Next: About this document ...
Up: The Free Haven Project:
Previous: Acknowledgements
- 1
-
Masayuki Abe.
Universally verifiable mix-net with verification work independent of
the number of servers.
In Advances in Cryptology - EUROCRYPT '98, pages 437-447.
- 2
-
Ross Anderson.
The Eternity Service.
http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
- 3
-
Aol instant messenger.
http://www.aol.com/aim.
- 4
-
Adam Back.
The Eternity Service.
http://phrack.infonexus.com/search.phtml?view&article=p51-12.
- 5
-
Oliver Berthold, Hannes Federrath, and Marit Kohntopp.
Anonymity and unobservability on the Internet.
In Workshop on Freedom and Privacy by Design : CFP 2000, 2000.
- 6
-
Ran Canetti.
PhD thesis, MIT.
- 7
-
David Chaum.
Untraceable electronic mail, return addresses, and digital
pseudonyms.
Communications of the ACM, 4(2), February 1982.
- 8
-
David Chaum.
The dining cryptographers problem: Unconditional sender and recipient
untraceability.
Journal of Cryptology, 1:65-75, 1988.
- 9
-
Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, and Peter
Yianilos.
A prototype implementation of archival intermemory.
In Proceedings of the fourth ACM Conference on Digital libraries
(DL '99), 1999.
- 10
-
Ian Clarke.
The Free Network Project.
http://freenet.sourceforge.net/.
- 11
-
The Cleaner.
Gnutella wall of shame.
http://www.zeropaid.com/busted/.
- 12
-
Roger Dingledine.
The Free Haven Project.
Master's thesis, MIT, 2000.
- 13
-
Cynthia Dwork, Moni Naor, and Rafail Ostrovsky.
Deniable encryption.
In Advances in Cryptology - CRYPTO '97.
- 14
-
Ian Hall-Beyer et al.
Gnutella.
http://gnutella.wego.com/.
- 15
-
Michael J. Freedman.
Design and Analysis of an Anonymous Communication Channel
for the Free Haven Project.
http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
- 16
-
Electronic Frontiers Georgia (EFGA).
Anonymous remailer information.
http://anon.efga.org/Remailers/.
- 17
-
Ian Goldberg and Adam Shostack.
Freedom network 1.0 architecture, November 1999.
- 18
-
Ian Goldberg, David Wagner, and Eric Brewer.
Privacy-enhancing technologies for the internet.
In Proceedings of IEEE COMPCON '97.
- 19
-
Oded Goldreich.
Modern Cryptography, Probabilistic Proofs, and
Pseudo-Randomness.
Springer-Verlag, 1999.
- 20
-
C. Gulcu and G. Tsudik.
Mixing e-mail with Babel.
In Proceedings of the ISOC Symposium on Network and Distributed
System Security, pages 2-16, 1996.
- 21
-
M. Jakobsson.
Flash mixing.
In Principles of Distributed Computing PODC '99.
- 22
-
M. Jakobsson.
A practical mix.
In Advances in Cryptology - EUROCRYPT '98.
- 23
-
Ari Juels and John Brainard.
Client puzzles: A cryptographic defense against connection depletion
attacks.
In Proceedings of the 1999 Network and Distributed System
Security Symposium, February 1999.
- 24
-
Kesdogan, Egner, and Bschkes.
Stop and go mixes : Providing probabilistic anonymity in an open
system.
In 1998 Information Hiding Workshop.
- 25
-
Mark Lewis.
Metallica sues Napster, universities, citing copyright infringement
and RICO violations.
http://www.livedaily.com/archive/2000/2k04/wk2/MetallicaSuesNapster,Univ.htm
l.
- 26
-
Anna Lysyanskaya.
Personal communication.
- 27
-
Tal Malkin.
Private Information Retrieval.
PhD thesis, MIT.
see http://theory.lcs.mit.edu/ cis/cis-theses.html.
- 28
-
David Michael Martin.
PhD thesis, Boston University, 2000.
http://www.cs.du.edu/~dm/anon.html.
- 29
-
Tim May.
Cyphernomicon.
http://www2.pro-ns.net/ crypto/cyphernomicon.html.
- 30
-
David Mazieres and M. Frans Kaashoek.
The design and operation of an e-mail pseudonym server.
In 5th ACM Conference on Computer and Communications Security,
1998.
- 31
-
Napster.
http://www.napster.com/.
- 32
-
University of Michigan News and Information Services.
Yugoslav phone books: perhaps the last record of a people.
http://www.umich.edu/~newsinfo/Releases/2000/Jan00/r012000e.html.
- 33
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner.
ISDN-Mixes : Untraceable communication with small bandwidth
overhead.
In GI/ITG Conference: Communication in Distributed Systems,
pages 451-463. Springer-Verlag, 1991.
- 34
-
PGP FAQ.
http://www.faqs.org/faqs/pgp-faq/.
- 35
-
Michael O. Rabin.
Efficient dispersal of information for security, load balancing, and
fault tolerance, April 1989.
- 36
-
Michael K. Reiter and Aviel D. Rubin.
Crowds: Anonymity for web transactions.
DIMACS Technical Report, 97(15), April 1997.
- 37
-
Simon and Rackoff.
Cryptographic defense against traffic analysis.
In STOC 1993, pages 672-681, 1993.
- 38
-
Brian T. Sniffen.
Trust Economies in the Free Haven Project.
http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
- 39
-
Markus Stadler.
Publicly verifiable secret sharing.
In EUROCRYPT '96, 1996.
http://citeseer.nj.nec.com/stadler96publicly.html.
- 40
-
Steve Steinberg.
Gnutellanet maps.
http://gnutella.wego.com/file_depot/0-10000000/110000-120000/116705/folder/
151713/network3.jpg.
- 41
-
Paul Syverson.
Group principals and the formalization of anonymity.
In World Congress on Formal Methods 1999, 1999.
- 42
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed.
Anonymous connections and onion routing.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, May 1997.
- 43
-
Vernor Vinge.
True Names.
Short story.
- 44
-
Marc Waldman, Aviel Rubin, and Lorrie Cranor.
Publius: A robust, tamper-evident, censorship-resistant and
source-anonymous web publishing system.
- 45
-
Alma Whitten and J.D. Tygar.
Why johnny can't encrypt.
In USENIX Security 1999, 1999.
http://www.usenix.org/publications/library/proceedings/sec99/whitten.html.
2000-07-08