[{"author": "Yingwu Zhu", "title": "Resilient P2P Anonymous Routing by Using Redundancy", "journal": "iwnas", "volume": "0", "year": "2006", "isbn": "0-7695-2651-9", "pages": "103--110", "doi": "http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40", "publisher": "IEEE Computer Society", "address": "Los Alamitos, CA, USA", "www_section": "Anonymous communication", "key": "10.1109/IWNAS.2006.40"}, {"author": "Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter Rautenbach", "title": "Fundamental Limits on the Anonymity Provided by the MIX Technique", "journal": "sp", "volume": "0", "year": "2006", "issn": "1081-6011", "pages": "86--99", "doi": "http://doi.ieeecomputersociety.org/10.1109/SP.2006.17", "publisher": "IEEE Computer Society", "address": "Los Alamitos, CA, USA", "www_section": "Traffic analysis", "www_pdf_url": "http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf", "key": "10.1109/SP.2006.17"}, {"author": "Ira S. Moskowitz and Richard E. Newman", "title": "Timing channels, anonymity, mixes, and spikes", "booktitle": "Proceedings of the 2nd IASTED international conference on Advances in computer science and technology (ACST '06)", "month": "January", "year": "2006", "isbn": "0-88986-545-0", "pages": "251--256", "location": "Puerto Vallarta, Mexico", "publisher": "ACTA Press", "address": "Anaheim, CA, USA", "www_section": "Formal methods", "key": "1166488"}, {"title": "Measuring and Mitigating AS-level Adversaries Against Tor", "author": "Rishab Nithyanand and Oleksii Starov and Phillipa Gill and Adva Zair and Michael Schapira", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '16", "year": "2016", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/blogs-media/measuring-mitigating-as-level-adversaries-against-tor.pdf", "www_tags": "selected", "key": "ASlevel-ndss2016"}, {"author": "Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos", "title": "GAS: Overloading a File Sharing Network as an Anonymizing System", "booktitle": "Proceedings of Second International Workshop on Security, (IWSEC 2007)", "year": "2007", "location": "Nara, Japan", "www_pdf_url": "http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "AthanRAM07"}, {"author": "Bodo M{\\\"o}ller", "title": "Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes", "booktitle": "Proceedings of {CT-RSA} 2003", "publisher": "Springer-Verlag, LNCS 2612", "year": "2003", "month": "April", "www_section": "Anonymous communication", "www_pdf_url": "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", "www_tags": "selected", "key": "BM:mixencrypt"}, {"author": "Michael Backes and Aniket Kate and Ian Goldberg and Esfandiar Mohammadi", "title": "{Provably Secure and Practical Onion Routing}", "booktitle": "{Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF)}", "month": "June", "year": "2012", "pages": "369--385", "www_pdf_url": "http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/uc-or.pdf", "www_section": "Anonymous communication", "key": "BaKaGoMo_12"}, {"author": "Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser, Esfandiar Mohammadi", "title": "{AnoA: A Framework For Analyzing Anonymous Communication Protocols}", "booktitle": "{Proceedings of the of the 26th IEEE Computer Security Foundations Symposium (CSF)}", "year": "2013", "month": "June", "pages": "163--178", "www_pdf_url": "http://www.infsec.cs.uni-saarland.de/~meiser/paper/anoa.pdf", "www_section": "Anonymous communication", "key": "BaKaMaMeMo_13"}, {"author": "Michael Backes and Aniket Kate and Esfandiar Mohammadi", "title": "{Ace: An Efficient Key-Exchange Protocol for Onion Routing}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}", "year": "2013", "month": "October", "pages": "55--64", "www_pdf_url": "http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/owake.pdf", "www_section": "Anonymous communication", "key": "BaKaMo_13"}, {"author": "Michael Backes and Praveen Manoharan and Esfandiar Mohammadi", "title": "{TUC: Time-sensitive and Modular Analysis of Anonymous Communication}", "howpublished": "IACR ePrint Archive Report 2013/664", "month": "October", "year": "2013", "www_pdf_url": "http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/tuc.pdf", "www_section": "Anonymous communication", "key": "BaMaMo_13"}, {"title": "Almost Entirely Correct Mixing With Application to Voting", "author": "Dan Boneh and Philippe Golle", "booktitle": "{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}", "year": "2002", "month": "November", "location": "Washington, DC", "pages": "68--77", "editor": "Vijay Atluri", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/psp.ps", "www_section": "Provable shuffles", "www_tags": "selected", "key": "BonehGolle:psp2002"}, {"address": "Vienna", "author": "Ian Brown and Joss Wright et al", "publisher": "UN Office on Drugs and Crime", "title": "Comprehensive Study on Cybercrime", "year": "2013", "www_section": "Misc", "www_pdf_url": "https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf", "key": "BrownWright2013"}, {"author": "Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati", "editor": "T. Yu and S. Jajodia", "booktitle": "Security in Decentralized Data Management", "title": "k-Anonymity", "publisher": "Springer", "year": "2007", "address": "Berlin Heidelberg", "howpublished": "Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer", "www_pdf_url": "http://seclab.dti.unimi.it/Papers/kanonymity.pdf", "www_section": "Anonymous publication", "www_remarks": "Discusses the original k-anonymity proposal and research results on k-anonymity. Introduces also a taxonomy of k-anonymity solutions.", "key": "CDFS07"}, {"author": "Benny Chor and Niv Gilboa", "title": "Computationally private information retrieval (extended abstract)", "booktitle": "Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97)", "month": "May", "year": "1997", "isbn": "0-89791-888-6", "pages": "304--313", "location": "El Paso, Texas, United States", "doi": "http://doi.acm.org/10.1145/258533.258609", "publisher": "ACM Press", "address": "New York, NY, USA", "www_pdf_url": "http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf", "www_ps_url": "http://www.cs.technion.ac.il/~gilboa/stoc_final.ps", "www_section": "Private Information Retrieval", "key": "CPIR"}, {"author": "Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden", "title": "Probability of Error in Information-Hiding Protocols", "booktitle": "Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)", "year": "2007", "location": "S. Servolo island, Venice - Italy", "www_pdf_url": "http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "ChatziPP07"}, {"author": "Marek Klonowski and Miroslaw Kutylowski and Anna Lauks", "title": "Repelling Detour Attack Against Onions with Re-encryption", "pages": "296--308", "ee": "http://dx.doi.org/10.1007/978-3-540-68914-0_18", "www_section": "Anonymous communication", "www_publisher_url": "http://www.springerlink.com/content/c8n33l20527t0l03/", "editor": "Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung", "booktitle": "Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008)", "series": "Lecture Notes in Computer Science", "volume": "5037", "location": "New York, NY, USA", "month": "June", "year": "2008", "isbn": "978-3-540-68913-3", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/acns/KlonowskiKL08"}, {"author": "Matthew Edman and Paul F. Syverson", "title": "{AS}-awareness in {T}or path selection", "pages": "380--389", "www_tags": "selected", "www_pdf_url": "http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf", "www_section": "Anonymous communication", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/ccs/EdmanS09"}, {"author": "Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Dong Xuan and Weijia Jia", "title": "A new cell counter based attack against tor", "pages": "578--589", "www_section": "Traffic analysis", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/ccs/LingLYFXJ09"}, {"author": "Carmela Troncoso and George Danezis", "title": "The bayesian traffic analysis of mix networks", "pages": "369--379", "www_tags": "selected", "www_pdf_url": "http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf", "www_section": "Traffic analysis", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/ccs/TroncosoD09"}, {"author": "Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas Hopper and Yongdae Kim", "title": "Membership-concealing overlay networks", "pages": "390--399", "www_tags": "selected", "www_pdf_url": "http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf", "www_section": "Anonymous communication", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/ccs/VassermanJTHK09"}, {"author": "George Danezis and Claudia D\\'{\\i}az and Emilia K{\\\"a}sper and Carmela Troncoso", "title": "The Wisdom of Crowds: Attacks and Optimal Constructions", "pages": "406--423", "www_tags": "selected", "www_pdf_url": "http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf", "www_section": "Traffic analysis", "editor": "Michael Backes and Peng Ning", "booktitle": "Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5789", "month": "September", "year": "2009", "isbn": "978-3-642-04443-4", "key": "DBLP:conf/esorics/DanezisDKT09"}, {"author": "Nayantara Mallesh and Matthew Wright", "title": "Countering Statistical Disclosure with Receiver-Bound Cover Traffic", "pages": "547--562", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf", "editor": "Joachim Biskup and Javier Lopez", "booktitle": "Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "4734", "month": "September", "year": "2007", "location": "Dresden, Germany", "isbn": "978-3-540-74834-2", "key": "DBLP:conf/esorics/MalleshW07"}, {"author": "Sebastian M{\\\"o}dersheim and Luca Vigan{\\`o}", "title": "Secure Pseudonymous Channels", "pages": "337--354", "www_pdf_url": "http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\\$File/rz3724_updated_August09.pdf", "www_section": "Anonymous communication", "editor": "Michael Backes and Peng Ning", "booktitle": "Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5789", "month": "September", "year": "2009", "isbn": "978-3-642-04443-4", "key": "DBLP:conf/esorics/ModersheimV09"}, {"author": "Jacek Cichon and Marek Klonowski and Miroslaw Kutylowski", "title": "Privacy Protection for RFID with Hidden Subset Identifiers", "pages": "298--314", "ee": "http://dx.doi.org/10.1007/978-3-540-79576-6_18", "www_section": "Misc", "www_publisher_url": "http://www.springerlink.com/content/r754w32x71176057/", "editor": "Jadwiga Indulska and Donald J. Patterson and Tom Rodden and Max Ott", "booktitle": "Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5013", "location": "Sydney, Australia", "month": "May", "year": "2008", "isbn": "978-3-540-79575-9", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/pervasive/CichonKK08"}, {"author": "Elli Androulaki and Steven M. Bellovin", "title": "APOD: Anonymous Physical Object Delivery", "pages": "202--215", "www_pdf_url": "http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf", "www_section": "Anonymous communication", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/AndroulakiB09"}, {"author": "Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker", "title": "Physical Layer Attacks on Unlinkability in Wireless LANs", "pages": "108--127", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf", "www_section": "Anonymous communication", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/BauerMGGS09"}, {"author": "George Danezis and Carmela Troncoso", "title": "Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications", "pages": "56--72", "www_pdf_url": "http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/DanezisT09"}, {"author": "Barath Raghavan and Tadayoshi Kohno and Alex C. Snoeren and David Wetherall", "title": "Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default", "pages": "143--163", "www_pdf_url": "http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/RaghavanKSW09"}, {"author": "Stefan Schiffner and Sebastian Clau{\\ss}", "title": "Using Linkability Information to Attack Mix-Based Anonymity Services", "pages": "94--107", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf", "www_section": "Traffic analysis", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/SchiffnerC09"}, {"author": "Micah Sherr and Matt Blaze and Boon Thau Loo", "title": "Scalable Link-Based Relay Selection for Anonymous Routing", "pages": "73--93", "www_pdf_url": "http://micah.cis.upenn.edu/papers/pets09.pdf", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "editor": "Ian Goldberg and Mikhail J. Atallah", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "5672", "month": "August", "year": "2009", "isbn": "978-3-642-03167-0", "key": "DBLP:conf/pet/SherrBL09"}, {"author": "George Danezis and Ian Goldberg", "title": "Sphinx: A Compact and Provably Secure Mix Format", "pages": "269--282", "ee": "http://dx.doi.org/10.1109/SP.2009.15", "www_tags": "selected", "www_pdf_url": "http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf", "www_section": "Anonymous communication", "editor": "", "booktitle": "Proceedings of the 30th IEEE Symposium on Security and Privacy (S\\&P 2009)", "location": "Oakland, California, USA", "publisher": "IEEE Computer Society", "month": "May", "year": "2009", "isbn": "978-0-7695-3633-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/sp/DanezisG09"}, {"title": "Anon-Pass: Practical Anonymous Subscriptions", "author": "Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel", "booktitle": "Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P 2013)", "year": "2013", "month": "May", "location": "San Francisco, California, USA", "pages": "319--333", "publisher": "IEEE Computer Society", "www_section": "Anonymous publication", "www_tags": "selected", "www_pdf_url": "http://www.cs.utexas.edu/users/witchel/pubs/lee13oak-anon-pass.pdf", "key": "DBLP:conf/sp/LeeDWWK13"}, {"author": "Arvind Narayanan and Vitaly Shmatikov", "title": "De-anonymizing Social Networks", "pages": "173--187", "www_tags": "selected", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf", "www_section": "Misc", "www_important": "1", "editor": "", "booktitle": "Proceedings of the 30th IEEE Symposium on Security and Privacy (S\\&P 2009)", "location": "Oakland, California, USA", "publisher": "IEEE Computer Society", "month": "May", "year": "2009", "isbn": "978-0-7695-3633-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "DBLP:conf/sp/NarayananS09"}, {"author": "Sheharbano Khattak and Laurent Simon and Steven J. Murdoch", "title": "Systemization of Pluggable Transports for Censorship Resistance", "journal": "CoRR", "volume": "abs/1412.7448", "year": "2014", "timestamp": "Thu, 01 Jan 2015 19:51:08 +0100", "biburl": "http://dblp.uni-trier.de/rec/bib/journals/corr/KhattakSM14", "bibsource": "dblp computer science bibliography, http://dblp.org", "www_pdf_url": "http://arxiv.org/pdf/1412.7448v1.pdf", "www_section": "Communications Censorship", "www_tags": "selected", "key": "DBLP:journals/corr/KhattakSM14"}, {"author": "George Danezis and Claudia Diaz", "title": "A Survey of Anonymous Communication Channels", "institution": "Microsoft Research", "year": "2008", "number": "MSR-TR-2008-35", "month": "January", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf", "key": "DD08Survey"}, {"title": "Differential Privacy for Collaborative Security", "author": "Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith", "booktitle": "Proceedings of the European Workshop on System Security (EUROSEC)", "year": "2010", "month": "April", "publisher": "ACM Press", "www_pdf_url": "http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf", "www_section": "Misc", "key": "DPCS2010"}, {"author": "George Danezis", "title": "Forward Secure Mixes", "booktitle": "Proceedings of 7th Nordic Workshop on Secure {IT} Systems", "pages": "195--207", "year": "2002", "editor": "Fisher-Hubner, Jonsson", "location": "Karlstad, Sweden", "month": "November", "day": "7", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/fsmix.pdf", "www_tags": "selected", "key": "Dan:SFMix03"}, {"author": "George Danezis and Andrei Serjantov", "title": "Statistical Disclosure or Intersection Attacks on Anonymity Systems", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "year": "2004", "series": "LNCS", "location": "Toronto", "month": "May", "www_section": "Traffic analysis", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps", "www_tags": "selected", "key": "DanSer04"}, {"author": "Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel", "title": "Towards measuring anonymity", "booktitle": "Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Traffic analysis", "www_important": "1", "www_pdf_url": "https://www.researchgate.net/profile/Stefaan_Seys/publication/221655590_Towards_Measuring_Anonymity/links/00b495213688a4e2e7000000/Towards-Measuring-Anonymity.pdf", "www_tags": "selected", "key": "Diaz02"}, {"author": "Claudia Diaz", "year": "2005", "title": "Anonymity and Privacy in Electronic Services", "school": "Katholieke Universiteit Leuven", "address": "Leuven, Belgium", "month": "December", "www_section": "Anonymous communication", "www_pdf_url": "http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf", "www_tags": "selected", "key": "DiazThesis05"}, {"author": "Douglas Kelly", "title": "A taxonomy for and analysis of anonymous communications networks", "school": "Air Force Institute of Technology", "year": "2009", "month": "March", "www_section": "Anonymous communication", "www_pdf_url": "http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf", "www_tags": "selected", "key": "Douglas-thesis"}, {"title": "A Combinatorial Approach to Measuring Anonymity", "author": "M. Edman and F. Sivrikaya and B. Yener", "journal": "Intelligence and Security Informatics, 2007 IEEE", "year": "2007", "month": "May", "volume": "", "number": "", "pages": "356--363", "www_section": "Traffic analysis", "www_pdf_url": "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", "www_tags": "selected", "key": "EdmanSY07"}, {"title": "Keyword Search and Oblivious Pseudorandom Functions", "author": "Michael J. Freedman and Yuval Ishai and Benny Pinkas and Omer Reingold", "booktitle": "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", "location": "Cambridge, MA", "month": "February", "year": "2005", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf", "www_section": "Misc", "key": "FIPR05"}, {"title": "Efficient Private Matching and Set Intersection", "author": "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", "booktitle": "Proceedings of {EUROCRYPT} 2004", "location": "Interlaken, Switzerland", "month": "May", "year": "2004", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf", "www_section": "Misc", "key": "FNP04"}, {"author": "Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao", "title": "On Flow Marking Attacks in Wireless Anonymous Communication Networks", "booktitle": "Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)", "year": "2005", "month": "April", "www_section": "Traffic analysis", "www_pdf_url": "http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf", "www_tags": "selected", "key": "Fu::FlowMarking::2005"}, {"author": "Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum", "title": "Provable Anonymity", "booktitle": "{Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)}", "year": "2005", "location": "Alexandria, VA, USA", "month": "November", "www_pdf_url": "http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf", "www_ps_url": "http://www.cs.ru.nl/~flaviog/publications/anonymity.ps", "www_section": "Formal methods", "www_tags": "selected", "key": "GHPvR05"}, {"author": "Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski", "title": "Rapid Mixing and Security of Chaum's Visual Electronic Voting", "booktitle": "Proceedings of ESORICS 2003", "year": "2003", "month": "October", "www_section": "Provable shuffles", "www_pdf_url": "http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf", "www_tags": "selected", "key": "GKK03"}, {"title": "{Garbled Routing (GR): A Generic Framework towards Unification of Anonymous Communication Systems}", "author": "Shaahin Madani and Ibrahim Khalil", "journal": "{Journal of Network and Computer Applications}", "volume": "44", "number": "", "pages": "183--195", "year": "2014", "issn": "1084-8045", "doi": "http://dx.doi.org/10.1016/j.jnca.2014.05.005", "www_html_url": "http://www.sciencedirect.com/science/article/pii/S1084804514001246", "www_section": "Anonymous communication", "key": "GR2014"}, {"title": "Revisiting A Combinatorial Approach Toward Measuring Anonymity", "author": "Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)", "year": "2008", "month": "October", "location": "Alexandria, VA, USA", "publisher": "ACM", "www_tags": "", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf", "www_section": "Traffic analysis", "key": "GTDPV-WPES08"}, {"title": "Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks", "author": "Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow", "booktitle": "Proceedings of the 2006 IEEE Symposium on Security and Privacy", "year": "2006", "month": "May", "location": "Oakland, CA", "pages": "121--131", "publisher": "IEEE CS", "www_section": "Anonymous communication", "www_pdf_url": "http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf", "www_tags": "selected", "key": "Golle:sp2006"}, {"title": "Universal Re-Encryption for Mixnets", "author": "Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson", "booktitle": "Proceedings of the 2004 RSA Conference, Cryptographer's track", "year": "2004", "month": "February", "location": "San Francisco, USA", "www_pdf_url": "http://www.syverson.org/univrenc-ctrsa.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "GolleJakobssonJuelsSyverson:universal04"}, {"author": "Jinsong Han and Yunhao Liu and Li Lu and Lei Hu and Abhishek Patil", "title": "A Random Walk Based Anonymous Peer-to-Peer Protocol Design", "booktitle": "Proceedings of ICCNMC", "year": "2005", "pages": "143--152", "www_section": "Anonymous communication", "www_tags": "selected", "key": "HanLLHP05"}, {"author": "Ichiro Hasuo and Yoshinobu Kawabe", "title": "Probabilistic Anonymity via Coalgebraic Simulations", "booktitle": "Proceedings of the European Symposium on Programming (ESOP '07)", "pages": "379--394", "publisher": "Springer, Berlin", "series": "Lecture Notes in Computer Science", "volume": "4421", "year": "2007", "www_section": "Formal methods", "www_pdf_url": "http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf", "key": "HasuoK07a"}, {"title": "Hot or Not: Revealing Hidden Services by their Clock Skew", "author": "Steven J. Murdoch", "booktitle": "Proceedings of CCS 2006", "year": "2006", "month": "November", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "HotOrNot"}, {"author": "Dijiang Huang", "title": "Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems", "booktitle": "Proceedings of the 5th ACM workshop on Wireless security (WiSe '06)", "year": "2006", "isbn": "1-59593-557-6", "pages": "65--74", "location": "Los Angeles, California", "doi": "http://doi.acm.org/10.1145/1161289.1161303", "publisher": "ACM Press", "address": "New York, NY, USA", "www_section": "Traffic analysis", "key": "Huang06"}, {"author": "Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner", "title": "{ISDN-mixes: Untraceable communication with very small bandwidth overhead}", "booktitle": "Proceedings of the GI/ITG Conference on Communication in Distributed Systems", "year": "1991", "month": "February", "pages": "451--463", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz", "www_tags": "selected", "key": "ISDN-mixes"}, {"title": "Information Disclosure in Identity Management", "author": "Dogan Kesdogan and Vinh Pham and Lexi Pimenidis", "booktitle": "Proceedings of 12th Nordic Workshop on IT-Security, NordSec", "year": "2007", "month": "October", "location": "Reykjavik, Iceland", "pages": "141--152", "editor": "Ulfar Erlingsson and Andrei Sabelfeld", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf", "key": "InfDisclosureIDM07"}, {"author": "Dogan Kesdogan and Lexi Pimenidis and Tobias K{\\\"o}lsch", "title": "Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis", "booktitle": "Proceedings of First Workshop on Quality of Protection", "year": "2005", "month": "September", "pages": "159--171", "series": "Advances in Information Security", "volume": "23", "locations": "Milan, Italy", "www_tags": "", "www_pdf_url": "http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf", "www_section": "Anonymous communication", "key": "KesdoganPK06"}, {"author": "Jiejun Kong and Xiaoyan Hong and Mario Gerla", "title": "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks", "journal": "IEEE Transactions on Mobile Computing", "volume": "6", "number": "8", "year": "2007", "issn": "1536-1233", "pages": "888--902", "publisher": "IEEE Computer Society", "address": "Los Alamitos, CA, USA", "www_section": "Anonymous communication", "www_pdf_url": "http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf", "www_tags": "selected", "key": "KongHG07"}, {"title": "{TCP} Covert Timing Channels: Design and Detection", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08", "year": "2008", "month": "June", "publisher": "IEEE", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf", "www_section": "Anonymous communication", "key": "LCC_DSN08"}, {"title": "Cloak: A Ten-fold Way for Reliable Covert Communications", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'07", "year": "2007", "month": "September", "publisher": "Springer", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf", "www_section": "Anonymous communication", "key": "LCC_ESORICS07"}, {"title": "{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the International Conference on Communications - {ICC}'09", "year": "2009", "month": "June", "publisher": "IEEE", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf", "www_section": "Anonymous communication", "key": "LCC_ICC09"}, {"title": "Crafting Web Counters into Covert Channels", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07", "year": "2007", "month": "May", "publisher": "Springer", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf", "www_section": "Anonymous communication", "key": "LCC_IFIPSEC07"}, {"title": "Entropy Bounds for Traffic Confirmation", "author": "Luke O'Connor", "institution": "IACR", "number": "2008/365", "year": "2008", "month": "October", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://eprint.iacr.org/2008/365.pdf", "key": "LOCEntropy2008"}, {"title": "A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks", "author": "Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee", "booktitle": "Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11", "year": "2011", "month": "June", "publisher": "IEEE", "www_section": "Anonymous communication", "key": "LZCCL_DSN11"}, {"title": "{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows", "author": "Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'11", "year": "2011", "month": "February", "publisher": "Internet Society", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf", "www_section": "Traffic analysis", "key": "LZCLCP_NDSS11"}, {"title": "On the Secrecy of Spread-Spectrum Flow Watermarks", "author": "Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'10", "year": "2010", "month": "September", "publisher": "Springer", "www_section": "Traffic analysis", "key": "LZPL_ESORICS10"}, {"author": "Brian Neil Levine and Clay Shields", "journal": "Journal of Computer Security", "keywords": "anonymity; routing; security; multicast; Journal Paper", "number": "3", "pages": "213--240", "title": "{Hordes --- A Multicast Based Protocol for Anonymity}", "volume": "10", "year": "2002", "www_section": "Anonymous communication", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf", "www_tags": "selected", "key": "Levine:2002"}, {"author": "Marc Liberatore and Brian Neil Levine", "title": "{Inferring the Source of Encrypted HTTP Connections}", "booktitle": "Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006)", "month": "November", "year": "2006", "pages": "255--263", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf", "key": "Liberatore:2006"}, {"author": "Tianbo Lu and Binxing Fang and Yuzhong Sun and Li Guo", "title": "Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel", "booktitle": "Proceedings of ICCNMC", "year": "2005", "pages": "853--862", "www_section": "Anonymous communication", "www_tags": "selected", "www_abstract_url": "http://www.springerlink.com/content/b3x4na87xbmcextx/", "key": "LuFSG05"}, {"author": "Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko +Niedermayer and Georg Carle", "title": "{More: A Peer-To-Peer Based Connectionless Onion Router}", "year": "2007", "booktitle": "Proceedings of IEEE GLOBECOM, Globalcommunications Conference", "location": "Washington DC, USA", "month": "November", "day": "26", "www_pdf_url": "http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf", "www_section": "Anonymous communication", "key": "MORE"}, {"title": "{Improving Security and Efficiency of Mix-Based Anonymous Communication Systems}", "author": "Shaahin Madani", "school": "RMIT University, Melbourne, Australia", "year": "2015", "month": "April", "url": "https://researchbank.rmit.edu.au/view/rmit:161447", "www_section": "Anonymous communication", "www_pdf_url": "https://researchbank.rmit.edu.au/eserv/rmit:161447/Madani.pdf", "key": "MadaniThesis"}, {"title": "A Concept of an Anonymous Direct P2P Distribution Overlay System", "year": "2008", "booktitle": "Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA)", "month": "March", "pages": "590--597", "publisher": "IEEE Computer Society Press", "location": "Gino-wan, Okinawa, Japan", "isbn": "978-0-7695-3095-6", "www_pdf_url": "http://p2priv.org/pub/p2priv-aina2008.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "author": "Igor Margasinski and Michal Pioro", "key": "MarPi08"}, {"title": "{Multi-Binomial Mix: A Proposal for Secure and Efficient Anonymous Communication}", "author": "Shaahin Madani and Ibrahim Khalil", "journal": "Computer Networks", "volume": "93, Part 1", "number": "", "pages": "41--53", "year": "2015", "issn": "1389-1286", "doi": "http://dx.doi.org/10.1016/j.comnet.2015.10.007", "url": "http://authors.elsevier.com/a/1R-Ng4xsUrfGOV", "www_section": "Anonymous communication", "www_html_url": "http://authors.elsevier.com/a/1R-Ng4xsUrfGOV", "key": "MultiBinomial2015"}, {"author": "Piers O'Hanlon, Joss Wright, and Ian Brown", "booktitle": "Proceedings of the W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring", "title": "Privacy at the Link Layer", "year": "2014", "www_section": "Anonymous communication", "www_pdf_url": "https://www.w3.org/2014/strint/papers/35.pdf", "key": "OHanlonWrightBrown2014"}, {"author": "C. Park and K. Itoh and K. Kurosawa", "title": "Efficient anonymous channel and all/nothing election scheme", "booktitle": "Proceedings of {EUROCRYPT} 1993", "month": "May", "year": "1993", "pages": "248--259", "publisher": "Springer-Verlag, LNCS 765", "www_section": "Provable shuffles", "www_tags": "selected", "key": "PIK"}, {"author": "Jun Furukawa and Kazue Sako", "title": "An Efficient Scheme for Proving a Shuffle", "editor": "Joe Kilian", "booktitle": "Proceedings of {CRYPTO} 2001", "year": "2001", "publisher": "Springer-Verlag, LNCS 2139", "www_pdf_url": "http://www.iacr.org/archive/crypto2001/21390366.pdf", "www_section": "Provable shuffles", "www_tags": "selected", "key": "PShuffle"}, {"author": "Andriy Panchenko and Lexi Pimenidis", "title": "Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication", "booktitle": "Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006)", "year": "2006", "month": "October", "pages": "240--251", "series": "Lecture Notes in Computer Science", "volume": "4237", "location": "Heraklion, Crete, Greece", "www_section": "Anonymous communication", "key": "PanchenkoP06"}, {"author": "Andriy Panchenko and Lexi Pimenidis and Johannes Renner", "title": "Performance Analysis of Anonymous Communication Channels Provided by {Tor}", "year": "2008", "month": "March", "pages": "221--228", "booktitle": "Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008)", "location": "Barcelona, Spain", "publisher": "IEEE Computer Society", "www_tags": "", "www_ps_url": "http://www.pimenidis.org/research/papers/PaPiRe08.ps", "www_section": "Anonymous communication,Tor Performance", "key": "PanchenkoPR08"}, {"address": "Leuven, Belgium", "author": "Dang Vinh Pham and Joss Wright and Dogan Kesdogan", "booktitle": "Proceedings of ESORICS 2011", "pages": "12--15", "publisher": "September 2011", "title": "A Practical Complexity-Theoretic Analysis of Mix Systems", "year": "2011", "www_section": "Anonymous communication", "www_pdf_url": "https://link.springer.com/content/pdf/10.1007%2F978-3-642-23822-2_28.pdf", "key": "PhamWrightKesdogan2011"}, {"author": "Marc Rennhard and Bernhard Plattner", "title": "{Practical Anonymity for the Masses with Mix-Networks}", "booktitle": "{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}", "location": "Linz, Austria", "month": "June", "year": "2003", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", "www_tags": "selected", "key": "RP03-1"}, {"author": "Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison", "title": "{Analysis of an Anonymity Network for Web Browsing}", "booktitle": "{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}", "location": "Pittsburgh, USA", "pages": "49--54", "month": "June", "year": "2002", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", "www_tags": "selected", "key": "RRMPH02-1"}, {"title": "Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy", "author": "Jason Reed and Benjamin C. Pierce", "booktitle": "Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on {F}unctional {P}rogramming ({ICFP})", "year": "2010", "month": "September", "location": "Baltimore, Maryland", "publisher": "ACM Press", "www_pdf_url": "http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf", "www_section": "Formal methods", "key": "ReedPierce10"}, {"title": "A survey on solutions and main free tools for privacy enhancing Web communications", "volume": "35", "issn": "1084-8045", "doi": "10.1016/j.jnca.2012.02.011", "number": "5", "journal": "Journal of Network and Computer Applications", "author": "Ruiz-Mart{\\'i}nez, A.", "year": "2012", "month": "September", "pages": "1473--1492", "www_pdf_url": "http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf", "www_section": "Anonymous communication", "key": "Ruiz-Martinez_2012"}, {"author": "Rybczy\\'{n}ska, Marta", "title": "{A Round--based Cover Traffic Algorithm for Anonymity Systems}", "booktitle": "{Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems}", "year": "2009", "pages": "93--99", "location": "Barcelona, Spain", "month": "November", "publisher": "IEEE Computer Society Press", "www_pdf_url": "http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf", "www_section": "Traffic analysis", "key": "Rybczynska-incos2009"}, {"author": "Joe Kilian and Kazue Sako", "title": "Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth", "booktitle": "Proceedings of {EUROCRYPT} 1995", "www_section": "Provable shuffles", "month": "May", "year": "1995", "publisher": "Springer-Verlag", "www_tags": "selected", "key": "SK"}, {"author": "Andrei Serjantov and Richard E. Newman", "title": "On the Anonymity of Timed Pool Mixes", "booktitle": "Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems", "pages": "427--434", "year": "2003", "location": "Athens, Greece", "month": "May", "publisher": "Kluwer", "www_section": "Traffic analysis", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", "www_tags": "selected", "key": "SN03"}, {"title": "Protecting data privacy in private information retrieval schemes", "author": "Gertner, Yael and Ishai, Yuval and Kushilevitz, Eyal and Malkin, Tal", "booktitle": "Proceedings of the thirtieth annual ACM symposium on Theory of computing", "pages": "151--160", "year": "1998", "organization": "ACM", "www_section": "Private Information Retrieval", "www_pdf_url": "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.50.6801&rep=rep1&type=pdf", "key": "SPIR"}, {"author": "Andrei Serjantov and Peter Sewell", "title": "Passive Attack Analysis for Connection-Based Anonymity Systems", "booktitle": "Proceedings of ESORICS 2003", "year": "2003", "month": "October", "www_section": "Traffic analysis", "www_ps_url": "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps", "www_remarks": "An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.", "www_tags": "selected", "key": "SS03"}, {"title": "IM Session Identification by Outlier Detection in Cross-correlation Functions", "author": "Saad Saleh and Muhammad U. Ilyas and Khawar Khurshid and Alex X. Liu and Hayder Radha", "booktitle": "Proceedings of the 49th Annual Conference on Information Sciences and Systems (CISS 2015)", "year": "2015", "location": "Baltimore, MD, USA", "www_pdf_url": "https://www.researchgate.net/publication/274635819_IM_Session_Identification_by_Outlier_Detection_in_Cross-correlation_Functions", "www_section": "Anonymous communication", "key": "SalehCISS15"}, {"title": "Salsa: A Structured Approach to Large-Scale Anonymity", "author": "Arjun Nambiar and Matthew Wright", "booktitle": "Proceedings of CCS 2006", "year": "2006", "month": "November", "www_pdf_url": "http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "Salsa"}, {"author": "Vincent Scarlata and Brian Neil Levine and Clay Shields", "title": "{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}", "booktitle": "Proceedings of the IEEE International Conference on Network Protocols (ICNP)", "keywords": "security; routing; peer-to-peer; anonymity", "month": "November", "pages": "272--280", "year": "2001", "www_section": "Misc", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf", "key": "Scarlata:2001"}, {"author": "Andrei Serjantov and George Danezis", "title": "Towards an Information Theoretic Metric for Anonymity", "booktitle": "Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Traffic analysis", "www_important": "1", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps", "www_tags": "selected", "key": "Serj02"}, {"author": "Andrei Serjantov", "title": "Anonymizing censorship resistant systems", "booktitle": "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", "month": "March", "year": "2002", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps", "www_section": "Anonymous publication", "www_tags": "selected", "key": "Serj02-iptps"}, {"title": "Measuring Relationship Anonymity in Mix Networks", "author": "Vitaly Shmatikov and Ming-Hsiu Wang", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}", "year": "2006", "month": "October", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "ShWa-Relationship"}, {"title": "Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses", "author": "Vitaly Shmatikov and Ming-Hsiu Wang", "booktitle": "Proceedings of ESORICS 2006", "year": "2006", "month": "September", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "www_important": "1", "key": "ShWa-Timing06"}, {"title": "{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}", "author": "Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao", "booktitle": "Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07)", "year": "2007", "month": "May", "www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/pDCS.pdf", "www_section": "Anonymous communication", "key": "Shao-infocom07"}, {"title": "{ Towards Statistically Strong Source Anonymity for Sensor Networks }", "author": "Min Shao and Yi Yang and Sencun Zhu and Guohong Cao", "booktitle": "Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08)", "year": "2008", "month": "May", "www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf", "www_section": "Anonymous communication", "key": "Shao-infocom08"}, {"title": "Quantifying location privacy", "author": "Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "pages": "247--262", "year": "2011", "organization": "IEEE", "www_section": "Misc", "www_pdf_url": "http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf", "key": "Shokri11QLP1"}, {"title": "Quantifying Location Privacy: The Case of Sporadic Location Exposure", "author": "Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux, Jean-Pierre and Jean-Yves Le Boudec", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "pages": "57--76", "year": "2011", "publisher": "Springer", "www_section": "Misc", "www_pdf_url": "http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf", "key": "Shokri11QLP2"}, {"author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "title": "Measuring Anonymity in a Non-adaptive, Real-time System", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "series": "Springer-Verlag, LNCS", "volume": "3424", "pages": "226--241", "www_section": "Traffic analysis", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf", "www_tags": "selected", "key": "TH04"}, {"title": "{The APROB Channel: adaptive semi-real-time anonymous communication}", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "booktitle": "Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and Distributed, Karlstad, Sweden", "year": "2006", "www_section": "stream", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf", "key": "TH06a"}, {"title": "{The Chances of Successful Attacks against Continuous-time Mixes}", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "booktitle": "Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\\\"oping, Sweden", "year": "2006", "www_section": "Traffic analysis", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf", "key": "TH06b"}, {"author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak and Ferenc Vajda", "title": "Measuring Anonymity Revisited", "booktitle": "Proceedings of the Ninth Nordic Workshop on Secure IT Systems", "pages": "85--90", "year": "2004", "location": "Espoo, Finland", "month": "November", "editor": "Sanna Liimatainen and Teemupekka Virtanen", "www_section": "Traffic analysis", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf", "www_tags": "selected", "key": "THV04"}, {"author": "Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu", "title": "Statistical Identification of Encrypted Web Browsing Traffic", "booktitle": "Proceedings of the 2002 IEEE Symposium on Security and Privacy", "year": "2002", "location": "Berkeley, California", "month": "May", "www_section": "Traffic analysis", "www_pdf_url": "ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf", "www_tags": "selected", "key": "TrafHTTP"}, {"title": "Breaking Four Mix-related Schemes Based on Universal Re-encryption", "author": "George Danezis", "booktitle": "Proceedings of Information Security Conference 2006", "year": "2006", "month": "September", "publisher": "Springer-Verlag", "www_pdf_url": "http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf", "www_section": "Provable shuffles", "www_tags": "selected", "key": "UREbreak06"}, {"author": "Parvathinathan Venkitasubramaniam and Ting He and Lang Tong", "title": "Anonymous Networking amidst Eavesdroppers", "howpublished": "Pre-print available as arXiv:0710.4903v1 at arxiv.org", "month": "October", "year": "2007", "www_pdf_url": "http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "VenHeTon07"}, {"title": "{Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems}", "author": "Xinyuan Wang and Shiping Chen and Sushil Jajodia", "booktitle": "Proceedings of the 2007 IEEE Symposium on Security and Privacy", "year": "2007", "month": "May", "pages": "116--130", "www_section": "Traffic analysis", "www_pdf_url": "http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf", "key": "Wang-SP2007"}, {"author": "Xinyuan Wang and Shiping Chen and Sushil Jajodia", "title": "Tracking anonymous peer-to-peer VoIP calls on the internet", "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security", "month": "November", "year": "2005", "pages": "81--91", "www_section": "Anonymous communication", "www_pdf_url": "http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf", "www_tags": "selected", "key": "WangCJ05"}, {"author": "Stefan G. Weber", "title": "Multilaterally Secure Pervasive Cooperation", "school": "TU Darmstadt, Germany", "year": "2011", "month": "December", "www_section": "comm", "www_pdf_url": "http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf", "key": "Weber11"}, {"author": "Joss Wright", "booktitle": "Proceedings of the 11th Czech Information Security Summit", "editor": "Prague, Czech Republic", "pages": "24--26", "publisher": "May 2010", "title": "Obscured by Clouds: On the Privacy Implications of Cloud Computing", "year": "2010", "www_section": "Misc", "www_pdf_url": "http://www.pseudonymity.net/~joss/doc/papers/2010/wright10is2_en.pdf", "key": "Wright2010"}, {"author": "Joss Wright", "journal": "Internet Policy Review", "title": "Necessary and inherent limits to internet surveillance", "year": "2013", "www_section": "Traffic analysis", "www_pdf_url": "http://policyreview.info/node/184/pdf", "key": "Wright2013"}, {"author": "Joss Wright", "journal": "Information, Communication & Society", "number": "1", "pages": "121--141", "title": "Regional Variation in Chinese Internet Filtering", "volume": "17", "year": "2014", "www_section": "Communications Censorship", "www_pdf_url": "https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf", "key": "Wright2014"}, {"author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "title": "{The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems}", "journal": "ACM Transactions on Information and System Security (TISSEC)", "keywords": "anonymity; Journal Paper", "month": "November", "number": "7", "pages": "489--522", "volume": "4", "year": "2004", "www_section": "Traffic analysis", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf", "www_tags": "selected", "key": "Wright:2004"}, {"address": "India, September 2010", "author": "Joss Wright and Ian Brown", "booktitle": "Proceedings of the 2nd Extreme Workshop on Communication", "pages": "4--10", "publisher": "Dharamsala", "title": "Privacy Challenges in Delay-Tolerant and Restricted-Route Networks", "year": "2010", "www_section": "Traffic analysis", "www_pdf_url": "http://www.pseudonymity.net/~joss/doc/papers/2010/wright10privdtn.pdf", "key": "WrightBrown2010"}, {"author": "Charles V. Wright and Fabian Monrose and Gerald M. Masson", "title": "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", "journal": "Journal of Machine Learning Research", "volume": "7", "year": "2006", "issn": "1533-7928", "pages": "2745--2769", "publisher": "MIT Press", "address": "Cambridge, MA, USA", "www_pdf_url": "http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf", "www_tags": "selected", "www_section": "Traffic analysis", "key": "WrightMM06"}, {"address": "San Francisco", "author": "Joss Wright and Tulio de Souza and Ian Brown", "booktitle": "Proceedings of FOCI'11 (USENIX Security Symposium)", "publisher": "8 August 2011", "title": "Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics", "year": "2011", "www_section": "Communications Censorship", "www_pdf_url": "https://db.usenix.org/events/foci11/tech/final_files/Wright.pdf", "key": "WrightSouzaBrown2011"}, {"author": "Joss Wright, Susan Stepney, John A. Clark, and Jeremy Jacob", "journal": "University of York Technical (Yellow) Report", "title": "Formalizing Anonymity: A Review", "year": "2005", "comment": "University of York, Heslington, York, UK", "www_section": "Anonymous communication", "www_pdf_url": "http://www-users.cs.york.ac.uk/susan/bib/ss/security/389.pdf", "key": "WrightStepneyClarkJacob2005"}, {"author": "Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao", "title": "SAS: A Scalar Anonymous Communication System", "booktitle": "Proceedings of ICCNMC", "year": "2005", "pages": "452--461", "www_section": "Anonymous communication", "www_tags": "selected", "key": "XuFZBCZ05"}, {"title": "{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks }", "author": "Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao", "booktitle": "Proceedings of The ACM Conference on Wireless Network Security (WiSec)", "year": "2008", "month": "March", "www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf", "www_section": "Anonymous communication", "key": "Yang-wisec08"}, {"title": "Towards Provably-Secure Scalable Anonymous Broadcast", "author": "Mahdi Zamani and Jared Saia and Mahnush Movahedi and Joud Khoury", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet", "year": "2013", "month": "August", "day": "13", "series": "FOCI '13", "location": "Washington, DC, USA", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.unm.edu/~saia/papers/foci13.pdf", "key": "Zamani:FOCI13"}, {"author": "Bendert Zevenbergen, Ian Brown, Joss Wright, and David Erdos", "institution": "Oxford Internet Institute, University of Oxford", "title": "Ethical Privacy Guidelines for Mobile Connectivity Measurements", "year": "2013", "www_section": "Misc", "www_pdf_url": "http://www.oii.ox.ac.uk/research/Ethical_Privacy_Guidelines_for_Mobile_Connectivity_Measurements.pdf", "key": "ZevenbergenBrownWrightErdos2013"}, {"title": "Browser-Based Attacks on {Tor}", "author": "Tim Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Browser_based.pdf", "key": "abbott-pet2007"}, {"author": "Masayuki Abe", "title": "Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers", "booktitle": "Proceedings of {EUROCRYPT} 1998", "year": "1998", "publisher": "Springer-Verlag, LNCS 1403", "www_section": "Provable shuffles", "www_tags": "selected", "key": "abe"}, {"title": "ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks", "author": "John Geddes and Michael Schliep and Nicholas Hopper", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016)}", "year": "2016", "month": "November", "www_pdf_url": "https://www-users.cs.umn.edu/~hopper/abra_wpes_16.pdf", "www_tags": "selected", "www_section": "Tor Performance", "key": "abra-wpes16"}, {"title": "Few throats to choke: On the current structure of the internet", "author": "Acharya, HB and Chakravarty, Sambuddho and Gosain, Devashish", "booktitle": "Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks (LCN)", "pages": "339--346", "year": "2017", "organization": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://arxiv.org/pdf/1806.07038.pdf", "key": "acharya2017few"}, {"author": "Dario Catalano and Dario Fiore and Rosario Gennaro", "title": "Fully Non-Interactive Onion Routing with Forward-Secrecy", "www_pdf_url": "http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "editor": "Javier Lopez and Gene Tsudik", "booktitle": "Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011)", "series": "Lecture Notes in Computer Science", "location": "Malaga, Spain", "volume": "6715", "month": "June", "year": "2011", "key": "acns11-certificateless"}, {"title": "Exposing Invisible Timing-based Traffic Watermarks with BACKLIT", "author": "Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "year": "2011", "month": "December", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/backlit-acsac11.pdf", "key": "acsac11-backlit"}, {"title": "\"Super Nodes\" in Tor: Existence and Security Implication", "author": "Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "year": "2011", "month": "December", "www_section": "Anonymous communication", "www_pdf_url": "http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf", "key": "acsac11-supernodes"}, {"title": "Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise", "author": "W. Brad Moore and Chris Wacek and Micah Sherr", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "year": "2011", "month": "December", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "https://security.cs.georgetown.edu/papers/tortoise.pdf", "www_tags": "selected", "key": "acsac11-tortoise"}, {"title": "Preventing Active Timing Attacks in Low-Latency Anonymous Communication", "author": "Aaron Johnson and Joan Feigenbaum and Paul Syverson", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "year": "2010", "month": "July", "location": "Berlin, Germany", "www_tags": "selected", "www_pdf_url": "http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf", "www_section": "Traffic analysis", "key": "active-pet2010"}, {"title": "A Classification for Privacy Techniques", "author": "Carlisle Adams", "journal": "University of Ottawa Law \\& Technology Journal", "volume": "3", "issue": "1", "year": "2006", "pages": "35--52", "www_pdf_url": "http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf", "www_section": "Misc", "www_tags": "selected", "key": "adams06"}, {"author": "Ben Adida and Douglas Wikstr\\\"om", "title": "How to Shuffle in Public", "booktitle": "Proceedings of the Theory of Cryptography 2007", "year": "2007", "month": "February", "www_section": "Provable shuffles", "www_pdf_url": "http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf", "www_tags": "selected", "key": "adida07"}, {"author": "Dakshi Agrawal and Dogan Kesdogan and Stefan Penz", "title": "{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "year": "2003", "month": "May", "pages": "16--27", "www_pdf_url": "http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "agrawal03"}, {"author": "Roger Dingledine and Andrei Serjantov and Paul Syverson", "title": "Blending Different Latency Traffic with Alpha-Mixing", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "245--257", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf", "www_tags": "selected", "key": "alpha-mixing:pet2006"}, {"author": "Ross Anderson", "title": "The Eternity Service", "booktitle": "Proceedings of Pragocrypt '96", "year": "1996", "www_section": "Anonymous publication", "www_important": "1", "www_ps_url": "http://www.ovmj.org/GNUnet/papers/eternity.ps", "www_html_url": "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html", "www_tags": "selected", "key": "anderson96eternity"}, {"author": "Andrei Serjantov", "title": "On the Anonymity of Anonymity Systems", "school": "University of Cambridge", "year": "2004", "month": "June", "www_section": "Anonymous communication", "www_ps_url": "http://home.arachsys.com/~aas/Thesis/2.ps", "www_tags": "selected", "key": "andrei-thesis"}, {"title": "Reputation Systems for Anonymous Networks", "author": "Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "pages": "202--218", "www_section": "Anonymous communication", "www_tags": "selected", "key": "androulaki-pet2008"}, {"author": "Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan", "title": "Cryptographic Protocol Analysis of {AN.ON}", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "year": "2010", "month": "January", "editor": "Radu Sion", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/wwpk2010.pdf", "www_tags": "selected", "key": "anon-fc10"}, {"title": "{ANONIZE}: A Large-Scale Anonymous Survey System", "author": "Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat", "booktitle": "Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy", "year": "2014", "month": "May", "publisher": "IEEE", "www_section": "Misc", "www_pdf_url": "http://ieee-security.org/TC/SP2014/papers/ANONIZE_c_ALarge-ScaleAnonymousSurveySystem.pdf", "key": "anonize"}, {"title": "Website Fingerprinting Defenses at the Application Layer", "author": "Giovanni Cherubin and Jamie Hayes and Marc Juarez", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "2", "year": "2017", "month": "April", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue2/paper54-2017-2-source.pdf", "www_section": "Traffic analysis", "key": "applicationlayer-pets2017"}, {"title": "Towards Efficient Traffic-analysis Resistant Anonymity Networks", "author": "Stevens Le Blond and David Choffnes and Wenxuan Zhou and Peter Druschel and Hitesh Ballani and Paul Francis", "booktitle": "Proceedings of the ACM SIGCOMM 2013 Conference", "year": "2013", "month": "August", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/sigcomm13-aqua.pdf", "www_tags": "selected", "key": "aqua-sigcomm2013"}, {"author": "Anupam Das and Nikita Borisov and Prateek Mittal and Matthew Caesar", "title": "$Re^3$: Relay Reliability Reputation for Anonymity Systems", "booktitle": "Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)", "month": "June", "year": "2014", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://hatswitch.org/~nikita/papers/re3-asiaccs14.pdf", "key": "asiaccs2014-reputation"}, {"author": "Dmitri Asonov and Johann-Christoph Freytag", "title": "Almost Optimal Private Information Retrieval", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Private Information Retrieval", "www_pdf_url": "http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf", "key": "asonov:pet2002"}, {"author": "Ceki G\\\"ulc\\\"u and Gene Tsudik", "title": "Mixing {E}-mail With {B}abel", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '96", "year": "1996", "month": "February", "publisher": "IEEE", "pages": "2--16", "www_section": "Anonymous communication", "www_html_url": "http://citeseer.nj.nec.com/2254.html", "www_ps_url": "http://www.isoc.org/conferences/ndss96/gulcu.ps", "www_important": "1", "www_tags": "selected", "key": "babel"}, {"author": "Adam Back and Ulf M\\\"oller and Anton Stiglic", "title": "Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "pages": "245--257", "year": "2001", "month": "April", "editor": "Ira S. Moskowitz", "publisher": "Springer-Verlag, LNCS 2137", "www_section": "Traffic analysis", "www_important": "1", "www_pdf_url": "http://www.cypherspace.org/adam/pubs/traffic.pdf", "www_tags": "selected", "key": "back01"}, {"title": "{BitBlender}: {L}ight-Weight Anonymity for BitTorrent", "author": "Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker", "booktitle": "{Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008)}", "year": "2008", "month": "September", "location": "Istanbul, Turkey", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf", "www_section": "Anonymous communication", "key": "bauer:alpaca2008"}, {"author": "Matthias Bauer", "title": "{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "location": "Washington, DC, USA", "month": "October", "year": "2003", "www_section": "Anonymous communication", "www_ps_url": "http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps", "www_important": "1", "www_remarks": "Anonymity sets in deployed systems are small because few people think it's worthwhile to use them. But we can take advantage of ordinary web users to transfer messages (that is, mix them) from one webserver to another via cookies and http redirect tricks. Senders and receivers should also look like ordinary web users, so anonymity sets are large.", "www_tags": "selected", "key": "bauer:wpes2003"}, {"author": "Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker", "title": "Low-Resource Routing Attacks Against {Tor}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "location": "Washington, DC, USA", "month": "October", "year": "2007", "www_section": "Traffic analysis", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf", "www_tags": "selected", "www_important": "1", "key": "bauer:wpes2007"}, {"title": "On the establishment of distinct identities in overlay networks", "author": "Bazzi, Rida A and Konjevod, Goran", "journal": "Distributed Computing", "volume": "19", "number": "4", "pages": "267--287", "year": "2007", "publisher": "Springer", "www_section": "comm", "www_pdf_url": "http://www.organicorigami.com/thrackle/papers/dc06.pdf", "key": "bazzi2007establishment"}, {"title": "{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private Information Retrieval}", "author": "Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\\c{c}ois Raymond", "booktitle": "Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02)", "month": "November", "year": "2002", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf", "www_section": "Private Information Retrieval", "key": "beimel-barrier"}, {"author": "A. Beimel and Y. Stahl", "title": "Robust information-theoretic private information retrieval", "booktitle": "Proceedings of the 3rd Conference on Security in Communication Networks", "editor": "S. Cimato C. Galdi G. Persiano", "publisher": "Springer-Verlag", "series": "Lecture Notes in Computer Science", "pages": "326--341", "volume": "2576", "year": "2002", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf", "www_ps_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps", "www_section": "Private Information Retrieval", "key": "beimel-robust"}, {"author": "Amos Beimel and Yuval Ishai", "title": "Information-Theoretic Private Information Retrieval: {A} Unified Construction", "journal": "Lecture Notes in Computer Science", "volume": "2076", "pages": "89--98", "year": "2001", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf", "www_section": "Private Information Retrieval", "key": "beimel01informationtheoretic"}, {"author": "Krista Bennett and Christian Grothoff", "title": "{GAP} -- Practical anonymous networking", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "141--160", "www_section": "Anonymous publication", "www_ps_url": "http://www.ovmj.org/GNUnet/download/aff.ps", "www_tags": "selected", "key": "bennett:pet2003"}, {"author": "Ron Berman and Amos Fiat and Amnon Ta-Shma", "title": "Provable Unlinkability Against Traffic Analysis", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "year": "2004", "month": "February", "editor": "Ari Juels", "publisher": "Springer-Verlag, LNCS 3110", "pages": "266--280", "www_section": "Anonymous communication", "www_pdf_url": "http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf", "www_tags": "selected", "key": "berman-fc2004"}, {"title": "An Analysis of Anonymity in Bitcoin Using P2P Network Traffic", "author": "Philip Koshy and Diana Koshy and Patrick McDaniel", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'14)", "year": "2014", "month": "March", "www_section": "Traffic analysis", "www_pdf_url": "http://fc14.ifca.ai/papers/fc14_submission_71.pdf", "key": "bitcoin-p2p-anon"}, {"author": "Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.", "title": "BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs", "journal": "ACM Transactions on Information and System Security", "issue_date": "December 2010", "volume": "13", "issue": "4", "month": "December", "year": "2010", "issn": "1094-9224", "pages": "39:1--39:33", "articleno": "39", "numpages": "33", "url": "http://doi.acm.org/10.1145/1880022.1880033", "doi": "http://doi.acm.org/10.1145/1880022.1880033", "acmid": "1880033", "publisher": "ACM", "address": "New York, NY, USA", "keywords": "Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior", "www_tags": "selected", "www_section": "Pseudonymity", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf", "key": "blac-tissec"}, {"author": "Man Ho Au and Apu Kapadia and Willy Susilo", "title": "{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation", "booktitle": "Proceedings of the 19th Annual Network and Distributed System Security Symposium ({NDSS})", "year": "2012", "month": "February", "www_tags": "selected", "www_section": "Pseudonymity", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf", "key": "blacr-ndss"}, {"title": "Designing a Better Browser for {T}or with {BLAST}", "author": "Tao Wang", "booktitle": "Proceedings of the 27th Symposium on Network and Distributed System Security ({NDSS} '20)", "year": "2020", "month": "February", "publisher": "Internet Society", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/blast-ndss2020.pdf", "key": "blast-ndss2020"}, {"author": "Peter Lofgren and Nicholas Hopper", "title": "BNymble: More anonymous blacklisting at almost no cost", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "year": "2011", "month": "February", "www_tags": "selected", "www_section": "Misc", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/bnymble.pdf", "key": "bnymble11"}, {"title": "Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages", "author": "Asya Mitseva and Andriy Panchenko", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "Traffic analysis", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-mitseva.pdf", "www_tags": "selected", "key": "boosting-sec2024"}, {"title": "Challenges in protecting Tor hidden services from botnet abuse", "author": "Nicholas Hopper", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'14)", "year": "2014", "month": "March", "www_section": "Anonymous communication", "www_pdf_url": "http://fc14.ifca.ai/papers/fc14_submission_152.pdf", "www_tags": "selected", "key": "botnetfc14"}, {"title": "{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}", "author": "A. Boukerche and K. El-Khatib and L. Xu and L. Korba", "journal": "Computer Communications", "volume": "28", "number": "10", "pages": "1193--1203", "year": "2005", "publisher": "Elsevier", "www_section": "Anonymous communication", "www_pdf_url": "http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf", "key": "boukerche2005esd"}, {"title": "Bayes, not Na\\\"{\\i}ve: Security Bounds on Website Fingerprinting Defenses", "author": "Giovanni Cherubin", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "4", "year": "2017", "month": "October", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue4/paper50-2017-4-source.pdf", "www_section": "Traffic analysis", "key": "bounds-pets2017"}, {"title": "Secure User Identification Without Privacy Erosion", "author": "Stefan Brands", "journal": "University of Ottawa Law \\& Technology Journal", "volume": "3", "issue": "1", "year": "2006", "pages": "205--223", "www_pdf_url": "http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf", "www_section": "Misc", "www_tags": "selected", "key": "brands06"}, {"author": "Amos Beimel and Shlomi Dolev", "title": "Buses for Anonymous Message Delivery", "journal": "Journal of Cryptology", "pages": "25--39", "volume": "16", "year": "2003", "number": "1", "www_section": "Anonymous communication", "www_ps_url": "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", "www_tags": "selected", "key": "buses03"}, {"title": "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials", "author": "Jan Camenisch and Anna Lysyanskaya", "booktitle": "Proceedings of {CRYPTO} 2002", "year": "2002", "pages": "61--76", "publisher": "Springer Verlag, LNCS 2442", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm", "key": "camenisch2002da"}, {"title": "A Signature Scheme with Efficient Protocols", "author": "Jan Camenisch and Anna Lysyanskaya", "booktitle": "Proceedings of {SCN '02}, Third Conference on Security in Communication Networks", "year": "2002", "pages": "268--289", "publisher": "Springer Verlag, LNCS 2576", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf", "key": "camenisch2002ssep"}, {"title": "Practical Verifiable Encryption and Decryption of Discrete Logarithms", "author": "Jan Camenisch and Victor Shoup", "booktitle": "Proceedings of {CRYPTO} 2003", "year": "2003", "pages": "126--144", "publisher": "Springer Verlag, LNCS 2729", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://springerlink.metapress.com/openurl.asp?genre=article{\\&}issn=0302-9743{\\&}volume=2729{\\&}spage=126", "key": "camenisch2003pve"}, {"author": "Jan Camenisch and Anna Lysyanskaya", "title": "A Formal Treatment of Onion Routing", "booktitle": "Proceedings of {CRYPTO} 2005", "year": "2005", "month": "August", "editor": "Victor Shoup", "publisher": "Springer-Verlag, LNCS 3621", "pages": "169--187", "www_pdf_url": "https://freehaven.net/anonbib/papers/onion21.pdf", "www_section": "Provable shuffles", "www_tags": "selected", "key": "camlys05"}, {"title": "Ting: Measuring and Exploiting Latencies Between All {Tor} Nodes", "author": "Frank Cangialosi and Dave Levin and Neil Spring", "booktitle": "Proceedings of the 2015 Internet Measurement Conference", "year": "2015", "month": "October", "pages": "289--302", "location": "Tokyo, Japan", "doi": "10.1145/2815675.2815701", "www_section": "Traffic analysis", "www_pdf_url": "https://www.cs.umd.edu/~dml/papers/ting_imc15.pdf", "key": "cangialosi15"}, {"author": "Carlsson, Niklas and Williamson, Carey and Hirt, Andreas and Jacobson, Jr., Michael", "title": "Performance modelling of anonymity protocols", "journal": "Performance Evaluation", "year": "2012", "volume": "69", "number": "12", "pages": "643--661", "month": "December", "publisher": "Elsevier", "doi": "{10.1016/j.peva.2012.08.001}", "issn": "{0166-5316}", "www_section": "comm", "www_pdf_url": "https://www.ida.liu.se/~nikca/papers/pe12.pdf", "key": "carlsson2012motorcycles"}, {"title": "Caronte: Detecting Location Leaks for Deanonymizing Tor Hidden Services", "author": "Srdjan Matic and Platon Kotzias and Juan Caballero", "booktitle": "Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15)", "month": "October", "year": "2015", "www_section": "Traffic analysis", "www_pdf_url": "https://software.imdea.org/~juanca/papers/caronte_ccs15.pdf", "www_tags": "selected", "key": "caronte-ccs2015"}, {"author": "Roger Dingledine and Paul Syverson", "title": "{Reliable MIX Cascade Networks through Reputation}", "booktitle": "Proceedings of Financial Cryptography (FC '02)", "year": "2002", "month": "March", "editor": "Matt Blaze", "publisher": "Springer-Verlag, LNCS 2357", "www_section": "Anonymous communication", "www_ps_url": "https://freehaven.net/doc/casc-rep/casc-rep.ps", "www_pdf_url": "https://freehaven.net/doc/casc-rep/casc-rep.pdf", "www_tags": "selected", "key": "casc-rep"}, {"author": "Rainer B\\\"ohme and George Danezis and Claudia Diaz and Stefan K\\\"opsell and Andreas Pfitzmann", "title": "On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?''", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "series": "Springer-Verlag, LNCS", "volume": "3424", "pages": "226--241", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-523.pdf", "key": "cascades-vs-p2p:pet2004"}, {"title": "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs", "author": "Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith", "booktitle": "Proceedings of CCS 2007", "year": "2007", "month": "October", "www_pdf_url": "http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf", "www_section": "Pseudonymity", "www_remarks": "Superseded by blac-tissec", "key": "ccs07-blac"}, {"title": "Denial of Service or Denial of Security? {H}ow Attacks on Reliability can Compromise Anonymity", "author": "Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz", "booktitle": "Proceedings of CCS 2007", "year": "2007", "month": "October", "www_pdf_url": "http://static.googleusercontent.com/media/research.google.com/en//pubs/archive/33413.pdf", "www_tags": "selected", "www_important": "1", "www_section": "Traffic analysis", "key": "ccs07-doa"}, {"title": "How Much Anonymity does Network Latency Leak?", "author": "Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin", "booktitle": "Proceedings of CCS 2007", "year": "2007", "month": "October", "www_pdf_url": "http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf", "www_section": "Traffic analysis", "key": "ccs07-latency-leak"}, {"author": "Dario Catalano and Dario Fiore and Rosario Gennaro", "title": "Certificateless Onion Routing", "www_pdf_url": "http://www.ippari.unict.it/~catalano/CaGeFi09.pdf", "www_section": "Anonymous communication", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "ccs09-certificateless"}, {"author": "Andriy Panchenko and Arne Rache and Stefan Richter", "title": "{NISAN}: Network Information Service for Anonymization Networks", "www_tags": "selected", "www_pdf_url": "http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf", "www_section": "Anonymous communication", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "ccs09-nisan"}, {"author": "Prateek Mittal and Nikita Borisov", "title": "ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies", "www_tags": "selected", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf", "www_section": "Anonymous communication", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "ccs09-shadowwalker"}, {"author": "Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim", "title": "{Scalable onion routing with Torsk}", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf", "www_section": "Anonymous communication,Tor Performance", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "November", "year": "2009", "isbn": "978-1-60558-894-0", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "ccs09-torsk"}, {"author": "Rob Jansen and Nicholas Hopper and Yongdae Kim", "title": "Recruiting New {T}or Relays with {BRAIDS}", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf", "www_section": "Anonymous communication,Tor Performance", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "October", "year": "2010", "key": "ccs10-braids"}, {"author": "Henry Corrigan-Gibbs and Bryan Ford", "title": "Dissent: Accountable Anonymous Group Messaging", "www_tags": "selected", "www_pdf_url": "http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf", "www_section": "Communications Censorship", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "October", "year": "2010", "key": "ccs10-dissent"}, {"author": "Qiyan Wang and Prateek Mittal and Nikita Borisov", "title": "In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems", "www_tags": "selected", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf", "www_section": "Traffic analysis", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "October", "year": "2010", "key": "ccs10-lookup"}, {"author": "Can Tang and Ian Goldberg", "title": "An Improved Algorithm for {T}or Circuit Scheduling", "www_tags": "selected", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf", "www_section": "Anonymous communication,Tor Performance", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "publisher": "ACM", "location": "Chicago, Illinois, USA", "month": "October", "year": "2010", "key": "ccs10-scheduling"}, {"title": "Efficient Attributes for Anonymous Credentials", "author": "Jan Camenisch and Thomas Gross", "pages": "345--356", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "location": "Alexandria, Virginia, USA", "publisher": "ACM Press", "day": "27--31", "month": "October", "year": "2008", "key": "ccs2008:camenisch"}, {"title": "Information Leaks in Structured Peer-to-peer Anonymous Communication Systems", "author": "Prateek Mittal and Nikita Borisov", "pages": "267--278", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "www_remarks": "Describes attacks against the SALSA and AP3 peer-to-peer anonymity network architectures.", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "location": "Alexandria, Virginia, USA", "publisher": "ACM Press", "day": "27--31", "month": "October", "year": "2008", "key": "ccs2008:mittal"}, {"title": "PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication", "author": "Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith", "pages": "333--345", "www_section": "Misc", "www_tags": "selected", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "location": "Alexandria, Virginia, USA", "publisher": "ACM Press", "day": "27--31", "month": "October", "year": "2008", "key": "ccs2008:tsang"}, {"title": "Dependent Link Padding Algorithms for Low Latency Anonymity Systems", "author": "Wei Wang and Mehul Motani and Vikram Srinivasan", "pages": "323--332", "www_tags": "selected", "www_section": "Traffic analysis", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "location": "Alexandria, Virginia, USA", "publisher": "ACM Press", "day": "27--31", "month": "October", "year": "2008", "key": "ccs2008:wang"}, {"author": "Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov", "title": "Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "month": "October", "year": "2011", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf", "key": "ccs2011-cirripede"}, {"author": "Swagatika Prusty and Marc Liberatore and Brian N. Levine", "title": "Forensic Investigation of the OneSwarm Anonymous Filesharing System", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "month": "October", "year": "2011", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf", "key": "ccs2011-oneswarm"}, {"author": "Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita Borisov", "title": "Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "month": "October", "year": "2011", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf", "key": "ccs2011-stealthy"}, {"author": "Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson", "title": "Trust-based Anonymous Communication: Adversary Models and Routing Algorithms", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "month": "October", "year": "2011", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/~arma/anonymity-trust-ccs2011.pdf", "key": "ccs2011-trust"}, {"author": "Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov", "title": "CensorSpoofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf", "key": "ccs2012-censorspoofer"}, {"author": "Mashael AlSabah and Kevin Bauer and Ian Goldberg", "title": "Enhancing Tor's Performance using Real-time Traffic Classification", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "www_pdf_url": "https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf", "key": "ccs2012-classification"}, {"author": "Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper", "title": "Routing Around Decoys", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf", "key": "ccs2012-decoys"}, {"author": "Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson", "title": "Touching from a Distance: Website Fingerprinting Attacks and Defenses", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cs.sunysb.edu/~xcai/fp.pdf", "key": "ccs2012-fingerprinting"}, {"author": "Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg", "title": "SkypeMorph: Protocol Obfuscation for {T}or Bridges", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf", "key": "ccs2012-skypemorph"}, {"author": "Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh", "title": "{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "month": "October", "year": "2012", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "http://www.owlfolio.org/media/2010/05/stegotorus.pdf", "key": "ccs2012-stegotorus"}, {"author": "John Geddes and Maxfield Schuchard and Nicholas Hopper", "title": "Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention", "booktitle": "Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013)", "month": "November", "year": "2013", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf", "key": "ccs2013-acks"}, {"author": "David Wolinsky and Ewa Syta and Bryan Ford", "title": "Hang with Your Buddies to Resist Intersection Attacks", "booktitle": "Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013)", "month": "November", "year": "2013", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://dedis.cs.yale.edu/dissent/papers/buddies.pdf", "key": "ccs2013-buddies"}, {"author": "Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton", "title": "Protocol Misidentification Made Easy with Format-Transforming Encryption", "booktitle": "Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013)", "month": "November", "year": "2013", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "http://eprint.iacr.org/2012/494.pdf", "key": "ccs2013-fte"}, {"author": "Mashael AlSabah and Ian Goldberg", "title": "{PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks}", "booktitle": "Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013)", "month": "November", "year": "2013", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/pctcp-ccs.pdf", "key": "ccs2013-pctcp"}, {"author": "Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson", "title": "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", "booktitle": "Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013)", "month": "November", "year": "2013", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf", "key": "ccs2013-usersrouted"}, {"author": "Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt", "title": "A Critical Evaluation of Website Fingerprinting Attacks", "booktitle": "Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)", "month": "November", "year": "2014", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-2456.pdf", "key": "ccs2014-critical"}, {"author": "Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg", "title": "A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses", "booktitle": "Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)", "month": "November", "year": "2014", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cs.stonybrook.edu/~rob/papers/ccs14.pdf", "key": "ccs2014-fingerprinting"}, {"author": "Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi", "title": "{(Nothing else) {MAT}or(s): Monitoring the Anonymity of Tor's Path Selection}", "booktitle": "Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)", "month": "November", "year": "2014", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "https://eprint.iacr.org/2014/621.pdf", "key": "ccs2014-mators"}, {"author": "Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and Arvind Narayanan and Claudia Diaz", "title": "The web never forgets: Persistent tracking mechanisms in the wild", "booktitle": "Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)", "month": "November", "year": "2014", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-2457.pdf", "key": "ccs2014-tracking"}, {"author": "Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas Shrimpton", "title": "Seeing Through Network-Protocol Obfuscation", "booktitle": "Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15)", "year": "2015", "month": "October", "isbn": "978-1-4503-3832-5", "location": "Denver, Colorado, USA", "pages": "57--69", "numpages": "13", "url": "http://doi.acm.org/10.1145/2810103.2813715", "doi": "10.1145/2810103.2813715", "acmid": "2813715", "publisher": "ACM", "address": "New York, NY, USA", "keywords": "Tor, censorship-resistance, network obfuscation", "www_tags": "selected", "www_pdf_url": "http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf", "www_section": "Traffic analysis", "key": "ccs2015obfsdetection"}, {"title": "Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\\\"{\\i}ve-bayes classifier", "author": "Dominik Herrmann and Rolf Wendolsky and Hannes Federrath", "booktitle": "Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)", "month": "October", "year": "2009", "isbn": "978-1-60558-784-4", "pages": "31--42", "location": "Chicago, Illinois, USA", "doi": "http://doi.acm.org/10.1145/1655008.1655013", "publisher": "ACM", "address": "New York, NY, USA", "www_tags": "selected", "www_pdf_url": "http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf", "www_section": "Traffic analysis", "key": "ccsw09-fingerprinting"}, {"title": "Practical Censorship Evasion Leveraging Content Delivery Networks", "author": "Hadi Zolfaghari and Amir Houmansadr", "booktitle": "Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf", "www_tags": "selected", "key": "cdn-ccs2016"}, {"author": "Zach Brown", "title": "{Cebolla: Pragmatic IP Anonymity}", "booktitle": "Proceedings of the 2002 Ottawa Linux Symposium", "year": "2002", "month": "June", "www_section": "Anonymous communication", "www_pdf_url": "http://cypherspace.org/cebolla/cebolla.pdf", "www_remarks": "Written by a former Freedom developer, Cebolla has a UDP-based design similar to second-generation Freedom. The initiator incrementally builds her circuit, giving her end-to-end forward-secrecy and also better recovery from broken nodes.", "www_tags": "selected", "key": "cebolla"}, {"title": "A Framework for the Game-theoretic Analysis of Censorship Resistance", "author": "Tariq Elahi and John A. Doucette and Hadi Hosseini and Steven J. Murdoch and Ian Goldberg", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/2016/files/papers/A_Framework_for_the_Game-theoretic_Analysis_of_Censorship_Resistance.pdf", "www_tags": "selected", "key": "censorship-framework-pets2016"}, {"title": "SoK: Making Sense of Censorship Resistance Systems", "author": "Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and Steven J. Murdoch and Ian Goldberg", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/2016/files/papers/SoK__Making_Sense_of_Censorship_Resistance_Systems.pdf", "www_tags": "selected", "key": "censorship-sok-pets2016"}, {"author": "Richard Clayton and George Danezis", "title": "Chaffinch: Confidentiality in the Face of Legal Threats", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "year": "2002", "month": "October", "editor": "Fabien Petitcolas", "publisher": "Springer-Verlag, LNCS 2578", "www_section": "Misc", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf", "www_html_url": "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html", "www_tags": "selected", "key": "chaffinch"}, {"title": "{Anonymity Protocols as Noisy Channels?}", "author": "K. Chatzikokolakis and C. Palamidessi and P. Panangaden", "journal": "Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer", "year": "2006", "www_section": "Formal methods", "www_tags": "selected", "key": "chatzikokolakis2006apn"}, {"author": "David Chaum", "title": "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", "journal": "Journal of Cryptology", "year": "1988", "volume": "1", "pages": "65--75", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf", "key": "chaum-dc"}, {"author": "David Chaum", "title": "Untraceable electronic mail, return addresses, and digital pseudonyms", "journal": "Communications of the ACM", "year": "1981", "volume": "24", "number": "2", "month": "February", "www_section": "Anonymous communication", "www_txt_url": "http://www.eskimo.com/~weidai/mix-net.txt", "www_html_url": "http://world.std.com/~franl/crypto/chaum-acm-1981.html", "www_pdf_url": "http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf", "www_important": "1", "www_tags": "selected", "key": "chaum-mix"}, {"author": "David Chaum", "title": "Security without Identification: Transaction Systems to Make Big Brother Obsolete", "journal": "CACM", "year": "1985", "volume": "28", "number": "10", "month": "October", "www_section": "Misc", "www_tags": "selected", "key": "chaum85"}, {"author": "Eric Friedman and Paul Resnick", "title": "The social cost of cheap pseudonyms", "journal": "Journal of Economics and Management Strategy", "year": "2001", "volume": "10", "number": "2", "pages": "173--199", "www_section": "Economics", "www_pdf_url": "http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf", "www_tags": "selected", "key": "cheap-pseudonyms"}, {"author": "Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya", "title": "Compact E-Cash", "pages": "302--321", "ee": "http://dx.doi.org/10.1007/11426639_18", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", "editor": "Ronald Cramer", "booktitle": "Proceedings of EUROCRYPT 2005", "publisher": "Springer", "series": "Lecture Notes in Computer Science", "volume": "3494", "month": "May", "year": "2005", "isbn": "3-540-25910-4", "bibsource": "DBLP, http://dblp.uni-trier.de", "key": "chl05-full:eurocrypt2005"}, {"author": "Giuseppe Ciaccio", "title": "Improving Sender Anonymity in a Structured Overlay with Imprecise Routing", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "190--207", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2006/preproc/preproc_11.pdf", "www_tags": "selected", "key": "ciaccio:pet2006"}, {"title": "Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services", "author": "Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas", "year": "2015", "booktitle": "Proceedings of the 24th Usenix Security Symposium", "month": "August", "www_section": "Traffic analysis", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf", "www_tags": "selected", "key": "circuit-fingerprinting2015"}, {"author": "Jan Camenisch and Anna Lysyanskaya", "title": "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", "booktitle": "Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01)", "year": "2001", "isbn": "3-540-42070-3", "pages": "93--118", "publisher": "Springer-Verlag", "location": "London, UK", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf", "key": "cl01a"}, {"title": "{CLAPS}: Client-Location-Aware Path Selection in {T}or", "author": "Florentin Rochet and Ryan Wails and Aaron Johnson and Prateek Mittal and Olivier Pereira", "booktitle": "Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)", "year": "2020", "month": "November", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/claps-ccs2020.pdf", "www_section": "Anonymous communication", "key": "claps-ccs2020"}, {"title": "Freenet: A distributed anonymous information storage and retrieval system. Freenet White Paper", "author": "Clarke, I and Sandberg, O and Wiley, B and Hong, TW", "year": "1999", "howpublished": "white paper", "www_section": "comm", "www_pdf_url": "https://freenetproject.org/papers/ddisrs.pdf", "key": "clarke1999freenet"}, {"title": "Protecting free expression online with Freenet", "author": "Clarke, Ian and Miller, Scott G and Hong, Theodore W and Sandberg, Oskar and Wiley, Brandon", "journal": "Internet Computing, IEEE", "volume": "6", "number": "1", "pages": "40--49", "year": "2002", "publisher": "IEEE", "www_section": "comm", "www_pdf_url": "https://freenetproject.org/papers/freenet-ieee.pdf", "key": "clarke2002protecting"}, {"title": "Private communication through a network of trusted connections: The dark freenet", "author": "Clarke, Ian and Sandberg, Oskar and Toseland, Matthew and Verendel, Vilhelm", "journal": "Network", "year": "2010", "www_section": "comm", "www_pdf_url": "https://freenetproject.org/papers/freenet-0.7.5-paper.pdf", "key": "clarke2010private"}, {"author": "Clau\\ss, Sebastian and Schiffner, Stefan", "title": "Structuring Anonymity Metrics", "booktitle": "Proceedings of the Second ACM Workshop on Digital Identity Management", "series": "DIM '06", "year": "2006", "isbn": "1-59593-547-9", "location": "Alexandria, Virginia, USA", "pages": "55--62", "numpages": "8", "url": "http://doi.acm.org/10.1145/1179529.1179539", "doi": "10.1145/1179529.1179539", "acmid": "1179539", "publisher": "ACM Press", "address": "New York, NY, USA", "keywords": "anonymity metrics, identity management, privacy metrics", "www_section": "Formal methods", "key": "clauss2006sam"}, {"author": "Richard Clayton", "title": "Improving Onion Notation", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "81--87", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/onions.pdf", "key": "clayton:pet2003"}, {"author": "Richard Clayton and Steven J. Murdoch and Robert N. M. Watson", "title": "{Ignoring the Great Firewall of China}", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "20--35", "www_section": "Communications Censorship", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf", "www_tags": "selected", "key": "clayton:pet2006"}, {"author": "Jon McLachlan and Nicholas Hopper", "title": "Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes", "booktitle": "Proceedings of Financial Cryptography (FC '08)", "year": "2008", "month": "January", "www_section": "Anonymous communication", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf", "www_tags": "selected", "key": "clog-the-queue"}, {"author": "Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich", "title": "How to win the clonewars: efficient periodic n-times anonymous authentication", "booktitle": "Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006)", "month": "November", "year": "2006", "isbn": "1-59593-518-5", "pages": "201--210", "location": "Alexandria, Virginia, USA", "doi": "http://doi.acm.org/10.1145/1180405.1180431", "publisher": "ACM Press", "address": "New York, NY, USA", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-812.pdf", "www_section": "E-Cash / Anonymous Credentials", "key": "clonewars"}, {"title": "Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover", "author": "Aaron H. Coble", "pages": "77--98", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Formal methods", "key": "coble-pet2008"}, {"title": "Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis", "author": "Milad Nasr and Amir Houmansadr and Arya Mazumdar", "booktitle": "Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)", "year": "2017", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "http://people.cs.umass.edu/~milad/papers/compress_CCS.pdf", "www_tags": "selected", "key": "compressive-ccs2017"}, {"title": "{Closed-Circuit Unobservable Voice Over IP}", "author": "Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny", "booktitle": "Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA", "publisher": "{IEEE} Computer Society Press", "year": "2007", "www_section": "Anonymous communication", "www_pdf_url": "http://www.acsac.org/2007/papers/110.pdf", "www_tags": "selected", "key": "conf/acsac/ADC07"}, {"title": "Paying the Guard: an Entry-Guard-based Payment System for Tor", "author": "Paolo Palmieri and Johan Pouwelse", "booktitle": "Proceedings of the 19th International Conference on Financial Cryptography and Data Security ({FC} 2015)", "year": "2015", "month": "January", "www_tags": "selected", "www_pdf_url": "http://paolopalmieri.com/pdf/Palmieri_Pouwelse_FC2015.pdf", "www_section": "Economics", "key": "conf/fc/PalmieriP15"}, {"title": "Key Management for Onion Routing in a True Peer to Peer Setting", "author": "Paolo Palmieri and Johan Pouwelse", "booktitle": "Proceedings of the 9th International Workshop on Security ({IWSEC} 2014)", "year": "2014", "month": "August", "www_pdf_url": "http://paolopalmieri.com/pdf/Palmieri_Pouwelse_IWSEC2014.pdf", "www_section": "Anonymous communication", "key": "conf/iwsec/PalmieriP14"}, {"author": "Nathan Evans and Roger Dingledine and Christian Grothoff", "title": "A Practical Congestion Attack on {T}or Using Long Paths", "booktitle": "Proceedings of the 18th USENIX Security Symposium", "year": "2009", "month": "August", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/congestion-longpaths.pdf", "www_tags": "selected", "key": "congestion-longpaths"}, {"author": "Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg", "title": "{Congestion-aware Path Selection for Tor}", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'12)", "year": "2012", "month": "February", "www_tags": "selected", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf", "key": "congestion-tor12"}, {"title": "{ConsenSGX}: Scaling Anonymous Communications Networks with Trusted Execution Environments", "author": "Sajin Sasy and Ian Goldberg", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2019", "number": "3", "year": "2019", "month": "July", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2019/files/papers/issue3/popets-2019-0050.pdf", "www_section": "Anonymous communication", "key": "consensgx-pets2019"}, {"title": "Preserving Privacy in a Network of Mobile Computers", "author": "David A. Cooper and Kenneth P. Birman", "booktitle": "Proceedings of the 1995 IEEE Symposium on Security and Privacy", "year": "1995", "month": "May", "www_section": "Private Information Retrieval", "www_tags": "selected", "www_pdf_url": "http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf", "key": "cooper"}, {"author": "Len Sassaman and Bart Preneel", "title": "{The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers}", "year": "2007", "month": "February", "institution": "Katholieke Universiteit Leuven", "number": "ESAT-COSIC 2007-001", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-880.pdf", "www_section": "Private Information Retrieval", "www_tags": "selected", "key": "cosic-2007-001"}, {"title": "Counter-{RAPTOR}: Safeguarding {T}or Against Active Routing Attacks", "author": "Yixin Sun and Anne Edmundson and Nick Feamster and Mung Chiang and Prateek Mittal", "booktitle": "Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P 2017)", "year": "2017", "month": "May", "location": "San Francisco, California, USA", "publisher": "IEEE Computer Society", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/counter-raptor-sp17.pdf", "key": "counter-raptor"}, {"title": "CovertCast: Using Live Streaming to Evade Internet Censorship", "author": "Richard McPherson and Amir Houmansadr and Vitaly Shmatikov", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "3", "year": "2016", "month": "July", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/2016/files/papers/CovertCast__Using_Live_Streaming_to_Evade_Internet_Censorship.pdf", "www_tags": "selected", "key": "covertcast-pets2016"}, {"author": "Giuseppe Persiano and Ivan Visconti", "title": "An Efficient and Usable Multi-show Non-transferable Anonymous Credential System", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "year": "2004", "month": "February", "editor": "Ari Juels", "publisher": "Springer-Verlag, LNCS 3110", "pages": "196--211", "www_section": "E-Cash / Anonymous Credentials", "key": "credentials-fc2004"}, {"title": "Onions in the Crosshairs: When The Man really is out to get you", "author": "Aaron D. Jaggard and Paul Syverson", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2017)}", "year": "2017", "month": "November", "www_pdf_url": "", "www_tags": "selected", "www_section": "Anonymous communication", "key": "crosshairs-wpes17"}, {"author": "Vitaly Shmatikov", "title": "Probabilistic Model Checking of an Anonymity System", "journal": "Journal of Computer Security", "volume": "12", "number": "3-4", "pages": "355--377", "year": "2004", "www_section": "Formal methods", "www_ps_url": "http://www.csl.sri.com/users/shmat/shmat_crowds.ps", "www_remarks": "Uses formal methods to analyze probabilistic anonymity systems like <a href=\"#crowds:tissec\">Crowds</a>. Confirms that anonymity degrades with a larger crowd: as N grows, the fact that the request came from you becomes more suspicious.", "www_tags": "selected", "key": "crowds-model"}, {"author": "Michael Reiter and Aviel Rubin", "title": "Crowds: Anonymity for Web Transactions", "journal": "ACM Transactions on Information and System Security", "volume": "1", "number": "1", "month": "June", "year": "1998", "www_section": "Anonymous communication", "www_ps_gz_url": "http://avirubin.com/crowds.ps.gz", "www_pdf_url": "http://avirubin.com/crowds.pdf", "www_important": "1", "www_tags": "selected", "key": "crowds:tissec"}, {"author": "Ben Adida and Douglas Wikstr\\\"om", "title": "Obfuscated Ciphertext Mixing", "howpublished": "Cryptology ePrint Archive, Report 2005/394", "year": "2005", "month": "November", "www_section": "Provable shuffles", "www_html_url": "http://eprint.iacr.org/2005/394", "www_pdf_url": "http://eprint.iacr.org/2005/394.pdf", "www_tags": "selected", "key": "cryptoeprint:2005:394"}, {"author": "Alex Biryukov and Ivan Pustogarov", "title": "Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay", "howpublished": "Cryptology ePrint Archive, Report 2014/1011", "year": "2014", "www_pdf_url": "https://eprint.iacr.org/2014/1011.pdf", "www_section": "Economics", "key": "cryptoeprint:2014:1011"}, {"author": "Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg", "title": "No right to remain silent: Isolating Malicious Mixes", "howpublished": "Cryptology ePrint Archive, Report 2017/1000", "year": "2017", "month": "October", "www_section": "Anonymous communication", "www_html_url": "https://eprint.iacr.org/2017/1000", "www_pdf_url": "https://eprint.iacr.org/2017/1000.pdf", "www_tags": "selected", "key": "cryptoeprint:2017:1000"}, {"author": "Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald", "title": "ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation", "booktitle": "Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011)", "year": "2011", "month": "August", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf", "www_tags": "selected", "key": "cset11-experimentor"}, {"author": "Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine", "title": "Methodically Modeling the Tor Network", "booktitle": "Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)", "year": "2012", "month": "August", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "https://www.robgjansen.com/publications/tormodel-cset2012.pdf", "www_tags": "selected", "key": "cset12-modeling"}, {"title": "{Tor}: Hidden Service Scaling", "author": "Sucu, Ceysun", "school": "University College London", "year": "2015", "month": "September", "day": "2", "abstract": "{Tor's hidden services in its current state does not fully utilise multi-core architecture or provide any load balancing options in regards to multi-server systems. This thesis explores possible techniques which could be used in scaling Tor's hidden services horizontally, more precisely looking at possible load balancing techniques and hidden service resiliency. The first section of the thesis will give an detailed overview of Tor and look at relevant scaling and load balancing techniques. The body of the thesis will experiment with possible techniques and evaluate them. Finally I will indicate the aim of this research and possible future directions.}", "url": "https://github.com/csucu/Tor-Hidden-Service-Scaling", "www_abstract_url": "https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/", "www_pdf_url": "https://raw.githubusercontent.com/csucu/Tor-Hidden-Service-Scaling/master/Ceysun%20Sucu%20-%20Hidden%20Service%20Scaling.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "csucu2015"}, {"author": "Andreas Pashalidis and Bernd Meyer", "title": "Linking Anonymous Transactions: The Consistent View Attack", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "384--392", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2006/preproc/preproc_22.pdf", "www_tags": "selected", "key": "cview:pet2006"}, {"author": "George Danezis and Claudia Diaz and Carmela Troncoso", "title": "Two-Sided Statistical Disclosure Attack", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf", "www_tags": "selected", "www_remarks": "Extends the Statistical Disclosure attack to take advantage of reply messages.", "key": "danezis-pet2007"}, {"title": "Bridging and Fingerprinting: Epistemic Attacks on Route Selection", "author": "George Danezis and Paul Syverson", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "pages": "133--150", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/bridge.pdf", "www_important": "1", "key": "danezis-pet2008"}, {"title": "{Route Fingerprinting in Anonymous Communications}", "author": "George Danezis and Richard Clayton", "journal": "Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing", "pages": "69--72", "year": "2006", "publisher": "IEEE Computer Society Washington, DC, USA", "www_section": "mixattacks", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf", "key": "danezis2006rfa"}, {"author": "George Danezis", "title": "Mix-networks with Restricted Routes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "1--17", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf", "www_important": "1", "www_tags": "selected", "key": "danezis:pet2003"}, {"author": "George Danezis", "title": "The Traffic Analysis of Continuous-Time Mixes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "35--50", "www_section": "Traffic analysis", "www_important": "1", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf", "www_tags": "selected", "key": "danezis:pet2004"}, {"title": "The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications", "author": "George Danezis and Bettina Wittneben", "www_section": "Traffic analysis", "www_important": "1", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-788.pdf", "www_tags": "selected", "editor": "Ross Anderson", "booktitle": "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", "month": "June", "year": "2006", "location": "Cambridge, UK", "bookurl": "http://weis2006.econinfosec.org/", "key": "danezis:weis2006"}, {"author": "George Danezis and Len Sassaman", "title": "Heartbeat Traffic to Counter (n-1) Attacks", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "location": "Washington, DC, USA", "month": "October", "year": "2003", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf", "www_remarks": "Mix nodes should send out \"heartbeat\" messages (dummies that start and end at that node). By measuring how many return in a given time, they can detect whether the adversary is dropping or delaying traffic coming into them (possibly so he can launch an active blending attack).", "www_tags": "selected", "key": "danezis:wpes2003"}, {"author": "George Danezis and Ben Laurie", "title": "Minx: A simple and efficient anonymous packet format", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "location": "Washington, DC, USA", "month": "October", "year": "2004", "www_section": "Anonymous communication", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/minx.pdf", "www_tags": "selected", "key": "danezis:wpes2004"}, {"author": "Norman Danner and Sam DeFabbia-Kane and Danny Krizanc and Marc Liberatore", "doi": "10.1145/2382448.2382449", "journal": "Transactions on Information and System Security", "keywords": "anonymity", "number": "3", "pages": "11:1--11:25", "title": "Effectiveness and detection of denial of service attacks in {Tor}", "volume": "15", "year": "2012", "www_tags": "selected", "www_pdf_url": "https://dl.acm.org/doi/epdf/10.1145/2382448.2382449", "www_section": "Anonymous communication", "key": "danner-et-al:tissec12"}, {"author": "Anupam Das and Nikita Borisov", "title": "Securing Anonymous Communication Channels under the Selective DoS Attack", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'13)", "year": "2013", "month": "April", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "https://www.ifca.ai/pub/fc13/78590356.pdf", "key": "das-securing-fc13"}, {"title": "Data-plane Defenses against Routing Attacks on Tor", "author": "Henry Tan and Micah Sherr and Wenchao Zhou", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Data-plane_Defenses_against_Routing_Attacks_on_Tor.pdf", "www_tags": "selected", "key": "dataplane-pets2016"}, {"title": "The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks", "author": "Milad Nasr and Hadi Zolfaghari and Amir Houmansadr", "booktitle": "Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)", "year": "2017", "month": "November", "www_section": "Communications Censorship", "www_pdf_url": "https://people.cs.umass.edu/~amir/papers/CCS17-Waterfall.pdf", "www_tags": "selected", "key": "decoy-ccs2017"}, {"title": "Secure asymmetry and deployability for decoy routing systems", "author": "Cecylia Bocovich and Ian Goldberg", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2018", "number": "3", "year": "2018", "month": "June", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2018/files/papers/issue3/popets-2018-0020.pdf", "www_section": "Communications Censorship", "key": "decoy-pets2018"}, {"title": "GAME OF DECOYS: Optimal Decoy Routing Through Game Theory", "author": "Milad Nasr and Amir Houmansadr", "booktitle": "Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf", "www_tags": "selected", "key": "decoys-ccs2016"}, {"title": "{DeepCorr}: Strong Flow Correlation Attacks on Tor Using Deep Learning", "author": "Milad Nasr and Alireza Bahramali and Amir Houmansadr", "booktitle": "Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18)", "year": "2018", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf", "www_tags": "selected", "key": "deepcorr-ccs2018"}, {"title": "Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning", "author": "Payap Sirinam and Mohsen Imani and Marc Juarez and Matthew Wright", "booktitle": "Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18)", "year": "2018", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "https://homes.esat.kuleuven.be/~mjuarezm/index_files/pdf/ccs18.pdf", "www_tags": "selected", "key": "deepwf-ccs2018"}, {"title": "Automated Website Fingerprinting through Deep Learning", "author": "Vera Rimmer and Davy Preuveneers and Marc Juarez and Tom Van Goethem and Wouter Joosen", "booktitle": "Proceedings of the 25th Symposium on Network and Distributed System Security ({NDSS} '18)", "year": "2018", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/ndss2018_03A-1_Rimmer_paper.pdf", "www_tags": "selected", "key": "deepwf-ndss2018"}, {"title": "Censors' Delay in Blocking Circumvention Proxies", "author": "David Fifield and Lynn Tsai", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet", "year": "2016", "month": "August", "series": "FOCI '16", "location": "Austin, TX, USA", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf", "key": "delay-foci16"}, {"title": "L'{\\'e}mergence au sein d'internet de communaut{\\'e}s virtuelles et anonymes, Freenet et i2p", "author": "Laurie Delmer", "school": "Universit{\\'e} catholique de Louvain - D{\\'e}partement des sciences politiques et sociales", "year": "2009", "note": "Title : The rise in internet virtual and anonymous communities, Freenet and I2P. School: Catholic University of Leuven - Department of Political and Social Science", "www_section": "Anonymous communication", "key": "delmer-mthesis"}, {"author": "Thomas Demuth", "title": "A Passive Attack on the Privacy of Web Users Using Standard Log Information", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Anonymous communication", "www_pdf_url": "http://demuth.biz/veroeffentlichungen/pet02.pdf", "www_tags": "selected", "key": "demuth:pet2002"}, {"title": "DeNASA: Destination-Naive AS-Awareness in Anonymous Communications", "author": "Armon Barton and Matthew Wright", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2016/files/papers/DeNASA__Destination-Naive_AS-Awareness_in_Anonymous_Communications.pdf", "www_tags": "selected", "key": "denasa-pets2016"}, {"title": "{Measuring anonymity with relative entropy}", "author": "Y. Deng and J. Pang and P. Wu", "journal": "Proc. of FAST", "year": "2006", "www_section": "Formal methods", "key": "deng2006mar"}, {"author": "Yvo Desmedt and Kaoru Kurosawa", "title": "How To Break a Practical {MIX} and Design a New One", "booktitle": "Proceedings of {EUROCRYPT} 2000", "year": "2000", "publisher": "Springer-Verlag, LNCS 1803", "www_section": "Provable shuffles", "www_html_url": "http://citeseer.nj.nec.com/447709.html", "www_tags": "selected", "key": "desmedt"}, {"title": "Leaving Timing Channel Fingerprints in Hidden Service Log Files", "author": "Bilal Shebaro and Fernando Perez-Gonzalez and Jedidiah R. Crandall", "journal": "Digital Investigation", "month": "August", "pages": "104--113", "volume": "7", "year": "2010", "www_section": "Traffic analysis", "www_pdf_url": "https://www.cs.unm.edu/~treport/tr/10-03/paper-2010-07.pdf", "key": "dfrws2010-timingchannel"}, {"author": "Claudia Diaz and Carmela Troncoso and Bart Preneel", "title": "A Framework for the Analysis of Mix-Based Steganographic File Systems", "year": "2008", "month": "October", "booktitle": "Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)", "editor": "Sushil Jajodia and J. Lopez", "volume": "LNCS (in print)", "number": "", "series": "Lecture Notes in Computer Science", "location": "Malaga,ES", "publisher": "Springer-Verlag", "www_section": "Misc", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf", "key": "diaz-esorics2008"}, {"title": "On the Impact of Social Network Profiling on Anonymity", "author": "Claudia Diaz and Carmela Troncoso and Andrei Serjantov", "pages": "44--62", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Traffic analysis", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf", "www_tags": "selected", "key": "diaz-pet2008"}, {"author": "Claudia Diaz and Carmela Troncoso and George Danezis", "title": "Does additional information always reduce anonymity?", "year": "2007", "month": "October", "pages": "72--75", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society 2007", "editor": "Ting Yu", "volume": "", "number": "", "series": "", "location": "Alexandria,VA,USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-925.pdf", "www_section": "Traffic analysis", "key": "diaz-wpes2007"}, {"author": "Claudia Diaz and Andrei Serjantov", "title": "Generalising Mixes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "18--31", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz", "www_important": "1", "www_tags": "selected", "key": "diaz:pet2003"}, {"title": "Do You See What I See? Differential Treatment of Anonymous Users", "author": "Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '16", "year": "2016", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/blogs-media/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf", "www_tags": "selected", "key": "differential-ndss2016"}, {"title": "Attacking and Improving the Tor Directory Protocol", "author": "Zhongtang Luo and Adithya Bhat and Kartik Nayak and Aniket Kate", "booktitle": "Proceedings of the 45th IEEE Symposium on Security and Privacy", "year": "2024", "month": "May", "www_section": "comms", "www_tags": "selected", "www_pdf_url": "https://zhtluo.com/paper/Attacking_and_Improving_the_Tor_Directory_Protocol.pdf", "key": "directory-oakland2024"}, {"author": "Oliver Berthold and Andreas Pfitzmann and Ronny Standtke", "title": "The disadvantages of free {MIX} routes and how to overcome them", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "pages": "30--45", "month": "July", "year": "2000", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "www_section": "Traffic analysis", "www_pdf_url": "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", "www_tags": "selected", "key": "disad-free-routes"}, {"author": "Michael Waidner and Birgit Pfitzmann", "title": "The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability", "booktitle": "Proceedings of {EUROCRYPT} 1989", "year": "1990", "publisher": "Springer-Verlag, LNCS 434", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz", "www_tags": "selected", "key": "disco"}, {"title": "Dissecting Tor Bridges: a Security Evaluation of their Private and Public Infrastructures", "author": "Srdjan Matic and Carmela Troncoso and Juan Caballero", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '17", "year": "2017", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/ndss2017_06B-1_Matic_paper.pdf", "www_tags": "selected", "key": "dissecting-ndss2017"}, {"title": "Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory", "author": "Milad Nasr and Sadegh Farhang and Amir Houmansadr and Jens Grossklags", "booktitle": "Proceedings of the 26th Symposium on Network and Distributed System Security ({NDSS} '19)", "year": "2019", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship,Economics", "www_pdf_url": "https://freehaven.net/anonbib/papers/ndss2019_11-2_Nasr_paper.pdf", "www_tags": "selected", "key": "distribution-ndss2019"}, {"title": "The Effect of DNS on Tor's Anonymity", "author": "Benjamin Greschbach and Tobias Pulls and Laura M. Roberts and Philipp Winter and Nick Feamster", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '17", "year": "2017", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/ndss2017_06B-2_Greschbach_paper.pdf", "www_tags": "selected", "key": "dnstor-ndss2017"}, {"title": "Encrypted DNS -> Privacy? A Traffic Analysis Perspective", "author": "Sandra Siby and Marc Juarez and Claudia Diaz and Narseo Vallina-Rodriguez and Carmela Troncoso", "booktitle": "Proceedings of the 27th Symposium on Network and Distributed System Security ({NDSS} '20)", "year": "2020", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/doh-ndss2020.pdf", "www_tags": "selected", "key": "doh-ndss2020"}, {"author": "Nikita Borisov and George Danezis and Ian Goldberg", "title": "DP5: A Private Presence Service", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2015", "month": "June", "volume": "2015", "number": "2", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2015/papers/14_Borisov.pdf", "www_tags": "selected", "key": "dp5-pets2015"}, {"title": "DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor", "author": "Hans Hanley and Yixin Sun and Sameer Wagh and Prateek Mittal", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2019", "number": "2", "year": "2019", "month": "April", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2019/files/papers/issue2/popets-2019-0025.pdf", "www_section": "Anonymous communication", "key": "dpselect-pets2019"}, {"title": "Drac: An Architecture for Anonymous Low-Volume Communications", "author": "George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "year": "2010", "month": "July", "location": "Berlin, Germany", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf", "www_section": "Anonymous communication", "key": "drac-pet2010"}, {"title": "Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols", "author": "Florentin Rochet and Olivier Pereira", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2018", "number": "2", "year": "2018", "month": "April", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2018/files/papers/issue2/popets-2018-0011.pdf", "www_section": "Traffic analysis", "key": "dropping-pets2018"}, {"title": "On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks", "address": "Lisbon", "author": "Jing Jin and Xinyuan Wang", "pages": "429--438", "booktitle": "Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks", "year": "2009", "month": "July", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf", "key": "dsn-09-jing"}, {"title": "{Tokens for Anonymous Communications in the Internet}", "author": "A. Durresi and V. Paruchuri and L. Barolli and R. Jain and M. Takizawa", "journal": "Proceedings of the 17th International Conference on Database and Expert Systems Applications", "pages": "83--90", "year": "2006", "publisher": "IEEE Computer Society Washington, DC, USA", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf", "key": "durresi2006tac"}, {"author": "Nick Mathewson and Roger Dingledine", "title": "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "17--34", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf", "www_important": "1", "www_tags": "selected", "key": "e2e-traffic"}, {"author": "Christian Grothoff", "title": "{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}", "journal": "Wirtschaftsinformatik", "publisher": "Springer-Verlag", "year": "2003", "month": "June", "www_section": "Economics", "www_ps_url": "http://www.ovmj.org/GNUnet/download/ebe.ps", "www_tags": "selected", "key": "ebe2003"}, {"author": "Alessandro Acquisti and Roger Dingledine and Paul Syverson", "title": "{On the Economics of Anonymity}", "booktitle": "Proceedings of Financial Cryptography (FC '03)", "year": "2003", "month": "January", "editor": "Rebecca N. Wright", "publisher": "Springer-Verlag, LNCS 2742", "www_section": "Economics", "www_pdf_url": "https://freehaven.net/doc/fc03/econymics.pdf", "www_important": "1", "www_tags": "selected", "key": "econymics"}, {"author": "Matthew Edman and B\\\"{u}lent Yener", "title": "On anonymity in an electronic society: A survey of anonymous communication systems", "journal": "ACM Computing Surveys", "volume": "42", "number": "1", "year": "2009", "issn": "0360-0300", "pages": "1--35", "doi": "http://doi.acm.org/10.1145/1592451.1592456", "publisher": "ACM", "address": "New York, NY, USA", "www_section": "Misc", "www_tags": "selected", "www_pdf_url": "http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf", "key": "edman2009survey"}, {"title": "Practical Attacks Against the I2P Network", "author": "Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna", "booktitle": "Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)", "year": "2013", "month": "October", "www_pdf_url": "http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf", "www_section": "Traffic analysis", "key": "egger2013:practical-attacks"}, {"title": "I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison", "author": "Mathias Ehlert", "institution": "Humboldt University of Berlin", "howpublished": "Seminar", "year": "2011", "month": "November", "www_pdf_url": "http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf", "www_section": "Anonymous communication", "key": "ehlert2011:usability-comparison-i2p-tor"}, {"title": "EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation", "author": "Robin Snader and Nikita Borisov", "booktitle": "Proceedings of the 8th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS09})", "location": "Boston, MA", "month": "April", "year": "2009", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "eigenspeed"}, {"author": "Paul Syverson", "title": "Why {I'm} not an Entropist", "booktitle": "Proceedings of Security Protocols XVII: 17th International Workshop, April 2009, Revised Selected Papers", "pages": "231--239", "editor": "Bruce Christianson and James A. Malcolm and Vashek Maty\\'{a}\\v{s} and Michael Roe", "year": "2013", "www_section": "Traffic analysis", "www_pdf_url": "http://www.syverson.org/entropist-final.pdf", "publisher": "Springer-Verlag, LNCS 7028", "www_tags": "selected", "key": "entropist"}, {"author": "Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna Lysyanskaya and Mira Meyerovich and Eric Rachlin", "title": "Making P2P Accountable without Losing Privacy", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "location": "Washington, DC, USA", "month": "October", "year": "2007", "www_section": "Economics", "www_pdf_url": "http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf", "key": "erway:wpes2007"}, {"title": "A formalization of anonymity and onion routing", "author": "S. Mauw and J. Verschuren and E.P. de Vink", "publisher": "LNCS 3193", "www_pdf_url": "http://www.win.tue.nl/~ecss/downloads/esorics04.pdf", "booktitle": "Proceedings of ESORICS 2004", "editor": "P. Samarati and P. Ryan and D. Gollmann and R. Molva", "location": "Sophia Antipolis", "year": "2004", "pages": "109--124", "www_section": "Formal methods", "www_tags": "selected", "key": "esorics04-mauw"}, {"title": "Local View Attack on Anonymous Communication", "author": "Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of ESORICS 2005", "year": "2005", "month": "September", "www_ps_url": "http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps", "www_section": "Traffic analysis", "www_tags": "selected", "key": "esorics05-Klonowski"}, {"title": "Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation", "author": "Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'10", "year": "2010", "month": "September", "publisher": "Springer", "www_pdf_url": "http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf", "www_tags": "selected", "www_section": "Traffic analysis", "key": "esorics10-bandwidth"}, {"title": "{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks", "author": "Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'12", "year": "2012", "month": "September", "publisher": "Springer", "www_pdf_url": "https://freehaven.net/anonbib/papers/torscan-esorics2012.pdf", "www_tags": "selected", "www_section": "Traffic analysis", "key": "esorics12-torscan"}, {"title": "{CellFlood}: Attacking {T}or Onion Routers on the Cheap", "author": "Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos Keromytis", "booktitle": "Proceedings of ESORICS 2013", "year": "2013", "month": "September", "www_pdf_url": "http://www.cs.columbia.edu/~vpk/papers/cellflood.esorics13.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "esorics13-cellflood"}, {"title": "Plug-and-Play {IP} Security: Anonymity Infrastructure Instead of {PKI}", "author": "Yossi Gilad and Amir Herzberg", "booktitle": "Proceedings of ESORICS 2013", "year": "2013", "month": "September", "www_pdf_url": "http://eprint.iacr.org/2013/410.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "esorics13-infra"}, {"title": "Characterizing the Nature and Dynamics of Tor Exit Blocking", "author": "Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael Carl Tschantz and Phillipa Gill and Vern Paxson", "booktitle": "Proceedings of the 26th Usenix Security Symposium", "month": "August", "year": "2017", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-singh.pdf", "www_tags": "selected", "key": "exit-blocking2017"}, {"title": "Bypassing {T}or Exit Blocking with Exit Bridge Onion Services", "author": "Zhao Zhang and Wenchao Zhou and Micah Sherr", "booktitle": "Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)", "year": "2020", "month": "November", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/exit-bridge-onion-services.pdf", "www_section": "Communications Censorship", "key": "exit-bridge-onion-services"}, {"author": "Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak", "title": "Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search", "booktitle": "Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf", "www_section": "Communications Censorship", "key": "facade-foci"}, {"author": "Peter Fairbrother", "title": "An Improved Construction for Universal Re-encryption", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "79--87", "www_section": "Anonymous communication", "www_pdf_url": "http://www.m-o-o-t.org/ICUR.pdf", "www_tags": "selected", "key": "fairbrother:pet2004"}, {"title": "An efficient privacy-preserving scheme against traffic analysis attacks in network coding", "author": "Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Shen, Xuemin", "booktitle": "Proceedings of the 28th Annual IEEE Conference on Computer Communications (INFOCOM 2009)", "pages": "2213--2221", "year": "2009", "organization": "IEEE", "www_pdf_url": "http://adhoc-security.googlecode.com/svn/trunk/Research/Research%20Papers/Network%20Coding/An%20Efficient%20Privacy%20Traffic%20Analysis%20Attacks%20in%20Network%20Coding.pdf", "www_section": "Misc", "key": "fan2009efficient"}, {"title": "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks", "author": "Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Chen, Jiming and Shen, Xuemin", "journal": "IEEE Transactions on Wireless Communications", "volume": "10", "number": "3", "pages": "834--843", "year": "2011", "publisher": "IEEE", "www_pdf_url": "http://bbcr.uwaterloo.ca/papers/FJZCS11.pdf", "www_section": "Misc", "key": "fan2011network"}, {"author": "Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and Bart Preneel", "title": "Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf", "key": "faust-pet2007"}, {"author": "Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger", "title": "{Thwarting Web Censorship with Untrusted Messenger Delivery}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "125--140", "www_section": "Communications Censorship", "www_pdf_url": "http://nms.lcs.mit.edu/papers/disc-pet2003.pdf", "www_tags": "selected", "key": "feamster:pet2003"}, {"author": "Nick Feamster and Roger Dingledine", "title": "Location Diversity in Anonymity Networks", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "location": "Washington, DC, USA", "month": "October", "year": "2004", "www_section": "Anonymous communication", "www_ps_url": "https://freehaven.net/doc/routing-zones/routing-zones.ps", "www_tags": "selected", "key": "feamster:wpes2004"}, {"author": "Joan Feigenbaum and Aaron Johnson and Paul Syverson", "title": "A Probabilistic Analysis of Onion Routing in a Black-box Model", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "location": "Washington, DC, USA", "month": "October", "year": "2007", "www_section": "Provable shuffles", "www_pdf_url": "http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf", "key": "feigenbaum:wpes2007"}, {"title": "Blocking-resistant communication through domain fronting", "author": "David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2015", "number": "2", "pages": "46--64", "year": "2015", "www_section": "Communications Censorship", "www_pdf_url": "https://www.bamsoftware.com/papers/fronting.pdf", "www_html_url": "https://www.bamsoftware.com/papers/fronting/", "www_tags": "selected", "key": "fifield2015fronting"}, {"title": "{POSTER}: Traffic Splitting to Counter Website Fingerprinting", "author": "Wladimir De la Cadena and Asya Mitseva and Jan Pennekamp and Jens Hiller and Fabian Lanze and Thomas Engel and Klaus Wehrle and Andriy Panchenko", "booktitle": "Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS '19)", "year": "2019", "month": "November", "www_pdf_url": "https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-delacadena-splitting-defense.pdf", "www_section": "Anonymous communication", "key": "fingerprinting-defense-ccs2019"}, {"title": "Toward an Efficient Website Fingerprinting Defense", "author": "Marc Juarez and Mohsen Imani and Mike Perry and Claudia Diaz and Matthew Wright", "booktitle": "Proceedings of ESORICS 2016", "year": "2016", "month": "September", "www_pdf_url": "https://homes.esat.kuleuven.be/~mjuarezm/index_files/pdf/esorics16.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "fingerprinting-esorics2016"}, {"title": "Website Fingerprinting at Internet Scale", "author": "Andriy Panchenko and Fabian Lanze and Jan Pennekamp and Thomas Engel and Andreas Zinnen and Martin Henze and Klaus Wehrle", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '16", "year": "2016", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/blogs-media/website-fingerprinting-internet-scale.pdf", "www_tags": "selected", "key": "fingerprinting-ndss2016"}, {"title": "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", "author": "Meng Shen and Kexin Ji and Jinhe Wu and Qi Li and Xiangdong Kong and Ke Xu and Liehuang Zhu", "booktitle": "Proceedings of the 45th IEEE Symposium on Security and Privacy", "year": "2024", "month": "May", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "https://raw.githubusercontent.com/kxdkxd/Palette/main/paper.pdf", "key": "fingerprinting-oakland2024"}, {"title": "Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes", "author": "Diwen Xue and Michalis Kallitsis and Amir Houmansadr and Roya Ensafi", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-xue-fingerprinting.pdf", "www_tags": "selected", "key": "fingerprinting-sec2024"}, {"title": "Analysis of Fingerprinting Techniques for Tor Hidden Services", "author": "Andriy Panchenko and Asya Mitseva and Martin Henze and Fabian Lanze and Klaus Wehrle and Thomas Engel", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2017)}", "year": "2017", "month": "November", "www_pdf_url": "https://lorre.uni.lu/~andriy/papers/acmccs-wpes17-hidden-services-fp.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "fingerprinting-wpes17"}, {"author": "Ian Goldberg", "title": "{Privacy-enhancing technologies for the Internet, II: Five years later}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Misc", "www_pdf_url": "https://freehaven.net/anonbib/papers/petfive.pdf", "www_ps_url": "https://freehaven.net/anonbib/papers/petfive.ps", "www_tags": "selected", "key": "fiveyearslater"}, {"author": "Markus Jakobsson", "title": "Flash {M}ixing", "booktitle": "Proceedings of Principles of Distributed Computing - {PODC} '99", "year": "1999", "publisher": "ACM Press", "www_section": "Provable shuffles", "www_pdf_url": "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf", "www_important": "1", "www_tags": "selected", "key": "flash-mix"}, {"title": "FlashFlow: A Secure Speed Test for Tor", "author": "Matthew Traudt and Rob Jansen and Aaron Johnson", "booktitle": "Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS)", "year": "2021", "pages": "381--391", "www_section": "Anonymous communication", "www_pdf_url": "https://www.robgjansen.com/publications/flashflow-icdcs2021.pdf", "www_tags": "selected", "key": "flashflow-icdcs2021"}, {"title": "Evading Censorship with Browser-Based Proxies", "author": "David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "month": "July", "year": "2012", "publisher": "Springer", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://crypto.stanford.edu/flashproxy/flashproxy.pdf", "key": "flashproxy-pets12"}, {"author": "Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "title": "On Flow Correlation Attacks and Countermeasures in Mix Networks", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "207--225", "www_section": "Traffic analysis", "www_pdf_url": "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf", "www_tags": "selected", "key": "flow-correlation04"}, {"author": "Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman", "title": "Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)", "year": "2011", "month": "August", "www_section": "Anonymous communication", "www_pdf_url": "http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf", "key": "foci11-clouds"}, {"author": "Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer", "title": "Decoy Routing: Toward Unblockable Internet Communication", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)", "year": "2011", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf", "www_tags": "selected", "key": "foci11-decoy"}, {"author": "Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh", "title": "Bootstrapping Communications into an Anti-Censorship System", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)", "year": "2012", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf", "www_tags": "selected", "key": "foci12-defiance"}, {"author": "Philipp Winter and Stefan Lindskog", "title": "{How the Great Firewall of China is blocking Tor}", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)", "year": "2012", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf", "www_tags": "selected", "key": "foci12-winter"}, {"title": "A case study on DDoS attacks against Tor relays", "author": "Tobias H{\\\"o}ller and Ren\\'e Mayrhofer", "booktitle": "Proceedings of Free and Open Communications on the Internet (FOCI 2024)", "month": "July", "year": "2024", "www_section": "Anonymous communication", "www_pdf_url": "https://www.petsymposium.org/foci/2024/foci-2024-0014.pdf", "www_tags": "selected", "key": "foci24-ddos"}, {"title": "Efficient Private Techniques for Verifying Social Proximity", "author": "Michael J. Freedman and Antonio Nicolosi", "booktitle": "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", "location": "Bellevue, WA", "month": "February", "year": "2007", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf", "www_section": "Misc", "key": "fof:iptps07"}, {"title": "Fingerprinting web users through font metrics", "author": "David Fifield and Serge Egelman", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'15)", "year": "2015", "month": "February", "www_section": "Traffic analysis", "www_pdf_url": "http://fc15.ifca.ai/preproceedings/paper_83.pdf", "key": "fontmetrics-fc14"}, {"author": "Matthias Franz and Bernd Meyer and Andreas Pashalidis", "title": "Attacking Unlinkability: The Importance of Context", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Formal methods", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf", "key": "franz-pet2007"}, {"author": "Philippe Boucher and Adam Shostack and Ian Goldberg", "title": "Freedom Systems 2.0 Architecture", "year": "2000", "month": "December", "day": "18", "type": "White Paper", "institution": "Zero Knowledge Systems, {Inc.}", "www_section": "Anonymous communication", "www_pdf_url": "http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf", "www_tags": "selected", "key": "freedom2-arch"}, {"author": "Adam Back and Ian Goldberg and Adam Shostack", "title": "Freedom Systems 2.1 Security Issues and Analysis", "year": "2001", "month": "May", "day": "3", "type": "White Paper", "institution": "Zero Knowledge Systems, {Inc.}", "www_section": "Anonymous communication", "www_pdf_url": "http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf", "www_tags": "selected", "key": "freedom21-security"}, {"author": "Roger Dingledine and Michael J. Freedman and David Molnar", "title": "The Free Haven Project: Distributed Anonymous Storage Service", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "year": "2000", "month": "July", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "www_section": "Anonymous publication", "www_ps_url": "https://freehaven.net/doc/berk/freehaven-berk.ps", "www_important": "1", "www_tags": "selected", "key": "freehaven-berk"}, {"author": "Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong", "title": "Freenet: {A} Distributed Anonymous Information Storage and Retrieval System", "pages": "46--66", "year": "2000", "month": "July", "url": "http://dx.doi.org/10.1007/3-540-44702-4_4", "doi": "10.1007/3-540-44702-4_4", "isbn": "978-3-540-41724-8", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "publisher": "Springer-Verlag, LNCS 2009", "volume": "2009", "series": "Lecture Notes in Computer Science", "editor": "H. Federrath", "www_section": "Anonymous publication", "www_pdf_url": "http://www.facweb.iitkgp.ernet.in/~niloy/COURSE/Autumn2010/UC/Resource/freenet1-big.pdf", "www_tags": "selected", "key": "freenet"}, {"title": "Detecting Probe-resistant Proxies", "author": "Sergey Frolov and Jack Wampler and Eric Wustrow", "booktitle": "Proceedings of the 27th Symposium on Network and Distributed System Security ({NDSS} '20)", "year": "2020", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/frolov-ndss2020.pdf", "www_tags": "selected", "key": "frolov-ndss2020"}, {"author": "Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton", "title": "LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes", "booktitle": "Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/usenix2014-fte.pdf", "key": "fte-usenix14"}, {"author": "Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "title": "Active Traffic Analysis Attacks and Countermeasures", "booktitle": "Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing", "year": "2003", "pages": "31--39", "www_section": "Traffic analysis", "www_pdf_url": "http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf", "www_tags": "selected", "key": "fu-active"}, {"author": "Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "title": "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks", "booktitle": "Proceedings of the 2003 International Conference on Parallel Processing", "year": "2003", "pages": "483--492", "www_section": "Traffic analysis", "www_pdf_url": "http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf", "www_tags": "selected", "key": "fu-analytical"}, {"title": "Decentralized Anonymous Credentials", "author": "Christina Garman and Matthew Green and Ian Miers", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '14", "year": "2014", "month": "February", "publisher": "Internet Society", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.internetsociety.org/sites/default/files/07_3_1.pdf", "www_tags": "selected", "key": "garmandecentralized"}, {"title": "On the Challenges of Geographical Avoidance for Tor", "author": "Katharina Kohls and Kai Jansen and David Rupprecht and Thorsten Holz and Christina P\\\"opper", "booktitle": "Proceedings of the 26th Symposium on Network and Distributed System Security ({NDSS} '19)", "year": "2019", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/ndss2019_03B-2-2_Kohls_paper.pdf", "www_tags": "selected", "key": "geoavoidance-ndss2019"}, {"author": "George Danezis", "title": "Better Anonymous Communications", "school": "University of Cambridge", "year": "2004", "month": "July", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/thesis.pdf", "www_tags": "selected", "key": "george-thesis"}, {"author": "Anonymous", "title": "Towards a Comprehensive Picture of the Great Firewall's {DNS} Censorship", "booktitle": "Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "www_tags": "selected", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf", "www_section": "Communications Censorship", "publisher": "USENIX Association", "key": "gfw-foci14"}, {"author": "Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu", "title": "{Efficient Sharing of Encrypted Data}", "booktitle": "{Proceedings of ASCIP 2002}", "publisher": "Springer-Verlag", "pages": "107--120", "www_ps_url": "http://www.ovmj.org/GNUnet/download/esed.ps", "www_section": "Anonymous publication", "year": "2002", "month": "July", "www_tags": "selected", "key": "gnunetencoding"}, {"title": "{Improving the Robustness of Private Information Retrieval}", "author": "Ian Goldberg", "booktitle": "Proceedings of the 2007 IEEE Symposium on Security and Privacy", "year": "2007", "month": "May", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf", "www_section": "Private Information Retrieval", "key": "goldberg-2007"}, {"author": "Ian Goldberg and David Wagner and Eric Brewer", "title": "Privacy-enhancing Technologies for the Internet", "booktitle": "Proceedings of the 42nd IEEE Spring COMPCON", "year": "1997", "month": "February", "publisher": "IEEE Computer Society Press", "isbn": "0-8186-7804-6", "www_section": "Misc", "www_ps_url": "http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps", "www_tags": "selected", "key": "goldberg97privacyenhancing"}, {"author": "Philippe Golle and Ari Juels", "title": "Parallel Mixing", "booktitle": "{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}", "year": "2004", "month": "October", "publisher": "ACM Press", "www_section": "Anonymous communication", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/parallel.pdf", "www_ps_url": "http://crypto.stanford.edu/~pgolle/papers/parallel.ps", "www_tags": "selected", "key": "golle:ccs2004"}, {"author": "Philippe Golle and Ari Juels", "title": "Dining Cryptographers Revisited", "booktitle": "Proceedings of Eurocrypt 2004", "year": "2004", "month": "May", "www_section": "Anonymous communication", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/nim.pdf", "www_tags": "selected", "key": "golle:eurocrypt2004"}, {"author": "Philippe Golle", "title": "Reputable Mix Networks", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "51--63", "www_section": "Provable shuffles", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/reputable.pdf", "www_tags": "selected", "key": "golle:pet2004"}, {"title": "The Devil's in The Details: Placing Decoy Routers in the Internet", "author": "Gosain, Devashish and Agarwal, Anshika and Chakravarty, Sambuddho and Acharya, HB", "booktitle": "Proceedings of the 33rd Annual Computer Security Applications Conference", "pages": "577--589", "year": "2017", "organization": "ACM", "www_section": "Traffic analysis", "www_pdf_url": "https://arxiv.org/pdf/1710.05527.pdf", "key": "gosain2017devil"}, {"title": "Mending wall: On the implementation of censorship in india", "author": "Gosain, Devashish and Agarwal, Anshika and Shekhawat, Sahil and Acharya, HB and Chakravarty, Sambuddho", "booktitle": "Proceedings of the International Conference on Security and Privacy in Communication Systems", "pages": "418--437", "year": "2017", "organization": "Springer", "www_section": "Communications Censorship", "www_pdf_url": "https://arxiv.org/pdf/1806.06518.pdf", "key": "gosain2017mending"}, {"title": "$\\{$MIMIQ$\\}$: Masking IPs with Migration in $\\{$QUIC$\\}$", "author": "Govil, Yashodhar and Wang, Liang and Rexford, Jennifer", "booktitle": "Proceedings of the 10th $\\{$USENIX$\\}$ Workshop on Free and Open Communications on the Internet ($\\{$FOCI$\\}$ 20)", "year": "2020", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/foci20-paper-govil.pdf", "key": "govil2020mimiq"}, {"author": "Jamie Hayes and George Danezis", "title": "Guard Sets for Onion Routing", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2015", "month": "June", "volume": "2015", "number": "2", "pages": "65--80", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2015/papers/05_Hayes.pdf", "www_tags": "selected", "key": "guardsets-pets2015"}, {"title": "Guard Sets in Tor using AS Relationships", "author": "Mohsen Imani and Armon Barton and Matthew Wright", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2018", "number": "1", "year": "2018", "month": "January", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2018/files/papers/issue1/paper44-2018-1-source.pdf", "www_section": "Anonymous communication", "key": "guardsets-pets2018"}, {"author": "Saikat Guha and Paul Francis", "title": "Identity Trail: Covert Surveillance Using DNS", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Identity_trail.pdf", "key": "guha-pet2007"}, {"title": "Protecting Privacy Against Structural De-anonymization Attacks in Social Networks", "author": "G{\\'a}bor Gy{\\\"o}rgy Guly{\\'a}s", "school": "CrySyS Lab, Budapest University of Technology and Economics", "year": "2015", "month": "May", "www_section": "Misc", "www_pdf_url": "http://www.omikk.bme.hu/collections/phd/Villamosmernoki_es_Informatikai_Kar/2015/Gulyas_Gabor_Gyorgy/ertekezes.pdf", "key": "gulyas-thesis"}, {"author": "Stuart Stubblebine and Paul Syverson", "title": "Authentic Attributes with Fine-Grained Anonymity Protection", "booktitle": "Proceedings of Financial Cryptography (FC 2000)", "pages": "276--294", "year": "2001", "editor": "Yair Frankel", "publisher": "Springer-Verlag, LNCS 1962", "www_section": "Pseudonymity", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf", "www_tags": "selected", "key": "gup"}, {"author": "Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish", "title": "Scalable and Private Media Consumption with Popcorn", "booktitle": "Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)", "year": "2016", "month": "March", "address": "Santa Clara, CA", "pages": "91--107", "www_section": "Private Information Retrieval", "www_pdf_url": "https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-gupta-trinabh-update.pdf", "key": "gupta16scalable"}, {"title": "{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}", "author": "R. Gupta and S. Ray and A.K. Somani and Z. Zhang", "journal": "Multiagent and Grid Systems", "volume": "2", "number": "1", "pages": "11--27", "year": "2006", "publisher": "IOS Press", "www_section": "Economics", "www_pdf_url": "http://www.public.iastate.edu/~rsouvik/Article531.pdf", "key": "gupta2006uns"}, {"author": "Joseph Y. Halpern and Kevin R. O'Neill", "title": "Anonymity and Information Hiding in Multiagent Systems", "journal": "Journal of Computer Security", "volume": "", "number": "", "year": "2004", "www_section": "Formal methods", "www_pdf_url": "http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf", "www_tags": "selected", "key": "halpern-oneill-2003"}, {"author": "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", "title": "{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}", "number": "2003-1890", "institution": "Cornell University", "address": "Ithaca, NY", "month": "February", "year": "2003", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf", "www_tags": "selected", "key": "herbivore:tr"}, {"title": "Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems", "author": "Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and Nicholas Merritt", "booktitle": "Proceedings of the ACM SIGCOMM 2015 Conference", "year": "2015", "month": "August", "www_section": "Anonymous communication", "www_pdf_url": "http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p639.pdf", "www_tags": "selected", "key": "herd-sigcomm2015"}, {"title": "Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P", "author": "Michael Hermann", "school": "TU-Munich", "year": "2011", "month": "March", "www_section": "Traffic analysis", "key": "hermann2011-mthesis"}, {"title": "An Indistinguishability-Based Characterization of Anonymous Channels", "author": "Alejandro Hevia and Daniele Micciancio", "pages": "24--43", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Misc", "key": "hevia-pet2008"}, {"title": "Privacy for Public Transportation", "author": "Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "www_section": "E-Cash / Anonymous Credentials", "pages": "1--19", "www_pdf_url": "http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf", "key": "heydt-benjamin:pet2006"}, {"author": "Andrew Hintz", "title": "Fingerprinting Websites Using Traffic Analysis", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Traffic analysis", "www_html_url": "http://guh.nu/projects/ta/safeweb/safeweb.html", "www_pdf_url": "http://guh.nu/projects/ta/safeweb/safeweb.pdf", "www_ps_url": "http://guh.nu/projects/ta/safeweb/safeweb.ps", "www_tags": "selected", "key": "hintz02"}, {"author": "Andreas Hirt", "school": "The University of Calgary", "title": "A Practical Buses Protocol for Anonymous Network Communication", "year": "2004", "month": "June", "doi": "10.1.1.90.4163", "www_abstract_url": "http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.4163", "www_section": "comm", "www_pdf_url": "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.4163&rep=rep1&type=pdf", "key": "hirt2004thesis"}, {"title": "A Practical Buses Protocol for Anonymous Internet Communication", "author": "Hirt, Andreas and Jacobson Jr, Michael J and Williamson, Carey L", "booktitle": "Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST)", "year": "2005", "www_section": "comm", "www_pdf_url": "http://pages.cpsc.ucalgary.ca/~carey/papers/2005/pst2005.pdf", "key": "hirt2005practical"}, {"title": "Taxis: scalable strong anonymous communication", "author": "Hirt, Andreas and Jacobson, M and Williamson, Carey", "booktitle": "Proceedings of the IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems, 2008. (MASCOTS)", "pages": "1--10", "year": "2008", "organization": "IEEE", "www_section": "comm", "www_pdf_url": "http://pages.cpsc.ucalgary.ca/~carey/papers/2008/mascots08-paper113.pdf", "key": "hirt2008taxis"}, {"title": "HisTor{\\varepsilon}: Differentially Private and Robust Statistics Collection for Tor", "author": "Akshaya Mani and Micah Sherr", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '17", "year": "2017", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.internetsociety.org/sites/default/files/ndss2017_06B-4_Mani_paper.pdf", "www_tags": "selected", "key": "histore-ndss2017"}, {"author": "Dogan Kesdogan and Lexi Pimenidis", "title": "The Hitting Set Attack on Anonymity Protocols", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "year": "2004", "series": "LNCS", "location": "Toronto", "month": "May", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf", "www_tags": "selected", "key": "hitting-set04"}, {"author": "Chen Chen and Daniele E. Asoni and David Barrera and George Danezis and Adrian Perrig", "title": "{HORNET}: High-speed Onion Routing at the Network Layer", "booktitle": "Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS '15)", "month": "October", "year": "2015", "www_section": "Anonymous communication", "www_pdf_url": "http://www.scion-architecture.net/pdf/2015-HORNET.pdf", "www_tags": "selected", "key": "hornet-ccs2015"}, {"title": "No Direction Home: The True Cost of Routing Around Decoys", "author": "Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '14", "year": "2014", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship", "www_pdf_url": "http://www.internetsociety.org/sites/default/files/01_2_1.pdf", "www_tags": "selected", "key": "houmansadrnodirection"}, {"title": "Locating Hidden Servers", "author": "Lasse {\\O}verlier and Paul Syverson", "booktitle": "Proceedings of the 2006 IEEE Symposium on Security and Privacy", "year": "2006", "month": "May", "publisher": "IEEE CS", "www_pdf_url": "http://www.onion-router.net/Publications/locating-hidden-servers.pdf", "www_section": "Traffic analysis", "www_important": "1", "www_remarks": "Motivates and describes Tor's entry guard design.", "www_tags": "selected", "key": "hs-attack06"}, {"title": "{Silent cascade: Enhancing location privacy without communication qos degradation}", "author": "L. Huang and K. Matsuura and H. Yamane and K. Sezaki", "journal": "Proc. of Security in Pervasive Computing (SPC)", "pages": "165--180", "year": "2006", "www_section": "Misc", "key": "huang2006sce"}, {"title": "{Tor HTTP Usage and Information Leakage}", "author": "Markus Huber and Martin Mulazzani and Edgar Weippl", "booktitle": "Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2010)", "year": "2010", "month": "May", "location": "Linz, Austria", "publisher": "Springer", "series": "LNCS", "volume": "6109", "pages": "245--255", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf", "key": "huber2010tor"}, {"title": "Linking Tor Circuits", "author": "Otto Huhta", "booktitle": "", "year": "2014", "month": "September", "www_pdf_url": "http://www0.cs.ucl.ac.uk/staff/G.Danezis/students/Huhta14-UCL-Msc.pdf", "www_section": "Traffic analysis", "key": "huhta-thesis"}, {"author": "Miyako Ohkubo and Masayuki Abe", "title": "A {L}ength-{I}nvariant {H}ybrid {MIX}", "booktitle": "Proceedings of {ASIACRYPT} 2000", "year": "2000", "publisher": "Springer-Verlag, LNCS 1976", "www_section": "Provable shuffles", "www_tags": "selected", "key": "hybrid-mix"}, {"author": "Nguyen Phong Hoang and Panagiotis Kintis and Manos Antonakakis", "title": "An Empirical Study of the I2P Anonymity Network and its Censorship Resistance", "booktitle": "Proceedings of the Internet Measurement Conference 2018 (IMC '18)", "year": "2018", "month": "October", "publisher": "ACM", "www_section": "Communications Censorship", "www_pdf_url": "https://www3.cs.stonybrook.edu/~mikepo/papers/i2p.imc18.pdf", "www_tags": "selected", "key": "i2p-imc18"}, {"author": "Ian Goldberg", "title": "A Pseudonymous Communications Infrastructure for the Internet", "school": "UC Berkeley", "year": "2000", "month": "December", "www_section": "Anonymous communication", "www_pdf_url": "http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf", "www_tags": "selected", "key": "ian-thesis"}, {"title": "M2: Multicasting Mixes for Efficient and Anonymous Communication", "author": "Ginger Perng and Michael K. Reiter and Chenxi Wang", "booktitle": "Proceedings of the 26th IEEE Conference on Distributed Computing Systems", "year": "2006", "month": "July", "day": "4--7", "www_section": "Anonymous communication", "www_pdf_url": "http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf", "www_tags": "selected", "key": "icdcs2006:m2"}, {"author": "Jan Camenisch and Els Van Herreweghen", "title": "Design and implementation of the idemix anonymous credential system", "booktitle": "Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002)", "year": "2002", "isbn": "1-58113-612-9", "pages": "21--30", "location": "Washington, DC, USA", "doi": "http://doi.acm.org/10.1145/586110.586114", "publisher": "ACM Press", "address": "New York, NY, USA", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://www.zurich.ibm.com/~jca/papers/camvan02.pdf", "key": "idemix"}, {"title": "Provable Anonymity for Networks of Mixes", "author": "Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "year": "2005", "month": "June", "pages": "26--38", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "ih05-Klonowski"}, {"title": "On Blending Attacks For Mixes with Memory", "author": "Luke O'Connor", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "year": "2005", "month": "June", "pages": "39--52", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://lukejamesoconnor.googlepages.com/blending-attacks.pdf", "key": "ih05-Luke"}, {"title": "Censorship Resistance Revisited", "author": "Ginger Perng and Michael K. Reiter and Chenxi Wang", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "year": "2005", "month": "June", "pages": "62--76", "www_section": "Anonymous publication", "www_pdf_url": "http://gnunet.org/papers/IHW-CR.pdf", "www_tags": "selected", "key": "ih05-csispir"}, {"title": "Compulsion Resistant Anonymous Communications", "author": "George Danezis and Jolyon Clulow", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "year": "2005", "month": "June", "pages": "11--25", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/compel.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "ih05-danezisclulow"}, {"author": "Sebastian Zander and Steven J. Murdoch", "title": "An Improved Clock-skew Measurement Technique for Revealing Hidden Services", "booktitle": "Proceedings of the 17th USENIX Security Symposium", "year": "2008", "month": "July", "location": "San Jose, CA, US", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf", "www_tags": "selected", "key": "improved-clockskew"}, {"author": "Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach", "title": "{Building Incentives into Tor}", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "year": "2010", "month": "January", "editor": "Radu Sion", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "https://freehaven.net/anonbib/papers/incentives-fc10.pdf", "www_tags": "selected", "key": "incentives-fc10"}, {"author": "Brent Waters and Ed Felten and Amit Sahai", "title": "Receiver Anonymity via Incomparable Public Keys", "booktitle": "{Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)}", "pages": "112--121", "year": "2003", "editor": "Vijay Atluri and Peng Liu", "month": "October", "publisher": "ACM Press", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf", "www_ps_url": "http://www.cs.princeton.edu/~bwaters/research/incomparable.ps", "www_tags": "selected", "key": "incomparable-pkeys"}, {"author": "Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger", "title": "Infranet: Circumventing Web Censorship and Surveillance", "booktitle": "Proceedings of the 11th USENIX Security Symposium", "year": "2002", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf", "www_ps_gz_url": "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz", "www_tags": "selected", "key": "infranet"}, {"title": "Inside Job: Applying Traffic Analysis to Measure Tor from Within", "author": "Jansen, Rob and Juarez, Marc and G{\\'a}lvez, Rafa and Elahi, Tariq and Diaz, Claudia", "booktitle": "Proceedings of the 25th Symposium on Network and Distributed System Security ({NDSS} '18)", "year": "2018", "month": "February", "publisher": "Internet Society", "www_section": "Traffic analysis", "www_pdf_url": "https://www.robgjansen.com/publications/insidejob-ndss2018.pdf", "www_tags": "selected", "key": "insidejob-ndss2018"}, {"title": "How Do Tor Users Interact With Onion Services?", "author": "Philipp Winter and Anne Edmundson and Laura M. Roberts and Agnieszka Dutkowska-Zuk and Marshini Chetty and Nick Feamster", "booktitle": "Proceedings of the 27th Usenix Security Symposium", "month": "August", "year": "2018", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-winter.pdf", "www_tags": "selected", "key": "interact-sec2018"}, {"author": "Andriy Panchenko and Fabian Lanze and Thomas Engel", "title": "Improving Performance and Anonymity in the Tor Network", "booktitle": "Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012)", "month": "December", "year": "2012", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf", "key": "ipccc12-performance"}, {"title": "{Cryptography from Anonymity}", "author": "Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai", "journal": "Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)-Volume 00", "pages": "239--248", "month": "October", "year": "2006", "publisher": "IEEE Computer Society Washington, DC, USA", "www_tags": "selected", "www_section": "Formal methods", "www_pdf_url": "http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf", "key": "ishai2006ca"}, {"author": "Markus Jakobsson and Ari Juels", "title": "An Optimally Robust Hybrid Mix Network (Extended Abstract)", "booktitle": "Proceedings of Principles of Distributed Computing - {PODC} '01", "year": "2001", "publisher": "ACM Press", "www_section": "Provable shuffles", "www_html_url": "http://citeseer.nj.nec.com/492015.html", "www_tags": "selected", "key": "jakobsson-optimally"}, {"title": "Privacy Preserving Performance Enhancements for Anonymous Communication Systems", "author": "Rob Jansen", "school": "University of Minnesota", "year": "2012", "month": "October", "www_tags": "selected", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "https://www.robgjansen.com/publications/jansen-phd-dissertation.pdf", "key": "jansen-phd-thesis"}, {"author": "Rob Jansen and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson", "title": "Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport", "booktitle": "Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_tags": "selected", "www_section": "Tor Performance", "www_pdf_url": "https://www.robgjansen.com/publications/kist-sec2014.pdf", "key": "jansen14-kist"}, {"title": "Nymble: Anonymous IP-address Blocking", "author": "Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Misc", "www_pdf_url": "http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf", "www_remarks": "Superseded by nymble-tdsc.", "key": "johnson-pet2007"}, {"title": "Characterising Anonymity Systems", "author": "Joss Wright", "school": "Department of Computer Science, University of York, York", "year": "2007", "month": "November", "www_pdf_url": "http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf", "www_section": "Formal methods", "key": "joss-thesis"}, {"author": "Luis von Ahn and Andrew Bortz and Nicholas J. Hopper", "title": "k-Anonymous Message Transmission", "booktitle": "{Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)}", "pages": "122--130", "year": "2003", "editor": "Vijay Atluri and Peng Liu", "month": "October", "publisher": "ACM Press", "www_section": "Anonymous communication", "www_pdf_url": "http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf", "www_tags": "selected", "key": "k-anonymous:ccs2003"}, {"author": "Paul A. Karger", "title": "Non-Discretionary Access Control for Decentralized Computing Systems", "institution": "Laboratory for Computer Science, Massachusetts Institute of Technology", "address": "Cambridge, MA", "number": "MIT/LCS/TR-179", "type": "S. M. \\& E. E. thesis", "month": "May", "year": "1977", "www_section": "Traffic analysis", "www_pdf_url": "http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf", "www_remarks": "Chapter 11, \"Limitations of End-to-End Encryption,\" has some early discussion of traffic analysis issues.", "www_tags": "selected", "key": "karger77"}, {"author": "Aniket Kate and Greg Zaverucha and Ian Goldberg", "title": "Pairing-Based Onion Routing", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Pairing_based.pdf", "www_remarks": "Describes a circuit-establishment protocol for a Tor-like network. Uses Pairing- and Identity-Based crypto for efficiency, at the expense of having all private keys generated by a trusted IBE authority.", "key": "kate-pet2007"}, {"title": "{Technical challenges of network anonymity}", "author": "D. Kesdogan and C. Palmer", "journal": "Computer Communications", "volume": "29", "number": "3", "pages": "306--324", "year": "2006", "publisher": "Elsevier", "www_section": "Anonymous communication", "key": "kesdogan2006tcn"}, {"author": "Dogan Kesdogan and Mark Borning and Michael Schmeink", "title": "Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf", "www_tags": "selected", "key": "kesdogan:pet2002"}, {"author": "Kevin Bauer", "title": "Improving Security and Performance in Low Latency Anonymity Networks", "school": "University of Colorado", "year": "2011", "month": "May", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf", "www_tags": "selected", "key": "kevin-thesis"}, {"author": "L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang", "title": "Private keyword-based push and pull with applications to anonymous communication", "journal": "Applied Cryptography and Network Security", "year": "2004", "www_pdf_url": "http://www.cs.cmu.edu/~alina/papers/p3.pdf", "www_section": "Private Information Retrieval", "key": "kissner04private"}, {"title": "{KIST}: Kernel-Informed Socket Transport for {Tor}", "author": "Jansen, Rob and Traudt, Matthew and Geddes, John and Wacek, Chris and Sherr, Micah and Syverson, Paul", "journal": "ACM Transactions on Privacy and Security (TOPS)", "month": "December", "number": "1", "pages": "3:1--3:37", "volume": "22", "year": "2018", "www_section": "Tor Performance", "www_pdf_url": "https://www.robgjansen.com/publications/kist-tops2018.pdf", "www_tags": "selected", "key": "kist-tops2018"}, {"author": "R. Koch and M. Golling and G. D. Rodosek", "journal": "Computer", "title": "How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation", "year": "2016", "volume": "49", "number": "3", "pages": "42--49", "keywords": "Communication networks; Computer hacking; Computer security; IP networks; Internet; Privacy; Relays; Routing protocols; Surveillance; Tor; anonymous communication; de-anonymization; hackers; network security; network surveillance; networking; networks; onion routing; routers; security", "doi": "10.1109/MC.2016.73", "issn": "0018-9162", "month": "March", "www_section": "comm", "www_pdf_url": "https://www.unibw.de/inf3/personen/wimis/koch/how-anonymous-is-the-tor-network-a-long-term-black-box-investigation", "key": "koch-7433346"}, {"author": "Stefan K\\\"opsell and Ulf Hilling", "title": "How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "location": "Washington, DC, USA", "month": "October", "year": "2004", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/p103-koepsell.pdf", "www_tags": "selected", "key": "koepsell:wpes2004"}, {"author": "Matthijs R. Koot", "year": "2012", "month": "June", "school": "University of Amsterdam", "address": "Amsterdam, The Netherlands", "title": "Measuring and Predicting Anonymity", "www_pdf_url": "http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf", "www_section": "Traffic analysis", "key": "koot2012"}, {"title": "{Revocable Anonymity}", "author": "S. Kopsell and R. Wendolsky and H. Federrath", "journal": "Emerging Trends in Information and Communication Security-ETRICS, LNCS", "volume": "3995", "pages": "206--220", "year": "2006", "www_section": "Anonymous communication", "key": "kopsell2006ra"}, {"author": "Konstantinos Chatzikokolakis", "title": "Probabilistic and Information-Theoretic Approaches to Anonymity", "school": "Laboratoire d'Informatique (LIX), {\\'E}cole Polytechnique, Paris", "year": "2007", "month": "October", "www_section": "Anonymous communication", "www_pdf_url": "http://www.lix.polytechnique.fr/~kostas/thesis.pdf", "www_tags": "selected", "key": "kostas-thesis"}, {"title": "Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking", "author": "Ralf K\\\"usters and Tomasz Truderung and Andreas Vogt", "booktitle": "Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy", "year": "2014", "month": "May", "publisher": "IEEE", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://infsec.uni-trier.de/publications/paper/KuestersTruderungVogt-SP-2014.pdf", "key": "kuesters-rpc"}, {"author": "Dennis K\\\"ugler", "title": "{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "161--176", "www_section": "Anonymous publication", "www_pdf_url": "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf", "www_tags": "selected", "key": "kugler:pet2003"}, {"author": "Dennis K{\\\"u}gler", "title": "On the Anonymity of Banknotes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "108--120", "www_section": "Misc", "key": "kugler:pet2004"}, {"author": "Oliver Berthold and Heinrich Langos", "title": "Dummy Traffic Against Long Term Intersection Attacks", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "publisher": "Springer-Verlag, LNCS 2482", "www_section": "Traffic analysis", "www_pdf_url": "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf", "www_tags": "selected", "key": "langos02"}, {"title": "Measuring Information Leakage in Website Fingerprinting Attacks and Defenses", "author": "Shuai Li and Huajun Guo and Nicholas Hopper", "booktitle": "Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18)", "year": "2018", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "https://www-users.cs.umn.edu/~hoppernj/wefde-ccs2018.pdf", "www_tags": "selected", "key": "leakage-ccs2018"}, {"title": "Privacy-preserving Dynamic Learning of Tor Network Traffic", "author": "Rob Jansen and Matthew Traudt and Nicholas Hopper", "booktitle": "Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18)", "year": "2018", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "https://www.robgjansen.com/publications/tmodel-ccs2018.pdf", "www_tags": "selected", "key": "learning-ccs2018"}, {"title": "Understanding Statistical Disclosure: A Least Squares approach", "author": "Fernando Perez-Gonzalez and Carmela Troncoso", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "month": "July", "year": "2012", "publisher": "Springer", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2012/paper_41.pdf", "key": "leastsquares-pets12"}, {"title": "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users", "author": "Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous", "booktitle": "Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats", "series": "LEET'11", "year": "2011", "publisher": "USENIX Association", "www_section": "Traffic analysis", "www_pdf_url": "http://arxiv.org/pdf/1103.1518", "key": "leet2011:TorBunchApple"}, {"author": "J{\\\"o}rg Lenhard and Karsten Loesing and Guido Wirtz", "title": "Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks", "booktitle": "Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009", "year": "2009", "month": "June", "editor": "Michel Abdalla and David Pointcheval and Pierre-Alain Fouque and Damien Vergnaud", "volume": "5536", "series": "Lecture Notes in Computer Science", "isbn": "978-3-642-01956-2", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "www_pdf_url": "http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf", "key": "lenhard2009hidserv-lowbw"}, {"author": "Dogan Kesdogan and Dakshi Agrawal and Stefan Penz", "title": "Limits of Anonymity in Open Environments", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "year": "2002", "month": "October", "editor": "Fabien Petitcolas", "publisher": "Springer-Verlag, LNCS 2578", "www_section": "Traffic analysis", "www_pdf_url": "http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf", "www_tags": "selected", "key": "limits-open"}, {"author": "Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz", "title": "{Performance Measurements and Statistics of Tor Hidden Services}", "booktitle": "Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)", "month": "July", "year": "2008", "location": "Turku, Finland", "publisher": "IEEE CS Press", "www_tags": "selected", "www_pdf_url": "http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "loesing2008performance"}, {"title": "Privacy-enhancing Technologies for Private Services", "author": "Karsten Loesing", "school": "University of Bamberg", "year": "2009", "month": "May", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf", "key": "loesing2009thesis"}, {"title": "The Loopix Anonymity System", "author": "Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis", "booktitle": "Proceedings of the 26th Usenix Security Symposium", "month": "August", "year": "2017", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-piotrowska.pdf", "www_tags": "selected", "key": "loopix2017"}, {"title": "Mailet: Instant Social Networking under Censorship", "author": "Shuai Li and Nicholas Hopper", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "2", "year": "2016", "month": "April", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Mailet__Instant_Social_Networking_under_Censorship.pdf", "www_tags": "selected", "key": "mailet-pets2016"}, {"title": "Marionette: A Programmable Network Traffic Obfuscation System", "author": "Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton", "year": "2015", "booktitle": "Proceedings of the 24th Usenix Security Symposium", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf", "www_tags": "selected", "key": "marionette2015"}, {"title": "Mass{B}rowser: Unblocking the Censored Web for the Masses, by the Masses", "author": "Milad Nasr and Hadi Zolfaghari and Amir Houmansadr and Amirhossein Ghafari", "booktitle": "Proceedings of the 27th Symposium on Network and Distributed System Security ({NDSS} '20)", "year": "2020", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/massbrowser-ndss2020.pdf", "www_tags": "selected", "key": "massbrowser-ndss2020"}, {"title": "Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms against Structural Attacks", "author": "Michael Backes and Sebastian Meiser and Marcin Slowik", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "2", "year": "2016", "month": "April", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Your_Choice_MATor(s).pdf", "www_tags": "selected", "key": "mators-pets2016"}, {"title": "Shining Light in Dark Places: Understanding the {Tor} Network", "author": "Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker", "pages": "63--76", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Misc", "www_tags": "selected", "www_pdf_url": "http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf", "key": "mccoy-pet2008"}, {"title": "{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale", "author": "Nguyen Phong Hoang and Jakub Dalek and Masashi Crete-Nishihata and Nicolas Christin and Vinod Yegneswaran and Michalis Polychronakis and Nick Feamster", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-hoang.pdf", "www_tags": "selected", "key": "measuring-sec2024"}, {"title": "{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}", "author": "C.A. Melchor and Y. Deswarte", "journal": "Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications", "pages": "163--172", "year": "2006", "publisher": "IEEE Computer Society Washington, DC, USA", "www_section": "Anonymous communication", "key": "melchor2006dnp"}, {"title": "Message In A Bottle: Sailing Past Censorship", "author": "Luca Invernizzi and Christopher Kruegel and Giovanni Vigna", "booktitle": "Proceedings of the Annual Computer Security Applications Conference (ACSAC)", "publisher": "ACM", "year": "2013", "www_section": "Communications Censorship", "www_pdf_url": "http://www.cs.ucsb.edu/~vigna/publications/2013_ACSAC_MITB.pdf", "www_tags": "selected", "key": "miab-acsac13"}, {"author": "George Danezis and Roger Dingledine and Nick Mathewson", "title": "{Mixminion: Design of a Type III Anonymous Remailer Protocol}", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "year": "2003", "month": "May", "pages": "2--15", "www_important": "1", "www_section": "Anonymous communication", "www_pdf_url": "http://mixminion.net/minion-design.pdf", "www_tags": "selected", "key": "minion-design"}, {"title": "MirageFlow: {A} New Bandwidth Inflation Attack on Tor", "author": "Christoph Sendner and Jasper Stang and Alexandra Dmitrienko and Raveen Wijewickrama and Murtuza Jadliwala", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS} '24", "publisher": "The Internet Society", "year": "2024", "month": "February", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/mirageflow-ndss24.pdf", "www_tags": "selected", "key": "mirageflow-ndss24"}, {"author": "Masashi Mitomo and Kaoru Kurosawa", "title": "{Attack for Flash MIX}", "booktitle": "Proceedings of {ASIACRYPT} 2000", "year": "2000", "publisher": "Springer-Verlag, LNCS 1976", "www_section": "Provable shuffles", "www_html_url": "http://citeseer.nj.nec.com/450148.html", "www_tags": "selected", "key": "mitkuro"}, {"author": "Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar", "title": "{A Reputation System to Increase MIX-net Reliability}", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "pages": "126--141", "year": "2001", "month": "April", "editor": "Ira S. Moskowitz", "publisher": "Springer-Verlag, LNCS 2137", "www_section": "Anonymous communication", "www_ps_url": "https://freehaven.net/doc/mix-acc/mix-acc.ps", "www_pdf_url": "https://freehaven.net/doc/mix-acc/mix-acc.pdf", "www_tags": "selected", "key": "mix-acc"}, {"title": "Mixcoin: Anonymity for Bitcoin with accountable mixes", "author": "Joseph Bonneau and Jeremy Clark and Joshua A. Kroll and Andrew Miller and Arvind Narayanan", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'14)", "year": "2014", "month": "March", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://fc14.ifca.ai/papers/fc14_submission_170.pdf", "key": "mixcoin-fc14"}, {"author": "Claudia Diaz and Len Sassaman and Evelyne Dewitte", "title": "Comparison between two practical mix designs", "booktitle": "Proceedings of ESORICS 2004", "year": "2004", "series": "LNCS", "location": "France", "month": "September", "www_section": "Traffic analysis", "www_ps_gz_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-98.pdf", "www_tags": "selected", "www_important": "1", "key": "mixmaster-reliable"}, {"author": "Ulf M{\\\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman", "title": "Mixmaster {P}rotocol --- {V}ersion 2", "howpublished": "IETF Internet Draft", "year": "2003", "month": "July", "www_section": "Anonymous communication", "www_txt_url": "http://www.abditum.com/mixmaster-spec.txt", "www_tags": "selected", "www_important": "1", "key": "mixmaster-spec"}, {"author": "Nick Mathewson and Roger Dingledine", "title": "Mixminion: Strong Anonymity for Financial cryptography", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "year": "2004", "month": "February", "editor": "Ari Juels", "publisher": "Springer-Verlag, LNCS 3110", "pages": "227--232", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/doc/fc04/minion-systems.pdf", "key": "mixminion-fc2004"}, {"title": "DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion Protocols", "author": "Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004", "year": "2004", "month": "September", "www_section": "Anonymous communication", "www_tags": "selected", "key": "mmsec04-Klonowski"}, {"author": "Dominic Hughes and Vitaly Shmatikov", "title": "Information Hiding, Anonymity and Privacy: A Modular Approach", "journal": "Journal of Computer Security", "volume": "12", "number": "1", "pages": "3--36", "year": "2004", "www_section": "Formal methods", "www_ps_url": "http://www.csl.sri.com/users/shmat/shmat_anon.ps", "www_tags": "selected", "key": "modular-approach"}, {"title": "Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark", "author": "Montieri, Antonio and Ciuonzo, Domenico and Aceto, Giuseppe and Pescap{\\'e}, Antonio", "booktitle": "Proceedings of Teletraffic Congress (ITC 29), 2017 29th International", "volume": "1", "pages": "81--89", "year": "2017", "organization": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://domenicociuonzo.files.wordpress.com/2013/08/pid4874931_final.pdf", "key": "montieri2017anonymity"}, {"title": "MoP-2-MoP -- Mobile private microblogging", "author": "Marius Senftleben and Mihai Bucicoiu and Erik Tews and Frederik Armknecht and Stefan Katzenbeisser and Ahmad-Reza Sadeghi", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'14)", "year": "2014", "month": "March", "www_section": "Anonymous communication", "www_pdf_url": "http://fc14.ifca.ai/papers/fc14_submission_99.pdf", "key": "mop2mop-fc14"}, {"author": "Charles Wright and Scott Coull and Fabian Monrose", "title": "Traffic Morphing: An efficient defense against statistical traffic analysis", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '09", "year": "2009", "month": "February", "publisher": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/morphing09.pdf", "www_tags": "selected", "key": "morphing09"}, {"author": "Marc Rennhard and Bernhard Plattner", "title": "Practical Anonymity for the Masses with MorphMix", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "year": "2004", "month": "February", "editor": "Ari Juels", "publisher": "Springer-Verlag, LNCS 3110", "pages": "233--250", "www_section": "Anonymous communication", "www_pdf_url": "http://home.zhwin.ch/~rer/publications/FC2004.pdf", "www_tags": "selected", "key": "morphmix-fc2004"}, {"author": "Parisa Tabriz and Nikita Borisov", "title": "Breaking the Collusion Detection Mechanism of MorphMix", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "368--384", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2006/preproc/preproc_21.pdf", "www_tags": "selected", "key": "morphmix:pet2006"}, {"author": "Marc Rennhard and Bernhard Plattner", "title": "{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}", "location": "Washington, DC, USA", "month": "November", "year": "2002", "www_important": "1", "www_section": "Anonymous communication", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", "www_tags": "selected", "key": "morphmix:wpes2002"}, {"title": "Scalable and Anonymous Group Communication with MTor", "author": "Dong Lin and Micah Sherr and Boon Thau Loo", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "2", "year": "2016", "month": "April", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Scalable_and_Anonymous_Group_Communication_with_MTor.pdf", "www_tags": "selected", "key": "mtor-pets2016"}, {"title": "Multi-Class Traffic Morphing for Encrypted VoIP Communication", "author": "W. Brad Moore and Henry Tan and Micah Sherr and Marcus A. Maloof", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'15)", "year": "2015", "month": "February", "www_section": "Traffic analysis", "www_pdf_url": "http://fc15.ifca.ai/preproceedings/paper_108.pdf", "key": "muffler-fc14"}, {"title": "Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing", "author": "Jan Pennekamp and Jens Hiller and Sebastian Reuter and Wladimir De la Cadena and Asya Mitseva and Martin Henze and Thomas Engel and Klaus Wehrle and Andriy Panchenko", "booktitle": "Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19)", "year": "2019", "month": "October", "www_tags": "selected", "www_pdf_url": "https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf", "www_section": "Anonymous communication", "key": "multipathing-icnp2019"}, {"title": "Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries", "author": "Steven J. Murdoch and Piotr Zieli{\\'n}ski", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf", "www_tags": "selected", "www_important": "1", "www_remarks": "Examines efficacy of traffic analysis against a low-latency anonymity network by an adversary who controls Internet exchanges, and who can only sample a fraction of traffic.", "key": "murdoch-pet2007"}, {"title": "Metrics for Security and Performance in Low-Latency Anonymity Networks", "author": "Steven J. Murdoch and Robert N. M. Watson", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "pages": "115--132", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf", "key": "murdoch-pet2008"}, {"title": "Anonymity in the wild: Mixes on unstructured networks", "author": "Shishir Nagaraja", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf", "key": "nagaraja-pet2007"}, {"title": "RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows", "author": "Amir Houmansadr and Negar Kiyavash and Nikita Borisov", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'09", "year": "2009", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf", "www_section": "Traffic analysis", "key": "ndss09-rainbow"}, {"title": "SWIRL: A Scalable Watermark to Detect Correlated Network Flows", "author": "Amir Houmansadr and Nikita Borisov", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'11", "year": "2011", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf", "www_section": "Traffic analysis", "key": "ndss11-swirl"}, {"title": "X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks", "author": "Prateek Mittal and Matthew Caesar and Nikita Borisov", "www_section": "Anonymous communication", "www_pdf_url": "http://www.internetsociety.org/sites/default/files/02_2.pdf", "editor": "", "booktitle": "Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS2012)", "location": "San Diego, California, USA", "publisher": "The Internet Society 2013", "month": "January", "year": "2012", "key": "ndss12:mittal"}, {"title": "{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}", "author": "Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "year": "2013", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf", "www_section": "Communications Censorship", "key": "ndss13-freewave"}, {"title": "{LIRA: Lightweight Incentivized Routing for Anonymity}", "author": "Rob Jansen and Aaron Johnson and Paul Syverson", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "year": "2013", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "https://www.robgjansen.com/publications/lira-ndss2013.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "ndss13-lira"}, {"title": "{rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation}", "author": "Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "year": "2013", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf", "www_section": "Anonymous communication", "key": "ndss13-rbridge"}, {"title": "{An Empirical Evaluation of Relay Selection in Tor}", "author": "Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "year": "2013", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "ndss13-relay-selection"}, {"title": "{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}", "author": "Michael Backes and Goran Doychev and Boris K\\\"opf", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "year": "2013", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://software.imdea.org/~bkoepf/papers/ndss13.pdf", "www_section": "Anonymous communication", "key": "ndss13-website-fingerprinting"}, {"title": "Pisces: Anonymous Communication Using Social Networks", "author": "Prateek Mittal and Matthew Wright and Nikita Borisov", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "http://internetsociety.org/sites/default/files/05_1_0.pdf", "editor": "", "booktitle": "Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS2013)", "location": "San Diego, California, USA", "publisher": "The Internet Society 2013", "month": "February", "year": "2013", "key": "ndss13:mittal:a"}, {"title": "Preserving Link Privacy in Social Network Based Systems", "author": "Prateek Mittal and Charalampos Papamanthou and Dawn Song", "www_section": "Anonymous communication", "www_pdf_url": "http://internetsociety.org/sites/default/files/05_2_0.pdf", "editor": "", "booktitle": "Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS2013)", "location": "San Diego, California, USA", "publisher": "The Internet Society 2013", "month": "February", "year": "2013", "key": "ndss13:mittal:b"}, {"title": "{NetShaper}: A Differentially Private Network Side-Channel Mitigation System", "author": "Amir Sabzi and Rut Vora and Swati Goswami and Margo Seltzer and Mathias L\\'ecuyer and Aastha Mehta", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "comms", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-sabzi.pdf", "www_tags": "selected", "key": "netshaper-sec2024"}, {"title": "{NetShuffle}: Circumventing Censorship with Shuffle Proxies at the Edge", "author": "Patrick Tser Jern Kon and Aniket Gattani and Dhiraj Saharia and Tianyu Cao and Diogo Barradas and Ang Chen and Micah Sherr and Benjamin E. Ujcich", "booktitle": "Proceedings of the 45th IEEE Symposium on Security and Privacy", "year": "2024", "month": "May", "www_section": "Communications Censorship", "www_tags": "selected", "www_pdf_url": "https://personal.benujcich.georgetown.domains/papers/24_SP.pdf", "key": "netshuffle-oakland2024"}, {"author": "Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov", "title": "Metrics for Traffic Analysis Prevention", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "48--65", "www_section": "Traffic analysis", "www_ps_url": "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps", "www_tags": "selected", "key": "newman:pet2003"}, {"author": "Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz", "title": "Anonymity and Covert Channels in Simple Timed Mix-firewalls", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "1--16", "www_section": "Traffic analysis", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps", "www_remarks": "If we think about leaked anonymity as a covert channel between the sender Alice and the adversary Eve, then by measuring covert channel capacity we can get an upper bound on the amount of information Alice could leak.", "www_tags": "selected", "key": "newman:pet2004"}, {"title": "On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records", "author": "S. Chakravarty and M. V. Barbera and G. Portokalidis and M. Polychronakis and A. D. Keromytis", "booktitle": "Proceedings of the 15th Passive and Active Measurements Conference (PAM '14)", "year": "2014", "month": "March", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cs.columbia.edu/~sc2516/papers/pam2014-tor-nfattack.pdf", "key": "nfattackpam14"}, {"title": "{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}", "author": "L. Nguyen and R. Safavi-Naini and K. Kurosawa", "journal": "International Journal of Information Security", "volume": "5", "number": "4", "pages": "241--255", "year": "2006", "publisher": "Springer", "www_section": "Provable shuffles", "www_tags": "selected", "key": "nguyen2006vsf"}, {"author": "Lan Nguyen and Rei Safavi-Naini", "title": "Breaking and Mending Resilient Mix-nets", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "66--80", "www_section": "Provable shuffles", "www_pdf_url": "https://www.petsymposium.org/2003/preproc/05-preproc.pdf", "www_tags": "selected", "key": "nguyen:pet2003"}, {"title": "On Privacy Notions in Anonymous Communication", "author": "Christiane Kuhn and Martin Beck and Stefan Schiffner and Eduard Jorswieck and Thorsten Strufe", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2019", "number": "2", "year": "2019", "month": "April", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2019/files/papers/issue2/popets-2019-0022.pdf", "www_section": "Traffic analysis", "key": "notions-pets2019"}, {"title": "Reducing Latency in Tor Circuits with Unordered Delivery", "author": "Nowlan, Michael F and Wolinsky, David and Ford, Bryan", "booktitle": "Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet", "organization": "USENIX", "year": "2013", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://dedis.cs.yale.edu/2010/anon/papers/foci13.pdf", "key": "nowlanreducing"}, {"author": "David Mazi\\`eres and M. Frans Kaashoek", "title": "{The Design, Implementation and Operation of an Email Pseudonym Server}", "booktitle": "{Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS 1998)}", "year": "1998", "month": "November", "publisher": "ACM Press", "www_section": "Pseudonymity", "www_ps_gz_url": "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", "www_pdf_url": "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", "www_tags": "selected", "key": "nym-alias-net"}, {"author": "Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith", "title": "Nymble: Blocking Misbehaving Users in Anonymizing Networks", "journal": "IEEE Transactions on Dependable and Secure Computing", "volume": "8", "number": "2", "year": "2011", "month": "March--April", "pages": "256--269", "doi": "10.1109/TDSC.2009.38", "www_tags": "selected", "www_important": "1", "www_section": "Misc", "www_remarks": "Describes Nymble, a system that allows services to block anonymous users that misbehave, without making their transactions linkable.", "key": "nymble-tdsc"}, {"title": "{Making a Nymbler Nymble using VERBS (Extended Version)}", "author": "Ryan Henry and Kevin Henry and Ian Goldberg", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "year": "2010", "month": "July", "location": "Berlin, Germany", "www_tags": "selected", "www_pdf_url": "http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf", "www_section": "Misc", "key": "nymbler"}, {"author": "Ryan Henry and Ian Goldberg", "title": "Extending Nymble-like Systems", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "year": "2011", "month": "May", "www_section": "Misc", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf", "key": "oakland11-extending"}, {"author": "Ryan Henry and Ian Goldberg", "title": "Formalizing Anonymous Blacklisting Systems", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "year": "2011", "month": "May", "www_section": "Misc", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf", "www_tags": "selected", "key": "oakland11-formalizing"}, {"title": "{LAP}: Lightweight Anonymity and Privacy", "author": "Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "year": "2012", "month": "May", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/LAP.pdf", "key": "oakland2012-lap"}, {"title": "{LASTor: A Low-Latency AS-Aware Tor Client}", "author": "Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "year": "2012", "month": "May", "www_tags": "selected", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf", "key": "oakland2012-lastor"}, {"title": "Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail", "author": "Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "year": "2012", "month": "May", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://kpdyer.com/publications/oakland2012-peekaboo.pdf", "key": "oakland2012-peekaboo"}, {"title": "The Parrot is Dead: Observing Unobservable Network Communications", "author": "Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov", "booktitle": "Proceedings of the 2013 IEEE Symposium on Security and Privacy", "year": "2013", "month": "May", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/parrot.pdf", "key": "oakland2013-parrot"}, {"title": "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization", "author": "Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann", "booktitle": "Proceedings of the 2013 IEEE Symposium on Security and Privacy", "year": "2013", "month": "May", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf", "key": "oakland2013-trawling"}, {"title": "Off-Path TCP Exploits: Global Rate Limit Considered Dangerous", "author": "Yue Cao and Zhiyun Qian and Zhongjie Wang and Tuan Dao and Srikanth V. Krishnamurthy and Lisa M. Marvel", "year": "2016", "booktitle": "Proceedings of the 25th Usenix Security Symposium", "month": "August", "www_section": "Traffic analysis", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf", "www_tags": "selected", "key": "offpath2016"}, {"author": "Paul Syverson and Michael Reed and David Goldschlag", "title": "{O}nion {R}outing Access Configurations", "booktitle": "Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000)", "year": "2000", "publisher": "IEEE CS Press", "pages": "34--40", "volume": "1", "www_section": "Anonymous communication", "www_abstract_url": "http://www.onion-router.net/Publications.html", "www_ps_url": "http://www.onion-router.net/Publications/DISCEX-2000.ps", "www_ps_gz_url": "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", "www_pdf_url": "http://www.onion-router.net/Publications/DISCEX-2000.pdf", "www_tags": "selected", "key": "onion-discex00"}, {"title": "The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services", "author": "Jesse Victors and Ming Li and Xinwen Fu", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "1", "year": "2017", "month": "January", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue1/paper05-2017-1-source.pdf", "www_section": "Anonymous communication", "key": "onion-ns-pets2017"}, {"title": "Anonymous Connections and Onion Routing", "author": "Paul F. Syverson and David M. Goldschlag and Michael G. Reed", "booktitle": "Proceedings of the 1997 IEEE Symposium on Security and Privacy", "year": "1997", "month": "May", "pages": "44--54", "publisher": "IEEE", "www_section": "Anonymous communication", "www_pdf_url": "https://www.ieee-security.org/TC/SP2020/tot-papers/syverson-1997.pdf", "key": "onion-routing:ieeesp1997"}, {"title": "{Hiding Routing Information}", "author": "David M. Goldschlag and Michael G. Reed and Paul F. Syverson", "booktitle": "Proceedings of Information Hiding: First International Workshop", "year": "1996", "month": "May", "pages": "137--150", "editor": "R. Anderson", "publisher": "Springer-Verlag, LNCS 1174", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.onion-router.net/Publications/IH-1996.ps.gz", "www_pdf_url": "http://www.onion-router.net/Publications/IH-1996.pdf", "www_tags": "selected", "key": "onion-routing:ih96"}, {"author": "Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr", "title": "{Towards an Analysis of Onion Routing Security}", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "year": "2000", "month": "July", "pages": "96--114", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "www_section": "Anonymous communication", "www_ps_gz_url": "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz", "www_important": "1", "www_tags": "selected", "key": "onion-routing:pet2000"}, {"title": "A Large-scale Analysis of Content Modification by Open HTTP Proxies", "author": "Giorgos Tsirantonakis and Panagiotis Ilia and Sotiris Ioannidis and Elias Athanasopoulos and Michalis Polychronakis", "booktitle": "Proceedings of the 25th Symposium on Network and Distributed System Security ({NDSS} '18)", "year": "2018", "month": "February", "publisher": "Internet Society", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/anonbib/papers/ndss2018_04A-1_Tsirantonakis_paper.pdf", "www_tags": "selected", "key": "openproxies-ndss2018"}, {"title": "Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden services", "author": "Lasse {\\O}verlier and Paul Syverson", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf", "www_tags": "selected", "www_remarks": "Introduces Diffie-Hellman-based handshakes to build Tor circuits with fewer exponentiations than the original circuit-establishment protocol.", "key": "overlier-pet2007"}, {"author": "Michael A. Padlipsky and David W. Snow and Paul A. Karger", "title": "Limitations of End-to-End Encryption in Secure Computer Networks", "institution": "The MITRE Corporation: Bedford MA, HQ Electronic Systems Division", "address": "Hanscom AFB, MA", "number": "ESD-TR-78-158", "month": "August", "year": "1978", "www_section": "Traffic analysis", "www_pdf_url": "http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf", "www_tags": "selected", "key": "padlipky78"}, {"author": "Richard Clayton and George Danezis and Markus G. Kuhn", "title": "Real World Patterns of Failure in Anonymity Systems", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "pages": "230--244", "year": "2001", "month": "April", "editor": "Ira S. Moskowitz", "publisher": "Springer-Verlag, LNCS 2137", "www_section": "Misc", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf", "www_tags": "selected", "key": "patterns-failure"}, {"title": "Paying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper)", "author": "Paolo Palmieri and Johan Pouwelse", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'15)", "year": "2015", "month": "February", "www_section": "Tor Performance", "www_pdf_url": "http://fc15.ifca.ai/preproceedings/paper_112.pdf", "key": "payguard-fc14"}, {"title": "PeerFlow: Secure Load Balancing in Tor", "author": "Aaron Johnson and Rob Jansen and Nicholas Hopper and Aaron Segal and Paul Syverson", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2017", "volume": "2017", "number": "2", "month": "April", "www_section": "Tor Performance", "www_pdf_url": "http://ohmygodel.com/publications/peerflow-popets2017.pdf", "www_tags": "selected", "key": "peerflow-pets2017"}, {"author": "Andrea Forte and Nazanin Andalibi and Rachel Greenstadt", "title": "Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of {T}or Users and {W}ikipedians", "year": "2017", "month": "March", "booktitle": "Proceedings of Computer-Supported Cooperative Work and Social Computing (CSCW)", "www_section": "Economics", "www_tags": "selected", "www_pdf_url": "http://andreaforte.net/ForteCSCW17-Anonymity.pdf", "key": "perceived-cscw2017"}, {"author": "Man Ho Au and Patrick P. Tsang and Apu Kapadia", "title": "{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous users", "journal": "ACM Transactions on Information and System Security ({ACM TISSEC})", "issue_date": "December 2011", "volume": "14", "issue": "4", "month": "December", "year": "2011", "issn": "1094-9224", "pages": "29:1--29:34", "articleno": "29", "numpages": "34", "url": "http://doi.acm.org/10.1145/2043628.2043630", "doi": "http://doi.acm.org/10.1145/2043628.2043630", "acmid": "204363", "publisher": "ACM", "address": "New York, NY, USA", "keywords": "Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf", "www_section": "Misc", "www_tags": "selected", "key": "perea-tissec11"}, {"author": "Man Ho Au and Apu Kapadia", "title": "{PERM}: Practical Reputation-Based Blacklisting without {TTPs}", "booktitle": "Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS)", "pages": "929--940", "month": "October", "year": "2012", "doi": "10.1145/2382196.2382294", "publisher": "ACM", "www_tags": "selected", "www_section": "Pseudonymity", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf", "key": "perm-ccs12"}, {"title": "Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)", "author": "Pescape, Antonio and Montieri, Antonio and Aceto, Giuseppe and Ciuonzo, Domenico", "journal": "IEEE Transactions on Dependable and Secure Computing", "year": "2018", "publisher": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://domenicociuonzo.files.wordpress.com/2018/02/ieee_tdsc.pdf", "key": "pescape2018anonymity"}, {"author": "George Dean Bissias and Marc Liberatore and Brian Neil Levine", "title": "Privacy Vulnerabilities in Encrypted HTTP Streams", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "month": "May", "year": "2005", "pages": "1--11", "www_section": "Traffic analysis", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", "www_tags": "selected", "key": "pet05-bissias"}, {"author": "Nikita Borisov", "title": "An Analysis of Parallel Mixing with Attacker-Controlled Inputs", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "month": "May", "year": "2005", "pages": "12--25", "www_section": "Traffic analysis", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf", "www_tags": "selected", "key": "pet05-borisov"}, {"author": "Jan Camenisch and Anton Mityagin", "title": "Mix-network with Stronger Security", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "month": "May", "year": "2005", "pages": "128--147", "www_section": "Provable shuffles", "www_tags": "selected", "key": "pet05-camenisch"}, {"title": "Message Splitting Against the Partial Adversary", "author": "Andrei Serjantov and Steven J. Murdoch", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "year": "2005", "month": "May", "pages": "26--39", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf", "www_tags": "selected", "key": "pet05-serjantov"}, {"author": "Ye Zhu and Riccardo Bettati", "title": "Unmixing Mix Traffic", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "month": "May", "year": "2005", "pages": "110--127", "www_section": "Traffic analysis", "www_pdf_url": "http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf", "www_tags": "selected", "key": "pet05-zhu"}, {"title": "Anonymity Techniques - Usability Tests of Major Anonymity Networks", "author": "Jens Schomburg", "booktitle": "Proceedings of PET-CON 2009.1", "location": "Dresden, Germany", "year": "2009", "month": "March", "pages": "55--64", "www_pdf_url": "https://core.ac.uk/download/pdf/236367247.pdf", "www_section": "Anonymous communication", "key": "petcon2009-schomburg"}, {"title": "Peer Profiling and Selection in the I2P Anonymous Network", "author": "zzz (Pseudonym) and Lars Schimmer", "booktitle": "Proceedings of PET-CON 2009.1", "location": "Dresden, Germany", "year": "2009", "month": "March", "pages": "59--59", "www_pdf_url": "https://geti2p.net/_static/pdf/I2P-PET-CON-2009.1.pdf", "www_section": "Anonymous communication", "key": "petcon2009-zzz"}, {"title": "The need for flow fingerprints to link correlated network flows", "author": "Amir Houmansadr and Nikita Borisov", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "month": "July", "year": "2013", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/Fancy.pdf", "key": "pets13-flow-fingerprints"}, {"title": "How Low Can You Go: Balancing Performance with Anonymity in Tor", "author": "John Geddes and Rob Jansen and Nicholas Hopper", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "month": "July", "year": "2013", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf", "key": "pets13-how-low"}, {"title": "{OSS}: Using Online Scanning Services for Censorship Circumvention", "author": "David Fifield and Gabi Nakibly and Dan Boneh", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "month": "July", "year": "2013", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2013/paper_29.pdf", "key": "pets13-oss"}, {"title": "The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting", "author": "Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "month": "July", "year": "2013", "www_tags": "selected", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf", "key": "pets13-splitting"}, {"title": "Exploiting Delay Patterns for User IPs Identification in Cellular Networks", "author": "Vasile Claudiu Perta and Marco Valerio Barbera and Alessandro Mei", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Perta.pdf", "key": "pets14-cellular-ident"}, {"title": "CloudTransport: Using Cloud Storage for Censorship-Resistant Networking", "author": "Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Brubaker.pdf", "key": "pets14-cloudtransport"}, {"title": "The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency", "author": "Casey Devet and Ian Goldberg", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_section": "Private Information Retrieval", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Devet.pdf", "key": "pets14-combining-pir"}, {"title": "Dovetail: Stronger Anonymity in Next-Generation Internet Routing", "author": "Jody Sankey and Matthew Wright", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Sankey.pdf", "key": "pets14-dovetail"}, {"title": "Do dummies pay off? Limits of dummy traffic protection in anonymous communications", "author": "Simon Oya, Carmela Troncoso and Fernando P{\\'e}rez-Gonz\\'alez", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Traffic analysis,Anonymous communication", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Oya.pdf", "key": "pets14-dummy-traffic"}, {"title": "I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis", "author": "Brad Miller and Ling Huang and A. D. Joseph and J. D. Tygar", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Miller.pdf", "key": "pets14-https-traffic-analysis"}, {"title": "Measuring Freenet in the Wild: Censorship-resilience under Observation", "author": "Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Anonymous publication", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Roos.pdf", "key": "pets14-measuring-freenet"}, {"title": "Spoiled Onions: Exposing Malicious Tor Exit Relays", "author": "Philipp Winter and Richard K\\\"ower and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl", "booktitle": "Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)", "month": "July", "year": "2014", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "https://www.petsymposium.org/2014/papers/Winter.pdf", "key": "pets14-spoiled-onions"}, {"title": "How unique is your web browser?", "author": "Peter Eckersley", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium", "pages": "1--18", "year": "2010", "month": "July", "location": "Berlin, Germany", "www_section": "Misc", "www_tags": "selected", "www_pdf_url": "http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf", "key": "pets2010:eckersley2010unique"}, {"title": "An Accurate System-Wide Anonymity Metric for Probabilistic Attacks", "author": "Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "year": "2011", "month": "July", "location": "Waterloo, Canada", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf", "www_section": "Traffic analysis", "key": "pets2011-bagai"}, {"title": "DefenestraTor: Throwing out Windows in Tor", "author": "Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey Voelker", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "year": "2011", "month": "July", "location": "Waterloo, Canada", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "pets2011-defenestrator"}, {"title": "Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P", "author": "Michael Herrmann and Christian Grothoff", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "year": "2011", "month": "July", "location": "Waterloo, Canada", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf", "www_section": "Traffic analysis", "key": "pets2011-i2p"}, {"title": "How Unique and Traceable are Usernames?", "author": "Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium", "year": "2011", "month": "July", "www_section": "Pseudonymity", "www_pdf_url": "http://arxiv.org/pdf/1101.5578", "key": "pets2011:TorUsernames"}, {"title": "Blending Different Latency Traffic With Beta Mixing", "author": "Iness Ben Guirat and Debajyoti Das and Claudia Diaz", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "comms", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0059.pdf", "key": "pets24-betamixing"}, {"title": "{CoStricTor}: Collaborative {HTTP} Strict Transport Security in {Tor Browser}", "author": "Killian Davitt and Dan Ristea and Duncan Russell and Steven J. Murdoch", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0020.pdf", "key": "pets24-costrictor"}, {"title": "De{T}orrent: An Adversarial Padding-only Traffic Analysis Defense", "author": "James K Holland and Jason Carpenter and Se Eun Oh and Nicholas Hopper", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0007.pdf", "key": "pets24-dettorrent"}, {"title": "Mix{M}atch: Flow Matching for Mixnet Traffic", "author": "Lennart Oldenburg and Marc Juarez and Enrique Argones R\\'ua and Claudia Diaz", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "analysis", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0050.pdf", "key": "pets24-mixmatch"}, {"title": "Onion Services in the Wild: A Study of Deanonymization Attacks", "author": "Pascal Tippe and Adrian Tippe", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0117.pdf", "key": "pets24-onions"}, {"title": "Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship", "author": "Paul Vines and Samuel McKay and Jesse Jenter and Suresh Krishnaswamy", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0027.pdf", "key": "pets24-raceboat"}, {"title": "Are continuous stop-and-go mixnets provably secure?", "author": "Debajyoti Das and Claudia Diaz and Aggelos Kiayias and Thomas Zacharias", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "Provable shuffles", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0136.pdf", "key": "pets24-sag"}, {"title": "Provable Security for the Onion Routing and Mix Network Packet Format {S}phinx", "author": "Philip Scherer and Christiane Weis and Thorsten Strufe", "booktitle": "Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024)", "month": "July", "year": "2024", "www_tags": "selected", "www_section": "Provable shuffles", "www_pdf_url": "https://petsymposium.org/popets/2024/popets-2024-0140.pdf", "key": "pets24-sphinx"}, {"author": "Andreas Pfitzmann and Michael Waidner", "title": "Networks Without User Observability -- Design Options", "booktitle": "Proceedings of {EUROCRYPT} 1985", "month": "April", "year": "1985", "publisher": "Springer-Verlag, LNCS 219", "www_section": "Anonymous communication", "www_html_url": "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html", "www_tags": "selected", "key": "pfitzmann85"}, {"author": "Birgit Pfitzmann and Andreas Pfitzmann", "title": "How to Break the Direct {RSA}-Implementation of {MIXes}", "booktitle": "Proceedings of {EUROCRYPT} 1989", "publisher": "Springer-Verlag, LNCS 434", "year": "1990", "www_section": "Traffic analysis", "www_ps_gz_url": "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90", "key": "pfitzmann90how"}, {"title": "PHI: a Path-Hidden Lightweight Anonymity Protocol at Network Layer", "author": "Chen Chen and Adrian Perrig", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "1", "year": "2017", "month": "January", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue1/paper15-2017-1-source.pdf", "www_section": "Anonymous communication", "key": "phi-pets2017"}, {"title": "Phonion: Practical Protection of Metadata in Telephony Networks", "author": "Stephan Heuser and Bradley Reaves and Praveen Kumar Pendyala and Henry Carter and Alexandra Dmitrienko and William Enck and Negar Kiyavash and Ahmad-Reza Sadeghi and Patrick Traynor", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "1", "year": "2017", "month": "January", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue1/paper27-2017-1-source.pdf", "www_section": "Anonymous communication", "key": "phonion-pets2017"}, {"author": "Wei Dai", "title": "PipeNet 1.1", "howpublished": "Post to Cypherpunks mailing list", "year": "1998", "month": "November", "day": "26", "www_txt_url": "http://www.eskimo.com/~weidai/pipenet.txt", "www_section": "Anonymous communication", "www_remarks": "Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html", "www_tags": "selected", "key": "pipenet"}, {"author": "Wei Dai", "title": "PipeNet 1.0", "howpublished": "Post to Cypherpunks mailing list", "year": "1998", "month": "January", "day": "19", "www_html_url": "http://cypherpunks.venona.com/date/1998/01/msg00878.html", "www_section": "Anonymous communication", "www_remarks": "First written in 1996 based on cypherpunks posts in 1995.", "www_tags": "selected", "key": "pipenet10"}, {"title": "Private Information Retrieval", "author": "Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan", "booktitle": "Proceedings of the {IEEE} Symposium on Foundations of Computer Science", "pages": "41--50", "year": "1995", "www_ps_url": "http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps", "www_section": "Private Information Retrieval", "key": "pir"}, {"title": "Guard Placement Attacks on Location-Based Path Selection Algorithms in Tor", "author": "Gerry Wan and Aaron Johnson and Ryan Wails and Sameer Wagh and Prateek Mittal", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2019", "number": "4", "year": "2019", "month": "October", "www_tags": "selected", "www_pdf_url": "", "www_section": "Traffic analysis", "key": "placement-pets2019"}, {"title": "{Point Break}: A Study of Bandwidth Denial-of-Service Attacks against {Tor}", "author": "Rob Jansen and Tavish Vaidya and Micah Sherr", "booktitle": "Proceedings of the 28th USENIX Security Symposium ({Sec} '19)", "year": "2019", "month": "August", "publisher": "USENIX Association", "www_section": "Anonymous communication", "www_pdf_url": "https://www.robgjansen.com/publications/pointbreak-sec2019.pdf", "www_tags": "selected", "key": "pointbreak-sec2019"}, {"author": "Claudia Diaz and Bart Preneel", "title": "Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "year": "2004", "series": "LNCS", "location": "Toronto", "month": "May", "www_section": "Anonymous communication", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", "www_tags": "selected", "key": "pool-dummy04"}, {"title": "Towards Predicting Efficient and Anonymous Tor Circuits", "author": "Armon Barton and Mohsen Imani and Jiang Ming and Matthew Wright", "booktitle": "Proceedings of the 27th Usenix Security Symposium", "month": "August", "year": "2018", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-barton.pdf", "www_tags": "selected", "key": "predicting-sec2018"}, {"title": "PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication", "author": "Ludovic Barman and Mahdi Zamani and Italo Dacosta and Joan Feigenbaum and Bryan Ford and Jean-Pierre Hubaux and David Wolinsky", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016)}", "year": "2016", "month": "November", "www_pdf_url": "http://dedis.cs.yale.edu/dissent/papers/wpes16-prifi.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "prifi-wpes16"}, {"author": "Rob Jansen and Aaron Johnson", "title": "Safely Measuring Tor", "booktitle": "Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)", "year": "2016", "month": "October", "www_section": "Misc", "www_pdf_url": "http://ohmygodel.com/publications/privcount-ccs2016.pdf", "www_tags": "selected", "key": "privcount-ccs2016"}, {"author": "Kai Rannenberg and Giovanni Iachello", "title": "Protection Profiles for Remailer Mixes", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "year": "2000", "month": "July", "www_section": "Anonymous communication", "www_pdf_url": "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", "key": "pro-pro:pet2000"}, {"author": "Andrea Forte and Nazanin Andalibi and Rachel Greenstadt", "title": "Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers", "year": "2019", "month": "May", "booktitle": "Proceedings of Conference on Human Factors in Computing Systems (CHI)", "www_section": "Economics", "www_tags": "selected", "www_pdf_url": "http://andreaforte.net/McDonaldCHI2019_privacyAnonymity.pdf", "key": "providers-chi2019"}, {"author": "Kirill Levchenko and Damon McCoy", "title": "Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "year": "2011", "month": "February", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf", "key": "proximax11"}, {"author": "Marc Waldman and Aviel Rubin and Lorrie Cranor", "title": "Publius: {A} robust, tamper-evident, censorship-resistant and source-anonymous web publishing system", "booktitle": "Proceedings of the 9th USENIX Security Symposium", "pages": "59--72", "year": "2000", "month": "August", "www_section": "Anonymous publication", "www_pdf_url": "http://www.cs.nyu.edu/~waldman/publius/publius.pdf", "www_tags": "selected", "key": "publius"}, {"title": "Pudding: Private User Discovery in Anonymity Networks", "author": "Ceren Kocaogullar and Daniel Hugenroth and Martin Kleppmann and Alastair R. Beresford and Martin Kleppmann", "booktitle": "Proceedings of the 45th IEEE Symposium on Security and Privacy", "year": "2024", "month": "May", "www_section": "comms", "www_tags": "selected", "www_remarks": "The authors put up a blog post at https://martin.kleppmann.com/2024/07/05/pudding-user-discovery-anonymity-networks.html", "www_pdf_url": "https://arxiv.org/pdf/2311.10825", "key": "pudding-oakland2024"}, {"author": "Marie Elisabeth Gaup Moe", "title": "Quantification of Anonymity for Mobile Ad Hoc Networks", "booktitle": "Proceedings of the 4th International Workshop on Security and Trust Management (STM 08)", "year": "2008", "pages": "25--36", "month": "June", "location": "Trondheim, Norway", "www_section": "Traffic analysis", "www_pdf_url": "http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf", "www_tags": "selected", "key": "quant-adhoc"}, {"author": "Charles Rackoff and Daniel R. Simon", "title": "Cryptographic Defense Against Traffic Analysis", "booktitle": "Proceedings of {ACM} Symposium on Theory of Computing", "pages": "672--681", "year": "1993", "www_section": "Traffic analysis", "www_ps_url": "http://research.microsoft.com/crypto/papers/ta.ps", "www_tags": "selected", "key": "rackoff93cryptographic"}, {"title": "Detecting Traffic Snooping in Tor Using Decoys", "author": "Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis", "booktitle": "Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection", "series": "RAID'11", "month": "September", "year": "2011", "location": "Menlo Park, CA", "pages": "222--241", "publisher": "Springer-Verlag", "address": "Berlin, Heidelberg", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf", "key": "raid2011:chakravartydetecting"}, {"author": "Markus Jakobsson and Ari Juels and Ronald L. Rivest", "title": "Making mix nets robust for electronic voting by randomized partial checking", "booktitle": "Proceedings of the 11th USENIX Security Symposium", "year": "2002", "month": "August", "www_important": "1", "www_section": "Provable shuffles", "www_pdf_url": "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf", "www_tags": "selected", "key": "randomized-checking"}, {"author": "Josyula R. Rao and Pankaj Rohatgi", "title": "Can Pseudonymity Really Guarantee Privacy?", "booktitle": "Proceedings of the 9th USENIX Security Symposium", "year": "2000", "month": "August", "publisher": "USENIX", "pages": "85--96", "www_section": "Pseudonymity", "www_pdf_url": "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", "www_tags": "selected", "key": "rao-pseudonymity"}, {"title": "{RAPTOR}: Routing Attacks on Privacy in {Tor}", "author": "Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer Rexford and Mung Chiang and Prateek Mittal", "booktitle": "Proceedings of the 24th USENIX Security Symposium", "year": "2015", "month": "August", "www_section": "Traffic analysis", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-sun.pdf", "www_tags": "selected", "key": "raptor-sec2015"}, {"title": "PAR: Payment for Anonymous Routing", "author": "Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin", "pages": "219--236", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf", "key": "raykova-pet2008"}, {"author": "Jean-Fran\\c{c}ois Raymond", "title": "{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "year": "2000", "month": "July", "pages": "10--29", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "www_section": "Traffic analysis", "www_important": "1", "www_ps_url": "http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps", "www_pdf_url": "http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf", "www_tags": "selected", "key": "raymond00"}, {"author": "Anja Jerichow and Jan M\\\"uller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner", "title": "{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}", "journal": "IEEE Journal on Selected Areas in Communications", "year": "1998", "volume": "16", "number": "4", "www_section": "Anonymous communication", "www_html_url": "http://www.zurich.ibm.com/security/publications/1998.html", "www_tags": "selected", "key": "realtime-mix"}, {"author": "Reardon, Joel", "title": "Improving {Tor} using a {TCP}-over-{DTLS} Tunnel", "school": "University of Waterloo", "year": "2008", "month": "September", "www_abstract_url": "http://hdl.handle.net/10012/4011", "www_pdf_url": "http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf", "www_section": "Anonymous communication,Tor Performance", "www_tags": "selected", "key": "reardon-thesis"}, {"author": "George Danezis and Ross Anderson", "title": "The Economics of Censorship Resistance", "booktitle": "Proceedings of Workshop on Economics and Information Security (WEIS04)", "year": "2004", "month": "May", "www_section": "Economics", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", "www_tags": "selected", "key": "redblue"}, {"author": "Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao", "title": "Regroup-And-Go mixes to counter the $(n-1)$ attack", "journal": "Journal of Internet Research", "pages": "213--223", "volume": "16", "year": "2006", "doi": "http://dx.doi.org/10.1108/10662240610656528", "number": "2", "publisher": "Emerald Group Publishing Limited", "www_section": "Anonymous communication", "www_tags": "selected", "key": "regroup2006"}, {"author": "Michael Reiter and XiaoFeng Wang", "title": "Fragile Mixing", "booktitle": "{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}", "year": "2004", "month": "October", "publisher": "ACM Press", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf", "www_tags": "selected", "key": "reiter:ccs2004"}, {"title": "Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay [short paper]", "author": "Alex Biryukov and Ivan Pustogarov", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'15)", "year": "2015", "month": "February", "www_section": "Tor Performance", "www_pdf_url": "http://fc15.ifca.ai/preproceedings/paper_71.pdf", "key": "relay-anon-micropay-fc14"}, {"author": "Sameer Parekh", "title": "Prospects for Remailers", "journal": "First Monday", "volume": "1", "number": "2", "month": "August", "year": "1996", "www_section": "Anonymous communication", "www_html_url": "http://www.firstmonday.dk/issues/issue2/remailers/", "www_tags": "selected", "key": "remailer-history"}, {"title": "Website Detection Using Remote Traffic Analysis", "author": "Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "month": "July", "year": "2012", "publisher": "Springer", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2012/paper_53.pdf", "key": "remote-traffic-pets12"}, {"author": "Roger Dingledine and Nick Mathewson and Paul Syverson", "title": "{Reputation in P2P Anonymity Systems}", "booktitle": "Proceedings of Workshop on Economics of Peer-to-Peer Systems", "month": "June", "year": "2003", "www_section": "Economics", "www_pdf_url": "https://freehaven.net/doc/econp2p03/econp2p03.pdf", "www_tags": "selected", "key": "rep-anon"}, {"author": "Philippe Golle and Markus Jakobsson", "title": "Reusable Anonymous Return Channels", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "location": "Washington, DC, USA", "month": "October", "year": "2003", "www_section": "Anonymous communication", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/return.pdf", "www_ps_url": "http://crypto.stanford.edu/~pgolle/papers/return.ps", "www_remarks": "Reencryption mix-nets can allow users to use a single reply channel even when they maintain multiple separate nyms (think of it like a reply block but it looks different each time you give it to somebody).", "www_tags": "selected", "key": "reusable-channels:wpes2003"}, {"author": "Ian Goldberg and David Wagner", "title": "{TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web}", "journal": "First Monday", "volume": "3", "number": "4", "month": "August", "year": "1998", "www_section": "Anonymous publication", "www_html_url": "http://www.firstmonday.dk/issues/issue3_4/goldberg/", "www_ps_url": "http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps", "www_tags": "selected", "key": "rewebber"}, {"title": "Riffle: An Efficient Communication System With Strong Anonymity", "author": "Albert Kwon and David Lazar and Srinivas Devadas and Bryan Ford", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "2", "pages": "115--134", "year": "2016", "month": "April", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Riffle.pdf", "www_tags": "selected", "key": "riffle-pets2016"}, {"author": "Meredith L. Patterson and Len Sassaman", "title": "Subliminal Channels in the Private Information Retrieval Protocols", "year": "2007", "booktitle": "Proceedings of the 28th Symposium on Information Theory in the Benelux", "location": "Enschede, NL", "publisher": "Werkgemeenschap voor Informatie- en Communicatietheorie", "www_section": "Private Information Retrieval", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-895.pdf", "key": "ringstwice07"}, {"title": "{Riposte}: An anonymous messaging system handling millions of users", "author": "Corrigan-Gibbs, Henry and Boneh, Dan and Mazi{\\`e}res, David", "booktitle": "Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P 2015)", "pages": "321--338", "year": "2015", "month": "May", "location": "San Jose, California, USA", "editor": "", "publisher": "IEEE Computer Society", "isbn": "978-1-4673-6949-7", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "https://www.henrycg.com/files/academic/papers/oakland15riposte.pdf", "key": "riposte2015"}, {"title": "Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform", "author": "Paul Vines and Tadayoshi Kohno", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2015)}", "year": "2015", "month": "October", "www_pdf_url": "https://homes.cs.washington.edu/~yoshi/papers/wpes-rook.pdf", "www_tags": "selected", "www_section": "Communications Censorship", "key": "rook-wpes15"}, {"title": "On the Impossibility of Efficient Self-Stabilization in Virtual Overlays with Churn", "author": "Stefanie Roos and Thorsten Strufe", "booktitle": "Proceedings of IEEE INFOCOM 2015", "year": "2015", "month": "April", "publisher": "IEEE", "www_tags": "selected", "www_pdf_url": "https://www.researchgate.net/profile/Stefanie_Roos/publication/280623435_On_the_Impossibility_of_Efficient_Self-Stabilization_in_Virtual_Overlays_with_Churn/links/55bf708108ae092e96669065.pdf", "www_section": "Anonymous publication", "key": "roos15impossibility"}, {"title": "{Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays}", "author": "Stefanie Roos and Martin Beck and Thorsten Strufe", "booktitle": "Proceedings of IEEE INFOCOM 2016", "year": "2016", "month": "April", "publisher": "IEEE", "www_pdf_url": "https://secure-redaktion.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_informatik/sysa/ps/forschung/Publications/roos16anonymous", "www_section": "Anonymous publication", "key": "roos16anonymous"}, {"title": "Dealing with Dead Ends -- Efficient Routing in Darknets", "author": "Stefanie Roos and Thorsten Strufe", "journal": "Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS)", "year": "2016", "organization": "ACM", "www_pdf_url": "https://secure-redaktion.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_informatik/sysa/ps/forschung/Publications/roos16dealing", "www_section": "Anonymous publication", "key": "roos16dealing"}, {"author": "Anne Edmundson and Anna Kornfeld Simpson and Joshua A. Kroll and Edward W. Felten", "title": "{Security Audit of Safeplug ``Tor in a Box''}", "booktitle": "Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "www_tags": "selected", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci14/foci14-edmundson.pdf", "www_section": "Anonymous communication", "publisher": "USENIX Association", "key": "safeplug-foci"}, {"title": "Salmon: Robust Proxy Distribution for Censorship Circumvention", "author": "Frederick Douglas and Rorshach and Weiyang Pan and Matthew Caesar", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://petsymposium.org/2016/files/papers/Salmon__Robust_Proxy_Distribution_for_Censorship_Circumvention.pdf", "www_tags": "selected", "key": "salmon-pets2016"}, {"title": "How to Bypass Two Anonymity Revocation Systems", "author": "George Danezis and Len Sassaman", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "pages": "187--201", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/KWF.pdf", "key": "sassaman-pet2008"}, {"title": "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval", "author": "Len Sassaman and Bram Cohen and Nick Mathewson", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005)}", "year": "2005", "month": "November", "location": "Arlington, VA, USA", "www_pdf_url": "http://www.abditum.com/pynchon/sassaman-wpes2005.pdf", "www_section": "Pseudonymity", "www_important": "1", "www_tags": "selected", "key": "sassaman:wpes2005"}, {"author": "Dahlberg, Rasmus and Syverson, Paul and Nordberg, Linus and Finkel, Matthew", "title": "Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses", "year": "2022", "isbn": "9781450398732", "publisher": "Association for Computing Machinery", "url": "https://doi.org/10.1145/3559613.3563208", "doi": "10.1145/3559613.3563208", "abstract": "{Onion addresses offer valuable features such as lookup and routing security, self-authenticated connections, and censorship resistance. Therefore, many websites are also available as onionsites in Tor. The way registered domains and onion addresses are associated is however a weak link. We introduce sauteed onions, transparent associations from domain names to onion addresses. Our approach relies on TLS certificates to establish onion associations. It is much like today's onion location which relies on Certificate Authorities (CAs) due to its HTTPS requirement, but has the added benefit of becoming public for everyone to see in Certificate Transparency (CT) logs. We propose and prototype two uses of sauteed onions: certificate-based onion location and search engines that use CT logs as the underlying database. The achieved goals are consistency of available onion associations, which mitigates attacks where users are partitioned depending on which onion addresses they are given, forward censorship-resistance after a TLS site has been configured once, and improved third-party discovery of onion associations, which requires less trust while easily scaling to all onionsites that opt-in.}", "booktitle": "Proceedings of the 21st Workshop on Privacy in the Electronic Society", "pages": "35--40", "numpages": "6", "www_section": "Misc", "www_pdf_url": "https://www.diva-portal.org/smash/get/diva2:1722436/FULLTEXT01.pdf", "key": "sauteedonions2022"}, {"title": "Fingerprinting Past the Front Page: Identifying Keywords in Search Engine Queries over Tor", "author": "Se Eun Oh and Shuai Li and Nicholas Hopper", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "4", "year": "2017", "month": "October", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue4/paper59-2017-4-source.pdf", "www_section": "Traffic analysis", "key": "search-engine-pets2017"}, {"title": "New bounds for randomized busing", "author": "Seidena, Steven S and Chena, Peter P and Laxb, RF and Chena, J and Dingb, Guoli", "journal": "Theoretical Computer Science", "volume": "332", "pages": "63--81", "year": "2005", "www_section": "comm", "www_pdf_url": "https://www.math.lsu.edu/~lax/TCS.pdf", "key": "seidena2005busing"}, {"author": "Andrei Serjantov", "title": "A Fresh Look at the Generalized Mix Framework", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Fresh_look.pdf", "key": "serjantov-pet2007"}, {"title": "{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}", "author": "Rob Jansen and Nicholas Hopper", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'12", "year": "2012", "month": "February", "publisher": "Internet Society", "www_tags": "selected", "www_pdf_url": "http://www.internetsociety.org/sites/default/files/09_3.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "shadow-ndss12"}, {"author": "Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson", "title": "{SHALON}: Lightweight Anonymization based on Open Standards", "booktitle": "Proceedings of 18th International Conference on Computer Communications and Networks", "year": "2009", "location": "San Francisco, CA, USA", "month": "August", "www_section": "Anonymous communication", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf", "www_tags": "selected", "key": "shalon-anon"}, {"author": "Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan", "title": "P5: A Protocol for Scalable Anonymous Communication", "booktitle": "Proceedings of the 2002 IEEE Symposium on Security and Privacy", "year": "2002", "month": "May", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cs.umd.edu/projects/p5/p5.pdf", "www_ps_url": "http://www.cs.umd.edu/projects/p5/p5.ps", "www_tags": "selected", "key": "sherwood-protocol"}, {"title": "Breaking and Provably Fixing Minx", "author": "Eric Shimshock and Matt Staats and Nicholas Hopper", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "pages": "99--114", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf", "key": "shimshock-pet2008"}, {"title": "ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing", "author": "Kyle Hogan and Sacha Servan-Schreiber and Zacharay Newman and Ben Weintraub and Cristina Nita-Rotaru and Srinivas Devadas", "booktitle": "Proceedings of the 43rd IEEE Symposium on Security and Privacy", "year": "2022", "month": "May", "pages": "1933--1952", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "https://arxiv.org/pdf/2204.04489", "key": "shortor-oakland2022"}, {"author": "Anna Shubina and Sean Smith", "title": "Using Caching for Browsing Anonymity", "journal": "ACM SIGEcom Exchanges", "year": "2003", "volume": "4", "number": "2", "month": "September", "www_section": "Anonymous communication", "www_pdf_url": "http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf", "www_tags": "selected", "key": "shsm03"}, {"author": "C. Andrew Neff", "title": "A Verifiable Secret Shuffle and its Application to E-Voting", "booktitle": "{Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}", "pages": "116--125", "year": "2001", "editor": "P. Samarati", "month": "November", "publisher": "ACM Press", "www_section": "Provable shuffles", "www_pdf_url": "http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf", "www_tags": "selected", "key": "shuffle:ccs01"}, {"title": "Signal{C}ookie: Discovering Guard Relays of Hidden Services in Parallel", "author": "Muqian Chen and Xuebin Wan and Tingwen Liu and Jinqiao Shi and Zelin Yin and Binxing Fang", "booktitle": "Proceedings of 2019 IEEE Symposium on Computers and Communications (ISCC)", "year": "2019", "month": "June", "publisher": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/signalcookie-2019.pdf", "www_tags": "selected", "key": "signalcookie-2019"}, {"title": "{Agyaat: mutual anonymity over structured P2P networks}", "author": "A. Singh and B. Gedik and L. Liu", "journal": "Internet Research", "volume": "16", "number": "2", "pages": "189--212", "year": "2006", "www_section": "Anonymous communication", "key": "singh2006ama"}, {"author": "Sachin Katti and Jeffery Cohen and Dina Katabi", "title": "Information Slicing: Anonymity Using Unreliable Overlays", "booktitle": "Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI)", "year": "2007", "month": "April", "www_section": "Anonymous communication", "www_pdf_url": "http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf", "www_tags": "selected", "key": "slicing07"}, {"title": "Slitheen: Perfectly imitated decoy routing through traffic replacement", "author": "Cecylia Bocovich and Ian Goldberg", "booktitle": "Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)", "year": "2016", "month": "October", "www_section": "Communications Censorship", "www_pdf_url": "https://cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf", "www_tags": "selected", "key": "slitheen-ccs2016"}, {"author": "Robin Snader and Nikita Borisov", "title": "A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '08", "year": "2008", "month": "February", "publisher": "Internet Society", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf", "www_tags": "selected", "key": "snader08"}, {"author": "Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\\\"{o}}rn Scheuermann", "title": "The Sniper Attack: Anonymously Deanonymizing and Disabling the {T}or Network", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '14", "year": "2014", "month": "February", "publisher": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "https://www.robgjansen.com/publications/sniper-ndss2014.pdf", "www_tags": "selected", "key": "sniper14"}, {"title": "Snowflake, a censorship circumvention system using temporary {WebRTC} proxies", "author": "Cecylia Bocovich and Arlo Breault and David Fifield and Serene and Xiaokang Wang", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-bocovich.pdf", "www_tags": "selected", "key": "snowflake-sec2024"}, {"title": "Anonymous Communication with On-line and Off-line Onion Encoding", "author": "Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski", "booktitle": "Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005)", "year": "2005", "month": "January", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "sofem05-Klonowski"}, {"author": "George Danezis and Claudia Diaz", "title": "Space-Efficient Private Search", "month": "February", "year": "2007", "booktitle": "Proceedings of Financial Cryptography (FC2007)", "series": "Lecture Notes in Computer Science", "location": "Tobago", "publisher": "Springer-Verlag", "www_section": "Private Information Retrieval", "key": "space-efficient"}, {"author": "Aniket Kate and Ian Goldberg", "title": "Using Sphinx to Improve Onion Routing Circuit Construction", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "year": "2010", "month": "January", "editor": "Radu Sion", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf", "www_tags": "selected", "key": "sphinx-onion-fc10"}, {"title": "{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention", "author": "Patrick Tser Jern Kon and Sina Kamali and Jinyu Pei and Diogo Barradas and Ang Chen and Micah Sherr and Moti Yung", "booktitle": "Proceedings of the 33rd USENIX Security Symposium ({Sec} '24)", "year": "2024", "month": "August", "publisher": "USENIX Association", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/usenixsecurity24-kon.pdf", "www_tags": "selected", "key": "spotproxy-sec2024"}, {"author": "George Danezis", "title": "Statistical Disclosure Attacks: Traffic Confirmation in Open Environments", "booktitle": "Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})", "pages": "421--426", "year": "2003", "editor": "Gritzalis and Vimercati and Samarati and Katsikas", "location": "Athens", "month": "May", "organization": "{IFIP TC11}", "publisher": "Kluwer", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf", "www_tags": "selected", "key": "statistical-disclosure"}, {"author": "Sandra Steinbrecher and Stefan K\\\"opsell", "title": "Modelling Unlinkability", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "year": "2003", "month": "March", "editor": "Roger Dingledine", "publisher": "Springer-Verlag, LNCS 2760", "pages": "32--47", "www_section": "Traffic analysis", "www_pdf_url": "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf", "www_tags": "selected", "key": "steinbrecher:pet2003"}, {"author": "Xinyuan Wang and Douglas S. Reeves and S. Felix Wu", "title": "Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones", "booktitle": "Proceedings of ESORICS 2002", "year": "2002", "month": "October", "pages": "244--263", "www_section": "Traffic analysis", "www_pdf_url": "http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf", "www_tags": "selected", "key": "stepping-stones"}, {"author": "Steven J. Murdoch", "title": "Covert channel vulnerabilities in anonymity systems", "school": "University of Cambridge", "year": "2007", "month": "December", "www_section": "Anonymous communication", "www_pdf_url": "http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf", "www_tags": "selected", "key": "steven-thesis"}, {"author": "Dogan Kesdogan and Jan Egner and Roland B\\\"uschkes", "title": "Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System", "booktitle": "Proceedings of Information Hiding Workshop (IH 1998)", "year": "1998", "publisher": "Springer-Verlag, LNCS 1525", "www_section": "Anonymous communication", "www_pdf_url": "http://www.uow.edu.au/~ldn01/infohide98.pdf", "www_tags": "selected", "www_important": "1", "key": "stop-and-go"}, {"author": "Tonda Benes", "title": "The Strong Eternity Service", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "year": "2001", "month": "April", "editor": "Ira S. Moskowitz", "publisher": "Springer-Verlag, LNCS 2137", "www_section": "Anonymous publication", "www_pdf_url": "https://freehaven.net/anonbib/papers/strong-eternity.pdf", "www_tags": "selected", "key": "strong-eternity"}, {"title": "Sublinear Scaling for Multi-Client Private Information Retrieval", "author": "Wouter Lueks and Ian Goldberg", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'15)", "year": "2015", "month": "February", "www_section": "Private Information Retrieval", "www_pdf_url": "http://fc15.ifca.ai/preproceedings/paper_48.pdf", "key": "sublinearpir-fc14"}, {"author": "John Douceur", "title": "{The Sybil Attack}", "booktitle": "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", "month": "March", "year": "2002", "www_section": "Traffic analysis", "www_important": "1", "www_pdf_url": "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf", "www_tags": "selected", "key": "sybil"}, {"author": "Roger Dingledine and Vitaly Shmatikov and Paul Syverson", "title": "Synchronous Batching: From Cascades to Free Routes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "186--206", "www_section": "Anonymous communication", "www_pdf_url": "https://freehaven.net/doc/sync-batching/sync-batching.pdf", "www_ps_url": "https://freehaven.net/doc/sync-batching/sync-batching.ps", "www_tags": "selected", "key": "sync-batching"}, {"author": "George Danezis and Claudia Diaz and Paul F. Syverson", "title": "{Systems for Anonymous Communication}", "month": "August", "year": "2010", "pages": "341--390", "editor": "B. Rosenberg and D. Stinson", "booktitle": "CRC Handbook of Financial Cryptography and Security", "publisher": "Chapman \\& Hall", "series": "CRC Cryptography and Network Security Series", "volume": "", "www_tags": "selected", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf", "www_section": "Anonymous communication", "key": "systems-anon-communication"}, {"author": "Paul F. Syverson and Stuart G. Stubblebine", "title": "Group Principals and the Formalization of Anonymity", "booktitle": "Proceedings of the World Congress on Formal Methods (1)", "pages": "814--833", "year": "1999", "www_section": "Formal methods", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf", "www_tags": "selected", "key": "syverson99"}, {"title": "TagIt: Tagging Network Flows using Blind Fingerprints", "author": "Fatemeh Rezaei and Amir Houmansadr", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "4", "year": "2017", "month": "October", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue4/paper66-2017-4-source.pdf", "www_section": "Traffic analysis", "key": "tagit-pets2017"}, {"author": "Ian Goldberg", "title": "On the Security of the {Tor} Authentication Protocol", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "316--331", "www_section": "Formal methods", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/torsec.pdf", "www_tags": "selected", "key": "tap:pet2006"}, {"title": "An ISP-Scale Deployment of TapDance", "author": "Sergey Frolov and Fred Douglas and Will Scott and Allison McDonald and Benjamin VanderSloot and Rod Hynes and Adam Kruger and Michalis Kallitsis and David G. Robinson and Nikita Borisov and Alex Halderman and Eric Wustrow", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet", "year": "2017", "month": "August", "series": "FOCI '17", "location": "Vancouver, Canada", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci17/foci17-paper-frolov_0.pdf", "key": "tapdance-foci17"}, {"title": "Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", "author": "Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '17", "year": "2017", "month": "February", "publisher": "Internet Society", "www_section": "Anonymous communication", "www_pdf_url": "https://www.robgjansen.com/publications/taps-ndss2017.pdf", "www_tags": "selected", "key": "taps-ndss2017"}, {"title": "Tarzan: A Peer-to-Peer Anonymizing Network Layer", "author": "Michael J. Freedman and Robert Morris", "booktitle": "{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}", "location": "Washington, DC", "month": "November", "year": "2002", "www_section": "Anonymous communication", "www_pdf_url": "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", "www_important": "1", "www_tags": "selected", "key": "tarzan:ccs02"}, {"title": "TASP: Towards Anonymity Sets that Persist", "author": "Jamie Hayes and Carmela Troncoso and George Danezis", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2016)}", "year": "2016", "month": "November", "www_pdf_url": "http://www.homepages.ucl.ac.uk/~ucabaye/papers/TASP.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "tasp-wpes16"}, {"author": "Yael Gertner and Shafi Goldwasser and Tal Malkin", "title": "A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication", "booktitle": "Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98)", "year": "1998", "isbn": "3-540-65142-X", "pages": "200--217", "publisher": "Springer-Verlag", "location": "London, UK", "www_ps_gz_url": "http://eprint.iacr.org/1998/013.ps.gz", "www_section": "Private Information Retrieval", "key": "tau-indy"}, {"author": "Claudia Diaz and Bart Preneel", "title": "Taxonomy of Mixes and Dummy Traffic", "booktitle": "Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems", "year": "2004", "location": "Toulouse, France", "month": "August", "www_section": "Anonymous communication", "www_pdf_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf", "www_tags": "selected", "key": "taxonomy-dummy"}, {"title": "{Spying in the Dark: TCP and Tor Traffic Analysis}", "author": "Yossi Gilad and Amir Herzberg", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "month": "July", "year": "2012", "publisher": "Springer", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2012/paper_57.pdf", "key": "tcp-tor-pets12"}, {"title": "Tempest: Temporal Dynamics in Anonymity Systems", "author": "Ryan Wails and Yixin Sun and Aaron Johnson and Mung Chiang and Prateek Mittal", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2018", "number": "3", "year": "2018", "month": "June", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2018/files/papers/issue3/popets-2018-0019.pdf", "www_section": "Traffic analysis", "key": "tempest-pets2018"}, {"author": "Andreas Pfitzmann and Marit Hansen", "title": "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", "www_section": "Misc", "www_html_url": "http://dud.inf.tu-dresden.de/Anon_Terminology.shtml", "howpublished": "Draft", "year": "2000", "month": "July", "optnote": "For date of the latest version, see the document itself", "www_tags": "selected", "key": "terminology"}, {"title": "{Throttling Tor Bandwidth Parasites}", "author": "Rob Jansen and Paul Syverson and Nicholas Hopper", "booktitle": "Proceedings of the 21st USENIX Security Symposium", "year": "2012", "month": "August", "www_tags": "selected", "www_pdf_url": "https://www.robgjansen.com/publications/throttling-sec2012.pdf", "www_section": "Traffic analysis,Tor Performance", "key": "throttling-sec12"}, {"author": "Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright", "title": "Timing Attacks in Low-Latency Mix-Based Systems", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "year": "2004", "month": "February", "editor": "Ari Juels", "publisher": "Springer-Verlag, LNCS 3110", "pages": "251--265", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf", "www_tags": "selected", "key": "timing-fc2004"}, {"hal_id": "hal-00744919", "url": "http://hal.inria.fr/hal-00744919", "title": "{A Bird's Eye View on the I2P Anonymous File-sharing Environment}", "author": "Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier", "abstract": "{Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous file-sharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.}", "keywords": "Large scale monitoring, I2P, Security risks, Anonymous file-sharing", "language": "English", "affiliation": "MADYNES - INRIA Nancy - Grand Est / LORIA", "booktitle": "{Proceedings of the 6th International Conference on Network and System Security}", "address": "Wu Yi Shan, China", "audience": "international", "year": "2012", "month": "November", "www_pdf_url": "http://hal.inria.fr/hal-00744919/PDF/A\\_Birda\\_s\\_Eye\\_View\\_on\\_the\\_I2P\\_Anonymous\\_0AFile-sharing\\_Environment\\_0A.pdf", "www_section": "Traffic analysis", "key": "timpanaro:hal-00744919"}, {"hal_id": "hal-00744922", "url": "http://hal.inria.fr/hal-00744922", "title": "{Improving Content Availability in the I2P Anonymous File-Sharing Environment}", "author": "Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier", "abstract": "{Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.}", "language": "English", "affiliation": "MADYNES - INRIA Nancy - Grand Est / LORIA", "booktitle": "{Proceedings of the 4th International Symposium on Cyberspace Safety and Security}", "publisher": "Springer", "pages": "77--92", "address": "Melbourne, Australia", "volume": "4", "audience": "international", "doi": "10.1007/978-3-642-35362-8", "year": "2012", "month": "December", "www_pdf_url": "http://hal.inria.fr/hal-00744922/PDF/Improving\\_Content\\_Availability\\_in\\_the\\_I2P\\_0AAnonymous\\_File-Sharing\\_Environment\\_0A.pdf", "www_section": "Anonymous communication", "key": "timpanaro:hal-00744922"}, {"hal_id": "inria-00632259", "url": "http://hal.inria.fr/inria-00632259", "title": "{Monitoring the I2P network}", "author": "Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier", "abstract": "{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and we show through a one week long experiment that we are able to identify 32\\% of all running applications, among web servers and file- sharing clients. Additionally, we identify 37\\% of published I2P applications, which turn out to be unreachable after its publication on the I2P distributed database.}", "language": "English", "affiliation": "MADYNES - INRIA Lorraine - LORIA", "institution": "MADYNES - INRIA Lorraine - LORIA", "year": "2011", "month": "October", "www_pdf_url": "http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf", "www_section": "Traffic analysis", "key": "timpanaro:inria-00632259"}, {"title": "Ting: Measuring and Exploiting Latencies Between All Tor Nodes", "author": "Frank Cangialosi and Dave Levin and Neil Spring", "booktitle": "Proceedings of the 2015 Internet Measurement Conference", "month": "October", "year": "2015", "www_section": "Traffic analysis", "www_pdf_url": "https://www.cs.umd.edu/~dml/papers/ting_imc15.pdf", "www_tags": "selected", "key": "ting-imc2015"}, {"title": "Hardening Tor Hidden Services", "author": "Tippe, Pascal", "year": "2022", "month": "December", "school": "University of Turku", "abstract": "{Tor is an overlay anonymization network that provides anonymity for clients surfing the web but also allows hosting anonymous services called hidden services. These enable whistleblowers and political activists to express their opinion and resist censorship. Administrating a hidden service is not trivial and requires extensive knowledge because Tor uses a comprehensiveprotocol and relies on volunteers. Meanwhile, attackers can spend significant resources to decloak them. This thesis aims to improve the security of hidden services by providing practical guidelines and a theoretical architecture. First, vulnerabilities specific to hidden services are analyzed by conducting an academic literature review. To model realistic real-world attackers, court documents are analyzed to determine their procedures. Both literature reviews classify the identified vulnerabilities into general categories. Afterward, a risk assessment process is introduced, and existing risks for hidden services and their operators are determined. The main contributions of this thesis are practical guidelines for hidden service operators and a theoretical architecture. The former provides operators with a good overview of practices to mitigate attacks. The latter is a comprehensive infrastructure that significantly increases the security of hidden services and alleviates problems in the Tor protocol. Afterward, limitations and the transfer into practice are analyzed. Finally, future research possibilities are determined.}", "url": "https://www.utupub.fi/handle/10024/174164", "www_abstract_url": "https://www.utupub.fi/handle/10024/174164", "www_pdf_url": "https://www.utupub.fi/bitstream/handle/10024/174164/Tippe_Pascal_Thesis.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "tippe2022"}, {"title": "How Much Anonymity does Network Latency Leak?", "author": "Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin", "journal": "ACM Transactions on Information and System Security", "year": "2010", "month": "February", "volume": "13", "number": "2", "www_important": "1", "www_tags": "selected", "www_pdf_url": "http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf", "www_section": "Traffic analysis", "key": "tissec-latency-leak"}, {"title": "The use of TLS in Censorship Circumvention", "author": "Sergey Frolov and Eric Wustrow", "booktitle": "Proceedings of the 26th Symposium on Network and Distributed System Security ({NDSS} '19)", "year": "2019", "month": "February", "publisher": "Internet Society", "www_section": "Communications Censorship", "www_pdf_url": "https://freehaven.net/anonbib/papers/ndss2019_03B-2-1_Frolov_paper.pdf", "www_tags": "selected", "key": "tls-ndss2019"}, {"title": "Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks", "author": "Claudia Diaz and Steven J. Murdoch and Carmela Troncoso", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "year": "2010", "month": "July", "location": "Berlin, Germany", "www_tags": "selected", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf", "www_section": "Traffic analysis", "key": "topology-pet2010"}, {"title": "Design of a blocking-resistant anonymity system", "author": "Roger Dingledine and Nick Mathewson", "institution": "The Tor Project", "number": "2006-1", "year": "2006", "month": "November", "www_tags": "selected", "www_section": "Anonymous communication", "www_important": "1", "www_pdf_url": "https://svn.torproject.org/svn/projects/design-paper/blocking.pdf", "key": "tor-blocking"}, {"author": "Roger Dingledine and Nick Mathewson and Paul Syverson", "title": "{Tor}: The Second-Generation Onion Router", "booktitle": "Proceedings of the 13th USENIX Security Symposium", "year": "2004", "month": "August", "www_section": "Anonymous communication", "www_important": "1", "www_pdf_url": "https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf", "www_html_url": "https://svn.torproject.org/svn/projects/design-paper/tor-design.html", "www_tags": "selected", "key": "tor-design"}, {"author": "Jeremy Clark and P. C. van Oorschot and Carlisle Adams", "title": "{Usability of anonymous web browsing: an examination of Tor interfaces and deployability}", "booktitle": "{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)}", "year": "2007", "month": "July", "isbn": "978-1-59593-801-5", "pages": "41--51", "location": "Pittsburgh, Pennsylvania", "doi": "http://doi.acm.org/10.1145/1280680.1280687", "publisher": "ACM", "address": "New York, NY, USA", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf", "key": "tor-soups07"}, {"title": "Identifying and Characterizing Sybils in the Tor Network", "author": "Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster", "year": "2016", "booktitle": "Proceedings of the 25th Usenix Security Symposium", "month": "August", "www_section": "Traffic analysis", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_winter.pdf", "www_tags": "selected", "key": "tor-sybils2016"}, {"author": "Akshaya Mani and T Wilson-Brown and Rob Jansen and Aaron Johnson and Micah Sherr", "title": "Understanding Tor Usage with Privacy-Preserving Measurement", "booktitle": "Proceedings of the Internet Measurement Conference 2018 (IMC '18)", "year": "2018", "month": "October", "publisher": "ACM", "www_pdf_url": "https://www.robgjansen.com/publications/torusage-imc2018.pdf", "www_section": "Traffic analysis", "www_tags": "selected", "key": "tor-usage-imc18"}, {"title": "Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments", "author": "Jens Hiller and Jan Pennekamp and Markus Dahlmanns and Martin Henze and Andriy Panchenko and Klaus Wehrle", "booktitle": "Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19)", "year": "2019", "month": "October", "www_tags": "selected", "www_pdf_url": "https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-tailoring.pdf", "www_section": "Anonymous communication", "key": "tor4iot-icnp2019"}, {"author": "Rob Jansen and Aaron Johnson", "title": "On the Accuracy of Tor Bandwidth Estimation", "booktitle": "Proceedings of the Passive and Active Measurement Conference (PAM '21)", "year": "2021", "publisher": "Springer International Publishing", "pages": "481--498", "www_section": "Anonymous communication", "www_pdf_url": "https://www.robgjansen.com/publications/torbwest-pam2021.pdf", "www_tags": "selected", "key": "torbwest-pam2021"}, {"title": "Compromising Anonymity Using Packet Spinning", "author": "Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P. Markatos", "booktitle": "Proceedings of the 11th Information Security Conference (ISC 2008)", "year": "2008", "month": "September", "location": "Taipei, Taiwan", "www_tags": "selected", "www_pdf_url": "http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf", "www_section": "Anonymous communication", "key": "torspinISC08"}, {"title": "Low-Cost Traffic Analysis of {Tor}", "author": "Steven J. Murdoch and George Danezis", "booktitle": "Proceedings of the 2005 IEEE Symposium on Security and Privacy", "year": "2005", "month": "May", "publisher": "IEEE CS", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf", "www_important": "1", "www_tags": "selected", "key": "torta05"}, {"author": "Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew Caesar", "title": "Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2015", "month": "June", "volume": "2015", "number": "2", "pages": "171--187", "doi": "10.1515/popets-2015-0021", "www_section": "Traffic analysis", "www_pdf_url": "http://ohmygodel.com/publications/tortraceroutes-pets15.pdf", "www_tags": "selected", "key": "tortraceroutes-pets2015"}, {"author": "Aaron Johnson and Aaron D. Jaggard and Paul Syverson", "title": "Throwing Your Weight Around: Fixing Tor's Positional Weighting", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2023", "volume": "2023", "number": "4", "pages": "593--612", "www_section": "Traffic analysis", "www_pdf_url": "https://ohmygodel.com/publications/torweights-pets2023.pdf", "www_tags": "selected", "key": "torweights-pets2023"}, {"title": "k-Indistinguishable Traffic Padding in Web Applications", "author": "Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "month": "July", "year": "2012", "publisher": "Springer", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "https://freehaven.net/anonbib/papers/pets2012/paper_46.pdf", "key": "traffic-padding-pets12"}, {"title": "Traffic{S}liver: Fighting Website Fingerprinting Attacks with Traffic Splitting", "author": "Wladimir De la Cadena and Asya Mitseva and Jens Hiller and Jan Pennekamp and Sebastian Reuter and Julian Filter and Klaus Wehrle and Thomas Engel and Andriy Panchenko", "booktitle": "Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)", "year": "2020", "month": "November", "www_tags": "selected", "www_pdf_url": "https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-delacadena-trafficsliver.pdf", "www_section": "Anonymous communication", "key": "trafficsliver-ccs2020"}, {"title": "An Anonymity Vulnerability in {T}or", "author": "Qingfeng Tan and Xuebin Wang and Wei Shi and Jian Tang and Zhihong Tian", "booktitle": "Proceedings of IEEE/ACM Transactions on Networking", "publisher": "ACM", "year": "2022", "month": "December", "www_section": "Traffic analysis", "www_pdf_url": "https://www.csit.carleton.ca/wshi/wp-content/uploads/2022/09/An_Anonymity_Vulnerability_in_Tor.pdf", "www_tags": "selected", "key": "trapper-ton22"}, {"author": "Andrei Serjantov and Roger Dingledine and Paul Syverson", "title": "From a Trickle to a Flood: Active Attacks on Several Mix Types", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "year": "2002", "month": "October", "editor": "Fabien Petitcolas", "publisher": "Springer-Verlag, LNCS 2578", "www_section": "Traffic analysis", "www_ps_url": "https://freehaven.net/doc/batching-taxonomy/taxonomy.ps", "www_pdf_url": "https://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", "www_tags": "selected", "www_important": "1", "key": "trickle02"}, {"title": "Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two", "author": "Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate", "booktitle": "Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P 2018)", "year": "2018", "month": "May", "location": "San Francisco, California, USA", "publisher": "IEEE Computer Society", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "https://eprint.iacr.org/2017/954.pdf", "key": "trilemma-oakland2018"}, {"author": "Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran", "title": "{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography", "booktitle": "Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf", "www_section": "Communications Censorship", "key": "trist-foci"}, {"author": "Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel", "title": "Traffic Analysis Attacks on a Continuously-Observable Steganographic File System", "year": "2007", "month": "June", "pages": "220--236", "booktitle": "Proceedings of Information Hiding Workshop (IH 2007)", "editor": "T. Furon et al", "volume": "4567", "number": "", "series": "Lecture Notes in Computer Science", "location": "Saint-Malo,FR", "publisher": "Springer-Verlag", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-890.pdf", "www_section": "Misc", "key": "troncoso-ih2007"}, {"title": "Perfect Matching Statistical Disclosure Attacks", "author": "Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede", "pages": "2--23", "editor": "Nikita Borisov and Ian Goldberg", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "month": "July", "year": "2008", "publisher": "Springer", "location": "Leuven, Belgium", "bookurl": "https://petsymposium.org/2008/", "www_section": "Traffic analysis", "www_tags": "selected", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf", "key": "troncoso-pet2008"}, {"author": "Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan Feigenbaum", "title": "20,000 In League Under the Sea: Anonymous Communication, Trust, {MLAT}s, and Undersea Cables", "journal": "Proceedings on Privacy Enhancing Technologies", "year": "2015", "month": "April", "volume": "2015", "number": "1", "pages": "4--24", "www_section": "Traffic analysis", "www_pdf_url": "http://ohmygodel.com/publications/trustrep-popets15.pdf", "www_tags": "selected", "key": "trustrep-pets2015"}, {"title": "{A Scalable Anonymous Server Overlay Network}", "author": "H. Tsai and A. Harwood", "journal": "Proceedings of the 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA'06)-Volume 01", "pages": "973--978", "year": "2006", "publisher": "IEEE Computer Society Washington, DC, USA", "www_section": "Anonymous communication", "key": "tsai2006sas"}, {"author": "Florian Tschorsch and Bj{\\\"{o}}rn Scheurmann", "title": "How (not) to build a transport layer for anonymity overlays", "month": "June", "year": "2012", "booktitle": "Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy", "www_tags": "selected", "www_pdf_url": "http://pade12.mytestbed.net/pade12-final6.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "tschorsch:translayeranon"}, {"author": "Gene Tsudik", "title": "A Family of Dunces", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Misc", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Family_dunces.pdf", "key": "tsudik-pet2007"}, {"title": "How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services", "author": "Rebekah Overdorf and Marc Juarez and Gunes Acar and Rachel Greenstadt and Claudia Diaz", "booktitle": "Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)", "year": "2017", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "https://cosic.esat.kuleuven.be/fingerprintability/fingerprintability.pdf", "www_tags": "selected", "key": "unique-ccs2017"}, {"title": "Anonymity Loves Company: Usability and the Network Effect", "author": "Roger Dingledine and Nick Mathewson", "www_section": "Economics", "www_pdf_url": "https://freehaven.net/doc/wupss04/usability.pdf", "www_tags": "selected", "editor": "Ross Anderson", "booktitle": "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", "month": "June", "year": "2006", "location": "Cambridge, UK", "bookurl": "http://weis2006.econinfosec.org/", "key": "usability:weis2006"}, {"title": "Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems", "author": "Greg Norcie and Jim Blythe and Kelly Caine and L Jean Camp", "booktitle": "Proceedings of the 2014 Workshop on Usable Security (USEC)", "year": "2014", "month": "February", "www_tags": "selected", "www_pdf_url": "https://www.ndss-symposium.org/wp-content/uploads/2017/09/04_1-paper.pdf", "www_section": "Misc", "key": "usableTor"}, {"author": "Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and Ian Goldberg", "title": "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval", "booktitle": "Proceedings of the 20th USENIX Security Symposium", "year": "2011", "month": "August", "www_section": "Anonymous communication,Tor Performance", "www_pdf_url": "http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf", "www_tags": "selected", "key": "usenix11-pirtor"}, {"author": "Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman", "title": "Telex: Anticensorship in the Network Infrastructure", "booktitle": "Proceedings of the 20th USENIX Security Symposium", "year": "2011", "month": "August", "www_section": "Communications Censorship", "www_pdf_url": "http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf", "www_tags": "selected", "www_important": "1", "key": "usenix11-telex"}, {"title": "An Analysis of Private Browsing Modes in Modern Browsers", "author": "Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh", "booktitle": "Proceedings of the 19th Usenix Security Symposium", "month": "August", "year": "2010", "www_section": "Misc", "www_tags": "selected", "www_pdf_url": "http://www.collinjackson.com/research/private-browsing.pdf", "key": "usenix2010:aggarwal2010analysis"}, {"author": "Lasse {\\O}verlier and Paul Syverson", "title": "Valet Services: Improving Hidden Servers with a Personal Touch", "editor": "George Danezis and Philippe Golle", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "month": "June", "year": "2006", "publisher": "Springer", "location": "Cambridge, UK", "bookurl": "https://petsymposium.org/2006/", "pages": "223--244", "www_section": "Pseudonymity", "www_pdf_url": "http://www.onion-router.net/Publications/valet-services.pdf", "www_tags": "selected", "key": "valet:pet2006"}, {"title": "Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis", "author": "Jelle van den Hooff and David Lazar and Matei Zaharia and Nickolai Zeldovich", "booktitle": "Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP 2015)", "year": "2015", "month": "October", "address": "Monterey, California", "www_pdf_url": "https://pdos.csail.mit.edu/papers/vuvuzela:sosp15.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "vuvuzela:sosp15"}, {"author": "Benedikt Westermann", "title": "Security Analysis of {AN.ON}'s Payment Scheme", "booktitle": "Proceedings of NordSec 2009", "year": "2009", "editor": "Audun J{\\o}sang and Torleiv Maseng and Svein Johan Knapskog", "volume": "5838/2009", "series": "Lecture Notes in Computer Science", "pages": "255--270", "month": "October", "publisher": "Springer", "www_section": "Anonymous communication", "key": "w09"}, {"author": "Robyn Wagner", "title": "{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}", "journal": "New Mexico Law Review", "volume": "32", "number": "Winter", "pages": "99--142", "year": "2002", "www_section": "Misc", "www_tags": "selected", "key": "wagner"}, {"author": "Marc Waldman and David Mazi\\`eres", "title": "Tangler: a censorship-resistant publishing system based on document entanglements", "booktitle": "{Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}", "pages": "126--135", "year": "2001", "month": "November", "www_section": "Anonymous publication", "www_important": "1", "www_ps_url": "http://www.cs.nyu.edu/~waldman/tangler.ps", "www_tags": "selected", "key": "waldman01tangler"}, {"title": "Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks", "author": "Tao Wang and Ian Goldberg", "booktitle": "Proceedings of the 26th Usenix Security Symposium", "month": "August", "year": "2017", "www_section": "Anonymous communication", "www_pdf_url": "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang-tao.pdf", "www_tags": "selected", "key": "walkie-talkie2017"}, {"title": "Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks", "author": "Wan, Zhiguo and Xing, Kai and Liu, Yunhao", "booktitle": "Proceedings of the 31st Annual IEEE Conference on Computer Communications (INFOCOM 2012)", "pages": "73--81", "year": "2012", "organization": "IEEE", "www_pdf_url": "http://www.cse.ust.hk/~liu/Infocom_12_Zhiguo.pdf", "www_section": "Misc", "key": "wan2012priv"}, {"author": "Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg", "title": "Effective Attacks and Provable Defenses for Website Fingerprinting", "booktitle": "Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_tags": "selected", "www_section": "Traffic analysis", "www_pdf_url": "http://cacr.uwaterloo.ca/techreports/2014/cacr2014-05.pdf", "key": "wang14-fingerprinting-defenses"}, {"title": "{System and method for protecting privacy and anonymity of parties of network communications}", "author": "Y.M. Wang and Q. Sun and D.R. Simon and W. Russell", "year": "2006", "howpublished": "US Patent 6,986,036", "publisher": "Google Patents", "note": "US Patent 6,986,036", "www_section": "Anonymous communication", "key": "wang2006sam"}, {"title": "Anonymous communication with network coding against traffic analysis attack", "author": "Wang, Jin and Wang, Jianping and Wu, Chuan and Lu, Kejie and Gu, Naijie", "booktitle": "Proceedings of the 30th Annual IEEE Conference on Computer Communications (INFOCOM 2011)", "pages": "1008--1016", "year": "2011", "organization": "IEEE", "www_pdf_url": "http://i.cs.hku.hk/~cwu/papers/jwang-infocom11.pdf", "www_section": "Misc", "key": "wang2011anonymous"}, {"title": "Universal Re-encryption of Signatures and Controlling Anonymous Information Flow", "author": "Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski", "booktitle": "Proceedings of WARTACRYPT '04", "year": "2004", "month": "July", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf", "www_section": "Misc", "www_tags": "selected", "key": "warta04-Klonowski"}, {"title": "Waterfilling: Balancing the Tor network with maximum diversity", "author": "Florentin Rochet and Olivier Pereira", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2017", "number": "2", "year": "2017", "month": "April", "www_tags": "selected", "www_pdf_url": "https://petsymposium.org/2017/papers/issue2/paper05-2017-2-source.pdf", "www_section": "Tor Performance", "key": "waterfilling-pets2017"}, {"author": "Oliver Berthold and Hannes Federrath and Stefan K\\\"opsell", "title": "Web {MIX}es: A system for anonymous and unobservable {I}nternet access", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "editor": "H. Federrath", "publisher": "Springer-Verlag, LNCS 2009", "pages": "115--129", "year": "2000", "month": "July", "www_section": "Anonymous communication", "www_pdf_url": "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf", "www_tags": "selected", "key": "web-mix:pet2000"}, {"title": "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on {WebRTC}", "author": "Diogo Barradas and Nuno Santos and Luis Rodrigues and V\\'{i}tor Nunes", "booktitle": "Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)", "year": "2020", "month": "November", "www_tags": "selected", "www_pdf_url": "https://web.ist.utl.pt/diogo.barradas/papers/barradas-ccs20.pdf", "www_section": "Communications Censorship", "key": "webrtc-ccs2020"}, {"title": "On Realistically Attacking Tor with Website Fingerprinting", "author": "Tao Wang and Ian Goldberg", "journal": "Proceedings on Privacy Enhancing Technologies", "volume": "2016", "number": "4", "year": "2016", "month": "October", "www_section": "Traffic analysis", "www_pdf_url": "https://petsymposium.org/2016/files/papers/On_Realistically_Attacking_Tor_with_Website_Fingerprinting.pdf", "www_tags": "selected", "key": "websitefingerprinting-pets2016"}, {"title": "A Case Study on Measuring Statistical Data in the {T}or Anonymity Network", "author": "Karsten Loesing and Steven J. Murdoch and Roger Dingledine", "booktitle": "Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)", "year": "2010", "month": "January", "location": "Tenerife, Canary Islands, Spain", "publisher": "Springer", "series": "LNCS", "www_section": "Anonymous communication", "www_tags": "selected", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf", "key": "wecsr10measuring-tor"}, {"title": "Performance Comparison of low-latency Anonymisation Services from a User Perspective", "author": "Rolf Wendolsky and Dominik Herrmann and Hannes Federrath", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Performance_comparison.pdf", "key": "wendolsky-pet2007"}, {"author": "Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini", "title": "Design principles for low latency anonymous network systems secure against timing attacks", "booktitle": "Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07)", "year": "2007", "isbn": "1-920-68285-X", "pages": "183--191", "location": "Ballarat, Australia", "publisher": "Australian Computer Society, Inc", "address": "Darlinghurst, Australia, Australia", "www_pdf_url": "http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=", "www_tags": "selected", "www_section": "Traffic analysis", "key": "wiangsripanawan-acsw07"}, {"title": "Fingerprinting {T}or's Hidden Service Log Files Using a Timing Channel", "author": "Juan A. Elices and Fernando Perez-Gonzalez and Carmela Troncoso", "booktitle": "Proceedings of the 3rd IEEE International Workshop on Information Forensics and Security (WIFS 2011)", "year": "2011", "month": "November", "www_section": "Traffic analysis", "www_pdf_url": "http://carmelatroncoso.com/papers/Elices-WIFS11.pdf", "key": "wifs2011-fingerprinting"}, {"title": "Dust: A Blocking-Resistant Internet Transport Protocol", "author": "Brandon Wiley", "institution": "School of Information, University of Texas at Austin", "year": "2011", "www_tags": "selected", "www_pdf_url": "http://blanu.net/Dust.pdf", "www_section": "Communications Censorship", "key": "wileydust"}, {"title": "Anonymous Communication with On-line and Off-line Onion Encoding", "author": "Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of Workshop on Information Security Applications (WISA 2004)", "year": "2004", "month": "August", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "wisa04-Klonowski"}, {"author": "Benedikt Westermann and Dogan Kesdogan", "title": "Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "year": "2011", "month": "February", "www_tags": "selected", "www_section": "Anonymous communication", "www_pdf_url": "http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf", "key": "wk11-malice-vs-anon"}, {"author": "Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend", "title": "Nonesuch: a mix network with sender unobservability", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}", "month": "October", "year": "2006", "isbn": "1-59593-556-8", "pages": "1--8", "location": "Alexandria, Virginia, USA", "doi": "http://doi.acm.org/10.1145/1179601.1179603", "publisher": "ACM Press", "address": "New York, NY, USA", "www_pdf_url": "http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf", "www_section": "Anonymous communication", "www_tags": "selected", "key": "wpes06:heydt-benjamin"}, {"title": "{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design}", "author": "Jon McLachlan and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "year": "2009", "month": "November", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf", "www_section": "Traffic analysis", "key": "wpes09-bridge-attack"}, {"title": "{Hashing it out in public: Common failure modes of DHT-based anonymity schemes}", "author": "Andrew Tran and Nicholas Hopper and Yongdae Kim", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "year": "2009", "month": "November", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf", "www_section": "Traffic analysis", "key": "wpes09-dht-attack"}, {"title": "{XPay: Practical anonymous payments for Tor routing and other networked services}", "author": "Yao Chen and Radu Sion and Bogdan Carbunar", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "year": "2009", "month": "November", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf", "www_section": "Anonymous communication", "key": "wpes09-xpay"}, {"title": "Jack: Scalable Accumulator-based Nymble System", "author": "Zi Lin and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "year": "2010", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf", "www_section": "Misc", "key": "wpes10-jack"}, {"title": "Balancing the Shadows", "author": "Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "year": "2010", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf", "www_section": "Anonymous communication", "key": "wpes10-shadows"}, {"title": "Unraveling an Old Cloak: k-anonymity for Location Privacy", "author": "Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and Jean-Pierre Hubaux", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "year": "2010", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2", "www_section": "Anonymous communication", "key": "wpes10-unraveling"}, {"title": "{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization", "author": "Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "year": "2011", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf", "www_section": "Anonymous communication", "key": "wpes11-bridgespa"}, {"title": "FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting", "author": "Peter Lofgren and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "year": "2011", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf", "www_section": "Anonymous communication", "key": "wpes11-faust"}, {"title": "Website Fingerprinting in Onion Routing Based Anonymization Networks", "author": "Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "year": "2011", "month": "October", "location": "Chicago, IL, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf", "www_section": "Traffic analysis", "key": "wpes11-panchenko"}, {"title": "Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor", "author": "Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)", "year": "2012", "month": "October", "location": "Raleigh, NC, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/~arma/cogs-wpes.pdf", "www_section": "Traffic analysis", "key": "wpes12-cogs"}, {"title": "Torchestra: Reducing interactive traffic delays over Tor", "author": "Deepika Gopal and Nadia Heninger", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)", "year": "2012", "month": "October", "location": "Raleigh, NC, USA", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "https://freehaven.net/anonbib/papers/torchestra-wpes.pdf", "www_section": "Anonymous communication,Tor Performance", "key": "wpes12-torchestra"}, {"title": "Thinking Inside the {BLAC} Box: Smarter Protocols for Faster Anonymous Blacklisting", "author": "Ryan Henry and Ian Goldberg", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf", "www_section": "Pseudonymity", "key": "wpes13-blac"}, {"title": "Conscript Your Friends into Larger Anonymity Sets with {J}ava{S}cript", "author": "Henry Corrigan-Gibbs and Bryan Ford", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://dedis.cs.yale.edu/dissent/papers/wpes13.pdf", "www_section": "Anonymous communication", "key": "wpes13-conscript"}, {"title": "Improved Website Fingerprinting on Tor", "author": "Tao Wang and Ian Goldberg", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/webfingerprint-wpes.pdf", "www_section": "Traffic analysis", "key": "wpes13-fingerprinting"}, {"title": "Improved Group Off-The-Record Messaging", "author": "Hong Liu and Eugene Y. Vasserman and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/gotr.pdf", "www_section": "Anonymous communication", "key": "wpes13-gotr"}, {"title": "You Cannot Hide for Long: De-Anonymization of Real-World Dynamic Behaviour", "author": "George Danezis and Carmela Troncoso", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/DanezisTroncoso13.pdf", "www_section": "Traffic analysis", "key": "wpes13-hide"}, {"title": "ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship", "author": "Philipp Winter and Tobias Pulls and Juergen Fuss", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)", "year": "2013", "month": "November", "location": "Berlin, Germany", "publisher": "ACM", "www_tags": "selected", "www_pdf_url": "http://www.cs.kau.se/philwint/pdf/wpes2013.pdf", "www_section": "Traffic analysis", "key": "wpes13-scramblesuit"}, {"author": "Xiang Cai and Rishab Nithyanand and Rob Johnson", "title": "{CS-BuFLO}: A Congestion Sensitive Website Fingerprinting Defense", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "http://pub.cs.sunysb.edu/~rob/papers/csbuflo.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "wpes14-csbuflo"}, {"author": "Shuai Li and Mike Schliep and Nick Hopper", "title": "Facet: Streaming over Videoconferencing for Censorship Circumvention", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf", "www_tags": "selected", "www_section": "Communications Censorship", "key": "wpes14-facet"}, {"author": "Li Xi and Dengguo Feng", "title": "{FARB}: Fast Anonymous Reputation-Based Blacklisting without {TTPs}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "", "www_tags": "selected", "www_section": "Pseudonymity", "key": "wpes14-farb"}, {"author": "Rishab Nithyanand and Xiang Cai and Rob Johnson", "title": "Glove: A Bespoke Website Fingerprinting Defense", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "http://www.cs.stonybrook.edu/~rob/papers/glove.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "wpes14-glove"}, {"author": "John Geddes and Rob Jansen and Nicholas Hopper", "title": "Tor {IMUX}: Managing Connections from Two to Infinity, and Beyond", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf", "www_tags": "selected", "www_section": "Tor Performance", "key": "wpes14-imux"}, {"author": "Aziz Mohaisen and Matthew Thomas", "title": "Measuring the Leakage of Onion at the Root", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "https://www.verisign.com/assets/onionleakage.pdf", "www_tags": "selected", "www_section": "Anonymous communication", "key": "wpes14-leakage"}, {"author": "Jiangmin Yu and Eric Chan-Tin", "title": "Identifying Webbrowsers in Encrypted Communications", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2014)}", "year": "2014", "month": "November", "www_pdf_url": "http://www.cs.okstate.edu/~chantin/WPES2014.pdf", "www_section": "Traffic analysis", "key": "wpes14-webbrowsers"}, {"author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "title": "An Analysis of the Degradation of Anonymous Protocols", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '02", "year": "2002", "month": "February", "publisher": "IEEE", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf", "www_tags": "selected", "key": "wright02"}, {"author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "title": "Defending Anonymous Communication Against Passive Logging Attacks", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "year": "2003", "month": "May", "pages": "28--43", "www_section": "Traffic analysis", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf", "www_tags": "selected", "www_important": "1", "key": "wright03"}, {"author": "Eric Wustrow and Colleen M. Swanson and J. Alex Halderman", "title": "TapDance: End-to-Middle Anticensorship without Flow Blocking", "booktitle": "Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)", "year": "2014", "month": "August", "address": "San Diego, CA", "publisher": "USENIX Association", "www_tags": "selected", "www_section": "Communications Censorship", "www_pdf_url": "https://jhalderm.com/pub/papers/tapdance-sec14.pdf", "key": "wustrow14-tapdance"}, {"author": "Shlomi Dolev and Rafail Ostrobsky", "title": "Xor-trees for efficient anonymous multicast and reception", "journal": "ACM Trans. Inf. Syst. Secur", "volume": "3", "number": "2", "year": "2000", "pages": "63--84", "publisher": "ACM Press", "address": "New York, NY, USA", "www_section": "Anonymous communication", "www_ps_url": "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps", "www_tags": "selected", "key": "xor-trees"}, {"title": "The drunk motorcyclist protocol for anonymous communication", "author": "Young, Adam L and Yung, Moti", "booktitle": "Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2014", "pages": "157--165", "year": "2014", "www_section": "comm", "organization": "IEEE", "key": "young2014drunkmotorcyclist"}, {"title": "Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin", "author": "Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza", "booktitle": "Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy", "year": "2014", "month": "May", "publisher": "IEEE", "www_section": "E-Cash / Anonymous Credentials", "www_pdf_url": "http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf", "key": "zerocash"}, {"author": "Ge Zhong and Ian Goldberg and Urs Hengartner", "title": "Louis, Lester, and Pierre: Three Protocols for Location Privacy", "editor": "Nikita Borisov and Philippe Golle", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "month": "June", "year": "2007", "publisher": "Springer", "location": "Ottawa, Canada", "bookurl": "https://petsymposium.org/2007/", "www_section": "Anonymous communication", "www_pdf_url": "https://petsymposium.org/2007/papers/PET2007_preproc_Louis_Lester.pdf", "key": "zhong-pet2007"}, {"author": "Alf Zugenmaier", "title": "{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "year": "2004", "month": "May", "series": "LNCS", "volume": "3424", "pages": "121--141", "www_section": "Anonymous communication", "key": "zugenmaier:pet2004"}]