokh, E.1
-
58
-
-
6244294214
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
-
Apr
-
M. Waidner and B. Pfitzmann. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Eurocrypt, Apr. 1989.
-
(1989)
Eurocrypt
-
-
Waidner, M.1
Pfitzmann, B.2
-
62
-
-
85084160016
-
Fine-grained censorship mapping information sources, legality and ethics
-
Aug
-
J. Wright, T. de Souza, and I. Brown. Fine-grained censorship mapping information sources, legality and ethics. In FOCI, Aug. 2011.
-
(2011)
FOCI
-
-
Wright, J.1
De Souza, T.2
Brown, I.3
|