-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
April I. S. Moskowitz, Ed., Springer-Verlag, LNCS
-
BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of Information Hiding Workshop (IH 2001) (April 2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245–257.
-
(2001)
Proceedings of Information Hiding Workshop (IH 2001)
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
2
-
-
50249119735
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
New York, NY, USA, October ACM
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS’07: Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, October 2007), ACM, pp. 92–102.
-
(2007)
CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (February 1981), 84–90.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
5
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
May
-
DANEZIS, G., DINGLEDINE, R., AND MATHEWSON, N. Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003), pp. 2–15.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
7
-
-
84948958135
-
How to break a practical MIX and design a new one
-
Springer-Verlag, LNCS 1807
-
DESMEDT, Y., AND KUROSAWA, K. How to break a practical MIX and design a new one. In Advances in Cryptology — Eurocrypt 2000, Proceedings (2000), Springer-Verlag, LNCS 1807, pp. 557–572.
-
(2000)
Advances in Cryptology — Eurocrypt 2000, Proceedings
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
8
-
-
35248882142
-
Generalising mixes
-
March R. Dingledine, Ed., Springer-Verlag, LNCS
-
DIAZ, C., AND SERJANTOV, A. Generalising mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (March 2003), R. Dingledine, Ed., Springer-Verlag, LNCS 2760, pp. 18–31.
-
(2003)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2003)
, vol.2760
, pp. 18-31
-
-
Diaz, C.1
Serjantov, A.2
-
13
-
-
0003415244
-
-
The Internet Society, June
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MAS-INTER, L., LEACH, P., AND BERNERS-LEE, T. RFC 2616: Hypertext Transfer Protocol — HTTP/1.1. The Internet Society, June 1999.
-
(1999)
RFC 2616: Hypertext Transfer Protocol — HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Mas-Inter, L.5
Leach, P.6
Berners-Lee, T.7
-
14
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
New York, NY, USA, November ACM
-
FREEDMAN, M. J., AND MORRIS, R. Tarzan: a peer-to-peer anonymizing network layer. In CCS’02: Proceedings of the 9th ACM conference on Computer and communications security (New York, NY, USA, November 2002), ACM, pp. 193–206.
-
(2002)
CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
15
-
-
84910595881
-
Introducing tarzan, a peer-to-peer anonymizing network layer
-
London, UK, Springer-Verlag
-
FREEDMAN, M.J., SIT, E., CATES, J., AND MORRIS, R. Introducing tarzan, a peer-to-peer anonymizing network layer. In IPTPS’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems (London, UK, 2002), Springer-Verlag, pp. 121–129.
-
(2002)
IPTPS’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems
, pp. 121-129
-
-
Freedman, M.J.1
Sit, E.2
Cates, J.3
Morris, R.4
-
16
-
-
84955557456
-
Hiding routing information
-
May R. Anderson, Ed., Springer-Verlag, LNCS
-
GOLDSCHLAG, D. M., REED, M. G., AND SYVERSON, P. F. Hiding Routing Information. In Proceedings of Information Hiding: First International Workshop (May 1996), R. Anderson, Ed., Springer-Verlag, LNCS 1174, pp. 137–150.
-
(1996)
Proceedings of Information Hiding: First International Workshop
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
18
-
-
46149086782
-
Rumor riding: Anonymizing unstructured peer-to-peer systems
-
Washington, DC, USA, Nov IEEE Computer Society
-
HAN, J., AND LIU, Y. Rumor riding: Anonymizing unstructured peer-to-peer systems. In ICNP’06: Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols (Washington, DC, USA, Nov 2006), IEEE Computer Society, pp. 22–31.
-
(2006)
ICNP’06: Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
, pp. 22-31
-
-
Han, J.1
Liu, Y.2
-
19
-
-
70349692738
-
How much anonymity does network latency leak?
-
New York, NY, USA, October ACM
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. How much anonymity does network latency leak? In CCS’07: Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, October 2007), ACM, pp. 82–91.
-
(2007)
CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
21
-
-
84890010554
-
Stop-and-go mixes: Providing probabilistic anonymity in an open system
-
London, UK, Springer-Verlag, LNCS
-
KESDOGAN, D., EGNER, J., AND BÜSCHKES, R. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In Proceedings of the Second International Workshop on Information Hiding (London, UK, 1998), Springer-Verlag, LNCS 1525, pp. 83–98.
-
(1998)
Proceedings of the Second International Workshop on Information Hiding
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Büschkes, R.3
-
22
-
-
39349092234
-
Dynamic multipath onion routing in anonymous peer-to-peer overlay networks
-
IEEE Nov
-
LANDSIEDEL, O., PIMENIDIS, A., WEHRLE, K., NIEDERMAYER, H., AND CARLE, G. Dynamic multipath onion routing in anonymous peer-to-peer overlay networks. Global Telecommunications Conference, 2007. GLOBECOM’07. IEEE (Nov. 2007), 64–69.
-
(2007)
Global Telecommunications Conference, 2007. GLOBECOM’07.
, pp. 64-69
-
-
Landsiedel, O.1
Pimenidis, A.2
Wehrle, K.3
Niedermayer, H.4
Carle, G.5
-
23
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
February A. Juels, Ed., Springer-Verlag, LNCS
-
LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC’04) (February 2004), A. Juels, Ed., Springer-Verlag, LNCS 3110, pp. 251–265.
-
(2004)
Proceedings of Financial Cryptography (FC’04)
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
24
-
-
54249091264
-
Don’t clog the queue! Circuit clogging and mitigation in p2p anonymity schemes
-
G. Tsudik, Ed.,. of Lecture Notes in Computer Science, Springer
-
MCLACHLAN, J., AND HOPPER, N. Don’t clog the queue! circuit clogging and mitigation in p2p anonymity schemes. In Financial Cryptography (2008), G. Tsudik, Ed., vol. 5143 of Lecture Notes in Computer Science, Springer, pp. 31–46.
-
(2008)
Financial Cryptography
, vol.5143
, pp. 31-46
-
-
McLachlan, J.1
Hopper, N.2
-
25
-
-
20444447364
-
-
IETF Internet Draft, December
-
MÖLLER, U., COTTRELL, L., PALFRADER, P., AND SASSAMAN, L. Mixmaster Protocol — Version 2. IETF Internet Draft, December 2004.
-
(2004)
Mixmaster Protocol — Version 2
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
27
-
-
27544454707
-
Low-cost traffic analysis of Tor
-
Washington, DC, USA, May IEEE Computer Society
-
MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of Tor. In SP’05: Proceedings of the 2005 IEEE Symposium on Security and Privacy (Washington, DC, USA, May 2005), IEEE Computer Society, pp. 183–195.
-
(2005)
SP’05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
28
-
-
34547281136
-
SalSA: A structured approach to large-scale anonymity
-
New York, NY, USA, October ACM
-
NAMBIAR, A., AND WRIGHT, M. Salsa: a structured approach to large-scale anonymity. In CCS’06: Proceedings of the 13th ACM conference on Computer and communications security (New York, NY, USA, October 2006), ACM, pp. 17–26.
-
(2006)
CCS’06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
29
-
-
33750277833
-
Locating hidden servers
-
Washington, DC, USA, May IEEE Computer Society
-
ØVERLIER, L., AND SYVERSON, P. Locating hidden servers. In SP’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (Washington, DC, USA, May 2006), IEEE Computer Society, pp. 100–114.
-
(2006)
SP’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 100-114
-
-
Øverlier, L.1
Syverson, P.2
-
30
-
-
56649123231
-
Compromising anonymity using packet spinning
-
T.-C. Wu, C.-L. Lei, Rijmen, and D.-T. Lee, Eds.,. of Lecture Notes in Computer Science, Springer
-
PAPPAS, V., ATHANASOPOULOS, E., IOANNIDIS, S., AND MARKATOS, E. P. Compromising anonymity using packet spinning. In Proceedings of the 11th Information Security Conference (ISC 2008) (2008), T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds., vol. 5222 of Lecture Notes in Computer Science, Springer, pp. 161–174.
-
(2008)
Proceedings of the 11th Information Security Conference (ISC 2008)
, vol.5222
, pp. 161-174
-
-
Pappas, V.1
Athanasopoulos, E.2
Ioannidis, S.3
Markatos, E.P.4
-
31
-
-
85076315443
-
-
PERRY, M., AND SQUIRES, S. https://www.torproject.org/torbutton/, 2009.
-
(2009)
-
-
Perry, M.1
Squires, S.2
-
32
-
-
0011702966
-
ISDNmixes: Untraceable communication with very small bandwidth overhead
-
February
-
PFITZMANN, A., PFITZMANN, B., AND WAIDNER, M. ISDNmixes: Untraceable communication with very small bandwidth overhead. In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (February 1991), pp. 451–463.
-
(1991)
Proceedings of the GI/ITG Conference on Communication in Distributed Systems
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
33
-
-
0038041177
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
New York, NY, USA, November ACM
-
RENNHARD, M., AND PLATTNER, B. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In WPES’02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society (New York, NY, USA, November 2002), ACM, pp. 91–102.
-
(2002)
WPES’02: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
34
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
London, UK, F. Petitcolas, Ed., Springer-Verlag, LNCS
-
SERJANTOV, A., DINGLEDINE, R., AND SYVERSON, P. From a trickle to a flood: Active attacks on several mix types. In IH’02: Revised Papers from the 5th International Workshop on Information Hiding (London, UK, 2003), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578, pp. 36–52.
-
(2003)
IH’02: Revised Papers from the 5th International Workshop on Information Hiding
, vol.2578
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
36
-
-
84871199341
-
Design principles for low latency anonymous network systems secure against timing attacks
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc
-
WIANGSRIPANAWAN, R., SUSILO, W., AND SAFAVI-NAINI, R. Design principles for low latency anonymous network systems secure against timing attacks. In Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW’07) (Darlinghurst, Australia, Australia, 2007), Australian Computer Society, Inc, pp. 183–191.
-
(2007)
Proceedings of the Fifth Australasian Symposium on ACSW Frontiers (ACSW’07)
, pp. 183-191
-
-
Wiangsripanawan, R.1
Susilo, W.2
Safavi-Naini, R.3
|