-
1
-
-
85180406236
-
-
Tor blog. https://blog.torproject.org/blog/tor-project-infrastructure-updates.
-
-
-
-
5
-
-
84865622599
-
All your contacts are belong to us: automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW, 2009.
-
(2009)
WWW
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
8
-
-
0038684291
-
-
White paper, Zero Knowledge Systems, Inc
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., 2000.
-
(2000)
Freedom systems 2.0 architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
9
-
-
33645586953
-
The anonymizer: Protecting user privacy on the web
-
J. Boyan. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine, 4(9), 1997.
-
(1997)
Computer-Mediated Communication Magazine
, vol.4
, Issue.9
-
-
Boyan, J.1
-
10
-
-
84887074866
-
Drac: an architecture for anonymous low-volume communications
-
G. Danezis, C. Diaz, C. Troncoso, and B. Laurie. Drac: an architecture for anonymous low-volume communications. In PETS, 2010.
-
(2010)
PETS
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
Laurie, B.4
-
12
-
-
85180633166
-
Sybilinfer: Detecting Sybil nodes using social networks
-
G. Danezis and P. Mittal. Sybilinfer: Detecting Sybil nodes using social networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
15
-
-
4544304744
-
The Sybil Attack
-
J. Douceur. The Sybil Attack. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
17
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Freedman, M. J.1
Morris, R.2
-
18
-
-
84892455410
-
Predicting tie strength with social media
-
E. Gilbert and K. Karahalios. Predicting tie strength with social media. In CHI, 2009.
-
(2009)
CHI
-
-
Gilbert, E.1
Karahalios, K.2
-
19
-
-
70349298073
-
Tor at heart of embassy passwords leak
-
September 10
-
D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
-
(2007)
The Register
-
-
Goodin, D.1
-
20
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1), 1970.
-
(1970)
Biometrika
, vol.57
, Issue.1
-
-
Hastings, W. K.1
-
21
-
-
85180402448
-
Clockscalpel: Understanding root causes of Internet clock synchronization inaccuracy
-
C.-Y. Hong, C.-C. Lin, and M. Caesar. Clockscalpel: Understanding root causes of Internet clock synchronization inaccuracy. In PAM, 2011.
-
(2011)
PAM
-
-
Hong, C.-Y.1
Lin, C.-C.2
Caesar, M.3
-
22
-
-
85177693003
-
Rainbow: A robust and invisible non-blind watermark for network flows
-
A. Houmansadr, N. Kiyavash, and N. Borisov. Rainbow: A robust and invisible non-blind watermark for network flows. In NDSS, 2009.
-
(2009)
NDSS
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
23
-
-
80755145229
-
-
I2P
-
I2P. I2P anonymous network. http://www.i2p2.de/index.html, 2003.
-
(2003)
I2P anonymous network
-
-
-
24
-
-
84896777836
-
Reverse social engineering attacks in online social networks
-
D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In DIMVA, 2011.
-
(2011)
DIMVA
-
-
Irani, D.1
Balduzzi, M.2
Balzarotti, D.3
Kirda, E.4
Pu, C.5
-
25
-
-
85168422949
-
More anonymous onion routing through trust
-
A. Johnson and P. Syverson. More anonymous onion routing through trust. In IEEE CSF, 2009.
-
(2009)
IEEE CSF
-
-
Johnson, A.1
Syverson, P.2
-
26
-
-
80755168359
-
Trust-based anonymous communication: adversary models and routing algorithms
-
A. Johnson, P. F. Syverson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: adversary models and routing algorithms. In ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Johnson, A.1
Syverson, P. F.2
Dingledine, R.3
Mathewson, N.4
-
27
-
-
4243128193
-
On clusterings: Good, bad and spectral
-
R. Kannan, S. Vempala, and A. Vetta. On clusterings: Good, bad and spectral. J. ACM, 51(3), 2004.
-
(2004)
J. ACM
, vol.51
, Issue.3
-
-
Kannan, R.1
Vempala, S.2
Vetta, A.3
-
29
-
-
84863903676
-
Whanaungatanga: A Sybil-proof distributed hash table
-
C. Lesniewski-Laas and M. F. Kaashoek. Whanaungatanga: A Sybil-proof distributed hash table. In NSDI, 2010.
-
(2010)
NSDI
-
-
Lesniewski-Laas, C.1
Kaashoek, M. F.2
-
30
-
-
85084162792
-
Attack-resistant trust metrics for public key certification
-
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In USENIX Security, 1998.
-
(1998)
USENIX Security
-
-
Levien, R.1
Aiken, A.2
-
32
-
-
85180404584
-
Guessing and entropy
-
J. L. Massey. Guessing and entropy. In IEEE ISIT, 1994.
-
(1994)
IEEE ISIT
-
-
Massey, J. L.1
-
34
-
-
5744249209
-
Equation of state calculations by fast computing machines
-
N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller. Equation of state calculations by fast computing machines. The Journal of Chemical Physics, 21(6), 1953.
-
(1953)
The Journal of Chemical Physics
, vol.21
, Issue.6
-
-
Metropolis, N.1
Rosenbluth, A. W.2
Rosenbluth, M. N.3
Teller, A. H.4
Teller, E.5
-
36
-
-
77951462266
-
AP3: Cooperative, decentrialized anonymous communication
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentrialized anonymous communication. ACM SIGOPS European Workshop, 2004.
-
(2004)
ACM SIGOPS European Workshop
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D. S.6
-
37
-
-
70349273917
-
Infomation leaks in structured peer-to-peer anonymous communication systems
-
P. Mittal and N. Borisov. Infomation leaks in structured peer-to-peer anonymous communication systems. ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Mittal, P.1
Borisov, N.2
-
38
-
-
74049096681
-
Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
-
P. Mittal and N. Borisov. Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies. ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Mittal, P.1
Borisov, N.2
-
40
-
-
84869484713
-
X-vine: Secure and pseudonymous routing using social networks
-
P. Mittal, M. Caesar, and N. Borisov. X-vine: Secure and pseudonymous routing using social networks. In NDSS, 2012.
-
(2012)
NDSS
-
-
Mittal, P.1
Caesar, M.2
Borisov, N.3
-
41
-
-
84962047384
-
PIR-Tor: Scalable anonymous communication using private information retrieval
-
P. Mittal, F. Olumofin, C. Troncoso, N. Borisov, and I. Goldberg. PIR-Tor: Scalable anonymous communication using private information retrieval. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Mittal, P.1
Olumofin, F.2
Troncoso, C.3
Borisov, N.4
Goldberg, I.5
-
42
-
-
85180405994
-
Preserving link privacy in social network based systems
-
P. Mittal, C. Papamanthou, and D. Song. Preserving link privacy in social network based systems. In NDSS, 2013.
-
(2013)
NDSS
-
-
Mittal, P.1
Papamanthou, C.2
Song, D.3
-
43
-
-
78650907130
-
Measuring the mixing time of social graphs
-
A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010.
-
(2010)
IMC
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
44
-
-
84877951088
-
Anonymity in the wild: mixes on unstructured networks
-
S. Nagaraja. Anonymity in the wild: mixes on unstructured networks. In PETS, 2007.
-
(2007)
PETS
-
-
Nagaraja, S.1
-
45
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
A. Nambiar and M. Wright. Salsa: A structured approach to large-scale anonymity. ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Nambiar, A.1
Wright, M.2
-
46
-
-
74049122426
-
NISAN: Network information service for anonymization networks
-
A. Panchenko, S. Richter, and A. Rache. NISAN: Network information service for anonymization networks. ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Panchenko, A.1
Richter, S.2
Rache, A.3
-
47
-
-
78649989557
-
-
Aug. v0.34
-
A. Pfitzmann and M. Hansen. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tudresden.de/literatur/Anon Terminology v0.34.pdf, Aug. 2010. v0.34.
-
(2010)
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management
-
-
Pfitzmann, A.1
Hansen, M.2
-
48
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
June
-
M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1), June 1998.
-
(1998)
ACM TISSEC
, vol.1
, Issue.1
-
-
Reiter, M.1
Rubin, A.2
-
49
-
-
20444437836
-
Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection. WPES, 2002.
-
(2002)
WPES
-
-
Rennhard, M.1
Plattner, B.2
-
50
-
-
0003007594
-
Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems
-
A. Rowstron and P. Druschel. Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In MIDDLEWARE, 2001.
-
(2001)
MIDDLEWARE
-
-
Rowstron, A.1
Druschel, P.2
-
51
-
-
84866953244
-
Balancing the shadows
-
M. Schuchard, A. W. Dean, V. Heorhiadi, N. Hopper, and Y. Kim. Balancing the shadows. In WPES, 2010.
-
(2010)
WPES
-
-
Schuchard, M.1
Dean, A. W.2
Heorhiadi, V.3
Hopper, N.4
Kim, Y.5
-
52
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PETS, 2002.
-
(2002)
PETS
-
-
Serjantov, A.1
Danezis, G.2
-
53
-
-
84945266114
-
Measuring relationship anonymity in mix networks
-
V. Shmatikov and M.-H. Wang. Measuring relationship anonymity in mix networks. In ACM WPES, 2006.
-
(2006)
ACM WPES
-
-
Shmatikov, V.1
Wang, M.-H.2
-
54
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for Internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans. Netw., 11(1):17-32, 2003.
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D. R.4
Kaashoek, M. F.5
Dabek, F.6
Balakrishnan, H.7
-
57
-
-
85056528164
-
Breaking the collusion detection mechanism of MorphMix
-
P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In PETS, 2006.
-
(2006)
PETS
-
-
Tabriz, P.1
Borisov, N.2
-
58
-
-
84870633783
-
-
The Tor Project. Tor metrics portal. http://metrics.torproject.org/.
-
Tor metrics portal
-
-
-
60
-
-
84994593259
-
-
The Tor Project
-
The Tor Project. Who uses Tor. http://www.torproject.org/about/torusers.html. en.
-
Who uses Tor
-
-
-
61
-
-
74049098547
-
Membership-concealing overlay networks
-
E. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim. Membership-concealing overlay networks. In CCS, 2009.
-
(2009)
CCS
-
-
Vasserman, E.1
Jansen, R.2
Tyra, J.3
Hopper, N.4
Kim, Y.5
-
64
-
-
85091916526
-
In search of an anonymous and secure lookup
-
Q. Wang, P. Mittal, and N. Borisov. In search of an anonymous and secure lookup. In ACM CCS, 2010.
-
(2010)
ACM CCS
-
-
Wang, Q.1
Mittal, P.2
Borisov, N.3
-
65
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the Internet
-
X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In ACM CCS, 2005.
-
(2005)
ACM CCS
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
66
-
-
70349153347
-
User interactions in social networks and their implications
-
C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In Eurosys, 2009.
-
(2009)
Eurosys
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K. P.4
Zhao, B. Y.5
-
67
-
-
70449694823
-
Sybillimit: A near-optimal social network defense against Sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Yu, H.1
Gibbons, P. B.2
Kaminsky, M.3
Xiao, F.4
-
68
-
-
35548992569
-
SybilGuard: Defending against Sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
-
69
-
-
84893628934
-
DSSS-based flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao. DSSS-based flow marking technique for invisible traceback. In IEEE S&P, 2007.
-
(2007)
IEEE S&P
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
|