next up previous
Next: About this document ... Up: The Free Haven Project: Previous: Acknowledgements

Bibliography

1
Masayuki Abe.
Universally verifiable mix-net with verification work independent of the number of servers.
In Advances in Cryptology - EUROCRYPT '98, pages 437-447.

2
Ross Anderson.
The Eternity Service.
http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.

3
Aol instant messenger.
http://www.aol.com/aim.

4
Adam Back.
The Eternity Service.
http://phrack.infonexus.com/search.phtml?view&article=p51-12.

5
Oliver Berthold, Hannes Federrath, and Marit Kohntopp.
Anonymity and unobservability on the Internet.
In Workshop on Freedom and Privacy by Design : CFP 2000, 2000.

6
Ran Canetti.
PhD thesis, MIT.

7
David Chaum.
Untraceable electronic mail, return addresses, and digital pseudonyms.
Communications of the ACM, 4(2), February 1982.

8
David Chaum.
The dining cryptographers problem: Unconditional sender and recipient untraceability.
Journal of Cryptology, 1:65-75, 1988.

9
Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, and Peter Yianilos.
A prototype implementation of archival intermemory.
In Proceedings of the fourth ACM Conference on Digital libraries (DL '99), 1999.

10
Ian Clarke.
The Free Network Project.
http://freenet.sourceforge.net/.

11
The Cleaner.
Gnutella wall of shame.
http://www.zeropaid.com/busted/.

12
Roger Dingledine.
The Free Haven Project.
Master's thesis, MIT, 2000.

13
Cynthia Dwork, Moni Naor, and Rafail Ostrovsky.
Deniable encryption.
In Advances in Cryptology - CRYPTO '97.

14
Ian Hall-Beyer et al.
Gnutella.
http://gnutella.wego.com/.

15
Michael J. Freedman.
Design and Analysis of an Anonymous Communication Channel for the Free Haven Project.
http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.

16
Electronic Frontiers Georgia (EFGA).
Anonymous remailer information.
http://anon.efga.org/Remailers/.

17
Ian Goldberg and Adam Shostack.
Freedom network 1.0 architecture, November 1999.

18
Ian Goldberg, David Wagner, and Eric Brewer.
Privacy-enhancing technologies for the internet.
In Proceedings of IEEE COMPCON '97.

19
Oded Goldreich.
Modern Cryptography, Probabilistic Proofs, and Pseudo-Randomness.
Springer-Verlag, 1999.

20
C. Gulcu and G. Tsudik.
Mixing e-mail with Babel.
In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 2-16, 1996.

21
M. Jakobsson.
Flash mixing.
In Principles of Distributed Computing PODC '99.

22
M. Jakobsson.
A practical mix.
In Advances in Cryptology - EUROCRYPT '98.

23
Ari Juels and John Brainard.
Client puzzles: A cryptographic defense against connection depletion attacks.
In Proceedings of the 1999 Network and Distributed System Security Symposium, February 1999.

24
Kesdogan, Egner, and Bschkes.
Stop and go mixes : Providing probabilistic anonymity in an open system.
In 1998 Information Hiding Workshop.

25
Mark Lewis.
Metallica sues Napster, universities, citing copyright infringement and RICO violations.
http://www.livedaily.com/archive/2000/2k04/wk2/MetallicaSuesNapster,Univ.htm l.

26
Anna Lysyanskaya.
Personal communication.

27
Tal Malkin.
Private Information Retrieval.
PhD thesis, MIT.
see http://theory.lcs.mit.edu/ cis/cis-theses.html.

28
David Michael Martin.
PhD thesis, Boston University, 2000.
http://www.cs.du.edu/~dm/anon.html.

29
Tim May.
Cyphernomicon.
http://www2.pro-ns.net/ crypto/cyphernomicon.html.

30
David Mazieres and M. Frans Kaashoek.
The design and operation of an e-mail pseudonym server.
In 5th ACM Conference on Computer and Communications Security, 1998.

31
Napster.
http://www.napster.com/.

32
University of Michigan News and Information Services.
Yugoslav phone books: perhaps the last record of a people.
http://www.umich.edu/~newsinfo/Releases/2000/Jan00/r012000e.html.

33
A. Pfitzmann, B. Pfitzmann, and M. Waidner.
ISDN-Mixes : Untraceable communication with small bandwidth overhead.
In GI/ITG Conference: Communication in Distributed Systems, pages 451-463. Springer-Verlag, 1991.

34
PGP FAQ.
http://www.faqs.org/faqs/pgp-faq/.

35
Michael O. Rabin.
Efficient dispersal of information for security, load balancing, and fault tolerance, April 1989.

36
Michael K. Reiter and Aviel D. Rubin.
Crowds: Anonymity for web transactions.
DIMACS Technical Report, 97(15), April 1997.

37
Simon and Rackoff.
Cryptographic defense against traffic analysis.
In STOC 1993, pages 672-681, 1993.

38
Brian T. Sniffen.
Trust Economies in the Free Haven Project.
http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.

39
Markus Stadler.
Publicly verifiable secret sharing.
In EUROCRYPT '96, 1996.
http://citeseer.nj.nec.com/stadler96publicly.html.

40
Steve Steinberg.
Gnutellanet maps.
http://gnutella.wego.com/file_depot/0-10000000/110000-120000/116705/folder/ 151713/network3.jpg.

41
Paul Syverson.
Group principals and the formalization of anonymity.
In World Congress on Formal Methods 1999, 1999.

42
P.F. Syverson, D.M. Goldschlag, and M.G. Reed.
Anonymous connections and onion routing.
In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.

43
Vernor Vinge.
True Names.
Short story.

44
Marc Waldman, Aviel Rubin, and Lorrie Cranor.
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system.

45
Alma Whitten and J.D. Tygar.
Why johnny can't encrypt.
In USENIX Security 1999, 1999.
http://www.usenix.org/publications/library/proceedings/sec99/whitten.html.




2000-07-08