-
1
-
-
84921020129
-
A lattice-based computationally-efficient private information retrieval protocol, 2007
-
Accessed February 2011
-
C. Aguilar-Melchor and P. Gaborit. A lattice-based computationally-efficient private information retrieval protocol, 2007. Presented at WEWORC 2007. http: //eprint.iacr.org/2007/446.pdf, Accessed February 2011.
-
(2007)
WEWORC
-
-
Aguilar-Melchor, C.1
Gaborit, P.2
-
2
-
-
79959681025
-
Low-resource routing attacks against Tor
-
In Ting Yu, editor, ACM
-
K. S. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. C. Sicker. Low-resource routing attacks against Tor. In Ting Yu, editor, ACM Workshop on Privacy in the Electronic Society (WPES 2007), pages 11-20. ACM, 2007.
-
(2007)
ACM Workshop on Privacy in the Electronic Society (WPES 2007)
, pp. 11-20
-
-
Bauer, K.S.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.C.5
-
3
-
-
84946840347
-
Short signatures from the Weil pairing
-
In C. Boyd, editor, 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), Springer
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In C. Boyd, editor, 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
50249119735
-
Denial of service or denial of security?
-
In S De Capitani di Vimercati and P. F. Syverson, editors,. ACM
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? In S. De Capitani di Vimercati and P. F. Syverson, editors, ACM Conference on Computer and Communications Security (CCS 2007), pages 92-102. ACM, 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
5
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In IEEE Annual Symposium on Foundations of Computer Science (FOCS 95), pages 41-50, 1995.
-
(1995)
IEEE Annual Symposium on Foundations of Computer Science (FOCS 95)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
70349301122
-
Route fingerprinting in anonymous communications
-
In A. Montresor, A. Wierzbicki, and N. Shahmehri, editors, IEEE Computer Society
-
G. Danezis and R. Clayton. Route fingerprinting in anonymous communications. In A. Montresor, A. Wierzbicki, and N. Shahmehri, editors, International Conference on Peer-to-Peer Computing (P2P 2006), pages 69-72. IEEE Computer Society, 2006.
-
(2006)
International Conference on Peer-to-Peer Computing (P2P 2006)
, pp. 69-72
-
-
Danezis, G.1
Clayton, R.2
-
7
-
-
50249147866
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
In N. Borisov and I. Goldberg, editors 8th Privacy Enhancing Technologies Symposium (PETS 2008), Springer
-
G. Danezis and P. F. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In N. Borisov and I. Goldberg, editors, 8th Privacy Enhancing Technologies Symposium (PETS 2008), volume 5134 of Lecture Notes in Computer Science, pages 151-166. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5134
, pp. 151-166
-
-
Danezis, G.1
Syverson, P.F.2
-
8
-
-
85076458635
-
-
January Accessed February 2011.
-
R. Dingledine. Clients download consensus + microdescriptors. https://gitweb.torproject.org/ tor.git/blob/master:/doc/spec/proposals/ 158-microdescriptors.txt, January 2009. Accessed February 2011.
-
(2009)
Clients Download Consensus + Microdescriptors
-
-
Dingledine, R.1
-
12
-
-
34548787882
-
Improving the robustness of private information retrieval
-
IEEE Computer Society
-
I. Goldberg. Improving the robustness of private information retrieval. In IEEE Symposium on Security and Privacy (S&P 2007), pages 131-148. IEEE Computer Society, 2007.
-
(2007)
IEEE Symposium on Security and Privacy (S&P 2007)
, pp. 131-148
-
-
Goldberg, I.1
-
13
-
-
85076488056
-
-
I. Goldberg. Percy++, 2010. https://sourceforge.net/ projects/percy/.
-
(2010)
Percy++
-
-
Goldberg, I.1
-
14
-
-
67650312114
-
On the anonymity of home/work location pairs
-
In H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, and Y. Tobe, editors, m 7th International Conference Pervasive Computing (Pervasive 2009), Springer
-
P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, and Y. Tobe, editors, 7th International Conference Pervasive Computing (Pervasive 2009), volume 5538 of Lecture Notes in Computer Science, pages 390-397. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5538
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
19
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
In F. Monrose, editor, USENIX Association
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In F. Monrose, editor, 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2008). USENIX Association, 2008.
-
(2008)
1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2008).
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
22
-
-
74049096125
-
Scalable onion routing with Torsk
-
In S. Jha and A. D. Keromytis, editors, ACM
-
J. McLachlan, A. Tran, N. Hopper, and Y. Kim. Scalable onion routing with Torsk. In S. Jha and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 590-599. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
23
-
-
70349273917
-
Information leaks in structured peer-topeer anonymous communication systems
-
In P. F. Syverson and S. Jha, editors, ACM
-
P. Mittal and N. Borisov. Information leaks in structured peer-topeer anonymous communication systems. In P. F. Syverson and S. Jha, editors, ACM Conference on Computer and Communications Security (CCS 2008), pages 267-278. ACM, 2008.
-
(2008)
ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 267-278
-
-
Mittal, P.1
Borisov, N.2
-
24
-
-
74049096681
-
ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies
-
In S. Jha and A. D. Keromytis, editors, ACM
-
P. Mittal and N. Borisov. ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies. In S. Jha and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security (CCS 2009), pages 161-172. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 161-172
-
-
Mittal, P.1
Borisov, N.2
-
25
-
-
85054509425
-
Scalable anonymous communication with provable security
-
USENIX Association
-
P. Mittal, N. Borisov, C. Troncoso, and A. Rial. Scalable anonymous communication with provable security. In 5th USENIX conference on Hot topics in security (HotSec'10), pages 1-16. USENIX Association, 2010.
-
(2010)
5th USENIX Conference on Hot Topics in Security (HotSec'10)
, pp. 1-16
-
-
Mittal, P.1
Borisov, N.2
Troncoso, C.3
Rial, A.4
-
26
-
-
85076457106
-
-
Technical Report CACR 2011-05, Centre for Applied Crytpographic Research
-
Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg. PIR-Tor: Scalable anonymous communication using private information retrieval. Technical Report CACR 2011-05, Centre for Applied Crytpographic Research, 2011. http://www.cacr.math.uwaterloo.ca/ techreports/2011/cacr2011-05.pdf.
-
(2011)
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
-
-
Mittal, P.1
Olumofin, F.2
Troncoso, C.3
Borisov, N.4
Goldberg, I.5
-
27
-
-
38149130456
-
Sampled traffic analysis by internet-exchange-level adversaries
-
In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Workshop (PET 2007), Springer
-
S. J. Murdoch and P. Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Workshop (PET 2007), volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
29
-
-
34547281136
-
Salsa: A structured approach to largescale anonymity
-
In R. N. Wright and S. De Capitani di Vimercati, editors, ACM
-
A. Nambiar and M. Wright. Salsa: A structured approach to largescale anonymity. In R. N. Wright and S. De Capitani di Vimercati, editors, 13th ACM Conference on Computer and Communications Security (CCS 2006)), pages 17-26. ACM, 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS 2006))
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
31
-
-
77955329624
-
Building incentives into Tor
-
Springer
-
T.-W. Ngan, R. Dingledine, and D. S. Wallach. Building incentives into Tor. In 14th International Conference on Financial Cryptography and Data Security (FC 2010), volume 6052 of Lecture Notes in Computer Science, pages 238-256. Springer, 2010.
-
(2010)
14th International Conference on Financial Cryptography and Data Security (FC 2010), Volume 6052 of Lecture Notes in Computer Science
, pp. 238-256
-
-
Ngan, T.-W.1
Dingledine, R.2
Wallach, D.S.3
-
34
-
-
85076473294
-
-
June. Accessed February 2011.
-
P. Palfrader. Download server descriptors on demand. https://gitweb.torproject.org/tor. git/blob/master:/doc/spec/proposals/ 141-jit-sd-downloads.txt, June 2008. Accessed February 2011.
-
(2008)
Download Server Descriptors on Demand
-
-
Palfrader, P.1
-
35
-
-
74049122426
-
NISAN: Network information service for anonymization networks
-
In S. Jha and A. D. Keromytis, editors, ACM
-
A. Panchenko, S. Richter, and A. Rache. NISAN: network information service for anonymization networks. In S. Jha and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security (CCS 2009), pages 141-150. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 141-150
-
-
Panchenko, A.1
Richter, S.2
Rache, A.3
-
36
-
-
78650332400
-
-
July 2007. Presented at Black Hat USA on July 2007
-
M. Perry. Securing the Tor network, July 2007. Presented at Black Hat USA on July 2007.
-
Securing the Tor Network
-
-
Perry, M.1
-
37
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
In H. Federrath, editor, Springer-Verlag
-
J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 10-29. Springer-Verlag, 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of Lecture Notes in Computer Science
, pp. 10-29
-
-
Raymond, J.-F.1
-
38
-
-
0038041177
-
Introducing MorphMix: Peer-topeer based anonymous internet usage with collusion detection
-
In S. Jajodia and P. Samarati, editors, ACM
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-topeer based anonymous internet usage with collusion detection. In S. Jajodia and P. Samarati, editors, ACM Workshop on Privacy in the Electronic Society (WPES 2002), pages 91-102. ACM, 2002.
-
(2002)
ACM Workshop on Privacy in the Electronic Society (WPES 2002)
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
39
-
-
78650188331
-
Balancing the shadows
-
In K. Frikken, editor, ACM
-
M. Schuchard, A.W. Dean, V. Heorhiadi, N. Hopper, and Y. Kim. Balancing the shadows. In K. Frikken, editor, 9th ACM workshop on Privacy in the electronic society (WPES 2010), pages 1-10. ACM, 2010.
-
(2010)
9th ACM Workshop on Privacy in the Electronic Society (WPES 2010)
, pp. 1-10
-
-
Schuchard, M.1
Dean, A.W.2
Heorhiadi, V.3
Hopper, N.4
Kim, Y.5
-
40
-
-
85180538667
-
A3: An extensible platform for application-aware anonymity
-
The Internet Society
-
M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. Thau Loo, and M. Blaze. A3: An extensible platform for application-aware anonymity. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2010), pages 247-266. The Internet Society, 2010.
-
(2010)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2010)
, pp. 247-266
-
-
Sherr, M.1
Mao, A.2
Marczak, W.R.3
Zhou, W.4
Thau Loo, B.5
Blaze, M.6
-
42
-
-
79960549105
-
Improving security and performance in the Tor network through tunable path selection
-
preprint
-
Robin Snader and Nikita Borisov. Improving security and performance in the Tor network through tunable path selection. IEEE Transactions on Dependable and Secure Computing, 2010. http://dx.doi.org/10.1109/TDSC.2010.40 (preprint).
-
(2010)
IEEE Transactions on Dependable and Secure Computing
-
-
Snader, R.1
Borisov, N.2
-
43
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics, 25:98-110, 1997.
-
(1997)
Journal of Law, Medicine and Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
44
-
-
77049097177
-
Breaking the collusion detection mechanism of MorphMix
-
In G. Danezis and P. Golle, editors, Springer
-
P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In G. Danezis and P. Golle, editors, Privacy Enhancing Technologies (PETS 2006), volume 4258 of Lecture Notes in Computer Science, pages 368-383. Springer, 2006.
-
(2006)
Privacy Enhancing Technologies (PETS 2006), Volume 4258 of Lecture Notes in Computer Science
, pp. 368-383
-
-
Tabriz, P.1
Borisov, N.2
-
45
-
-
84855658647
-
-
The Tor Project, February
-
The Tor Project. Tor metrics portal, February 2011. http://metrics.torproject.org/.
-
(2011)
Tor Metrics Portal
-
-
-
46
-
-
84994593259
-
-
The Tor Project, Accessed Februrary 2011.
-
The Tor Project. Who uses Tor. http://www.torproject. org/about/torusers.html.en. Accessed Februrary 2011.
-
Who Uses Tor
-
-
-
47
-
-
74049164513
-
Hashing it out in public: Common failure modes of DHT-based anonymity schemes
-
In S. Paraboschi, editor, ACM
-
A. Tran, N. Hopper, and Y. Kim. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In S. Paraboschi, editor, 8th ACM Workshop on Privacy in the Electronic Society (WPES 2009), pages 71-80. ACM, 2009.
-
(2009)
8th ACM Workshop on Privacy in the Electronic Society (WPES 2009)
, pp. 71-80
-
-
Tran, A.1
Hopper, N.2
Kim, Y.3
-
48
-
-
78649990817
-
In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems
-
In A. D. Keromytis and V. Shmatikov, editors,. ACM
-
Q. Wang, P. Mittal, and N. Borisov. In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems. In A. D. Keromytis and V. Shmatikov, editors, ACM Conference on Computer and Communications Security (CCS 2010), pages 308-318. ACM, 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 308-318
-
-
Wang, Q.1
Mittal, P.2
Borisov, N.3
|