-
1
-
-
50249119735
-
Denial of service or denial of security?
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? ACM CCS (2007).
-
(2007)
ACM CCS
-
-
BORISOV, N.1
DANEZIS, G.2
MITTAL, P.3
TABRIZ, P.4
-
3
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
(December)
-
CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. Secure routing for structured peer-to-peer overlay networks. In OSDI (December 2002).
-
(2002)
OSDI
-
-
CASTRO, M.1
DRUSCHEL, P.2
GANESH, A.3
ROWSTRON, A.4
WALLACH, D. S.5
-
4
-
-
85091912614
-
Route Fingerprinting in Anonymous Communications
-
DANEZIS, G., AND CLAYTON, R. Route Fingerprinting in Anonymous Communications. IEEE P2P (2006).
-
(2006)
IEEE P2P
-
-
DANEZIS, G.1
CLAYTON, R.2
-
5
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
DANEZIS, G., AND MITTAL, P. Sybilinfer: Detecting sybil nodes using social networks. In NDSS (2009).
-
(2009)
NDSS
-
-
DANEZIS, G.1
MITTAL, P.2
-
6
-
-
74049145915
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In PETS (2008).
-
(2008)
PETS
-
-
DANEZIS, G.1
SYVERSON, P.2
-
8
-
-
85019517087
-
Improving the robustness of private information retrieval
-
IEEE Computer Society
-
GOLDBERG, I. Improving the robustness of private information retrieval. In IEEE S&P (2007), IEEE Computer Society.
-
(2007)
IEEE S&P
-
-
GOLDBERG, I.1
-
9
-
-
0021409284
-
Probabilistic encryption
-
GOLDWASSER, S., AND MICALI, S. Probabilistic encryption. J. Comput. Syst. Sci. 28, 2 (1984), 270-299.
-
(1984)
J. Comput. Syst. Sci
, vol.28
, Issue.2
, pp. 270-299
-
-
GOLDWASSER, S.1
MICALI, S.2
-
10
-
-
70349298073
-
Tor at heart of embassy passwords leak
-
(September 10)
-
GOODIN, D. Tor at heart of embassy passwords leak. The Register (September 10 2007).
-
(2007)
The Register
-
-
GOODIN, D.1
-
11
-
-
84883261388
-
Replication is not needed: single database, computationally-private information retrieval
-
KUSHILEVITZ, E., AND OSTROVSKY, R. Replication is not needed: single database, computationally-private information retrieval. In FOCS 97.
-
FOCS
, vol.97
-
-
KUSHILEVITZ, E.1
OSTROVSKY, R.2
-
12
-
-
85091895343
-
Measuring the tor network: Evaluation of client requests to the directories
-
LO E S I N G, K
-
LO E S I N G, K. Measuring the tor network: Evaluation of client requests to the directories. Tech. Report (2009). https://git.torproject.org/checkout/metrics/master/ report/dirreq/directory- requests- 2009- 06- 26.pdf.
-
(2009)
Tech. Report
-
-
-
13
-
-
74049096125
-
Scalable onion routing with torsk
-
(November)
-
MCLACHLAN, J., TRAN, A., HOPPER, N., AND KIM, Y. Scalable onion routing with torsk. ACM CCS (November 2009).
-
(2009)
ACM CCS
-
-
MCLACHLAN, J.1
TRAN, A.2
HOPPER, N.3
KIM, Y.4
-
14
-
-
0009554659
-
Protocols for public key cryptosystems
-
MERKLE, R. Protocols for public key cryptosystems. In IEEE S&P (1980).
-
(1980)
IEEE S&P
-
-
MERKLE, R.1
-
15
-
-
77951462266
-
Ap3: Cooperative, decentrialized anonymous communication
-
MISLOVE, A., OBEROI, G., POST, A., REIS, C., DRUSCHEL, P., AND WALLACH, D. S. Ap3: Cooperative, decentrialized anonymous communication. ACM SIGOPS European Workshop (2004).
-
(2004)
ACM SIGOPS European Workshop
-
-
MISLOVE, A.1
OBEROI, G.2
POST, A.3
REIS, C.4
DRUSCHEL, P.5
WALLACH, D. S.6
-
16
-
-
70349273917
-
Infomation leaks in structured peer-to-peer anonymous communication systems
-
MITTAL, P., AND BORISOV, N. Infomation leaks in structured peer-to-peer anonymous communication systems. ACM CCS (2008).
-
(2008)
ACM CCS
-
-
MITTAL, P.1
BORISOV, N.2
-
17
-
-
74049096681
-
Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
-
MITTAL, P., AND BORISOV, N. Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies. ACM CCS (2009).
-
(2009)
ACM CCS
-
-
MITTAL, P.1
BORISOV, N.2
-
18
-
-
84855690631
-
Metrics for security and performance in low-latency anonymity systems
-
MURDOCH, S. J., AND WATSON, R. N. M. Metrics for security and performance in low-latency anonymity systems. In PETS (2008).
-
(2008)
PETS
-
-
MURDOCH, S. J.1
WATSON, R. N. M.2
-
19
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
NAMBIAR, A., AND WRIGHT, M. Salsa: A structured approach to large-scale anonymity. ACM CCS (2006).
-
(2006)
ACM CCS
-
-
NAMBIAR, A.1
WRIGHT, M.2
-
20
-
-
74049122426
-
Nisan: Network information service for anonymization networks
-
(November)
-
PANCHENKO, A., RICHTER, S., AND RACHE, A. Nisan: Network information service for anonymization networks. ACM CCS (November 2009).
-
(2009)
ACM CCS
-
-
PANCHENKO, A.1
RICHTER, S.2
RACHE, A.3
-
21
-
-
65549153230
-
News briefs
-
(April)
-
PAULSON, L. D. News briefs. IEEE Computer 39(4):17-19 (April 2006).
-
(2006)
IEEE Computer
, vol.39
, Issue.4
, pp. 17-19
-
-
PAULSON, L. D.1
-
22
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
(June)
-
REITER, M., AND RUBIN, A. Crowds: Anonymity for web transactions. ACM TISSEC 1, 1 (June 1998).
-
(1998)
ACM TISSEC
, vol.1
, pp. 1
-
-
REITER, M.1
RUBIN, A.2
-
23
-
-
20444437836
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
RENNHARD, M., AND PLATTNER, B. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. WPES (2002).
-
(2002)
WPES
-
-
RENNHARD, M.1
PLATTNER, B.2
-
24
-
-
0038311861
-
Towards an analysis of onion routing security
-
LNCS, Springer (July 2000)
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. Workshop on Design Issues in Anonymity and Unobservaility, vol. 2009, LNCS, Springer (July 2000).
-
(2009)
Workshop on Design Issues in Anonymity and Unobservaility
-
-
SYVERSON, P.1
TSUDIK, G.2
REED, M.3
LANDWEHR, C.4
-
25
-
-
85056528164
-
Breaking the collusion detection mechanism of MorphMix
-
TABRIZ, P., AND BORISOV, N. Breaking the collusion detection mechanism of MorphMix. In PET (2006).
-
(2006)
PET
-
-
TABRIZ, P.1
BORISOV, N.2
-
26
-
-
78650117154
-
Hashing it out in public: common failure modes of dht-based anonymity schemes
-
TRAN, A., HOPPER, N., AND KIM, Y. Hashing it out in public: common failure modes of dht-based anonymity schemes. In WPES (2009).
-
(2009)
WPES
-
-
TRAN, A.1
HOPPER, N.2
KIM, Y.3
-
27
-
-
85091916526
-
In search of an anonymous and secure lookup
-
WANG, Q., MITTAL, P., AND BORISOV, N. In search of an anonymous and secure lookup. In ACM CCS (2010).
-
(2010)
ACM CCS
-
-
WANG, Q.1
MITTAL, P.2
BORISOV, N.3
-
28
-
-
70449694823
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
YU, H., GIBBONS, P. B., KAMINSKY, M., AND XIAO, F. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE S&P (2008).
-
(2008)
IEEE S&P
-
-
YU, H.1
GIBBONS, P. B.2
KAMINSKY, M.3
XIAO, F.4
|