|
Publications by topic
-
Networks Without User Observability – Design Options (HTML) (Cached: HTML) by Andreas Pfitzmann and Michael Waidner.
In the Proceedings of EUROCRYPT 1985, April 1985. (BibTeX entry)·
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability (PDF) (Cached: PDF) by David Chaum.
In Journal of Cryptology 1, 1988, pages 65-75. (BibTeX entry)·
The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability (gzipped PS) (Cached: gzipped PS) by Michael Waidner and Birgit Pfitzmann.
In the Proceedings of EUROCRYPT 1989, 1990. (BibTeX entry)·
ISDN-mixes: Untraceable communication with very small bandwidth overhead (gzipped PS) (Cached: gzipped PS) by Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner.
In the Proceedings of the GI/ITG Conference on Communication in Distributed Systems, February 1991, pages 451-463. (BibTeX entry)·
Mixing E-mail With Babel (HTML, PS) (Cached: HTML, PS, gzipped PS) by Ceki Gülcü and Gene Tsudik.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '96, February 1996, pages 2-16. (BibTeX entry)·
Hiding Routing Information (PDF, gzipped PS) (Cached: PDF, gzipped PS) by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson.
In the Proceedings of Information Hiding: First International Workshop, May 1996, pages 137-150. (BibTeX entry)·
Prospects for Remailers (HTML) (Cached: HTML) by Sameer Parekh.
In First Monday 1(2), August 1996. (BibTeX entry)·
Anonymous Connections and Onion Routing (PDF) (Cached: PDF) by Paul F. Syverson, David M. Goldschlag, and Michael G. Reed.
In the Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997, pages 44-54. (BibTeX entry)·
Stop-and-Go MIXes: Providing Probabilistic Anonymity in an Open System (PDF) (Cached: PDF) by Dogan Kesdogan, Jan Egner, and Roland Büschkes.
In the Proceedings of Information Hiding Workshop (IH 1998), 1998. (BibTeX entry)·
Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol (HTML) (Cached: HTML) by Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner.
In IEEE Journal on Selected Areas in Communications 16(4), 1998. (BibTeX entry)·
PipeNet 1.0 (HTML) (Cached: HTML) by Wei Dai.
Post to Cypherpunks mailing list, January 1998. (BibTeX entry)·
Crowds: Anonymity for Web Transactions (PDF, gzipped PS) (Cached: PDF, gzipped PS) by Michael Reiter and Aviel Rubin.
In ACM Transactions on Information and System Security 1(1), June 1998. (BibTeX entry)·
PipeNet 1.1 (TXT) (Cached: TXT) by Wei Dai.
Post to Cypherpunks mailing list, November 1998. (BibTeX entry)·
Onion Routing Access Configurations (abstract, PDF, PS, gzipped PS) (Cached: abstract, PDF, PS, gzipped PS) by Paul Syverson, Michael Reed, and David Goldschlag.
In the Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000), 2000, pages 34-40. (BibTeX entry)·
Xor-trees for efficient anonymous multicast and reception (PS) (Cached: PS, gzipped PS) by Shlomi Dolev and Rafail Ostrobsky.
In ACM Trans. Inf. Syst. Secur 3(2), 2000, pages 63-84. (BibTeX entry)·
Towards an Analysis of Onion Routing Security (gzipped PS) (Cached: gzipped PS) by Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 96-114. (BibTeX entry)·
Web MIXes: A system for anonymous and unobservable Internet access (PDF) (Cached: PDF) by Oliver Berthold, Hannes Federrath, and Stefan Köpsell.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 115-129. (BibTeX entry)·
Protection Profiles for Remailer Mixes (PDF) (Cached: PDF) by Kai Rannenberg and Giovanni Iachello.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000. (BibTeX entry)·
Freedom Systems 2.0 Architecture (PDF) (Cached: PDF) by Philippe Boucher, Adam Shostack, and Ian Goldberg.
Zero Knowledge Systems, Inc. White Paper , December 2000. (BibTeX entry)·
A Pseudonymous Communications Infrastructure for the Internet (PDF) (Cached: PDF) by Ian Goldberg.
Ph.D. thesis, UC Berkeley, December 2000. (BibTeX entry)·
A Reputation System to Increase MIX-net Reliability (PDF, PS) (Cached: PDF, PS, gzipped PS) by Roger Dingledine, Michael J. Freedman, David Hopwood, and David Molnar.
In the Proceedings of Information Hiding Workshop (IH 2001), April 2001, pages 126-141. (BibTeX entry)·
Freedom Systems 2.1 Security Issues and Analysis (PDF) (Cached: PDF) by Adam Back, Ian Goldberg, and Adam Shostack.
Zero Knowledge Systems, Inc. White Paper , May 2001. (BibTeX entry)·
Hordes — A Multicast Based Protocol for Anonymity (PDF) (Cached: PDF) by Brian Neil Levine and Clay Shields.
In Journal of Computer Security 10(3), 2002, pages 213-240. (BibTeX entry)·
Reliable MIX Cascade Networks through Reputation (PDF, PS) (Cached: PDF, PS, gzipped PS) by Roger Dingledine and Paul Syverson.
In the Proceedings of Financial Cryptography (FC '02), March 2002. (BibTeX entry)·
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach? (PDF) (Cached: PDF) by Dogan Kesdogan, Mark Borning, and Michael Schmeink.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
A Passive Attack on the Privacy of Web Users Using Standard Log Information (PDF) (Cached: PDF) by Thomas Demuth.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
P5: A Protocol for Scalable Anonymous Communication (PDF, PS) (Cached: PDF, PS, gzipped PS) by Rob Sherwood, Bobby Bhattacharjee, and Aravind Srinivasan.
In the Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002. (BibTeX entry)·
Analysis of an Anonymity Network for Web Browsing (PDF, gzipped PS) (Cached: PDF, gzipped PS) by Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, and David Hutchison.
In the Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002), Pittsburgh, USA, June 2002, pages 49-54. (BibTeX entry)·
Cebolla: Pragmatic IP Anonymity (PDF) (Cached: PDF) by Zach Brown.
In the Proceedings of the 2002 Ottawa Linux Symposium, June 2002. (BibTeX entry)·
Tarzan: A Peer-to-Peer Anonymizing Network Layer (PDF) (Cached: PDF) by Michael J. Freedman and Robert Morris.
In the Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, November 2002. (BibTeX entry)·
Forward Secure Mixes (PDF) (Cached: PDF) by George Danezis.
In the Proceedings of 7th Nordic Workshop on Secure IT Systems, Karlstad, Sweden, November 2002, pages 195-207. (BibTeX entry)·
Buses for Anonymous Message Delivery (PS) (Cached: PS, gzipped PS) by Amos Beimel and Shlomi Dolev.
In Journal of Cryptology 16(1), 2003, pages 25-39. (BibTeX entry)·
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication (PDF) (Cached: PDF) by Sharad Goel, Mark Robson, Milo Polte, and Emin Gun Sirer.
Cornell University technical report 2003-1890, February 2003. (BibTeX entry)·
Generalising Mixes (gzipped PS) (Cached: gzipped PS) by Claudia Diaz and Andrei Serjantov.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 18-31. (BibTeX entry)·
Improving Onion Notation (PDF) (Cached: PDF) by Richard Clayton.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 81-87. (BibTeX entry)·
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes (PDF) (Cached: PDF) by Bodo Möller.
In the Proceedings of CT-RSA 2003, April 2003. (BibTeX entry)·
Mixminion: Design of a Type III Anonymous Remailer Protocol (PDF) (Cached: PDF) by George Danezis, Roger Dingledine, and Nick Mathewson.
In the Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pages 2-15. (BibTeX entry)·
Practical Anonymity for the Masses with Mix-Networks (PDF, gzipped PS) (Cached: PDF, gzipped PS) by Marc Rennhard and Bernhard Plattner.
In the Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003), Linz, Austria, June 2003. (BibTeX entry)·
Mixmaster Protocol — Version 2 (TXT) (Cached: TXT) by Ulf Möller, Lance Cottrell, Peter Palfrader, and Len Sassaman.
IETF Internet Draft, July 2003. (BibTeX entry)·
Using Caching for Browsing Anonymity (PDF) (Cached: PDF) by Anna Shubina and Sean Smith.
In ACM SIGEcom Exchanges 4(2), September 2003. (BibTeX entry)·
Reusable Anonymous Return Channels (PDF, PS) (Cached: PDF, PS, gzipped PS) by Philippe Golle and Markus Jakobsson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003. (BibTeX entry)·
Heartbeat Traffic to Counter (n-1) Attacks (PDF) (Cached: PDF) by George Danezis and Len Sassaman.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003. (BibTeX entry)·
New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets (PS) (Cached: PS, gzipped PS) by Matthias Bauer.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003. (BibTeX entry)·
Receiver Anonymity via Incomparable Public Keys (PDF, PS) (Cached: PDF, PS, gzipped PS) by Brent Waters, Ed Felten, and Amit Sahai.
In the Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pages 112-121. (BibTeX entry)·
k-Anonymous Message Transmission (PDF) (Cached: PDF) by Luis von Ahn, Andrew Bortz, and Nicholas J. Hopper.
In the Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pages 122-130. (BibTeX entry)·
On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?'' (PDF) (Cached: PDF) by Rainer Böhme, George Danezis, Claudia Diaz, Stefan Köpsell, and Andreas Pfitzmann.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), 2004, pages 226-241. (BibTeX entry)·
Universal Re-Encryption for Mixnets (PDF) (Cached: PDF) by Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson.
In the Proceedings of the 2004 RSA Conference, Cryptographer's track, San Francisco, USA, February 2004. (BibTeX entry)·
Provable Unlinkability Against Traffic Analysis (PDF) (Cached: PDF) by Ron Berman, Amos Fiat, and Amnon Ta-Shma.
In the Proceedings of Financial Cryptography (FC '04), February 2004, pages 266-280. (BibTeX entry)·
Practical Anonymity for the Masses with MorphMix (PDF) (Cached: PDF) by Marc Rennhard and Bernhard Plattner.
In the Proceedings of Financial Cryptography (FC '04), February 2004, pages 233-250. (BibTeX entry)·
Mixminion: Strong Anonymity for Financial cryptography (PDF) (Cached: PDF) by Nick Mathewson and Roger Dingledine.
In the Proceedings of Financial Cryptography (FC '04), February 2004, pages 227-232. (BibTeX entry)·
Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic (PDF) (Cached: PDF) by Claudia Diaz and Bart Preneel.
In the Proceedings of 6th Information Hiding Workshop (IH 2004), Toronto, May 2004. (BibTeX entry)·
An Improved Construction for Universal Re-encryption (PDF) (Cached: PDF) by Peter Fairbrother.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 79-87. (BibTeX entry)·
FLASCHE — A Mechanism Providing Anonymity for Mobile Users by Alf Zugenmaier.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 121-141. (BibTeX entry)·
Synchronous Batching: From Cascades to Free Routes (PDF, PS) (Cached: PDF, PS, gzipped PS) by Roger Dingledine, Vitaly Shmatikov, and Paul Syverson.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 186-206. (BibTeX entry)·
Dining Cryptographers Revisited (PDF) (Cached: PDF) by Philippe Golle and Ari Juels.
In the Proceedings of Eurocrypt 2004, May 2004. (BibTeX entry)·
On the Anonymity of Anonymity Systems (PS) (Cached: PS, gzipped PS) by Andrei Serjantov.
Ph.D. thesis, University of Cambridge, June 2004. (BibTeX entry)·
Better Anonymous Communications (PDF) (Cached: PDF) by George Danezis.
Ph.D. thesis, University of Cambridge, July 2004. (BibTeX entry)·
Taxonomy of Mixes and Dummy Traffic (PDF) (Cached: PDF) by Claudia Diaz and Bart Preneel.
In the Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, Toulouse, France, August 2004. (BibTeX entry)·
Anonymous Communication with On-line and Off-line Onion Encoding (PDF) (Cached: PDF) by Marcin Gomulkiewicz, Marek Klonowski, and Miroslaw Kutylowski.
In the Proceedings of Workshop on Information Security Applications (WISA 2004), August 2004. (BibTeX entry)·
DUO–Onions and Hydra–Onions – Failure and Adversary Resistant Onion Protocols by Jan Iwanik, Marek Klonowski, and Miroslaw Kutylowski.
In the Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004, September 2004. (BibTeX entry)·
Minx: A simple and efficient anonymous packet format (PDF) (Cached: PDF) by George Danezis and Ben Laurie.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004), Washington, DC, USA, October 2004. (BibTeX entry)·
Location Diversity in Anonymity Networks (PS) (Cached: PS, gzipped PS) by Nick Feamster and Roger Dingledine.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004), Washington, DC, USA, October 2004. (BibTeX entry)·
Fragile Mixing (PDF) (Cached: PDF) by Michael Reiter and XiaoFeng Wang.
In the Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), October 2004. (BibTeX entry)·
Parallel Mixing (PDF, PS) (Cached: PDF, PS, gzipped PS) by Philippe Golle and Ari Juels.
In the Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), October 2004. (BibTeX entry)·
A Random Walk Based Anonymous Peer-to-Peer Protocol Design by Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, and Abhishek Patil.
In the Proceedings of ICCNMC, 2005, pages 143-152. (BibTeX entry)·
SAS: A Scalar Anonymous Communication System by Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, and Wei Zhao.
In the Proceedings of ICCNMC, 2005, pages 452-461. (BibTeX entry)·
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel (abstract) (Cached: abstract) by Tianbo Lu, Binxing Fang, Yuzhong Sun, and Li Guo.
In the Proceedings of ICCNMC, 2005, pages 853-862. (BibTeX entry)·
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks (PDF) (Cached: PDF) by A. Boukerche, K. El-Khatib, L. Xu, and L. Korba.
In Computer Communications 28(10), 2005, pages 1193-1203. (BibTeX entry)·
Formalizing Anonymity: A Review (PDF) (Cached: PDF) by Wright, ['Susan', 'Stepney', 'John', 'A.', 'Clark'] and Jeremy Jacob.
In University of York Technical (Yellow) Report, 2005. (BibTeX entry)·
Anonymous Communication with On-line and Off-line Onion Encoding (PDF) (Cached: PDF) by Marek Klonowski, Miroslaw Kutylowski, and Filip Zagorski.
In the Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005), January 2005. (BibTeX entry)·
Message Splitting Against the Partial Adversary (PDF) (Cached: PDF) by Andrei Serjantov and Steven J. Murdoch.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005, pages 26-39. (BibTeX entry)·
Compulsion Resistant Anonymous Communications (PDF) (Cached: PDF) by George Danezis and Jolyon Clulow.
In the Proceedings of Information Hiding Workshop (IH 2005), June 2005, pages 11-25. (BibTeX entry)·
Provable Anonymity for Networks of Mixes (PDF) (Cached: PDF) by Marek Klonowski and Miroslaw Kutylowski.
In the Proceedings of Information Hiding Workshop (IH 2005), June 2005, pages 26-38. (BibTeX entry)·
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis (PDF) (Cached: PDF) by Dogan Kesdogan, Lexi Pimenidis, and Tobias Kölsch.
In the Proceedings of First Workshop on Quality of Protection, September 2005, pages 159-171. (BibTeX entry)·
Tracking anonymous peer-to-peer VoIP calls on the internet (PDF) (Cached: PDF) by Xinyuan Wang, Shiping Chen, and Sushil Jajodia.
In the Proceedings of the ACM Conference on Computer and Communications Security, November 2005, pages 81-91. (BibTeX entry)·
Anonymity and Privacy in Electronic Services (PDF) (Cached: PDF) by Claudia Diaz.
Ph.D. thesis, Katholieke Universiteit Leuven, December 2005. (BibTeX entry)·
Regroup-And-Go mixes to counter the $(n-1)$ attack (DOI) by Jin-Qiao Shi, Bin-Xing Fang, and Li-Jie Shao.
In Journal of Internet Research 16(2), 2006, pages 213-223. (BibTeX entry)·
System and method for protecting privacy and anonymity of parties of network communications by Y.M. Wang, Q. Sun, D.R. Simon, and W. Russell.
US Patent 6,986,036, 2006. (BibTeX entry)·
Technical challenges of network anonymity by D. Kesdogan and C. Palmer.
In Computer Communications 29(3), 2006, pages 306-324. (BibTeX entry)·
Revocable Anonymity by S. Kopsell, R. Wendolsky, and H. Federrath.
In Emerging Trends in Information and Communication Security-ETRICS, LNCS 3995, 2006, pages 206-220. (BibTeX entry)·
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications by C.A. Melchor and Y. Deswarte.
In Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006, pages 163-172. (BibTeX entry)·
Tokens for Anonymous Communications in the Internet (PDF) (Cached: PDF) by A. Durresi, V. Paruchuri, L. Barolli, R. Jain, and M. Takizawa.
In Proceedings of the 17th International Conference on Database and Expert Systems Applications, 2006, pages 83-90. (BibTeX entry)·
A Scalable Anonymous Server Overlay Network by H. Tsai and A. Harwood.
In Proceedings of the 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA'06)-Volume 01, 2006, pages 973-978. (BibTeX entry)·
Resilient P2P Anonymous Routing by Using Redundancy (DOI) by Yingwu Zhu.
In iwnas 0, 2006, pages 103-110. (BibTeX entry)·
Agyaat: mutual anonymity over structured P2P networks by A. Singh, B. Gedik, and L. Liu.
In Internet Research 16(2), 2006, pages 189-212. (BibTeX entry)·
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks (PDF) (Cached: PDF) by Philippe Golle, XiaoFeng Wang, Markus Jakobsson, and Alex Tsow.
In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May 2006, pages 121-131. (BibTeX entry)·
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing (PDF) (Cached: PDF) by Giuseppe Ciaccio.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 190-207. (BibTeX entry)·
Blending Different Latency Traffic with Alpha-Mixing (PDF) (Cached: PDF) by Roger Dingledine, Andrei Serjantov, and Paul Syverson.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 245-257. (BibTeX entry)·
M2: Multicasting Mixes for Efficient and Anonymous Communication (PDF) (Cached: PDF) by Ginger Perng, Michael K. Reiter, and Chenxi Wang.
In the Proceedings of the 26th IEEE Conference on Distributed Computing Systems, July 2006. (BibTeX entry)·
Nonesuch: a mix network with sender unobservability (PDF, DOI) (Cached: PDF) by Thomas S. Heydt-Benjamin, Andrei Serjantov, and Benessa Defend.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006), Alexandria, Virginia, USA, October 2006, pages 1-8. (BibTeX entry)·
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication (Cached: PDF) by Andriy Panchenko and Lexi Pimenidis.
In the Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006), Heraklion, Crete, Greece, October 2006, pages 240-251. (BibTeX entry)·
Salsa: A Structured Approach to Large-Scale Anonymity (PDF) (Cached: PDF) by Arjun Nambiar and Matthew Wright.
In the Proceedings of CCS 2006, November 2006. (BibTeX entry)·
Probability of Error in Information-Hiding Protocols (PDF) (Cached: PDF) by Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden.
In the Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), S. Servolo island, Venice - Italy, 2007. (BibTeX entry)·
GAS: Overloading a File Sharing Network as an Anonymizing System (PDF) (Cached: PDF) by Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, and Evangelos P. Markatos.
In the Proceedings of Second International Workshop on Security, (IWSEC 2007), Nara, Japan, 2007. (BibTeX entry)·
Closed-Circuit Unobservable Voice Over IP (PDF) (Cached: PDF) by Carlos Aguilar Melchor, Yves Deswarte, and Julien Iguchi-Cartigny.
In the Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA, 2007. (BibTeX entry)·
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks (PDF) (Cached: PDF) by Jiejun Kong, Xiaoyan Hong, and Mario Gerla.
In IEEE Transactions on Mobile Computing 6(8), 2007, pages 888-902. (BibTeX entry)·
Information Slicing: Anonymity Using Unreliable Overlays (PDF) (Cached: PDF) by Sachin Katti, Jeffery Cohen, and Dina Katabi.
In the Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI), April 2007. (BibTeX entry)·
pDCS: Security and Privacy Support for Data-Centric Sensor Networks (PDF) (Cached: PDF) by Min Shao, Sencun Zhu, Wensheng Zhang, and Guohong Cao.
In the Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07), May 2007. (BibTeX entry)·
Crafting Web Counters into Covert Channels (PDF) (Cached: PDF) by Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang.
In the Proceedings of the IFIP International Information Security Conference - IFIP SEC'07, May 2007. (BibTeX entry)·
A Fresh Look at the Generalized Mix Framework (PDF) (Cached: PDF) by Andrei Serjantov.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Louis, Lester, and Pierre: Three Protocols for Location Privacy (PDF) (Cached: PDF) by Ge Zhong, Ian Goldberg, and Urs Hengartner.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker (PDF) (Cached: PDF) by Sebastian Faust, Lothar Fritsch, Martek Gedrojc, Markulf Kohlweiss, and Bart Preneel.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Pairing-Based Onion Routing (PDF) (Cached: PDF) by Aniket Kate, Greg Zaverucha, and Ian Goldberg.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Improving Efficiency and Simplicity of Tor circuit establishment and hidden services (PDF) (Cached: PDF) by Lasse Øverlier and Paul Syverson.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Performance Comparison of low-latency Anonymisation Services from a User Perspective (PDF) (Cached: PDF) by Rolf Wendolsky, Dominik Herrmann, and Hannes Federrath.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Anonymity in the wild: Mixes on unstructured networks (PDF) (Cached: PDF) by Shishir Nagaraja.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Usability of anonymous web browsing: an examination of Tor interfaces and deployability (PDF, DOI) (Cached: PDF) by Jeremy Clark, P. C. van Oorschot, and Carlisle Adams.
In the Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07), Pittsburgh, Pennsylvania, July 2007, pages 41-51. (BibTeX entry)·
Countering Statistical Disclosure with Receiver-Bound Cover Traffic (PDF) (Cached: PDF) by Nayantara Mallesh and Matthew Wright.
In the Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, September 2007, pages 547-562. (BibTeX entry)·
Cloak: A Ten-fold Way for Reliable Covert Communications (PDF) (Cached: PDF) by Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang.
In the Proceedings of the European Symposium Research Computer Security - ESORICS'07, September 2007. (BibTeX entry)·
Anonymous Networking amidst Eavesdroppers (PDF) (Cached: PDF) by Parvathinathan Venkitasubramaniam, Ting He, and Lang Tong.
Pre-print available as arXiv:0710.4903v1 at arxiv.org, October 2007. (BibTeX entry)·
Probabilistic and Information-Theoretic Approaches to Anonymity (PDF) (Cached: PDF) by Konstantinos Chatzikokolakis.
Ph.D. thesis, Laboratoire d'Informatique (LIX), École Polytechnique, Paris, October 2007. (BibTeX entry)·
More: A Peer-To-Peer Based Connectionless Onion Router (PDF) (Cached: PDF) by Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Heiko +Niedermayer, and Georg Carle.
In the Proceedings of IEEE GLOBECOM, Globalcommunications Conference, Washington DC, USA, November 2007. (BibTeX entry)·
Covert channel vulnerabilities in anonymity systems (PDF) (Cached: PDF) by Steven J. Murdoch.
Ph.D. thesis, University of Cambridge, December 2007. (BibTeX entry)·
Don't Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes (PDF) (Cached: PDF) by Jon McLachlan and Nicholas Hopper.
In the Proceedings of Financial Cryptography (FC '08), January 2008. (BibTeX entry)·
A Survey of Anonymous Communication Channels (PDF) (Cached: PDF) by George Danezis and Claudia Diaz.
Microsoft Research technical report MSR-TR-2008-35, January 2008. (BibTeX entry)·
A Tune-up for Tor: Improving Security and Performance in the Tor Network (PDF) (Cached: PDF) by Robin Snader and Nikita Borisov.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '08, February 2008. (BibTeX entry)·
A Concept of an Anonymous Direct P2P Distribution Overlay System (PDF) (Cached: PDF) by Igor Margasinski and Michal Pioro.
In the Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA), Gino-wan, Okinawa, Japan, March 2008, pages 590-597. (BibTeX entry)·
Performance Analysis of Anonymous Communication Channels Provided by Tor (PS) (Cached: PDF, PS, gzipped PS) by Andriy Panchenko, Lexi Pimenidis, and Johannes Renner.
In the Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, March 2008, pages 221-228. (BibTeX entry)·
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks (PDF) (Cached: PDF) by Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, and Guohong Cao.
In the Proceedings of The ACM Conference on Wireless Network Security (WiSec), March 2008. (BibTeX entry)·
Towards Statistically Strong Source Anonymity for Sensor Networks (PDF) (Cached: PDF) by Min Shao, Yi Yang, Sencun Zhu, and Guohong Cao.
In the Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08), May 2008. (BibTeX entry)·
Repelling Detour Attack Against Onions with Re-encryption (publisher) by Marek Klonowski, Miroslaw Kutylowski, and Anna Lauks.
In the Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), New York, NY, USA, June 2008, pages 296-308. (BibTeX entry)·
TCP Covert Timing Channels: Design and Detection (PDF) (Cached: PDF) by Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang.
In the Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - DSN'08, June 2008. (BibTeX entry)·
Performance Measurements and Statistics of Tor Hidden Services (PDF) (Cached: PDF) by Karsten Loesing, Werner Sandmann, Christian Wilms, and Guido Wirtz.
In the Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT), Turku, Finland, July 2008. (BibTeX entry)·
Breaking and Provably Fixing Minx (PDF) (Cached: PDF) by Eric Shimshock, Matt Staats, and Nicholas Hopper.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 99-114. (BibTeX entry)·
How to Bypass Two Anonymity Revocation Systems (PDF) (Cached: PDF) by George Danezis and Len Sassaman.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 187-201. (BibTeX entry)·
Reputation Systems for Anonymous Networks by Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, and Tal Malkin.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 202-218. (BibTeX entry)·
PAR: Payment for Anonymous Routing (PDF) (Cached: PDF) by Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, and Steven M. Bellovin.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 219-236. (BibTeX entry)·
Compromising Anonymity Using Packet Spinning (PDF) (Cached: PDF) by Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos.
In the Proceedings of the 11th Information Security Conference (ISC 2008), Taipei, Taiwan, September 2008. (BibTeX entry)·
BitBlender: Light-Weight Anonymity for BitTorrent (PDF) (Cached: PDF) by Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker.
In the Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008), Istanbul, Turkey, September 2008. (BibTeX entry)·
Improving Tor using a TCP-over-DTLS Tunnel (abstract, PDF) (Cached: abstract, PDF) by Joel Reardon.
Masters's thesis, University of Waterloo, September 2008. (BibTeX entry)·
Information Leaks in Structured Peer-to-peer Anonymous Communication Systems (PDF) (Cached: PDF) by Prateek Mittal and Nikita Borisov.
In the Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pages 267-278. (BibTeX entry)·
L'émergence au sein d'internet de communautés virtuelles et anonymes, Freenet et i2p by Laurie Delmer.
Masters's thesis, Université catholique de Louvain - Département des sciences politiques et sociales, 2009. (BibTeX entry)·
A taxonomy for and analysis of anonymous communications networks (PDF) (Cached: PDF) by Douglas Kelly.
Ph.D. thesis, Air Force Institute of Technology, March 2009. (BibTeX entry)·
Anonymity Techniques - Usability Tests of Major Anonymity Networks (PDF) (Cached: PDF) by Jens Schomburg.
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 55-64. (BibTeX entry)·
Peer Profiling and Selection in the I2P Anonymous Network (PDF) (Cached: PDF) by zzz (Pseudonym) and Lars Schimmer.
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 59-59. (BibTeX entry)·
EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation (PDF) (Cached: PDF) by Robin Snader and Nikita Borisov.
In the Proceedings of the 8th International Workshop on Peer-to-Peer Systems (IPTPS09), Boston, MA, April 2009. (BibTeX entry)·
Sphinx: A Compact and Provably Secure Mix Format (PDF) (Cached: PDF) by George Danezis and Ian Goldberg.
In the Proceedings of the 30th IEEE Symposium on Security and Privacy (Samp;P 2009), Oakland, California, USA, May 2009, pages 269-282. (BibTeX entry)·
Privacy-enhancing Technologies for Private Services (PDF) (Cached: PDF) by Karsten Loesing.
Ph.D. thesis, University of Bamberg, May 2009. (BibTeX entry)·
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks (PDF) (Cached: PDF) by Jörg Lenhard, Karsten Loesing, and Guido Wirtz.
In the Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009, June 2009. (BibTeX entry)·
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding (PDF) (Cached: PDF) by Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang.
In the Proceedings of the International Conference on Communications - ICC'09, June 2009. (BibTeX entry)·
On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks (PDF) (Cached: PDF) by Jing Jin and Xinyuan Wang.
In the Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Lisbon, July 2009, pages 429-438. (BibTeX entry)·
SHALON: Lightweight Anonymization based on Open Standards (PDF) (Cached: PDF) by Andriy Panchenko, Benedikt Westermann, Lexi Pimenidis, and Christer Andersson.
In the Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, CA, USA, August 2009. (BibTeX entry)·
Scalable Link-Based Relay Selection for Anonymous Routing (PDF) (Cached: PDF) by Micah Sherr, Matt Blaze, and Boon Thau Loo.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 73-93. (BibTeX entry)·
Physical Layer Attacks on Unlinkability in Wireless LANs (PDF) (Cached: PDF) by Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, and Douglas C. Sicker.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 108-127. (BibTeX entry)·
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default (PDF) (Cached: PDF) by Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 143-163. (BibTeX entry)·
APOD: Anonymous Physical Object Delivery (PDF) (Cached: PDF) by Elli Androulaki and Steven M. Bellovin.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 202-215. (BibTeX entry)·
Secure Pseudonymous Channels (PDF) (Cached: PDF) by Sebastian Mödersheim and Luca Viganò.
In the Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 2009, pages 337-354. (BibTeX entry)·
Security Analysis of AN.ON's Payment Scheme by Benedikt Westermann.
In the Proceedings of NordSec 2009, October 2009, pages 255-270. (BibTeX entry)·
XPay: Practical anonymous payments for Tor routing and other networked services (PDF) (Cached: PDF) by Yao Chen, Radu Sion, and Bogdan Carbunar.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009), Chicago, IL, USA, November 2009. (BibTeX entry)·
AS-awareness in Tor path selection (PDF) (Cached: PDF) by Matthew Edman and Paul F. Syverson.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009, pages 380-389. (BibTeX entry)·
NISAN: Network Information Service for Anonymization Networks (PDF) (Cached: PDF) by Andriy Panchenko, Arne Rache, and Stefan Richter.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009. (BibTeX entry)·
ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies (PDF) (Cached: PDF) by Prateek Mittal and Nikita Borisov.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009. (BibTeX entry)·
Certificateless Onion Routing (PDF) (Cached: PDF) by Dario Catalano, Dario Fiore, and Rosario Gennaro.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009. (BibTeX entry)·
Scalable onion routing with Torsk (PDF) (Cached: PDF) by Jon McLachlan, Andrew Tran, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009. (BibTeX entry)·
Membership-concealing overlay networks (PDF) (Cached: PDF) by Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009, pages 390-399. (BibTeX entry)·
Building Incentives into Tor (PDF) (Cached: PDF) by Tsuen-Wan ``Johnny'' Ngan, Roger Dingledine, and Dan S. Wallach.
In the Proceedings of Financial Cryptography (FC '10), January 2010. (BibTeX entry)·
Using Sphinx to Improve Onion Routing Circuit Construction (PDF) (Cached: PDF) by Aniket Kate and Ian Goldberg.
In the Proceedings of Financial Cryptography (FC '10), January 2010. (BibTeX entry)·
Cryptographic Protocol Analysis of AN.ON (PDF) (Cached: PDF) by Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, and Dogan Kesdogan.
In the Proceedings of Financial Cryptography (FC '10), January 2010. (BibTeX entry)·
A Case Study on Measuring Statistical Data in the Tor Anonymity Network (PDF) (Cached: PDF) by Karsten Loesing, Steven J. Murdoch, and Roger Dingledine.
In the Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain, January 2010. (BibTeX entry)·
Tor HTTP Usage and Information Leakage (PDF) (Cached: PDF) by Markus Huber, Martin Mulazzani, and Edgar Weippl.
In the Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2010), Linz, Austria, May 2010, pages 245-255. (BibTeX entry)·
Drac: An Architecture for Anonymous Low-Volume Communications (PDF) (Cached: PDF) by George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie.
In the Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), Berlin, Germany, July 2010. (BibTeX entry)·
Systems for Anonymous Communication (PDF) (Cached: PDF) by George Danezis, Claudia Diaz, and Paul F. Syverson.
In the CRC Handbook of Financial Cryptography and Security, August 2010, pages 341-390. (BibTeX entry)·
Recruiting New Tor Relays with BRAIDS (PDF) (Cached: PDF) by Rob Jansen, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
An Improved Algorithm for Tor Circuit Scheduling (PDF) (Cached: PDF) by Can Tang and Ian Goldberg.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
Balancing the Shadows (PDF) (Cached: PDF) by Max Schuchard, Alex Dean, Victor Heorhiadi, Yongdae Kim, and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, IL, USA, October 2010. (BibTeX entry)·
Unraveling an Old Cloak: k-anonymity for Location Privacy (PDF) (Cached: PDF) by Reza Shokri, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, IL, USA, October 2010. (BibTeX entry)·
A Practical Complexity-Theoretic Analysis of Mix Systems (PDF) (Cached: PDF) by Dang Vinh Pham, Joss Wright, and Dogan Kesdogan.
In the Proceedings of ESORICS 2011, Leuven, Belgium, 2011, pages 12-15. (BibTeX entry)·
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection (PDF) (Cached: PDF) by Benedikt Westermann and Dogan Kesdogan.
In the Proceedings of Financial Cryptography and Data Security (FC'11), February 2011. (BibTeX entry)·
Improving Security and Performance in Low Latency Anonymity Networks (PDF) (Cached: PDF) by Kevin Bauer.
Ph.D. thesis, University of Colorado, May 2011. (BibTeX entry)·
A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks by Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, and Wenke Lee.
In the Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - DSN'11, June 2011. (BibTeX entry)·
Fully Non-Interactive Onion Routing with Forward-Secrecy (PDF) (Cached: PDF) by Dario Catalano, Dario Fiore, and Rosario Gennaro.
In the Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), Malaga, Spain, June 2011. (BibTeX entry)·
DefenestraTor: Throwing out Windows in Tor (PDF) (Cached: PDF) by Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey Voelker.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011. (BibTeX entry)·
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing (PDF) (Cached: PDF) by Nicholas Jones, Matvey Arye, Jacopo Cesareo, and Michael J. Freedman.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011), August 2011. (BibTeX entry)·
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation (PDF) (Cached: PDF) by Kevin Bauer, Micah Sherr, Damon McCoy, and Dirk Grunwald.
In the Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011), August 2011. (BibTeX entry)·
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (PDF) (Cached: PDF) by Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg.
In the Proceedings of the 20th USENIX Security Symposium, August 2011. (BibTeX entry)·
BridgeSPA: Improving Tor Bridges with Single Packet Authorization (PDF) (Cached: PDF) by Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, and Urs Hengartner.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, IL, USA, October 2011. (BibTeX entry)·
FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting (PDF) (Cached: PDF) by Peter Lofgren and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, IL, USA, October 2011. (BibTeX entry)·
Trust-based Anonymous Communication: Adversary Models and Routing Algorithms (PDF) (Cached: PDF) by Aaron Johnson, Paul Syverson, Roger Dingledine, and Nick Mathewson.
In the Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011), October 2011. (BibTeX entry)·
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting (PDF) (Cached: PDF) by Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, and Nikita Borisov.
In the Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011), October 2011. (BibTeX entry)·
I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison (PDF) (Cached: PDF) by Mathias Ehlert.
Seminar, November 2011. (BibTeX entry)·
Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise (PDF) (Cached: PDF) by W. Brad Moore, Chris Wacek, and Micah Sherr.
In the Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA, December 2011. (BibTeX entry)·
"Super Nodes" in Tor: Existence and Security Implication (PDF) (Cached: PDF) by Chenglong Li, Yibo Xue, Yingfei Dong, and Dongshen Wang.
In the Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA, December 2011. (BibTeX entry)·
Effectiveness and detection of denial of service attacks in Tor (PDF, DOI) (Cached: PDF) by Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, and Marc Liberatore.
In Transactions on Information and System Security 15(3), 2012, pages 11:1-11:25. (BibTeX entry)·
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks (PDF) (Cached: PDF) by Prateek Mittal, Matthew Caesar, and Nikita Borisov.
In the Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS2012), San Diego, California, USA, January 2012. (BibTeX entry)·
Congestion-aware Path Selection for Tor (PDF) (Cached: PDF) by Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg.
In the Proceedings of Financial Cryptography and Data Security (FC'12), February 2012. (BibTeX entry)·
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation (PDF) (Cached: PDF) by Rob Jansen and Nicholas Hopper.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'12, February 2012. (BibTeX entry)·
LASTor: A Low-Latency AS-Aware Tor Client (PDF) (Cached: PDF) by Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha.
In the Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012. (BibTeX entry)·
LAP: Lightweight Anonymity and Privacy (PDF) (Cached: PDF) by Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Sam Nelson, Marco Gruteser, and Wei Ming.
In the Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012. (BibTeX entry)·
How (not) to build a transport layer for anonymity overlays (PDF) (Cached: PDF) by Florian Tschorsch and Björn Scheurmann.
In the Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy, June 2012. (BibTeX entry)·
Provably Secure and Practical Onion Routing (PDF) (Cached: PDF) by Michael Backes, Aniket Kate, Ian Goldberg, and Esfandiar Mohammadi.
In the Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), June 2012, pages 369-385. (BibTeX entry)·
Methodically Modeling the Tor Network (PDF) (Cached: PDF) by Rob Jansen, Kevin Bauer, Nicholas Hopper, and Roger Dingledine.
In the Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012), August 2012. (BibTeX entry)·
A survey on solutions and main free tools for privacy enhancing Web communications (PDF, DOI) (Cached: PDF) by A. Ruiz-Martínez.
In Journal of Network and Computer Applications 35(5), September 2012, pages 1473-1492. (BibTeX entry)·
Torchestra: Reducing interactive traffic delays over Tor (PDF) (Cached: PDF) by Deepika Gopal and Nadia Heninger.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012), Raleigh, NC, USA, October 2012. (BibTeX entry)·
Enhancing Tor's Performance using Real-time Traffic Classification (PDF) (Cached: PDF) by Mashael AlSabah, Kevin Bauer, and Ian Goldberg.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
Privacy Preserving Performance Enhancements for Anonymous Communication Systems (PDF) (Cached: PDF) by Rob Jansen.
Ph.D. thesis, University of Minnesota, October 2012. (BibTeX entry)·
Improving Performance and Anonymity in the Tor Network (PDF) (Cached: PDF) by Andriy Panchenko, Fabian Lanze, and Thomas Engel.
In the Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012), December 2012. (BibTeX entry)·
Improving Content Availability in the I2P Anonymous File-Sharing Environment (PDF, DOI) (Cached: PDF) by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 4th International Symposium on Cyberspace Safety and Security, Melbourne, Australia, December 2012, pages 77-92. (BibTeX entry)·
Reducing Latency in Tor Circuits with Unordered Delivery (PDF) (Cached: PDF) by Michael F Nowlan, David Wolinsky, and Bryan Ford.
In the Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013. (BibTeX entry)·
LIRA: Lightweight Incentivized Routing for Anonymity (PDF) (Cached: PDF) by Rob Jansen, Aaron Johnson, and Paul Syverson.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation (PDF) (Cached: PDF) by Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas J. Hopper.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
An Empirical Evaluation of Relay Selection in Tor (PDF) (Cached: PDF) by Christopher Wacek, Henry Tan, Kevin Bauer, and Micah Sherr.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
Preventing Side-channel Leaks in Web Traffic: A Formal Approach (PDF) (Cached: PDF) by Michael Backes, Goran Doychev, and Boris Köpf.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
Pisces: Anonymous Communication Using Social Networks (PDF) (Cached: PDF) by Prateek Mittal, Matthew Wright, and Nikita Borisov.
In the Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS2013), San Diego, California, USA, February 2013. (BibTeX entry)·
Preserving Link Privacy in Social Network Based Systems (PDF) (Cached: PDF) by Prateek Mittal, Charalampos Papamanthou, and Dawn Song.
In the Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS2013), San Diego, California, USA, February 2013. (BibTeX entry)·
AnoA: A Framework For Analyzing Anonymous Communication Protocols (PDF) (Cached: PDF) by Michael Backes, Aniket Kate, Praveen Manoharan, and Esfandiar Mohammadi Meiser.
In the Proceedings of the of the 26th IEEE Computer Security Foundations Symposium (CSF), June 2013, pages 163-178. (BibTeX entry)·
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting (PDF) (Cached: PDF) by Mashael Alsabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg.
In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)·
Towards Provably-Secure Scalable Anonymous Broadcast (PDF) (Cached: PDF) by Mahdi Zamani, Jared Saia, Mahnush Movahedi, and Joud Khoury.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, Washington, DC, USA, August 2013. (BibTeX entry)·
Towards Efficient Traffic-analysis Resistant Anonymity Networks (PDF) (Cached: PDF) by Stevens Le Blond, David Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani, and Paul Francis.
In the Proceedings of the ACM SIGCOMM 2013 Conference, August 2013. (BibTeX entry)·
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI (PDF) (Cached: PDF) by Yossi Gilad and Amir Herzberg.
In the Proceedings of ESORICS 2013, September 2013. (BibTeX entry)·
TUC: Time-sensitive and Modular Analysis of Anonymous Communication (PDF) (Cached: PDF) by Michael Backes, Praveen Manoharan, and Esfandiar Mohammadi.
IACR ePrint Archive Report 2013/664, October 2013. (BibTeX entry)·
Ace: An Efficient Key-Exchange Protocol for Onion Routing (PDF) (Cached: PDF) by Michael Backes, Aniket Kate, and Esfandiar Mohammadi.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), October 2013, pages 55-64. (BibTeX entry)·
Improved Group Off-The-Record Messaging (PDF) (Cached: PDF) by Hong Liu, Eugene Y. Vasserman, and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
Conscript Your Friends into Larger Anonymity Sets with JavaScript (PDF) (Cached: PDF) by Henry Corrigan-Gibbs and Bryan Ford.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks (PDF) (Cached: PDF) by Mashael AlSabah and Ian Goldberg.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
Hang with Your Buddies to Resist Intersection Attacks (PDF) (Cached: PDF) by David Wolinsky, Ewa Syta, and Bryan Ford.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
Garbled Routing (GR): A Generic Framework towards Unification of Anonymous Communication Systems (HTML, DOI) (Cached: HTML) by Shaahin Madani and Ibrahim Khalil.
In Journal of Network and Computer Applications 44, 2014, pages 183-195. (BibTeX entry)·
Privacy at the Link Layer (PDF) (Cached: PDF) by O'Hanlon, ['Joss', 'Wright'] and Ian Brown.
In the Proceedings of the W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring, 2014. (BibTeX entry)·
Challenges in protecting Tor hidden services from botnet abuse (PDF) (Cached: PDF) by Nicholas Hopper.
In the Proceedings of Financial Cryptography and Data Security (FC'14), March 2014. (BibTeX entry)·
MoP-2-MoP – Mobile private microblogging (PDF) (Cached: PDF) by Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, and Ahmad-Reza Sadeghi.
In the Proceedings of Financial Cryptography and Data Security (FC'14), March 2014. (BibTeX entry)·
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking (PDF) (Cached: PDF) by Ralf Küsters, Tomasz Truderung, and Andreas Vogt.
In the Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 2014. (BibTeX entry)·
$Re^3$: Relay Reliability Reputation for Anonymity Systems (PDF) (Cached: PDF) by Anupam Das, Nikita Borisov, Prateek Mittal, and Matthew Caesar.
In the Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), June 2014. (BibTeX entry)·
Do dummies pay off? Limits of dummy traffic protection in anonymous communications (PDF) (Cached: PDF) by Carmela Troncoso Oya and Fernando Pérez-González.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Dovetail: Stronger Anonymity in Next-Generation Internet Routing (PDF) (Cached: PDF) by Jody Sankey and Matthew Wright.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Spoiled Onions: Exposing Malicious Tor Exit Relays (PDF) (Cached: PDF) by Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, and Edgar Weippl.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Security Audit of Safeplug ``Tor in a Box'' (PDF) (Cached: PDF) by Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, and Edward W. Felten.
In the Proceedings of 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), San Diego, CA, August 2014. (BibTeX entry)·
Key Management for Onion Routing in a True Peer to Peer Setting (PDF) (Cached: PDF) by Paolo Palmieri and Johan Pouwelse.
In the Proceedings of the 9th International Workshop on Security (IWSEC 2014), August 2014. (BibTeX entry)·
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense (PDF) (Cached: PDF) by Xiang Cai, Rishab Nithyanand, and Rob Johnson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
Glove: A Bespoke Website Fingerprinting Defense (PDF) (Cached: PDF) by Rishab Nithyanand, Xiang Cai, and Rob Johnson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
Measuring the Leakage of Onion at the Root (PDF) (Cached: PDF) by Aziz Mohaisen and Matthew Thomas.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
IM Session Identification by Outlier Detection in Cross-correlation Functions (PDF) (Cached: PDF) by Saad Saleh, Muhammad U. Ilyas, Khawar Khurshid, Alex X. Liu, and Hayder Radha.
In the Proceedings of the 49th Annual Conference on Information Sciences and Systems (CISS 2015), Baltimore, MD, USA, 2015. (BibTeX entry)·
Multi-Binomial Mix: A Proposal for Secure and Efficient Anonymous Communication (HTML, DOI) (Cached: HTML) by Shaahin Madani and Ibrahim Khalil.
In Computer Networks 93, Part 1, 2015, pages 41-53. (BibTeX entry)·
Improving Security and Efficiency of Mix-Based Anonymous Communication Systems (PDF) (Cached: PDF) by Shaahin Madani.
Ph.D. thesis, RMIT University, Melbourne, Australia, April 2015. (BibTeX entry)·
Riposte: An anonymous messaging system handling millions of users (PDF) (Cached: PDF) by Henry Corrigan-Gibbs, Dan Boneh, and David Mazières.
In the Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P 2015), San Jose, California, USA, May 2015, pages 321-338. (BibTeX entry)·
Guard Sets for Onion Routing (PDF) (Cached: PDF) by Jamie Hayes and George Danezis.
In Proceedings on Privacy Enhancing Technologies 2015(2), June 2015, pages 65-80. (BibTeX entry)·
DP5: A Private Presence Service (PDF) (Cached: PDF) by Nikita Borisov, George Danezis, and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2015(2), June 2015. (BibTeX entry)·
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems (PDF) (Cached: PDF) by Stevens Le Blond, David Choffnes, William Caldwell, Peter Druschel, and Nicholas Merritt.
In the Proceedings of the ACM SIGCOMM 2015 Conference, August 2015. (BibTeX entry)·
Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis (PDF) (Cached: PDF) by Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich.
In the Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP 2015), Monterey, California, October 2015. (BibTeX entry)·
HORNET: High-speed Onion Routing at the Network Layer (PDF) (Cached: PDF) by Chen Chen, Daniele E. Asoni, David Barrera, George Danezis, and Adrian Perrig.
In the Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15), October 2015. (BibTeX entry)·
Riffle: An Efficient Communication System With Strong Anonymity (PDF) (Cached: PDF) by Albert Kwon, David Lazar, Srinivas Devadas, and Bryan Ford.
In Proceedings on Privacy Enhancing Technologies 2016(2), April 2016, pages 115-134. (BibTeX entry)·
Scalable and Anonymous Group Communication with MTor (PDF) (Cached: PDF) by Dong Lin, Micah Sherr, and Boon Thau Loo.
In Proceedings on Privacy Enhancing Technologies 2016(2), April 2016. (BibTeX entry)·
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications (PDF) (Cached: PDF) by Armon Barton and Matthew Wright.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
TASP: Towards Anonymity Sets that Persist (PDF) (Cached: PDF) by Jamie Hayes, Carmela Troncoso, and George Danezis.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016), November 2016. (BibTeX entry)·
PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication (PDF) (Cached: PDF) by Ludovic Barman, Mahdi Zamani, Italo Dacosta, Joan Feigenbaum, Bryan Ford, Jean-Pierre Hubaux, and David Wolinsky.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016), November 2016. (BibTeX entry)·
The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services (PDF) (Cached: PDF) by Jesse Victors, Ming Li, and Xinwen Fu.
In Proceedings on Privacy Enhancing Technologies 2017(1), January 2017. (BibTeX entry)·
PHI: a Path-Hidden Lightweight Anonymity Protocol at Network Layer (PDF) (Cached: PDF) by Chen Chen and Adrian Perrig.
In Proceedings on Privacy Enhancing Technologies 2017(1), January 2017. (BibTeX entry)·
Phonion: Practical Protection of Metadata in Telephony Networks (PDF) (Cached: PDF) by Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor.
In Proceedings on Privacy Enhancing Technologies 2017(1), January 2017. (BibTeX entry)·
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection (PDF) (Cached: PDF) by Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, and Paul Syverson.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '17, February 2017. (BibTeX entry)·
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks (PDF) (Cached: PDF) by Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, and Prateek Mittal.
In the Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P 2017), San Francisco, California, USA, May 2017. (BibTeX entry)·
The Loopix Anonymity System (PDF) (Cached: PDF) by Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis.
In the Proceedings of the 26th Usenix Security Symposium, August 2017. (BibTeX entry)·
Characterizing the Nature and Dynamics of Tor Exit Blocking (PDF) (Cached: PDF) by Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson.
In the Proceedings of the 26th Usenix Security Symposium, August 2017. (BibTeX entry)·
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks (PDF) (Cached: PDF) by Tao Wang and Ian Goldberg.
In the Proceedings of the 26th Usenix Security Symposium, August 2017. (BibTeX entry)·
No right to remain silent: Isolating Malicious Mixes (HTML, PDF) (Cached: HTML, PDF) by Hemi Leibowitz, Ania Piotrowska, George Danezis, and Amir Herzberg.
Cryptology ePrint Archive, Report 2017/1000, October 2017. (BibTeX entry)·
Onions in the Crosshairs: When The Man really is out to get you by Aaron D. Jaggard and Paul Syverson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2017), November 2017. (BibTeX entry)·
Analysis of Fingerprinting Techniques for Tor Hidden Services (PDF) (Cached: PDF) by Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, and Thomas Engel.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2017), November 2017. (BibTeX entry)·
Guard Sets in Tor using AS Relationships (PDF) (Cached: PDF) by Mohsen Imani, Armon Barton, and Matthew Wright.
In Proceedings on Privacy Enhancing Technologies 2018(1), January 2018. (BibTeX entry)·
A Large-scale Analysis of Content Modification by Open HTTP Proxies (PDF) (Cached: PDF) by Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, and Michalis Polychronakis.
In the Proceedings of the 25th Symposium on Network and Distributed System Security (NDSS '18), February 2018. (BibTeX entry)·
How Do Tor Users Interact With Onion Services? (PDF) (Cached: PDF) by Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, and Nick Feamster.
In the Proceedings of the 27th Usenix Security Symposium, August 2018. (BibTeX entry)·
Towards Predicting Efficient and Anonymous Tor Circuits (PDF) (Cached: PDF) by Armon Barton, Mohsen Imani, Jiang Ming, and Matthew Wright.
In the Proceedings of the 27th Usenix Security Symposium, August 2018. (BibTeX entry)·
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor (PDF) (Cached: PDF) by Hans Hanley, Yixin Sun, Sameer Wagh, and Prateek Mittal.
In Proceedings on Privacy Enhancing Technologies 2019(2), April 2019. (BibTeX entry)·
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments (PDF) (Cached: PDF) by Sajin Sasy and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2019(3), July 2019. (BibTeX entry)·
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor (PDF) (Cached: PDF) by Rob Jansen, Tavish Vaidya, and Micah Sherr.
In the Proceedings of the 28th USENIX Security Symposium (Sec '19), August 2019. (BibTeX entry)·
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments (PDF) (Cached: PDF) by Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, and Klaus Wehrle.
In the Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 2019. (BibTeX entry)·
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing (PDF) (Cached: PDF) by Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, and Andriy Panchenko.
In the Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 2019. (BibTeX entry)·
POSTER: Traffic Splitting to Counter Website Fingerprinting (PDF) (Cached: PDF) by Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, and Andriy Panchenko.
In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS '19), November 2019. (BibTeX entry)·
$$MIMIQ$$: Masking IPs with Migration in $$QUIC$$ (PDF) (Cached: PDF) by Yashodhar Govil, Liang Wang, and Jennifer Rexford.
In the Proceedings of the 10th $$USENIX$$ Workshop on Free and Open Communications on the Internet ($$FOCI$$ 20), 2020. (BibTeX entry)·
Designing a Better Browser for Tor with BLAST (PDF) (Cached: PDF) by Tao Wang.
In the Proceedings of the 27th Symposium on Network and Distributed System Security (NDSS '20), February 2020. (BibTeX entry)·
CLAPS: Client-Location-Aware Path Selection in Tor (PDF) (Cached: PDF) by Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, and Olivier Pereira.
In the Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), November 2020. (BibTeX entry)·
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting (PDF) (Cached: PDF) by Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Klaus Wehrle, Thomas Engel, and Andriy Panchenko.
In the Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), November 2020. (BibTeX entry)·
On the Accuracy of Tor Bandwidth Estimation (PDF) by Rob Jansen and Aaron Johnson.
In the Proceedings of the Passive and Active Measurement Conference (PAM '21), 2021, pages 481-498. (BibTeX entry)·
FlashFlow: A Secure Speed Test for Tor (PDF) by Matthew Traudt, Rob Jansen, and Aaron Johnson.
In the Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS), 2021, pages 381-391. (BibTeX entry)·
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing (PDF) by Kyle Hogan, Sacha Servan-Schreiber, Zacharay Newman, Ben Weintraub, Cristina Nita-Rotaru, and Srinivas Devadas.
In the Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022, pages 1933-1952. (BibTeX entry)·
MirageFlow: A New Bandwidth Inflation Attack on Tor (PDF) by Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, and Murtuza Jadliwala.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS '24, February 2024. (BibTeX entry)·
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser (PDF) (Cached: PDF) by Killian Davitt, Dan Ristea, Duncan Russell, and Steven J. Murdoch.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
A case study on DDoS attacks against Tor relays (PDF) by Tobias Höller and René Mayrhofer.
In the Proceedings of Free and Open Communications on the Internet (FOCI 2024), July 2024. (BibTeX entry)·
-
The Eternity Service (HTML, PS) (Cached: HTML, PS, gzipped PS) by Ross Anderson.
In the Proceedings of Pragocrypt '96, 1996. (BibTeX entry)·
TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web (HTML, PS) (Cached: HTML, PS, gzipped PS) by Ian Goldberg and David Wagner.
In First Monday 3(4), August 1998. (BibTeX entry)·
The Free Haven Project: Distributed Anonymous Storage Service (PS) (Cached: PS, gzipped PS) by Roger Dingledine, Michael J. Freedman, and David Molnar.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000. (BibTeX entry)·
Freenet: A Distributed Anonymous Information Storage and Retrieval System (PDF, DOI) (Cached: HTML, PDF) by Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 46-66. (BibTeX entry)·
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system (PDF) (Cached: PDF) by Marc Waldman, Aviel Rubin, and Lorrie Cranor.
In the Proceedings of the 9th USENIX Security Symposium, August 2000, pages 59-72. (BibTeX entry)·
The Strong Eternity Service (PDF) (Cached: PDF) by Tonda Benes.
In the Proceedings of Information Hiding Workshop (IH 2001), April 2001. (BibTeX entry)·
Tangler: a censorship-resistant publishing system based on document entanglements (PS) (Cached: PS, gzipped PS) by Marc Waldman and David Mazières.
In the Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), November 2001, pages 126-135. (BibTeX entry)·
Anonymizing censorship resistant systems (PS) (Cached: PDF, PS, gzipped PS) by Andrei Serjantov.
In the Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), March 2002. (BibTeX entry)·
Efficient Sharing of Encrypted Data (PS) (Cached: PS, gzipped PS) by Krista Bennett, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu.
In the Proceedings of ASCIP 2002, July 2002, pages 107-120. (BibTeX entry)·
GAP – Practical anonymous networking (PS) (Cached: PS, gzipped PS) by Krista Bennett and Christian Grothoff.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 141-160. (BibTeX entry)·
An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks (PDF) (Cached: PDF) by Dennis Kügler.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 161-176. (BibTeX entry)·
Censorship Resistance Revisited (PDF) (Cached: PDF) by Ginger Perng, Michael K. Reiter, and Chenxi Wang.
In the Proceedings of Information Hiding Workshop (IH 2005), June 2005, pages 62-76. (BibTeX entry)·
k-Anonymity (PDF) (Cached: PDF) by Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati.
Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer, 2007. (BibTeX entry)·
Anon-Pass: Practical Anonymous Subscriptions (PDF) (Cached: PDF) by Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, and Emmett Witchel.
In the Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P 2013), San Francisco, California, USA, May 2013, pages 319-333. (BibTeX entry)·
Measuring Freenet in the Wild: Censorship-resilience under Observation (PDF) (Cached: PDF) by Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
On the Impossibility of Efficient Self-Stabilization in Virtual Overlays with Churn (PDF) (Cached: PDF) by Stefanie Roos and Thorsten Strufe.
In the Proceedings of IEEE INFOCOM 2015, April 2015. (BibTeX entry)·
Dealing with Dead Ends – Efficient Routing in Darknets (PDF) (Cached: PDF) by Stefanie Roos and Thorsten Strufe.
In Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS), 2016. (BibTeX entry)·
Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays (PDF) (Cached: PDF) by Stefanie Roos, Martin Beck, and Thorsten Strufe.
In the Proceedings of IEEE INFOCOM 2016, April 2016. (BibTeX entry)·
-
Infranet: Circumventing Web Censorship and Surveillance (PDF, gzipped PS) (Cached: PDF, gzipped PS) by Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, and David Karger.
In the Proceedings of the 11th USENIX Security Symposium, August 2002. (BibTeX entry)·
Thwarting Web Censorship with Untrusted Messenger Delivery (PDF) (Cached: PDF) by Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, and David Karger.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 125-140. (BibTeX entry)·
How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing (PDF) (Cached: PDF) by Stefan Köpsell and Ulf Hilling.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004), Washington, DC, USA, October 2004. (BibTeX entry)·
Ignoring the Great Firewall of China (PDF) (Cached: PDF) by Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 20-35. (BibTeX entry)·
Dissent: Accountable Anonymous Group Messaging (PDF) (Cached: PDF) by Henry Corrigan-Gibbs and Bryan Ford.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
Dust: A Blocking-Resistant Internet Transport Protocol (PDF) (Cached: PDF) by Brandon Wiley.
School of Information, University of Texas at Austin technical report , 2011. (BibTeX entry)·
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics (PDF) (Cached: PDF) by Joss Wright, Tulio de Souza, and Ian Brown.
In the Proceedings of FOCI'11 (USENIX Security Symposium), San Francisco, 2011. (BibTeX entry)·
Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies (PDF) (Cached: PDF) by Kirill Levchenko and Damon McCoy.
In the Proceedings of Financial Cryptography and Data Security (FC'11), February 2011. (BibTeX entry)·
Decoy Routing: Toward Unblockable Internet Communication (PDF) (Cached: PDF) by Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, and W. Timothy Strayer.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011), August 2011. (BibTeX entry)·
Telex: Anticensorship in the Network Infrastructure (PDF) (Cached: PDF) by Eric Wustrow, Scott Wolchok, Ian Goldberg, and J. Alex Halderman.
In the Proceedings of the 20th USENIX Security Symposium, August 2011. (BibTeX entry)·
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability (PDF) (Cached: PDF) by Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, and Nikita Borisov.
In the Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011), October 2011. (BibTeX entry)·
Evading Censorship with Browser-Based Proxies (PDF) (Cached: PDF) by David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, and Dan Boneh.
In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 2012. (BibTeX entry)·
How the Great Firewall of China is blocking Tor (PDF) (Cached: PDF) by Philipp Winter and Stefan Lindskog.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), August 2012. (BibTeX entry)·
Bootstrapping Communications into an Anti-Censorship System (PDF) (Cached: PDF) by Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Allen Simpson, Paul Vixie, and Dan Boneh.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), August 2012. (BibTeX entry)·
Routing Around Decoys (PDF) (Cached: PDF) by Max Schuchard, John Geddes, Christopher Thompson, and Nicholas Hopper.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
SkypeMorph: Protocol Obfuscation for Tor Bridges (PDF) (Cached: PDF) by Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, and Ian Goldberg.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
StegoTorus: A Camouflage Proxy for the Tor Anonymity System (PDF) (Cached: PDF) by Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, and Dan Boneh.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing (PDF) (Cached: PDF) by Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, and Nikita Borisov.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
Message In A Bottle: Sailing Past Censorship (PDF) (Cached: PDF) by Luca Invernizzi, Christopher Kruegel, and Giovanni Vigna.
In the Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2013. (BibTeX entry)·
I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention (PDF) (Cached: PDF) by Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew Singer.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
The Parrot is Dead: Observing Unobservable Network Communications (PDF) (Cached: PDF) by Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov.
In the Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 2013. (BibTeX entry)·
OSS: Using Online Scanning Services for Censorship Circumvention (PDF) (Cached: PDF) by David Fifield, Gabi Nakibly, and Dan Boneh.
In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)·
Protocol Misidentification Made Easy with Format-Transforming Encryption (PDF) (Cached: PDF) by Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention (PDF) (Cached: PDF) by John Geddes, Maxfield Schuchard, and Nicholas Hopper.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
Systemization of Pluggable Transports for Censorship Resistance (PDF) (Cached: PDF) by Sheharbano Khattak, Laurent Simon, and Steven J. Murdoch.
In CoRR abs/1412.7448, 2014. (BibTeX entry)·
Regional Variation in Chinese Internet Filtering (PDF) (Cached: PDF) by Joss Wright.
In Information, Communication & Society 17(1), 2014, pages 121-141. (BibTeX entry)·
No Direction Home: The True Cost of Routing Around Decoys (PDF) (Cached: PDF) by Amir Houmansadr, Edmund L. Wong, and Vitaly Shmatikov.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '14, February 2014. (BibTeX entry)·
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking (PDF) (Cached: PDF) by Chad Brubaker, Amir Houmansadr, and Vitaly Shmatikov.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
TapDance: End-to-Middle Anticensorship without Flow Blocking (PDF) (Cached: PDF) by Eric Wustrow, Colleen M. Swanson, and J. Alex Halderman.
In the Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, August 2014. (BibTeX entry)·
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes (PDF) (Cached: PDF) by Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, and Thomas Shrimpton.
In the Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, August 2014. (BibTeX entry)·
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship (PDF) (Cached: PDF) by Anonymous.
In the Proceedings of 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), San Diego, CA, August 2014. (BibTeX entry)·
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search (PDF) (Cached: PDF) by Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, and Karim Habak.
In the Proceedings of 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), San Diego, CA, August 2014. (BibTeX entry)·
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography (PDF) (Cached: PDF) by Christopher Connolly, Patrick Lincoln, Ian Mason, and Vinod Yegneswaran.
In the Proceedings of 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), San Diego, CA, August 2014. (BibTeX entry)·
Facet: Streaming over Videoconferencing for Censorship Circumvention (PDF) (Cached: PDF) by Shuai Li, Mike Schliep, and Nick Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
Blocking-resistant communication through domain fronting (HTML, PDF) (Cached: HTML, PDF) by David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson.
In Proceedings on Privacy Enhancing Technologies 2015(2), 2015, pages 46-64. (BibTeX entry)·
Marionette: A Programmable Network Traffic Obfuscation System (PDF) (Cached: PDF) by Kevin P. Dyer, Scott E. Coull, and Thomas Shrimpton.
In the Proceedings of the 24th Usenix Security Symposium, August 2015. (BibTeX entry)·
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform (PDF) (Cached: PDF) by Paul Vines and Tadayoshi Kohno.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2015), October 2015. (BibTeX entry)·
Do You See What I See? Differential Treatment of Anonymous Users (PDF) (Cached: PDF) by Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, and Steven J. Murdoch.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '16, February 2016. (BibTeX entry)·
Mailet: Instant Social Networking under Censorship (PDF) (Cached: PDF) by Shuai Li and Nicholas Hopper.
In Proceedings on Privacy Enhancing Technologies 2016(2), April 2016. (BibTeX entry)·
CovertCast: Using Live Streaming to Evade Internet Censorship (PDF) (Cached: PDF) by Richard McPherson, Amir Houmansadr, and Vitaly Shmatikov.
In Proceedings on Privacy Enhancing Technologies 2016(3), July 2016. (BibTeX entry)·
Censors' Delay in Blocking Circumvention Proxies (PDF) (Cached: PDF) by David Fifield and Lynn Tsai.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, Austin, TX, USA, August 2016. (BibTeX entry)·
Salmon: Robust Proxy Distribution for Censorship Circumvention (PDF) (Cached: PDF) by Frederick Douglas, Rorshach, Weiyang Pan, and Matthew Caesar.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
SoK: Making Sense of Censorship Resistance Systems (PDF) (Cached: PDF) by Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
A Framework for the Game-theoretic Analysis of Censorship Resistance (PDF) (Cached: PDF) by Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
Slitheen: Perfectly imitated decoy routing through traffic replacement (PDF) (Cached: PDF) by Cecylia Bocovich and Ian Goldberg.
In the Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), October 2016. (BibTeX entry)·
Practical Censorship Evasion Leveraging Content Delivery Networks (PDF) (Cached: PDF) by Hadi Zolfaghari and Amir Houmansadr.
In the Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), October 2016. (BibTeX entry)·
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory (PDF) (Cached: PDF) by Milad Nasr and Amir Houmansadr.
In the Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), October 2016. (BibTeX entry)·
Mending wall: On the implementation of censorship in india (PDF) (Cached: PDF) by Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, HB Acharya, and Sambuddho Chakravarty.
In the Proceedings of the International Conference on Security and Privacy in Communication Systems, 2017, pages 418-437. (BibTeX entry)·
An ISP-Scale Deployment of TapDance (PDF) (Cached: PDF) by Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Nikita Borisov, Alex Halderman, and Eric Wustrow.
In the Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, Vancouver, Canada, August 2017. (BibTeX entry)·
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks (PDF) (Cached: PDF) by Milad Nasr, Hadi Zolfaghari, and Amir Houmansadr.
In the Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17), November 2017. (BibTeX entry)·
Secure asymmetry and deployability for decoy routing systems (PDF) (Cached: PDF) by Cecylia Bocovich and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2018(3), June 2018. (BibTeX entry)·
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance (PDF) (Cached: PDF) by Nguyen Phong Hoang, Panagiotis Kintis, and Manos Antonakakis.
In the Proceedings of the Internet Measurement Conference 2018 (IMC '18), October 2018. (BibTeX entry)·
The use of TLS in Censorship Circumvention (PDF) (Cached: PDF) by Sergey Frolov and Eric Wustrow.
In the Proceedings of the 26th Symposium on Network and Distributed System Security (NDSS '19), February 2019. (BibTeX entry)·
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory (PDF) (Cached: PDF) by Milad Nasr, Sadegh Farhang, Amir Houmansadr, and Jens Grossklags.
In the Proceedings of the 26th Symposium on Network and Distributed System Security (NDSS '19), February 2019. (BibTeX entry)·
Detecting Probe-resistant Proxies (PDF) (Cached: PDF) by Sergey Frolov, Jack Wampler, and Eric Wustrow.
In the Proceedings of the 27th Symposium on Network and Distributed System Security (NDSS '20), February 2020. (BibTeX entry)·
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses (PDF) (Cached: PDF) by Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, and Amirhossein Ghafari.
In the Proceedings of the 27th Symposium on Network and Distributed System Security (NDSS '20), February 2020. (BibTeX entry)·
Bypassing Tor Exit Blocking with Exit Bridge Onion Services (PDF) (Cached: PDF) by Zhao Zhang, Wenchao Zhou, and Micah Sherr.
In the Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), November 2020. (BibTeX entry)·
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC (PDF) (Cached: PDF) by Diogo Barradas, Nuno Santos, Luis Rodrigues, and Vítor Nunes.
In the Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), November 2020. (BibTeX entry)·
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge (PDF) by Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, and Benjamin E. Ujcich.
In the Proceedings of the 45th IEEE Symposium on Security and Privacy, May 2024. (BibTeX entry)·
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship (PDF) (Cached: PDF) by Paul Vines, Samuel McKay, Jesse Jenter, and Suresh Krishnaswamy.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
GFWeb: Measuring the Great Firewall's Web Censorship at Scale (PDF) (Cached: PDF) by Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, and Nick Feamster.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
Snowflake, a censorship circumvention system using temporary WebRTC proxies (PDF) (Cached: PDF) by Cecylia Bocovich, Arlo Breault, David Fifield, Serene, and Xiaokang Wang.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
SpotProxy: Rediscovering the Cloud for Censorship Circumvention (PDF) by Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, and Moti Yung.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes (PDF) (Cached: PDF) by Diwen Xue, Michalis Kallitsis, Amir Houmansadr, and Roya Ensafi.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation (PDF) (Cached: PDF) by Jan Camenisch and Anna Lysyanskaya.
In the Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01), London, UK, 2001, pages 93-118. (BibTeX entry)·
Design and implementation of the idemix anonymous credential system (PDF, DOI) (Cached: PDF) by Jan Camenisch and Els Van Herreweghen.
In the Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), Washington, DC, USA, 2002, pages 21-30. (BibTeX entry)·
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials (PDF) (Cached: PDF) by Jan Camenisch and Anna Lysyanskaya.
In the Proceedings of CRYPTO 2002, 2002, pages 61-76. (BibTeX entry)·
A Signature Scheme with Efficient Protocols (PDF) (Cached: PDF) by Jan Camenisch and Anna Lysyanskaya.
In the Proceedings of SCN '02, Third Conference on Security in Communication Networks, 2002, pages 268-289. (BibTeX entry)·
Practical Verifiable Encryption and Decryption of Discrete Logarithms (PDF) (Cached: PDF) by Jan Camenisch and Victor Shoup.
In the Proceedings of CRYPTO 2003, 2003, pages 126-144. (BibTeX entry)·
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System by Giuseppe Persiano and Ivan Visconti.
In the Proceedings of Financial Cryptography (FC '04), February 2004, pages 196-211. (BibTeX entry)·
Compact E-Cash (PDF) (Cached: PDF) by Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya.
In the Proceedings of EUROCRYPT 2005, May 2005, pages 302-321. (BibTeX entry)·
Privacy for Public Transportation (PDF) (Cached: PDF) by Thomas Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 1-19. (BibTeX entry)·
How to win the clonewars: efficient periodic n-times anonymous authentication (PDF, DOI) (Cached: PDF) by Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich.
In the Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006), Alexandria, Virginia, USA, November 2006, pages 201-210. (BibTeX entry)·
Information Disclosure in Identity Management (PDF) (Cached: PDF) by Dogan Kesdogan, Vinh Pham, and Lexi Pimenidis.
In the Proceedings of 12th Nordic Workshop on IT-Security, NordSec, Reykjavik, Iceland, October 2007, pages 141-152. (BibTeX entry)·
Efficient Attributes for Anonymous Credentials (PDF) (Cached: PDF) by Jan Camenisch and Thomas Gross.
In the Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pages 345-356. (BibTeX entry)·
Decentralized Anonymous Credentials (PDF) (Cached: PDF) by Christina Garman, Matthew Green, and Ian Miers.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '14, February 2014. (BibTeX entry)·
Mixcoin: Anonymity for Bitcoin with accountable mixes (PDF) (Cached: PDF) by Joseph Bonneau, Jeremy Clark, Joshua A. Kroll, Andrew Miller, and Arvind Narayanan.
In the Proceedings of Financial Cryptography and Data Security (FC'14), March 2014. (BibTeX entry)·
Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin (PDF) (Cached: PDF) by Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza.
In the Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 2014. (BibTeX entry)·
-
The social cost of cheap pseudonyms (PDF) (Cached: HTML, PDF) by Eric Friedman and Paul Resnick.
In Journal of Economics and Management Strategy 10(2), 2001, pages 173-199. (BibTeX entry)·
On the Economics of Anonymity (PDF) (Cached: PDF) by Alessandro Acquisti, Roger Dingledine, and Paul Syverson.
In the Proceedings of Financial Cryptography (FC '03), January 2003. (BibTeX entry)·
An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks (PS) (Cached: PS, gzipped PS) by Christian Grothoff.
In Wirtschaftsinformatik, June 2003. (BibTeX entry)·
Reputation in P2P Anonymity Systems (PDF) (Cached: PDF) by Roger Dingledine, Nick Mathewson, and Paul Syverson.
In the Proceedings of Workshop on Economics of Peer-to-Peer Systems, June 2003. (BibTeX entry)·
The Economics of Censorship Resistance (PDF) (Cached: PDF) by George Danezis and Ross Anderson.
In the Proceedings of Workshop on Economics and Information Security (WEIS04), May 2004. (BibTeX entry)·
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids (PDF) (Cached: PDF) by R. Gupta, S. Ray, A.K. Somani, and Z. Zhang.
In Multiagent and Grid Systems 2(1), 2006, pages 11-27. (BibTeX entry)·
Anonymity Loves Company: Usability and the Network Effect (PDF) (Cached: PDF) by Roger Dingledine and Nick Mathewson.
In the Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June 2006. (BibTeX entry)·
Making P2P Accountable without Losing Privacy (PDF) (Cached: PDF) by Chris Erway, Melissa Chase, John Jannotti, Alptekin Kupcu, Anna Lysyanskaya, Mira Meyerovich, and Eric Rachlin.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007. (BibTeX entry)·
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay (PDF) (Cached: PDF) by Alex Biryukov and Ivan Pustogarov.
Cryptology ePrint Archive, Report 2014/1011, 2014. (BibTeX entry)·
Paying the Guard: an Entry-Guard-based Payment System for Tor (PDF) (Cached: PDF) by Paolo Palmieri and Johan Pouwelse.
In the Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015), January 2015. (BibTeX entry)·
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians (PDF) (Cached: PDF) by Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt.
In the Proceedings of Computer-Supported Cooperative Work and Social Computing (CSCW), March 2017. (BibTeX entry)·
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory (PDF) (Cached: PDF) by Milad Nasr, Sadegh Farhang, Amir Houmansadr, and Jens Grossklags.
In the Proceedings of the 26th Symposium on Network and Distributed System Security (NDSS '19), February 2019. (BibTeX entry)·
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers (PDF) (Cached: PDF) by Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt.
In the Proceedings of Conference on Human Factors in Computing Systems (CHI), May 2019. (BibTeX entry)·
-
Group Principals and the Formalization of Anonymity (PDF, PS) (Cached: PDF, PS, gzipped PS) by Paul F. Syverson and Stuart G. Stubblebine.
In the Proceedings of the World Congress on Formal Methods (1), 1999, pages 814-833. (BibTeX entry)·
Probabilistic Model Checking of an Anonymity System (PS) (Cached: PS, gzipped PS) by Vitaly Shmatikov.
In Journal of Computer Security 12(3-4), 2004, pages 355-377. (BibTeX entry)·
Information Hiding, Anonymity and Privacy: A Modular Approach (PS) (Cached: PS, gzipped PS) by Dominic Hughes and Vitaly Shmatikov.
In Journal of Computer Security 12(1), 2004, pages 3-36. (BibTeX entry)·
Anonymity and Information Hiding in Multiagent Systems (PDF) (Cached: PDF) by Joseph Y. Halpern and Kevin R. O'Neill.
In Journal of Computer Security, 2004. (BibTeX entry)·
A formalization of anonymity and onion routing (PDF) (Cached: PDF) by S. Mauw, J. Verschuren, and E.P. de Vink.
In the Proceedings of ESORICS 2004, Sophia Antipolis, 2004, pages 109-124. (BibTeX entry)·
Provable Anonymity (PDF, PS) (Cached: PDF, PS, gzipped PS) by Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, and Peter van Rossum.
In the Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05), Alexandria, VA, USA, November 2005. (BibTeX entry)·
Structuring Anonymity Metrics (DOI) by Sebastian Clau and Stefan Schiffner.
In the Proceedings of the Second ACM Workshop on Digital Identity Management, Alexandria, Virginia, USA, 2006, pages 55-62. (BibTeX entry)·
Measuring anonymity with relative entropy by Y. Deng, J. Pang, and P. Wu.
In Proc. of FAST, 2006. (BibTeX entry)·
Anonymity Protocols as Noisy Channels? by K. Chatzikokolakis, C. Palamidessi, and P. Panangaden.
In Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer, 2006. (BibTeX entry)·
Timing channels, anonymity, mixes, and spikes by Ira S. Moskowitz and Richard E. Newman.
In the Proceedings of the 2nd IASTED international conference on Advances in computer science and technology (ACST '06), Puerto Vallarta, Mexico, January 2006, pages 251-256. (BibTeX entry)·
On the Security of the Tor Authentication Protocol (PDF) (Cached: PDF) by Ian Goldberg.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 316-331. (BibTeX entry)·
Cryptography from Anonymity (PDF) (Cached: PDF) by Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai.
In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)-Volume 00, October 2006, pages 239-248. (BibTeX entry)·
Probabilistic Anonymity via Coalgebraic Simulations (PDF) (Cached: PDF) by Ichiro Hasuo and Yoshinobu Kawabe.
In the Proceedings of the European Symposium on Programming (ESOP '07), 2007, pages 379-394. (BibTeX entry)·
Attacking Unlinkability: The Importance of Context (PDF) (Cached: PDF) by Matthias Franz, Bernd Meyer, and Andreas Pashalidis.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Characterising Anonymity Systems (PDF) (Cached: PDF) by Joss Wright.
Ph.D. thesis, Department of Computer Science, University of York, York, November 2007. (BibTeX entry)·
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover by Aaron H. Coble.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 77-98. (BibTeX entry)·
Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy (PDF) (Cached: PDF) by Jason Reed and Benjamin C. Pierce.
In the Proceedings of the ACM SIGPLAN International Conference on Functional Programming (ICFP), Baltimore, Maryland, September 2010. (BibTeX entry)·
-
Security without Identification: Transaction Systems to Make Big Brother Obsolete by David Chaum.
In CACM 28(10), October 1985. (BibTeX entry)·
Privacy-enhancing Technologies for the Internet (PS) (Cached: PS, gzipped PS) by Ian Goldberg, David Wagner, and Eric Brewer.
In the Proceedings of the 42nd IEEE Spring COMPCON, February 1997. (BibTeX entry)·
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology (HTML) (Cached: HTML, PDF) by Andreas Pfitzmann and Marit Hansen.
Draft, July 2000. (BibTeX entry)·
Real World Patterns of Failure in Anonymity Systems (PDF) (Cached: PDF) by Richard Clayton, George Danezis, and Markus G. Kuhn.
In the Proceedings of Information Hiding Workshop (IH 2001), April 2001, pages 230-244. (BibTeX entry)·
Responder Anonymity and Anonymous Peer-to-Peer File Sharing (PDF) (Cached: PDF) by Vincent Scarlata, Brian Neil Levine, and Clay Shields.
In the Proceedings of the IEEE International Conference on Network Protocols (ICNP), November 2001, pages 272-280. (BibTeX entry)·
Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers by Robyn Wagner.
In New Mexico Law Review 32(Winter), 2002, pages 99-142. (BibTeX entry)·
Privacy-enhancing technologies for the Internet, II: Five years later (PDF, PS) (Cached: PDF, PS, gzipped PS) by Ian Goldberg.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
Chaffinch: Confidentiality in the Face of Legal Threats (HTML, PDF) (Cached: HTML, PDF) by Richard Clayton and George Danezis.
In the Proceedings of Information Hiding Workshop (IH 2002), October 2002. (BibTeX entry)·
On the Anonymity of Banknotes by Dennis Kügler.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 108-120. (BibTeX entry)·
Efficient Private Matching and Set Intersection (PDF) (Cached: PDF) by Michael J. Freedman, Kobbi Nissim, and Benny Pinkas.
In the Proceedings of EUROCRYPT 2004, Interlaken, Switzerland, May 2004. (BibTeX entry)·
Universal Re-encryption of Signatures and Controlling Anonymous Information Flow (PDF) (Cached: PDF) by Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, and Filip Zagorski.
In the Proceedings of WARTACRYPT '04, July 2004. (BibTeX entry)·
Keyword Search and Oblivious Pseudorandom Functions (PDF) (Cached: PDF) by Michael J. Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold.
In the Proceedings of the 2nd Theory of Cryptography Conference (TCC 05), Cambridge, MA, February 2005. (BibTeX entry)·
A Classification for Privacy Techniques (PDF) (Cached: PDF) by Carlisle Adams.
In University of Ottawa Law amp; Technology Journal 3, 2006, pages 35-52. (BibTeX entry)·
Secure User Identification Without Privacy Erosion (PDF) (Cached: PDF) by Stefan Brands.
In University of Ottawa Law amp; Technology Journal 3, 2006, pages 205-223. (BibTeX entry)·
Silent cascade: Enhancing location privacy without communication qos degradation by L. Huang, K. Matsuura, H. Yamane, and K. Sezaki.
In Proc. of Security in Pervasive Computing (SPC), 2006, pages 165-180. (BibTeX entry)·
Efficient Private Techniques for Verifying Social Proximity (PDF) (Cached: PDF) by Michael J. Freedman and Antonio Nicolosi.
In the Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS07), Bellevue, WA, February 2007. (BibTeX entry)·
A Family of Dunces (PDF) (Cached: PDF) by Gene Tsudik.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Nymble: Anonymous IP-address Blocking (PDF) (Cached: PDF) by Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, and Sean W. Smith.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System (PDF) (Cached: PDF) by Carmela Troncoso, Claudia Diaz, Orr Dunkelman, and Bart Preneel.
In the Proceedings of Information Hiding Workshop (IH 2007), Saint-Malo,FR, June 2007, pages 220-236. (BibTeX entry)·
Privacy Protection for RFID with Hidden Subset Identifiers (publisher) by Jacek Cichon, Marek Klonowski, and Miroslaw Kutylowski.
In the Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008), Sydney, Australia, May 2008, pages 298-314. (BibTeX entry)·
An Indistinguishability-Based Characterization of Anonymous Channels by Alejandro Hevia and Daniele Micciancio.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 24-43. (BibTeX entry)·
Shining Light in Dark Places: Understanding the Tor Network (PDF) (Cached: PDF) by Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 63-76. (BibTeX entry)·
A Framework for the Analysis of Mix-Based Steganographic File Systems (PDF) (Cached: PDF) by Claudia Diaz, Carmela Troncoso, and Bart Preneel.
In the Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga,ES, October 2008. (BibTeX entry)·
PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication by Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean Smith.
In the Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pages 333-345. (BibTeX entry)·
On anonymity in an electronic society: A survey of anonymous communication systems (PDF, DOI) (Cached: PDF) by Matthew Edman and Bülent Yener.
In ACM Computing Surveys 42(1), 2009, pages 1-35. (BibTeX entry)·
An efficient privacy-preserving scheme against traffic analysis attacks in network coding (PDF) (Cached: PDF) by Yanfei Fan, Yixin Jiang, Haojin Zhu, and Xuemin Shen.
In the Proceedings of the 28th Annual IEEE Conference on Computer Communications (INFOCOM 2009), 2009, pages 2213-2221. (BibTeX entry)·
De-anonymizing Social Networks (PDF) (Cached: PDF) by Arvind Narayanan and Vitaly Shmatikov.
In the Proceedings of the 30th IEEE Symposium on Security and Privacy (Samp;P 2009), Oakland, California, USA, May 2009, pages 173-187. (BibTeX entry)·
Obscured by Clouds: On the Privacy Implications of Cloud Computing (PDF) (Cached: PDF) by Joss Wright.
In the Proceedings of the 11th Czech Information Security Summit, 2010, pages 24-26. (BibTeX entry)·
Differential Privacy for Collaborative Security (PDF) (Cached: PDF) by Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas Haeberlen, Benjamin C. Pierce, and Jonathan M. Smith.
In the Proceedings of the European Workshop on System Security (EUROSEC), April 2010. (BibTeX entry)·
Making a Nymbler Nymble using VERBS (Extended Version) (PDF) (Cached: PDF) by Ryan Henry, Kevin Henry, and Ian Goldberg.
In the Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), Berlin, Germany, July 2010. (BibTeX entry)·
How unique is your web browser? (PDF) (Cached: PDF) by Peter Eckersley.
In the Proceedings of the 10th Privacy Enhancing Technologies Symposium, Berlin, Germany, July 2010, pages 1-18. (BibTeX entry)·
An Analysis of Private Browsing Modes in Modern Browsers (PDF) (Cached: PDF) by Gaurav Aggarwal, Elie Bursztein, Collin Jackson, and Dan Boneh.
In the Proceedings of the 19th Usenix Security Symposium, August 2010. (BibTeX entry)·
Jack: Scalable Accumulator-based Nymble System (PDF) (Cached: PDF) by Zi Lin and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, IL, USA, October 2010. (BibTeX entry)·
Quantifying location privacy (PDF) (Cached: PDF) by Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux.
In the Proceedings of the 2011 IEEE Symposium on Security and Privacy, 2011, pages 247-262. (BibTeX entry)·
Quantifying Location Privacy: The Case of Sporadic Location Exposure (PDF) (Cached: PDF) by Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, and Jean-Yves Le Boudec.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), 2011, pages 57-76. (BibTeX entry)·
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks (PDF) (Cached: PDF) by Yanfei Fan, Yixin Jiang, Haojin Zhu, Jiming Chen, and Xuemin Shen.
In IEEE Transactions on Wireless Communications 10(3), 2011, pages 834-843. (BibTeX entry)·
Anonymous communication with network coding against traffic analysis attack (PDF) (Cached: PDF) by Jin Wang, Jianping Wang, Chuan Wu, Kejie Lu, and Naijie Gu.
In the Proceedings of the 30th Annual IEEE Conference on Computer Communications (INFOCOM 2011), 2011, pages 1008-1016. (BibTeX entry)·
BNymble: More anonymous blacklisting at almost no cost (PDF) (Cached: PDF) by Peter Lofgren and Nicholas Hopper.
In the Proceedings of Financial Cryptography and Data Security (FC'11), February 2011. (BibTeX entry)·
Nymble: Blocking Misbehaving Users in Anonymizing Networks (DOI) (Cached: PDF) by Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith.
In IEEE Transactions on Dependable and Secure Computing 8(2), March–April 2011, pages 256-269. (BibTeX entry)·
Formalizing Anonymous Blacklisting Systems (PDF) (Cached: PDF) by Ryan Henry and Ian Goldberg.
In the Proceedings of the 2011 IEEE Symposium on Security and Privacy, May 2011. (BibTeX entry)·
Extending Nymble-like Systems (PDF) (Cached: PDF) by Ryan Henry and Ian Goldberg.
In the Proceedings of the 2011 IEEE Symposium on Security and Privacy, May 2011. (BibTeX entry)·
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users (PDF, DOI) (Cached: PDF) by Man Ho Au, Patrick P. Tsang, and Apu Kapadia.
In ACM Transactions on Information and System Security (ACM TISSEC) 14, December 2011, pages 29:1-29:34. (BibTeX entry)·
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks (PDF) (Cached: PDF) by Zhiguo Wan, Kai Xing, and Yunhao Liu.
In the Proceedings of the 31st Annual IEEE Conference on Computer Communications (INFOCOM 2012), 2012, pages 73-81. (BibTeX entry)·
Ethical Privacy Guidelines for Mobile Connectivity Measurements (PDF) (Cached: PDF) by Zevenbergen, ['Ian', 'Brown', 'Joss', 'Wright'] and David Erdos.
Oxford Internet Institute, University of Oxford technical report , 2013. (BibTeX entry)·
Comprehensive Study on Cybercrime (PDF) (Cached: PDF) by Ian Brown and Joss Wright et al.
UN Office on Drugs and Crime 2013. (BibTeX entry)·
Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems (PDF) (Cached: PDF) by Greg Norcie, Jim Blythe, Kelly Caine, and L Jean Camp.
In the Proceedings of the 2014 Workshop on Usable Security (USEC), February 2014. (BibTeX entry)·
ANONIZE: A Large-Scale Anonymous Survey System (PDF) (Cached: PDF) by Susan Hohenberger, Steven Myers, Rafael Pass, and abhi shelat.
In the Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 2014. (BibTeX entry)·
Protecting Privacy Against Structural De-anonymization Attacks in Social Networks (PDF) (Cached: PDF) by Gábor György Gulyás.
Ph.D. thesis, CrySyS Lab, Budapest University of Technology and Economics, May 2015. (BibTeX entry)·
Safely Measuring Tor (PDF) (Cached: PDF) by Rob Jansen and Aaron Johnson.
In the Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), October 2016. (BibTeX entry)·
-
Private Information Retrieval (PS) (Cached: PS, gzipped PS) by Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan.
In the Proceedings of the IEEE Symposium on Foundations of Computer Science, 1995, pages 41-50. (BibTeX entry)·
Preserving Privacy in a Network of Mobile Computers (PDF) (Cached: PDF) by David A. Cooper and Kenneth P. Birman.
In the Proceedings of the 1995 IEEE Symposium on Security and Privacy, May 1995. (BibTeX entry)·
Computationally private information retrieval (extended abstract) (PDF, PS, DOI) (Cached: PDF, PS, gzipped PS) by Benny Chor and Niv Gilboa.
In the Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97), El Paso, Texas, United States, May 1997, pages 304-313. (BibTeX entry)·
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication (gzipped PS) (Cached: PS, gzipped PS) by Yael Gertner, Shafi Goldwasser, and Tal Malkin.
In the Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98), London, UK, 1998, pages 200-217. (BibTeX entry)·
Protecting data privacy in private information retrieval schemes (PDF) (Cached: PDF) by Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin.
In the Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, pages 151-160. (BibTeX entry)·
Information-Theoretic Private Information Retrieval: A Unified Construction (PDF) (Cached: PDF) by Amos Beimel and Yuval Ishai.
In Lecture Notes in Computer Science 2076, 2001, pages 89-98. (BibTeX entry)·
Robust information-theoretic private information retrieval (PDF, PS) (Cached: PDF, PS, gzipped PS) by A. Beimel and Y. Stahl.
In the Proceedings of the 3rd Conference on Security in Communication Networks, 2002, pages 326-341. (BibTeX entry)·
Almost Optimal Private Information Retrieval (PDF) (Cached: PDF) by Dmitri Asonov and Johann-Christoph Freytag.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
Breaking the $O(n^1/(2k-1))$ Barrier for Information-Theoretic Private Information Retrieval (PDF) (Cached: PDF) by Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Jean-François Raymond.
In the Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02), November 2002. (BibTeX entry)·
Private keyword-based push and pull with applications to anonymous communication (PDF) (Cached: PDF) by L. Kissner, A. Oprea, M. Reiter, D. Song, and K. Yang.
In Applied Cryptography and Network Security, 2004. (BibTeX entry)·
Subliminal Channels in the Private Information Retrieval Protocols (PDF) (Cached: PDF) by Meredith L. Patterson and Len Sassaman.
In the Proceedings of the 28th Symposium on Information Theory in the Benelux, Enschede, NL, 2007. (BibTeX entry)·
The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers (PDF) (Cached: PDF) by Len Sassaman and Bart Preneel.
Katholieke Universiteit Leuven technical report ESAT-COSIC 2007-001, February 2007. (BibTeX entry)·
Space-Efficient Private Search by George Danezis and Claudia Diaz.
In the Proceedings of Financial Cryptography (FC2007), Tobago, February 2007. (BibTeX entry)·
Improving the Robustness of Private Information Retrieval (PDF) (Cached: PDF) by Ian Goldberg.
In the Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007. (BibTeX entry)·
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency (PDF) (Cached: PDF) by Casey Devet and Ian Goldberg.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Sublinear Scaling for Multi-Client Private Information Retrieval (PDF) (Cached: PDF) by Wouter Lueks and Ian Goldberg.
In the Proceedings of Financial Cryptography and Data Security (FC'15), February 2015. (BibTeX entry)·
Scalable and Private Media Consumption with Popcorn (PDF) (Cached: PDF) by Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish.
In the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, March 2016, pages 91-107. (BibTeX entry)·
-
Efficient anonymous channel and all/nothing election scheme by C. Park, K. Itoh, and K. Kurosawa.
In the Proceedings of EUROCRYPT 1993, May 1993, pages 248-259. (BibTeX entry)·
Receipt-Free MIX-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth by Joe Kilian and Kazue Sako.
In the Proceedings of EUROCRYPT 1995, May 1995. (BibTeX entry)·
Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers by Masayuki Abe.
In the Proceedings of EUROCRYPT 1998, 1998. (BibTeX entry)·
Flash Mixing (PDF) (Cached: PDF) by Markus Jakobsson.
In the Proceedings of Principles of Distributed Computing - PODC '99, 1999. (BibTeX entry)·
How To Break a Practical MIX and Design a New One (HTML) (Cached: HTML) by Yvo Desmedt and Kaoru Kurosawa.
In the Proceedings of EUROCRYPT 2000, 2000. (BibTeX entry)·
A Length-Invariant Hybrid MIX by Miyako Ohkubo and Masayuki Abe.
In the Proceedings of ASIACRYPT 2000, 2000. (BibTeX entry)·
Attack for Flash MIX (HTML) (Cached: HTML) by Masashi Mitomo and Kaoru Kurosawa.
In the Proceedings of ASIACRYPT 2000, 2000. (BibTeX entry)·
An Optimally Robust Hybrid Mix Network (Extended Abstract) (HTML) (Cached: HTML) by Markus Jakobsson and Ari Juels.
In the Proceedings of Principles of Distributed Computing - PODC '01, 2001. (BibTeX entry)·
An Efficient Scheme for Proving a Shuffle (PDF) (Cached: PDF) by Jun Furukawa and Kazue Sako.
In the Proceedings of CRYPTO 2001, 2001. (BibTeX entry)·
A Verifiable Secret Shuffle and its Application to E-Voting (PDF) (Cached: PDF) by C. Andrew Neff.
In the Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), November 2001, pages 116-125. (BibTeX entry)·
Almost Entirely Correct Mixing With Application to Voting (PDF) (Cached: PDF) by Dan Boneh and Philippe Golle.
In the Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, November 2002, pages 68-77. (BibTeX entry)·
Breaking and Mending Resilient Mix-nets (PDF) (Cached: PDF) by Lan Nguyen and Rei Safavi-Naini.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 66-80. (BibTeX entry)·
Rapid Mixing and Security of Chaum's Visual Electronic Voting (PDF) (Cached: PDF) by Marcin Gomulkiewicz, Marek Klonowski, and Miroslaw Kutylowski.
In the Proceedings of ESORICS 2003, October 2003. (BibTeX entry)·
Reputable Mix Networks (PDF) (Cached: PDF) by Philippe Golle.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 51-63. (BibTeX entry)·
Mix-network with Stronger Security by Jan Camenisch and Anton Mityagin.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005, pages 128-147. (BibTeX entry)·
A Formal Treatment of Onion Routing (PDF) (Cached: PDF) by Jan Camenisch and Anna Lysyanskaya.
In the Proceedings of CRYPTO 2005, August 2005, pages 169-187. (BibTeX entry)·
Obfuscated Ciphertext Mixing (HTML, PDF) (Cached: HTML, PDF) by Ben Adida and Douglas Wikström.
Cryptology ePrint Archive, Report 2005/394, November 2005. (BibTeX entry)·
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security by L. Nguyen, R. Safavi-Naini, and K. Kurosawa.
In International Journal of Information Security 5(4), 2006, pages 241-255. (BibTeX entry)·
Breaking Four Mix-related Schemes Based on Universal Re-encryption (PDF) (Cached: PDF) by George Danezis.
In the Proceedings of Information Security Conference 2006, September 2006. (BibTeX entry)·
How to Shuffle in Public (PDF) (Cached: PDF) by Ben Adida and Douglas Wikström.
In the Proceedings of the Theory of Cryptography 2007, February 2007. (BibTeX entry)·
A Probabilistic Analysis of Onion Routing in a Black-box Model (PDF) (Cached: PDF) by Joan Feigenbaum, Aaron Johnson, and Paul Syverson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007. (BibTeX entry)·
Are continuous stop-and-go mixnets provably secure? (PDF) (Cached: PDF) by Debajyoti Das, Claudia Diaz, Aggelos Kiayias, and Thomas Zacharias.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx (PDF) (Cached: PDF) by Philip Scherer, Christiane Weis, and Thorsten Strufe.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
-
The Design, Implementation and Operation of an Email Pseudonym Server (PDF, gzipped PS) (Cached: PDF, gzipped PS) by David Mazières and M. Frans Kaashoek.
In the Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS 1998), November 1998. (BibTeX entry)·
Can Pseudonymity Really Guarantee Privacy? (PDF) (Cached: PDF) by Josyula R. Rao and Pankaj Rohatgi.
In the Proceedings of the 9th USENIX Security Symposium, August 2000, pages 85-96. (BibTeX entry)·
Authentic Attributes with Fine-Grained Anonymity Protection (PDF, PS) (Cached: PDF, PS, gzipped PS) by Stuart Stubblebine and Paul Syverson.
In the Proceedings of Financial Cryptography (FC 2000), 2001, pages 276-294. (BibTeX entry)·
The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval (PDF) (Cached: PDF) by Len Sassaman, Bram Cohen, and Nick Mathewson.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005), Arlington, VA, USA, November 2005. (BibTeX entry)·
Valet Services: Improving Hidden Servers with a Personal Touch (PDF) (Cached: PDF) by Lasse Øverlier and Paul Syverson.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 223-244. (BibTeX entry)·
Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (PDF) (Cached: PDF) by Patrick Tsang, Man Ho Au, Apu Kapadia, and Sean Smith.
In the Proceedings of CCS 2007, October 2007. (BibTeX entry)·
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs (PDF, DOI) (Cached: PDF) by Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith.
In ACM Transactions on Information and System Security 13, December 2010, pages 39:1-39:33. (BibTeX entry)·
How Unique and Traceable are Usernames? (PDF) (Cached: PDF) by Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, and Pere Manils.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium, July 2011. (BibTeX entry)·
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation (PDF) (Cached: PDF) by Man Ho Au, Apu Kapadia, and Willy Susilo.
In the Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS), February 2012. (BibTeX entry)·
PERM: Practical Reputation-Based Blacklisting without TTPs (PDF, DOI) (Cached: PDF) by Man Ho Au and Apu Kapadia.
In the Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS), October 2012, pages 929-940. (BibTeX entry)·
Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting (PDF) (Cached: PDF) by Ryan Henry and Ian Goldberg.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs by Li Xi and Dengguo Feng.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
-
Improving Efficiency and Simplicity of Tor circuit establishment and hidden services (PDF) (Cached: PDF) by Lasse Øverlier and Paul Syverson.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
A Tune-up for Tor: Improving Security and Performance in the Tor Network (PDF) (Cached: PDF) by Robin Snader and Nikita Borisov.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '08, February 2008. (BibTeX entry)·
Performance Analysis of Anonymous Communication Channels Provided by Tor (PS) (Cached: PDF, PS, gzipped PS) by Andriy Panchenko, Lexi Pimenidis, and Johannes Renner.
In the Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, March 2008, pages 221-228. (BibTeX entry)·
Performance Measurements and Statistics of Tor Hidden Services (PDF) (Cached: PDF) by Karsten Loesing, Werner Sandmann, Christian Wilms, and Guido Wirtz.
In the Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT), Turku, Finland, July 2008. (BibTeX entry)·
Improving Tor using a TCP-over-DTLS Tunnel (abstract, PDF) (Cached: abstract, PDF) by Joel Reardon.
Masters's thesis, University of Waterloo, September 2008. (BibTeX entry)·
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks (PDF) (Cached: PDF) by Jörg Lenhard, Karsten Loesing, and Guido Wirtz.
In the Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009, June 2009. (BibTeX entry)·
Scalable Link-Based Relay Selection for Anonymous Routing (PDF) (Cached: PDF) by Micah Sherr, Matt Blaze, and Boon Thau Loo.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 73-93. (BibTeX entry)·
Scalable onion routing with Torsk (PDF) (Cached: PDF) by Jon McLachlan, Andrew Tran, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009. (BibTeX entry)·
Building Incentives into Tor (PDF) (Cached: PDF) by Tsuen-Wan ``Johnny'' Ngan, Roger Dingledine, and Dan S. Wallach.
In the Proceedings of Financial Cryptography (FC '10), January 2010. (BibTeX entry)·
Using Sphinx to Improve Onion Routing Circuit Construction (PDF) (Cached: PDF) by Aniket Kate and Ian Goldberg.
In the Proceedings of Financial Cryptography (FC '10), January 2010. (BibTeX entry)·
Recruiting New Tor Relays with BRAIDS (PDF) (Cached: PDF) by Rob Jansen, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
An Improved Algorithm for Tor Circuit Scheduling (PDF) (Cached: PDF) by Can Tang and Ian Goldberg.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
DefenestraTor: Throwing out Windows in Tor (PDF) (Cached: PDF) by Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey Voelker.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011. (BibTeX entry)·
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation (PDF) (Cached: PDF) by Kevin Bauer, Micah Sherr, Damon McCoy, and Dirk Grunwald.
In the Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011), August 2011. (BibTeX entry)·
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (PDF) (Cached: PDF) by Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg.
In the Proceedings of the 20th USENIX Security Symposium, August 2011. (BibTeX entry)·
Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise (PDF) (Cached: PDF) by W. Brad Moore, Chris Wacek, and Micah Sherr.
In the Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA, December 2011. (BibTeX entry)·
Congestion-aware Path Selection for Tor (PDF) (Cached: PDF) by Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg.
In the Proceedings of Financial Cryptography and Data Security (FC'12), February 2012. (BibTeX entry)·
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation (PDF) (Cached: PDF) by Rob Jansen and Nicholas Hopper.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'12, February 2012. (BibTeX entry)·
LASTor: A Low-Latency AS-Aware Tor Client (PDF) (Cached: PDF) by Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha.
In the Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012. (BibTeX entry)·
How (not) to build a transport layer for anonymity overlays (PDF) (Cached: PDF) by Florian Tschorsch and Björn Scheurmann.
In the Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy, June 2012. (BibTeX entry)·
Methodically Modeling the Tor Network (PDF) (Cached: PDF) by Rob Jansen, Kevin Bauer, Nicholas Hopper, and Roger Dingledine.
In the Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012), August 2012. (BibTeX entry)·
Throttling Tor Bandwidth Parasites (PDF) (Cached: PDF) by Rob Jansen, Paul Syverson, and Nicholas Hopper.
In the Proceedings of the 21st USENIX Security Symposium, August 2012. (BibTeX entry)·
Torchestra: Reducing interactive traffic delays over Tor (PDF) (Cached: PDF) by Deepika Gopal and Nadia Heninger.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012), Raleigh, NC, USA, October 2012. (BibTeX entry)·
Enhancing Tor's Performance using Real-time Traffic Classification (PDF) (Cached: PDF) by Mashael AlSabah, Kevin Bauer, and Ian Goldberg.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
Privacy Preserving Performance Enhancements for Anonymous Communication Systems (PDF) (Cached: PDF) by Rob Jansen.
Ph.D. thesis, University of Minnesota, October 2012. (BibTeX entry)·
Improving Performance and Anonymity in the Tor Network (PDF) (Cached: PDF) by Andriy Panchenko, Fabian Lanze, and Thomas Engel.
In the Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012), December 2012. (BibTeX entry)·
Reducing Latency in Tor Circuits with Unordered Delivery (PDF) (Cached: PDF) by Michael F Nowlan, David Wolinsky, and Bryan Ford.
In the Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013. (BibTeX entry)·
LIRA: Lightweight Incentivized Routing for Anonymity (PDF) (Cached: PDF) by Rob Jansen, Aaron Johnson, and Paul Syverson.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
An Empirical Evaluation of Relay Selection in Tor (PDF) (Cached: PDF) by Christopher Wacek, Henry Tan, Kevin Bauer, and Micah Sherr.
In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)·
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting (PDF) (Cached: PDF) by Mashael Alsabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg.
In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)·
PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks (PDF) (Cached: PDF) by Mashael AlSabah and Ian Goldberg.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport (PDF) (Cached: PDF) by Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson.
In the Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, August 2014. (BibTeX entry)·
Tor IMUX: Managing Connections from Two to Infinity, and Beyond (PDF) (Cached: PDF) by John Geddes, Rob Jansen, and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
Paying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper) (PDF) (Cached: PDF) by Paolo Palmieri and Johan Pouwelse.
In the Proceedings of Financial Cryptography and Data Security (FC'15), February 2015. (BibTeX entry)·
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay [short paper] (PDF) (Cached: PDF) by Alex Biryukov and Ivan Pustogarov.
In the Proceedings of Financial Cryptography and Data Security (FC'15), February 2015. (BibTeX entry)·
ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks (PDF) (Cached: PDF) by John Geddes, Michael Schliep, and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016), November 2016. (BibTeX entry)·
PeerFlow: Secure Load Balancing in Tor (PDF) (Cached: PDF) by Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson.
In Proceedings on Privacy Enhancing Technologies 2017(2), April 2017. (BibTeX entry)·
Waterfilling: Balancing the Tor network with maximum diversity (PDF) (Cached: PDF) by Florentin Rochet and Olivier Pereira.
In Proceedings on Privacy Enhancing Technologies 2017(2), April 2017. (BibTeX entry)·
KIST: Kernel-Informed Socket Transport for Tor (PDF) (Cached: PDF) by Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson.
In ACM Transactions on Privacy and Security (TOPS) 22(1), December 2018, pages 3:1-3:37. (BibTeX entry)·
-
Non-Discretionary Access Control for Decentralized Computing Systems (PDF) (Cached: PDF) by Paul A. Karger.
Laboratory for Computer Science, Massachusetts Institute of Technology S. M. amp; E. E. thesis MIT/LCS/TR-179, May 1977. (BibTeX entry)·
Limitations of End-to-End Encryption in Secure Computer Networks (PDF) (Cached: PDF) by Michael A. Padlipsky, David W. Snow, and Paul A. Karger.
The MITRE Corporation: Bedford MA, HQ Electronic Systems Division technical report ESD-TR-78-158, August 1978. (BibTeX entry)·
How to Break the Direct RSA-Implementation of MIXes (gzipped PS) (Cached: gzipped PS) by Birgit Pfitzmann and Andreas Pfitzmann.
In the Proceedings of EUROCRYPT 1989, 1990. (BibTeX entry)·
Cryptographic Defense Against Traffic Analysis (PS) (Cached: PS, gzipped PS) by Charles Rackoff and Daniel R. Simon.
In the Proceedings of ACM Symposium on Theory of Computing, 1993, pages 672-681. (BibTeX entry)·
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems (PDF, PS) (Cached: PDF, PS, gzipped PS) by Jean-François Raymond.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 10-29. (BibTeX entry)·
The disadvantages of free MIX routes and how to overcome them (PDF) (Cached: PDF) by Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke.
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 30-45. (BibTeX entry)·
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems (PDF) (Cached: PDF) by Adam Back, Ulf Möller, and Anton Stiglic.
In the Proceedings of Information Hiding Workshop (IH 2001), April 2001, pages 245-257. (BibTeX entry)·
An Analysis of the Degradation of Anonymous Protocols (PDF) (Cached: PDF, PS) by Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '02, February 2002. (BibTeX entry)·
The Sybil Attack (PDF) (Cached: PDF) by John Douceur.
In the Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), March 2002. (BibTeX entry)·
Fingerprinting Websites Using Traffic Analysis (HTML, PDF, PS) (Cached: HTML, PDF, PS, gzipped PS) by Andrew Hintz.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
Dummy Traffic Against Long Term Intersection Attacks (PDF) (Cached: PDF) by Oliver Berthold and Heinrich Langos.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2002), April 2002. (BibTeX entry)·
Towards measuring anonymity (PDF) (Cached: PDF, gzipped PS) by Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel.
In the Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), April 2002. (BibTeX entry)·
Towards an Information Theoretic Metric for Anonymity (PS) (Cached: PS, gzipped PS) by Andrei Serjantov and George Danezis.
In the Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), April 2002. (BibTeX entry)·
Statistical Identification of Encrypted Web Browsing Traffic (PDF) (Cached: PDF) by Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu.
In the Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, May 2002. (BibTeX entry)·
Limits of Anonymity in Open Environments (PDF) (Cached: PDF) by Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz.
In the Proceedings of Information Hiding Workshop (IH 2002), October 2002. (BibTeX entry)·
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones (PDF) (Cached: PDF) by Xinyuan Wang, Douglas S. Reeves, and S. Felix Wu.
In the Proceedings of ESORICS 2002, October 2002, pages 244-263. (BibTeX entry)·
Active Traffic Analysis Attacks and Countermeasures (PDF) (Cached: PDF) by Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao.
In the Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing, 2003, pages 31-39. (BibTeX entry)·
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks (PDF) (Cached: PDF) by Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao.
In the Proceedings of the 2003 International Conference on Parallel Processing, 2003, pages 483-492. (BibTeX entry)·
Mix-networks with Restricted Routes (PDF) (Cached: PDF) by George Danezis.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 1-17. (BibTeX entry)·
Modelling Unlinkability (PDF) (Cached: PDF) by Sandra Steinbrecher and Stefan Köpsell.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 32-47. (BibTeX entry)·
Metrics for Traffic Analysis Prevention (PS) (Cached: PS, gzipped PS) by Richard E. Newman, Ira S. Moskowitz, Paul Syverson, and Andrei Serjantov.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003), March 2003, pages 48-65. (BibTeX entry)·
Probabilistic Treatment of MIXes to Hamper Traffic Analysis (PDF) (Cached: PDF) by Dakshi Agrawal, Dogan Kesdogan, and Stefan Penz.
In the Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pages 16-27. (BibTeX entry)·
Defending Anonymous Communication Against Passive Logging Attacks (PDF) (Cached: PDF, PS) by Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields.
In the Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pages 28-43. (BibTeX entry)·
Statistical Disclosure Attacks: Traffic Confirmation in Open Environments (PDF) (Cached: PDF) by George Danezis.
In the Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), Athens, May 2003, pages 421-426. (BibTeX entry)·
On the Anonymity of Timed Pool Mixes (PS) (Cached: PS, gzipped PS) by Andrei Serjantov and Richard E. Newman.
In the Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems, Athens, Greece, May 2003, pages 427-434. (BibTeX entry)·
Passive Attack Analysis for Connection-Based Anonymity Systems (PS) (Cached: PS, gzipped PS) by Andrei Serjantov and Peter Sewell.
In the Proceedings of ESORICS 2003, October 2003. (BibTeX entry)·
Measuring Anonymity in a Non-adaptive, Real-time System (PDF) (Cached: PDF) by Gergely Tóth and Zoltán Hornák.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), 2004, pages 226-241. (BibTeX entry)·
Timing Attacks in Low-Latency Mix-Based Systems (PDF) (Cached: PDF) by Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright.
In the Proceedings of Financial Cryptography (FC '04), February 2004, pages 251-265. (BibTeX entry)·
Statistical Disclosure or Intersection Attacks on Anonymity Systems (PS) (Cached: PS, gzipped PS) by George Danezis and Andrei Serjantov.
In the Proceedings of 6th Information Hiding Workshop (IH 2004), Toronto, May 2004. (BibTeX entry)·
The Hitting Set Attack on Anonymity Protocols (PDF) (Cached: PDF) by Dogan Kesdogan and Lexi Pimenidis.
In the Proceedings of 6th Information Hiding Workshop (IH 2004), Toronto, May 2004. (BibTeX entry)·
Anonymity and Covert Channels in Simple Timed Mix-firewalls (PDF, PS) (Cached: PDF, PS, gzipped PS) by Richard E. Newman, Vipan R. Nalla, and Ira S. Moskowitz.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 1-16. (BibTeX entry)·
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure (PDF) (Cached: PDF) by Nick Mathewson and Roger Dingledine.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 17-34. (BibTeX entry)·
The Traffic Analysis of Continuous-Time Mixes (PDF) (Cached: PDF) by George Danezis.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 35-50. (BibTeX entry)·
On Flow Correlation Attacks and Countermeasures in Mix Networks (PDF) (Cached: PDF) by Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004, pages 207-225. (BibTeX entry)·
Comparison between two practical mix designs (PDF, gzipped PS) (Cached: PDF, gzipped PS) by Claudia Diaz, Len Sassaman, and Evelyne Dewitte.
In the Proceedings of ESORICS 2004, France, September 2004. (BibTeX entry)·
Measuring Anonymity Revisited (PDF) (Cached: PDF) by Gergely Tóth, Zoltán Hornák, and Ferenc Vajda.
In the Proceedings of the Ninth Nordic Workshop on Secure IT Systems, Espoo, Finland, November 2004, pages 85-90. (BibTeX entry)·
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems (PDF) (Cached: PDF) by Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields.
In ACM Transactions on Information and System Security (TISSEC) 4(7), November 2004, pages 489-522. (BibTeX entry)·
On Flow Marking Attacks in Wireless Anonymous Communication Networks (PDF) (Cached: PDF) by Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, and Wei Zhao.
In the Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), April 2005. (BibTeX entry)·
Low-Cost Traffic Analysis of Tor (PDF) (Cached: PDF) by Steven J. Murdoch and George Danezis.
In the Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005. (BibTeX entry)·
Privacy Vulnerabilities in Encrypted HTTP Streams (PDF) (Cached: PDF) by George Dean Bissias, Marc Liberatore, and Brian Neil Levine.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005, pages 1-11. (BibTeX entry)·
An Analysis of Parallel Mixing with Attacker-Controlled Inputs (PDF) (Cached: PDF) by Nikita Borisov.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005, pages 12-25. (BibTeX entry)·
Unmixing Mix Traffic (PDF) (Cached: PDF) by Ye Zhu and Riccardo Bettati.
In the Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005, pages 110-127. (BibTeX entry)·
On Blending Attacks For Mixes with Memory (PDF) (Cached: PDF) by Luke O'Connor.
In the Proceedings of Information Hiding Workshop (IH 2005), June 2005, pages 39-52. (BibTeX entry)·
Local View Attack on Anonymous Communication (PS) (Cached: PDF, PS, gzipped PS) by Marcin Gogolewski, Marek Klonowski, and Miroslaw Kutylowski.
In the Proceedings of ESORICS 2005, September 2005. (BibTeX entry)·
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems (DOI) by Dijiang Huang.
In the Proceedings of the 5th ACM workshop on Wireless security (WiSe '06), Los Angeles, California, 2006, pages 65-74. (BibTeX entry)·
Fundamental Limits on the Anonymity Provided by the MIX Technique (PDF, DOI) (Cached: PDF) by Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, and Dieter Rautenbach.
In sp 0, 2006, pages 86-99. (BibTeX entry)·
The Chances of Successful Attacks against Continuous-time Mixes (PDF) (Cached: PDF) by Gergely Tóth and Zoltán Hornák.
In the Proceedings of the 11th Nordic Workshop on Secure IT-systems, Linköping, Sweden, 2006. (BibTeX entry)·
On Inferring Application Protocol Behaviors in Encrypted Network Traffic (PDF) (Cached: PDF) by Charles V. Wright, Fabian Monrose, and Gerald M. Masson.
In Journal of Machine Learning Research 7, 2006, pages 2745-2769. (BibTeX entry)·
Locating Hidden Servers (PDF) (Cached: PDF) by Lasse Øverlier and Paul Syverson.
In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006. (BibTeX entry)·
Breaking the Collusion Detection Mechanism of MorphMix (PDF) (Cached: PDF) by Parisa Tabriz and Nikita Borisov.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 368-384. (BibTeX entry)·
Linking Anonymous Transactions: The Consistent View Attack (PDF) (Cached: PDF) by Andreas Pashalidis and Bernd Meyer.
In the Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006, pages 384-392. (BibTeX entry)·
Measuring Relationship Anonymity in Mix Networks (PDF) (Cached: PDF) by Vitaly Shmatikov and Ming-Hsiu Wang.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006), October 2006. (BibTeX entry)·
Hot or Not: Revealing Hidden Services by their Clock Skew (PDF) (Cached: PDF) by Steven J. Murdoch.
In the Proceedings of CCS 2006, November 2006. (BibTeX entry)·
Inferring the Source of Encrypted HTTP Connections (PDF) (Cached: PDF) by Marc Liberatore and Brian Neil Levine.
In the Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006), November 2006, pages 255-263. (BibTeX entry)·
Design principles for low latency anonymous network systems secure against timing attacks (PDF) (Cached: PDF) by Rungrat Wiangsripanawan, Willy Susilo, and Rei Safavi-Naini.
In the Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07), Ballarat, Australia, 2007, pages 183-191. (BibTeX entry)·
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems (PDF) (Cached: PDF) by Xinyuan Wang, Shiping Chen, and Sushil Jajodia.
In the Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007, pages 116-130. (BibTeX entry)·
A Combinatorial Approach to Measuring Anonymity (PDF) (Cached: PDF) by M. Edman, F. Sivrikaya, and B. Yener.
In Intelligence and Security Informatics, 2007 IEEE, May 2007, pages 356-363. (BibTeX entry)·
Two-Sided Statistical Disclosure Attack (PDF) (Cached: PDF) by George Danezis, Claudia Diaz, and Carmela Troncoso.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Identity Trail: Covert Surveillance Using DNS (PDF) (Cached: PDF) by Saikat Guha and Paul Francis.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
Browser-Based Attacks on Tor (PDF) (Cached: PDF) by Tim Abbott, Katherine J. Lai, Michael R. Lieberman, and Eric C. Price.
In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. (BibTeX entry)·
How Much Anonymity does Network Latency Leak? (PDF) (Cached: PDF) by Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin.
In the Proceedings of CCS 2007, October 2007. (BibTeX entry)·
Low-Resource Routing Attacks Against Tor (PDF) (Cached: PDF) by Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007. (BibTeX entry)·
Does additional information always reduce anonymity? (PDF) (Cached: PDF) by Claudia Diaz, Carmela Troncoso, and George Danezis.
In the Proceedings of the Workshop on Privacy in the Electronic Society 2007, Alexandria,VA,USA, October 2007, pages 72-75. (BibTeX entry)·
Quantification of Anonymity for Mobile Ad Hoc Networks (PDF) (Cached: PDF) by Marie Elisabeth Gaup Moe.
In the Proceedings of the 4th International Workshop on Security and Trust Management (STM 08), Trondheim, Norway, June 2008, pages 25-36. (BibTeX entry)·
An Improved Clock-skew Measurement Technique for Revealing Hidden Services (PDF) (Cached: PDF) by Sebastian Zander and Steven J. Murdoch.
In the Proceedings of the 17th USENIX Security Symposium, San Jose, CA, US, July 2008. (BibTeX entry)·
Perfect Matching Statistical Disclosure Attacks (PDF) (Cached: PDF) by Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 2-23. (BibTeX entry)·
On the Impact of Social Network Profiling on Anonymity (PDF) (Cached: PDF) by Claudia Diaz, Carmela Troncoso, and Andrei Serjantov.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 44-62. (BibTeX entry)·
Metrics for Security and Performance in Low-Latency Anonymity Networks (PDF) (Cached: PDF) by Steven J. Murdoch and Robert N. M. Watson.
In the Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008, pages 115-132. (BibTeX entry)·
Entropy Bounds for Traffic Confirmation (PDF) (Cached: PDF) by Luke O'Connor.
IACR technical report 2008/365, October 2008. (BibTeX entry)·
Revisiting A Combinatorial Approach Toward Measuring Anonymity (PDF) (Cached: PDF) by Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid Verbauwhede.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, VA, USA, October 2008. (BibTeX entry)·
Dependent Link Padding Algorithms for Low Latency Anonymity Systems by Wei Wang, Mehul Motani, and Vikram Srinivasan.
In the Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pages 323-332. (BibTeX entry)·
Traffic Morphing: An efficient defense against statistical traffic analysis (PDF) (Cached: PDF) by Charles Wright, Scott Coull, and Fabian Monrose.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '09, February 2009. (BibTeX entry)·
RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows (PDF) (Cached: PDF) by Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
In the Proceedings of the Network and Distributed Security Symposium - NDSS'09, February 2009. (BibTeX entry)·
A Practical Congestion Attack on Tor Using Long Paths (PDF) (Cached: PDF) by Nathan Evans, Roger Dingledine, and Christian Grothoff.
In the Proceedings of the 18th USENIX Security Symposium, August 2009. (BibTeX entry)·
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications (PDF) (Cached: PDF) by George Danezis and Carmela Troncoso.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 56-72. (BibTeX entry)·
Using Linkability Information to Attack Mix-Based Anonymity Services (PDF) (Cached: PDF) by Stefan Schiffner and Sebastian Clauß.
In the Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009), August 2009, pages 94-107. (BibTeX entry)·
The Wisdom of Crowds: Attacks and Optimal Constructions (PDF) (Cached: PDF) by George Danezis, Claudia Díaz, Emilia Käsper, and Carmela Troncoso.
In the Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 2009, pages 406-423. (BibTeX entry)·
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier (PDF, DOI) (Cached: PDF) by Dominik Herrmann, Rolf Wendolsky, and Hannes Federrath.
In the Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09), Chicago, Illinois, USA, October 2009, pages 31-42. (BibTeX entry)·
Hashing it out in public: Common failure modes of DHT-based anonymity schemes (PDF) (Cached: PDF) by Andrew Tran, Nicholas Hopper, and Yongdae Kim.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009), Chicago, IL, USA, November 2009. (BibTeX entry)·
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design (PDF) (Cached: PDF) by Jon McLachlan and Nicholas Hopper.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009), Chicago, IL, USA, November 2009. (BibTeX entry)·
A Round–based Cover Traffic Algorithm for Anonymity Systems (PDF) (Cached: PDF) by Marta Rybczyńska.
In the Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems, Barcelona, Spain, November 2009, pages 93-99. (BibTeX entry)·
The bayesian traffic analysis of mix networks (PDF) (Cached: PDF) by Carmela Troncoso and George Danezis.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009, pages 369-379. (BibTeX entry)·
A new cell counter based attack against tor by Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, and Weijia Jia.
In the Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 2009, pages 578-589. (BibTeX entry)·
Privacy Challenges in Delay-Tolerant and Restricted-Route Networks (PDF) (Cached: PDF) by Joss Wright and Ian Brown.
In the Proceedings of the 2nd Extreme Workshop on Communication, India, September 2010, 2010, pages 4-10. (BibTeX entry)·
How Much Anonymity does Network Latency Leak? (PDF) (Cached: PDF) by Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin.
In ACM Transactions on Information and System Security 13(2), February 2010. (BibTeX entry)·
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks (PDF) (Cached: PDF) by Claudia Diaz, Steven J. Murdoch, and Carmela Troncoso.
In the Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), Berlin, Germany, July 2010. (BibTeX entry)·
Preventing Active Timing Attacks in Low-Latency Anonymous Communication (PDF) (Cached: PDF) by Aaron Johnson, Joan Feigenbaum, and Paul Syverson.
In the Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), Berlin, Germany, July 2010. (BibTeX entry)·
Leaving Timing Channel Fingerprints in Hidden Service Log Files (PDF) (Cached: PDF) by Bilal Shebaro, Fernando Perez-Gonzalez, and Jedidiah R. Crandall.
In Digital Investigation 7, August 2010, pages 104-113. (BibTeX entry)·
On the Secrecy of Spread-Spectrum Flow Watermarks by Xiapu Luo, Junjie Zhang, Roberto Perdisci, and Wenke Lee.
In the Proceedings of the European Symposium Research Computer Security - ESORICS'10, September 2010. (BibTeX entry)·
Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation (PDF) (Cached: PDF) by Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the European Symposium Research Computer Security - ESORICS'10, September 2010. (BibTeX entry)·
In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems (PDF) (Cached: PDF) by Qiyan Wang, Prateek Mittal, and Nikita Borisov.
In the Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois, USA, October 2010. (BibTeX entry)·
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users (PDF) (Cached: PDF) by Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, and Walid Dabbous.
In the Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, 2011. (BibTeX entry)·
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows (PDF) (Cached: PDF) by Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci.
In the Proceedings of the Network and Distributed Security Symposium - NDSS'11, February 2011. (BibTeX entry)·
SWIRL: A Scalable Watermark to Detect Correlated Network Flows (PDF) (Cached: PDF) by Amir Houmansadr and Nikita Borisov.
In the Proceedings of the Network and Distributed Security Symposium - NDSS'11, February 2011. (BibTeX entry)·
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P by Michael Hermann.
Masters's thesis, TU-Munich, March 2011. (BibTeX entry)·
An Accurate System-Wide Anonymity Metric for Probabilistic Attacks (PDF) (Cached: PDF) by Rajiv Bagai, Huabo Lu, Rong Li, and Bin Tang.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011. (BibTeX entry)·
Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P (PDF) (Cached: PDF) by Michael Herrmann and Christian Grothoff.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011. (BibTeX entry)·
Detecting Traffic Snooping in Tor Using Decoys (PDF) (Cached: PDF) by Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis.
In the Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, Menlo Park, CA, September 2011, pages 222-241. (BibTeX entry)·
Website Fingerprinting in Onion Routing Based Anonymization Networks (PDF) (Cached: PDF) by Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, IL, USA, October 2011. (BibTeX entry)·
Forensic Investigation of the OneSwarm Anonymous Filesharing System (PDF) (Cached: PDF) by Swagatika Prusty, Marc Liberatore, and Brian N. Levine.
In the Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011), October 2011. (BibTeX entry)·
Monitoring the I2P network (PDF) (Cached: PDF) by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
MADYNES - INRIA Lorraine - LORIA technical report , October 2011. (BibTeX entry)·
Fingerprinting Tor's Hidden Service Log Files Using a Timing Channel (PDF) (Cached: PDF) by Juan A. Elices, Fernando Perez-Gonzalez, and Carmela Troncoso.
In the Proceedings of the 3rd IEEE International Workshop on Information Forensics and Security (WIFS 2011), November 2011. (BibTeX entry)·
Exposing Invisible Timing-based Traffic Watermarks with BACKLIT (PDF) (Cached: PDF) by Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, and Rocky K. C. Chang.
In the Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA, December 2011. (BibTeX entry)·
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail (PDF) (Cached: PDF) by Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton.
In the Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012. (BibTeX entry)·
Measuring and Predicting Anonymity (PDF) (Cached: PDF) by Matthijs R. Koot.
Ph.D. thesis, University of Amsterdam, June 2012. (BibTeX entry)·
Understanding Statistical Disclosure: A Least Squares approach (PDF) (Cached: PDF) by Fernando Perez-Gonzalez and Carmela Troncoso.
In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 2012. (BibTeX entry)·
Spying in the Dark: TCP and Tor Traffic Analysis (PDF) (Cached: PDF) by Yossi Gilad and Amir Herzberg.
In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 2012. (BibTeX entry)·
k-Indistinguishable Traffic Padding in Web Applications (PDF) (Cached: PDF) by Wen Ming Liu, Lingyu Wang, Kui Ren, Pengsu Cheng, and Mourad Debbabi.
In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 2012. (BibTeX entry)·
Website Detection Using Remote Traffic Analysis (PDF) (Cached: PDF) by Xun Gong, Nikita Borisov, Negar Kiyavash, and Nabil Schear.
In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 2012. (BibTeX entry)·
Throttling Tor Bandwidth Parasites (PDF) (Cached: PDF) by Rob Jansen, Paul Syverson, and Nicholas Hopper.
In the Proceedings of the 21st USENIX Security Symposium, August 2012. (BibTeX entry)·
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks (PDF) (Cached: PDF) by Alex Biryukov, Ivan Pustogarov, and Ralf Philipp Weinmann.
In the Proceedings of the European Symposium Research Computer Security - ESORICS'12, September 2012. (BibTeX entry)·
Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor (PDF) (Cached: PDF) by Tariq Elahi, Kevin Bauer, Mashael AlSabah, Roger Dingledine, and Ian Goldberg.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012), Raleigh, NC, USA, October 2012. (BibTeX entry)·
Touching from a Distance: Website Fingerprinting Attacks and Defenses (PDF) (Cached: PDF) by Xiang Cai, Xincheng Zhang, Brijesh Joshi, and Rob Johnson.
In the Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), October 2012. (BibTeX entry)·
A Bird's Eye View on the I2P Anonymous File-sharing Environment (PDF) (Cached: PDF) by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 6th International Conference on Network and System Security, Wu Yi Shan, China, November 2012. (BibTeX entry)·
Why I'm not an Entropist (PDF) (Cached: PDF) by Paul Syverson.
In the Proceedings of Security Protocols XVII: 17th International Workshop, April 2009, Revised Selected Papers, 2013, pages 231-239. (BibTeX entry)·
Necessary and inherent limits to internet surveillance (PDF) (Cached: PDF) by Joss Wright.
In Internet Policy Review, 2013. (BibTeX entry)·
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization (PDF) (Cached: PDF) by Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann.
In the Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 2013. (BibTeX entry)·
How Low Can You Go: Balancing Performance with Anonymity in Tor (PDF) (Cached: PDF) by John Geddes, Rob Jansen, and Nicholas Hopper.
In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)·
The need for flow fingerprints to link correlated network flows (PDF) (Cached: PDF) by Amir Houmansadr and Nikita Borisov.
In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)·
CellFlood: Attacking Tor Onion Routers on the Cheap (PDF) (Cached: PDF) by Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, and Angelos Keromytis.
In the Proceedings of ESORICS 2013, September 2013. (BibTeX entry)·
Practical Attacks Against the I2P Network (PDF) (Cached: PDF) by Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna.
In the Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013), October 2013. (BibTeX entry)·
You Cannot Hide for Long: De-Anonymization of Real-World Dynamic Behaviour (PDF) (Cached: PDF) by George Danezis and Carmela Troncoso.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
Improved Website Fingerprinting on Tor (PDF) (Cached: PDF) by Tao Wang and Ian Goldberg.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship (PDF) (Cached: PDF) by Philipp Winter, Tobias Pulls, and Juergen Fuss.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, November 2013. (BibTeX entry)·
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries (PDF) (Cached: PDF) by Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson.
In the Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. (BibTeX entry)·
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network (PDF) (Cached: PDF) by Rob Jansen, Florian Tschorsch, Aaron Johnson, and Björn Scheuermann.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '14, February 2014. (BibTeX entry)·
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic (PDF) (Cached: PDF) by Philip Koshy, Diana Koshy, and Patrick McDaniel.
In the Proceedings of Financial Cryptography and Data Security (FC'14), March 2014. (BibTeX entry)·
On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records (PDF) (Cached: PDF) by S. Chakravarty, M. V. Barbera, G. Portokalidis, M. Polychronakis, and A. D. Keromytis.
In the Proceedings of the 15th Passive and Active Measurements Conference (PAM '14), March 2014. (BibTeX entry)·
Exploiting Delay Patterns for User IPs Identification in Cellular Networks (PDF) (Cached: PDF) by Vasile Claudiu Perta, Marco Valerio Barbera, and Alessandro Mei.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (PDF) (Cached: PDF) by Brad Miller, Ling Huang, A. D. Joseph, and J. D. Tygar.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Do dummies pay off? Limits of dummy traffic protection in anonymous communications (PDF) (Cached: PDF) by Carmela Troncoso Oya and Fernando Pérez-González.
In the Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014), July 2014. (BibTeX entry)·
Effective Attacks and Provable Defenses for Website Fingerprinting (PDF) (Cached: PDF) by Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg.
In the Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, August 2014. (BibTeX entry)·
Linking Tor Circuits (PDF) (Cached: PDF) by Otto Huhta.
Ph.D. thesis, September 2014. (BibTeX entry)·
Identifying Webbrowsers in Encrypted Communications (PDF) (Cached: PDF) by Jiangmin Yu and Eric Chan-Tin.
In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014), November 2014. (BibTeX entry)·
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses (PDF) (Cached: PDF) by Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg.
In the Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014), November 2014. (BibTeX entry)·
A Critical Evaluation of Website Fingerprinting Attacks (PDF) (Cached: PDF) by Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt.
In the Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014), November 2014. (BibTeX entry)·
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection (PDF) (Cached: PDF) by Michael Backes, Aniket Kate, Sebastian Meiser, and Esfandiar Mohammadi.
In the Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014), November 2014. (BibTeX entry)·
The web never forgets: Persistent tracking mechanisms in the wild (PDF) (Cached: PDF) by Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz.
In the Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014), November 2014. (BibTeX entry)·
Multi-Class Traffic Morphing for Encrypted VoIP Communication (PDF) (Cached: PDF) by W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof.
In the Proceedings of Financial Cryptography and Data Security (FC'15), February 2015. (BibTeX entry)·
Fingerprinting web users through font metrics (PDF) (Cached: PDF) by David Fifield and Serge Egelman.
In the Proceedings of Financial Cryptography and Data Security (FC'15), February 2015. (BibTeX entry)·
20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables (PDF) (Cached: PDF) by Aaron D. Jaggard, Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum.
In Proceedings on Privacy Enhancing Technologies 2015(1), April 2015, pages 4-24. (BibTeX entry)·
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction (PDF, DOI) (Cached: PDF) by Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar.
In Proceedings on Privacy Enhancing Technologies 2015(2), June 2015, pages 171-187. (BibTeX entry)·
RAPTOR: Routing Attacks on Privacy in Tor (PDF) (Cached: PDF) by Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal.
In the Proceedings of the 24th USENIX Security Symposium, August 2015. (BibTeX entry)·
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services (PDF) (Cached: PDF) by Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas.
In the Proceedings of the 24th Usenix Security Symposium, August 2015. (BibTeX entry)·
Seeing Through Network-Protocol Obfuscation (PDF, DOI) (Cached: PDF) by Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton.
In the Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15), Denver, Colorado, USA, October 2015, pages 57-69. (BibTeX entry)·
Caronte: Detecting Location Leaks for Deanonymizing Tor Hidden Services (PDF) (Cached: PDF) by Srdjan Matic, Platon Kotzias, and Juan Caballero.
In the Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15), October 2015. (BibTeX entry)·
Ting: Measuring and Exploiting Latencies Between All Tor Nodes (PDF) (Cached: PDF) by Frank Cangialosi, Dave Levin, and Neil Spring.
In the Proceedings of the 2015 Internet Measurement Conference, October 2015. (BibTeX entry)·
Ting: Measuring and Exploiting Latencies Between All Tor Nodes (PDF, DOI) (Cached: PDF) by Frank Cangialosi, Dave Levin, and Neil Spring.
In the Proceedings of the 2015 Internet Measurement Conference, Tokyo, Japan, October 2015, pages 289-302. (BibTeX entry)·
Measuring and Mitigating AS-level Adversaries Against Tor (PDF) (Cached: PDF) by Rishab Nithyanand, Oleksii Starov, Phillipa Gill, Adva Zair, and Michael Schapira.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '16, February 2016. (BibTeX entry)·
Website Fingerprinting at Internet Scale (PDF) (Cached: PDF) by Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, and Klaus Wehrle.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '16, February 2016. (BibTeX entry)·
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms against Structural Attacks (PDF) (Cached: PDF) by Michael Backes, Sebastian Meiser, and Marcin Slowik.
In Proceedings on Privacy Enhancing Technologies 2016(2), April 2016. (BibTeX entry)·
Identifying and Characterizing Sybils in the Tor Network (PDF) (Cached: PDF) by Philipp Winter, Roya Ensafi, Karsten Loesing, and Nick Feamster.
In the Proceedings of the 25th Usenix Security Symposium, August 2016. (BibTeX entry)·
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous (PDF) (Cached: PDF) by Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, and Lisa M. Marvel.
In the Proceedings of the 25th Usenix Security Symposium, August 2016. (BibTeX entry)·
Toward an Efficient Website Fingerprinting Defense (PDF) (Cached: PDF) by Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright.
In the Proceedings of ESORICS 2016, September 2016. (BibTeX entry)·
Data-plane Defenses against Routing Attacks on Tor (PDF) (Cached: PDF) by Henry Tan, Micah Sherr, and Wenchao Zhou.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
On Realistically Attacking Tor with Website Fingerprinting (PDF) (Cached: PDF) by Tao Wang and Ian Goldberg.
In Proceedings on Privacy Enhancing Technologies 2016(4), October 2016. (BibTeX entry)·
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (PDF) (Cached: PDF) by Antonio Montieri, Domenico Ciuonzo, Giuseppe Aceto, and Antonio Pescapé.
In the Proceedings of Teletraffic Congress (ITC 29), 2017 29th International, 2017, pages 81-89. (BibTeX entry)·
Few throats to choke: On the current structure of the internet (PDF) (Cached: PDF) by HB Acharya, Sambuddho Chakravarty, and Devashish Gosain.
In the Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017, pages 339-346. (BibTeX entry)·
The Devil's in The Details: Placing Decoy Routers in the Internet (PDF) (Cached: PDF) by Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, and HB Acharya.
In the Proceedings of the 33rd Annual Computer Security Applications Conference, 2017, pages 577-589. (BibTeX entry)·
The Effect of DNS on Tor's Anonymity (PDF) (Cached: PDF) by Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, and Nick Feamster.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '17, February 2017. (BibTeX entry)·
Dissecting Tor Bridges: a Security Evaluation of their Private and Public Infrastructures (PDF) (Cached: PDF) by Srdjan Matic, Carmela Troncoso, and Juan Caballero.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '17, February 2017. (BibTeX entry)·
HisTor: Differentially Private and Robust Statistics Collection for Tor (PDF) (Cached: PDF) by Akshaya Mani and Micah Sherr.
In the Proceedings of the Network and Distributed Security Symposium - NDSS '17, February 2017. (BibTeX entry)·
Website Fingerprinting Defenses at the Application Layer (PDF) (Cached: PDF) by Giovanni Cherubin, Jamie Hayes, and Marc Juarez.
In Proceedings on Privacy Enhancing Technologies 2017(2), April 2017. (BibTeX entry)·
TagIt: Tagging Network Flows using Blind Fingerprints (PDF) (Cached: PDF) by Fatemeh Rezaei and Amir Houmansadr.
In Proceedings on Privacy Enhancing Technologies 2017(4), October 2017. (BibTeX entry)·
Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses (PDF) (Cached: PDF) by Giovanni Cherubin.
In Proceedings on Privacy Enhancing Technologies 2017(4), October 2017. (BibTeX entry)·
Fingerprinting Past the Front Page: Identifying Keywords in Search Engine Queries over Tor (PDF) (Cached: PDF) by Se Eun Oh, Shuai Li, and Nicholas Hopper.
In Proceedings on Privacy Enhancing Technologies 2017(4), October 2017. (BibTeX entry)·
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis (PDF) (Cached: PDF) by Milad Nasr, Amir Houmansadr, and Arya Mazumdar.
In the Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17), November 2017. (BibTeX entry)·
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services (PDF) (Cached: PDF) by Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, and Claudia Diaz.
In the Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17), November 2017. (BibTeX entry)·
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web) (PDF) (Cached: PDF) by Antonio Pescape, Antonio Montieri, Giuseppe Aceto, and Domenico Ciuonzo.
In IEEE Transactions on Dependable and Secure Computing, 2018. (BibTeX entry)·
Inside Job: Applying Traffic Analysis to Measure Tor from Within (PDF) (Cached: PDF) by Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, and Claudia Diaz.
In the Proceedings of the 25th Symposium on Network and Distributed System Security (NDSS '18), February 2018. (BibTeX entry)·
Automated Website Fingerprinting through Deep Learning (PDF) (Cached: PDF) by Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen.
In the Proceedings of the 25th Symposium on Network and Distributed System Security (NDSS '18), February 2018. (BibTeX entry)·
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols (PDF) (Cached: PDF) by Florentin Rochet and Olivier Pereira.
In Proceedings on Privacy Enhancing Technologies 2018(2), April 2018. (BibTeX entry)·
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency — Choose Two (PDF) (Cached: PDF) by Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate.
In the Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P 2018), San Francisco, California, USA, May 2018. (BibTeX entry)·
Tempest: Temporal Dynamics in Anonymity Systems (PDF) (Cached: PDF) by Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, and Prateek Mittal.
In Proceedings on Privacy Enhancing Technologies 2018(3), June 2018. (BibTeX entry)·
Understanding Tor Usage with Privacy-Preserving Measurement (PDF) (Cached: PDF) by Akshaya Mani, T Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr.
In the Proceedings of the Internet Measurement Conference 2018 (IMC '18), October 2018. (BibTeX entry)·
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning (PDF) (Cached: PDF) by Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright.
In the Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), November 2018. (BibTeX entry)·
Privacy-preserving Dynamic Learning of Tor Network Traffic (PDF) (Cached: PDF) by Rob Jansen, Matthew Traudt, and Nicholas Hopper.
In the Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), November 2018. (BibTeX entry)·
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning (PDF) (Cached: PDF) by Milad Nasr, Alireza Bahramali, and Amir Houmansadr.
In the Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), November 2018. (BibTeX entry)·
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses (PDF) (Cached: PDF) by Shuai Li, Huajun Guo, and Nicholas Hopper.
In the Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), November 2018. (BibTeX entry)·
On the Challenges of Geographical Avoidance for Tor (PDF) (Cached: PDF) by Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, and Christina Pöpper.
In the Proceedings of the 26th Symposium on Network and Distributed System Security (NDSS '19), February 2019. (BibTeX entry)·
On Privacy Notions in Anonymous Communication (PDF) (Cached: PDF) by Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard Jorswieck, and Thorsten Strufe.
In Proceedings on Privacy Enhancing Technologies 2019(2), April 2019. (BibTeX entry)·
Guard Placement Attacks on Location-Based Path Selection Algorithms in Tor by Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, and Prateek Mittal.
In Proceedings on Privacy Enhancing Technologies 2019(4), October 2019. (BibTeX entry)·
Encrypted DNS -> Privacy? A Traffic Analysis Perspective (PDF) (Cached: PDF) by Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, and Carmela Troncoso.
In the Proceedings of the 27th Symposium on Network and Distributed System Security (NDSS '20), February 2020. (BibTeX entry)·
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization (PDF) by Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, and Liehuang Zhu.
In the Proceedings of the 45th IEEE Symposium on Security and Privacy, May 2024. (BibTeX entry)·
Onion Services in the Wild: A Study of Deanonymization Attacks (PDF) (Cached: PDF) by Pascal Tippe and Adrian Tippe.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense (PDF) (Cached: PDF) by James K Holland, Jason Carpenter, Se Eun Oh, and Nicholas Hopper.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages (PDF) (Cached: PDF) by Asya Mitseva and Andriy Panchenko.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
-
-
Freenet: A distributed anonymous information storage and retrieval system. Freenet White Paper (PDF) (Cached: PDF) by I Clarke, O Sandberg, B Wiley, and TW Hong.
white paper, 1999. (BibTeX entry)·
Protecting free expression online with Freenet (PDF) (Cached: PDF) by Ian Clarke, Scott G Miller, Theodore W Hong, Oskar Sandberg, and Brandon Wiley.
In Internet Computing, IEEE 6(1), 2002, pages 40-49. (BibTeX entry)·
A Practical Buses Protocol for Anonymous Network Communication (abstract, PDF, DOI) (Cached: abstract, PDF) by Andreas Hirt.
Masters's thesis, The University of Calgary, June 2004. (BibTeX entry)·
New bounds for randomized busing (PDF) (Cached: PDF) by Steven S Seidena, Peter P Chena, RF Laxb, J Chena, and Guoli Dingb.
In Theoretical Computer Science 332, 2005, pages 63-81. (BibTeX entry)·
A Practical Buses Protocol for Anonymous Internet Communication (PDF) (Cached: PDF) by Andreas Hirt, Michael J Jr, and Carey L Williamson.
In the Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST), 2005. (BibTeX entry)·
On the establishment of distinct identities in overlay networks (PDF) (Cached: PDF) by Rida A Bazzi and Goran Konjevod.
In Distributed Computing 19(4), 2007, pages 267-287. (BibTeX entry)·
Taxis: scalable strong anonymous communication (PDF) (Cached: PDF) by Andreas Hirt, M Jacobson, and Carey Williamson.
In the Proceedings of the IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems, 2008. (MASCOTS), 2008, pages 1-10. (BibTeX entry)·
Private communication through a network of trusted connections: The dark freenet (PDF) (Cached: PDF) by Ian Clarke, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel.
In Network, 2010. (BibTeX entry)·
Multilaterally Secure Pervasive Cooperation (PDF) (Cached: PDF) by Stefan G. Weber.
Ph.D. thesis, TU Darmstadt, Germany, December 2011. (BibTeX entry)·
Performance modelling of anonymity protocols (PDF, DOI) (Cached: PDF) by Niklas Carlsson, Carey Williamson, Andreas Hirt, and Michael Jacobson, ['Jr.'].
In Performance Evaluation 69(12), December 2012, pages 643-661. (BibTeX entry)·
The drunk motorcyclist protocol for anonymous communication by Adam L Young and Moti Yung.
In the Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2014, 2014, pages 157-165. (BibTeX entry)·
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation (PDF, DOI) (Cached: PDF) by R. Koch, M. Golling, and G. D. Rodosek.
In Computer 49(3), March 2016, pages 42-49. (BibTeX entry)·
-
Attacking and Improving the Tor Directory Protocol (PDF) by Zhongtang Luo, Adithya Bhat, Kartik Nayak, and Aniket Kate.
In the Proceedings of the 45th IEEE Symposium on Security and Privacy, May 2024. (BibTeX entry)·
Pudding: Private User Discovery in Anonymity Networks (PDF) by Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford, and Martin Kleppmann.
In the Proceedings of the 45th IEEE Symposium on Security and Privacy, May 2024. (BibTeX entry)·
Blending Different Latency Traffic With Beta Mixing (PDF) (Cached: PDF) by Iness Ben Guirat, Debajyoti Das, and Claudia Diaz.
In the Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 2024. (BibTeX entry)·
NetShaper: A Differentially Private Network Side-Channel Mitigation System (PDF) by Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, and Aastha Mehta.
In the Proceedings of the 33rd USENIX Security Symposium (Sec '24), August 2024. (BibTeX entry)·
-
-
|
|