[{"publisher": "IEEE Computer Society", "doi": "http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40", "isbn": "0-7695-2651-9", "title": "Resilient P2P Anonymous Routing by Using Redundancy", "journal": "iwnas", "author": "Yingwu Zhu", "pages": "103--110", "volume": "0", "key": "10.1109/IWNAS.2006.40", "year": "2006", "www_section": "Anonymous communication", "address": "Los Alamitos, CA, USA"}, {"publisher": "IEEE Computer Society", "doi": "http://doi.ieeecomputersociety.org/10.1109/SP.2006.17", "author": "Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter Rautenbach", "journal": "sp", "title": "Fundamental Limits on the Anonymity Provided by the MIX Technique", "pages": "86--99", "volume": "0", "www_pdf_url": "http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf", "key": "10.1109/SP.2006.17", "year": "2006", "www_section": "Traffic analysis", "address": "Los Alamitos, CA, USA", "issn": "1081-6011"}, {"publisher": "ACTA Press", "isbn": "0-88986-545-0", "title": "Timing channels, anonymity, mixes, and spikes", "booktitle": "Proceedings of the 2nd IASTED international conference on Advances in computer science and technology (ACST '06)", "author": "Ira S. Moskowitz and Richard E. Newman", "month": "January", "pages": "251--256", "location": "Puerto Vallarta, Mexico", "key": "1166488", "year": "2006", "www_section": "Formal methods", "address": "Anaheim, CA, USA"}, {"title": "GAS: Overloading a File Sharing Network as an Anonymizing System", "booktitle": "Proceedings of Second International Workshop on Security, (IWSEC 2007)", "author": "Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos", "year": "2007", "www_pdf_url": "http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf", "location": "Nara, Japan", "key": "AthanRAM07", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2612", "title": "Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes", "booktitle": "Proceedings of {CT-RSA} 2003", "author": "Bodo M{\\\"o}ller", "year": "2003", "month": "April", "www_pdf_url": "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", "key": "BM:mixencrypt", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Dan Boneh and Philippe Golle", "booktitle": "{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}", "title": "Almost Entirely Correct Mixing With Application to Voting", "year": "2002", "month": "November", "pages": "68--77", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/psp.ps", "location": "Washington, DC", "key": "BonehGolle:psp2002", "www_tags": "selected", "www_section": "Provable shuffles", "editor": "Vijay Atluri"}, {"publisher": "Springer", "title": "k-Anonymity", "booktitle": "Security in Decentralized Data Management", "author": "Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati", "howpublished": "Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer", "www_pdf_url": "http://seclab.dti.unimi.it/Papers/kanonymity.pdf", "editor": "T. Yu and S. Jajodia", "key": "CDFS07", "year": "2007", "www_remarks": "Discusses the original k-anonymity proposal and research results on k-anonymity. Introduces also a taxonomy of k-anonymity solutions.", "www_section": "Anonymous publication", "address": "Berlin Heidelberg"}, {"publisher": "ACM Press", "doi": "http://doi.acm.org/10.1145/258533.258609", "isbn": "0-89791-888-6", "title": "Computationally private information retrieval (extended abstract)", "booktitle": "Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97)", "author": "Benny Chor and Niv Gilboa", "year": "1997", "month": "May", "pages": "304--313", "www_pdf_url": "http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf", "location": "El Paso, Texas, United States", "key": "CPIR", "www_tags": "selected", "www_ps_url": "http://www.cs.technion.ac.il/~gilboa/stoc_final.ps", "www_section": "Private Information Retrieval", "address": "New York, NY, USA"}, {"title": "Probability of Error in Information-Hiding Protocols", "booktitle": "Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)", "author": "Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden", "year": "2007", "www_pdf_url": "http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf", "location": "S. Servolo island, Venice - Italy", "key": "ChatziPP07", "www_tags": "selected", "www_section": "Anonymous communication"}, {"isbn": "978-3-540-68913-3", "title": "Repelling Detour Attack Against Onions with Re-encryption", "ee": "http://dx.doi.org/10.1007/978-3-540-68914-0_18", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Marek Klonowski and Miroslaw Kutylowski and Anna Lauks", "www_publisher_url": "http://www.springerlink.com/content/c8n33l20527t0l03/", "volume": "5037", "pages": "296--308", "location": "New York, NY, USA", "key": "DBLP:conf/acns/KlonowskiKL08", "year": "2008", "bibsource": "DBLP, http://dblp.uni-trier.de", "month": "June", "booktitle": "Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008)", "editor": "Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "{AS}-awareness in {T}or path selection", "www_section": "Anonymous communication", "author": "Matthew Edman and Paul F. Syverson", "pages": "380--389", "month": "November", "www_tags": "selected", "www_pdf_url": "http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "DBLP:conf/ccs/EdmanS09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "A new cell counter based attack against tor", "www_section": "Traffic analysis", "author": "Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Dong Xuan and Weijia Jia", "month": "November", "pages": "578--589", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "DBLP:conf/ccs/LingLYFXJ09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "The bayesian traffic analysis of mix networks", "www_section": "Traffic analysis", "author": "Carmela Troncoso and George Danezis", "pages": "369--379", "month": "November", "www_tags": "selected", "www_pdf_url": "http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "DBLP:conf/ccs/TroncosoD09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "Membership-concealing overlay networks", "www_section": "Anonymous communication", "author": "Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas Hopper and Yongdae Kim", "pages": "390--399", "month": "November", "www_tags": "selected", "www_pdf_url": "http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "DBLP:conf/ccs/VassermanJTHK09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "Springer", "isbn": "978-3-642-04443-4", "title": "The Wisdom of Crowds: Attacks and Optimal Constructions", "series": "Lecture Notes in Computer Science", "www_section": "Traffic analysis", "author": "George Danezis and Claudia D\\'{\\i}az and Emilia K{\\\"a}sper and Carmela Troncoso", "pages": "406--423", "month": "September", "volume": "5789", "www_tags": "selected", "www_pdf_url": "http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf", "editor": "Michael Backes and Peng Ning", "key": "DBLP:conf/esorics/DanezisDKT09", "year": "2009", "booktitle": "Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France"}, {"publisher": "Springer", "isbn": "978-3-540-74834-2", "title": "Countering Statistical Disclosure with Receiver-Bound Cover Traffic", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Nayantara Mallesh and Matthew Wright", "pages": "547--562", "month": "September", "volume": "4734", "www_tags": "selected", "www_pdf_url": "http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf", "editor": "Joachim Biskup and Javier Lopez", "key": "DBLP:conf/esorics/MalleshW07", "year": "2007", "booktitle": "Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007)", "location": "Dresden, Germany"}, {"publisher": "Springer", "isbn": "978-3-642-04443-4", "title": "Secure Pseudonymous Channels", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Sebastian M{\\\"o}dersheim and Luca Vigan{\\`o}", "month": "September", "volume": "5789", "pages": "337--354", "www_pdf_url": "http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\\$File/rz3724_updated_August09.pdf", "editor": "Michael Backes and Peng Ning", "key": "DBLP:conf/esorics/ModersheimV09", "year": "2009", "booktitle": "Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France"}, {"isbn": "978-3-540-79575-9", "ee": "http://dx.doi.org/10.1007/978-3-540-79576-6_18", "series": "Lecture Notes in Computer Science", "month": "May", "volume": "5013", "key": "DBLP:conf/pervasive/CichonKK08", "year": "2008", "pages": "298--314", "publisher": "Springer", "title": "Privacy Protection for RFID with Hidden Subset Identifiers", "www_section": "Misc", "author": "Jacek Cichon and Marek Klonowski and Miroslaw Kutylowski", "www_publisher_url": "http://www.springerlink.com/content/r754w32x71176057/", "editor": "Jadwiga Indulska and Donald J. Patterson and Tom Rodden and Max Ott", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008)", "location": "Sydney, Australia"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "APOD: Anonymous Physical Object Delivery", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Elli Androulaki and Steven M. Bellovin", "month": "August", "volume": "5672", "pages": "202--215", "www_pdf_url": "http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/AndroulakiB09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "Physical Layer Attacks on Unlinkability in Wireless LANs", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker", "month": "August", "volume": "5672", "pages": "108--127", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/BauerMGGS09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications", "series": "Lecture Notes in Computer Science", "www_section": "Traffic analysis", "author": "George Danezis and Carmela Troncoso", "pages": "56--72", "month": "August", "volume": "5672", "www_tags": "selected", "www_pdf_url": "http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/DanezisT09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Barath Raghavan and Tadayoshi Kohno and Alex C. Snoeren and David Wetherall", "pages": "143--163", "month": "August", "volume": "5672", "www_tags": "selected", "www_pdf_url": "http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/RaghavanKSW09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "Using Linkability Information to Attack Mix-Based Anonymity Services", "series": "Lecture Notes in Computer Science", "www_section": "Traffic analysis", "author": "Stefan Schiffner and Sebastian Clau{\\ss}", "month": "August", "volume": "5672", "pages": "94--107", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/SchiffnerC09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "Springer", "isbn": "978-3-642-03167-0", "title": "Scalable Link-Based Relay Selection for Anonymous Routing", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Micah Sherr and Matt Blaze and Boon Thau Loo", "pages": "73--93", "month": "August", "volume": "5672", "www_tags": "selected", "www_pdf_url": "http://micah.cis.upenn.edu/papers/pets09.pdf", "editor": "Ian Goldberg and Mikhail J. Atallah", "key": "DBLP:conf/pet/SherrBL09", "year": "2009", "booktitle": "Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)"}, {"publisher": "IEEE Computer Society", "isbn": "978-0-7695-3633-0", "title": "Sphinx: A Compact and Provably Secure Mix Format", "ee": "http://dx.doi.org/10.1109/SP.2009.15", "www_section": "Anonymous communication", "author": "George Danezis and Ian Goldberg", "pages": "269--282", "month": "May", "www_tags": "selected", "www_pdf_url": "http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf", "editor": "", "key": "DBLP:conf/sp/DanezisG09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 30th IEEE Symposium on Security and Privacy (S\\&P 2009)", "location": "Oakland, California, USA"}, {"publisher": "IEEE Computer Society", "isbn": "978-0-7695-3633-0", "author": "Arvind Narayanan and Vitaly Shmatikov", "title": "De-anonymizing Social Networks", "www_section": "Misc", "www_important": "1", "pages": "173--187", "month": "May", "www_tags": "selected", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf", "editor": "", "key": "DBLP:conf/sp/NarayananS09", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 30th IEEE Symposium on Security and Privacy (S\\&P 2009)", "location": "Oakland, California, USA"}, {"title": "A Survey of Anonymous Communication Channels", "www_section": "Anonymous communication", "author": "George Danezis and Claudia Diaz", "year": "2008", "number": "MSR-TR-2008-35", "month": "January", "www_pdf_url": "ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf", "key": "DD08Survey", "www_tags": "selected", "institution": "Microsoft Research"}, {"publisher": "ACM Press", "author": "Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith", "booktitle": "Proceedings of the European Workshop on System Security (EUROSEC)", "title": "Differential Privacy for Collaborative Security", "month": "April", "www_pdf_url": "http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf", "key": "DPCS2010", "year": "2010", "www_section": "Misc"}, {"title": "Forward Secure Mixes", "booktitle": "Proceedings of 7th Nordic Workshop on Secure {IT} Systems", "author": "George Danezis", "year": "2002", "month": "November", "pages": "195--207", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/fsmix.pdf", "editor": "Fisher-Hubner, Jonsson", "key": "Dan:SFMix03", "www_tags": "selected", "www_section": "Anonymous communication", "day": "7", "location": "Karlstad, Sweden"}, {"title": "Statistical Disclosure or Intersection Attacks on Anonymity Systems", "series": "LNCS", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "author": "George Danezis and Andrei Serjantov", "year": "2004", "www_section": "Traffic analysis", "month": "May", "location": "Toronto", "key": "DanSer04", "www_tags": "selected", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps"}, {"publisher": "Springer-Verlag, LNCS 2482", "author": "Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel", "title": "Towards measuring anonymity", "booktitle": "Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)", "www_important": "1", "year": "2002", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "key": "Diaz02", "www_tags": "selected", "www_ps_gz_url": "http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz", "www_section": "Traffic analysis"}, {"school": "Katholieke Universiteit Leuven", "author": "Claudia Diaz", "www_section": "Anonymous communication", "title": "Anonymity and Privacy in Electronic Services", "year": "2005", "month": "December", "www_pdf_url": "http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf", "key": "DiazThesis05", "www_tags": "selected", "address": "Leuven, Belgium"}, {"school": "Air Force Institute of Technology", "title": "A taxonomy for and analysis of anonymous communications networks", "www_section": "Anonymous communication", "author": "Douglas Kelly", "year": "2009", "month": "March", "www_pdf_url": "http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf", "key": "Douglas-thesis", "www_tags": "selected"}, {"author": "M. Edman and F. Sivrikaya and B. Yener", "journal": "Intelligence and Security Informatics, 2007 IEEE", "title": "A Combinatorial Approach to Measuring Anonymity", "year": "2007", "number": "", "month": "May", "volume": "", "www_pdf_url": "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", "key": "EdmanSY07", "www_tags": "selected", "pages": "356--363", "www_section": "Traffic analysis"}, {"author": "Michael J. Freedman and Yuval Ishai and Benny Pinkas and Omer Reingold", "booktitle": "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", "title": "Keyword Search and Oblivious Pseudorandom Functions", "month": "February", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf", "location": "Cambridge, MA", "key": "FIPR05", "year": "2005", "www_section": "Misc"}, {"author": "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", "booktitle": "Proceedings of {EUROCRYPT} 2004", "title": "Efficient Private Matching and Set Intersection", "month": "May", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf", "location": "Interlaken, Switzerland", "key": "FNP04", "year": "2004", "www_section": "Misc"}, {"title": "On Flow Marking Attacks in Wireless Anonymous Communication Networks", "booktitle": "Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)", "author": "Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao", "year": "2005", "month": "April", "www_pdf_url": "http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf", "key": "Fu::FlowMarking::2005", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Provable Anonymity", "booktitle": "{Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)}", "author": "Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum", "year": "2005", "month": "November", "www_pdf_url": "http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf", "location": "Alexandria, VA, USA", "key": "GHPvR05", "www_tags": "selected", "www_ps_url": "http://www.cs.ru.nl/~flaviog/publications/anonymity.ps", "www_section": "Formal methods"}, {"title": "Rapid Mixing and Security of Chaum's Visual Electronic Voting", "booktitle": "Proceedings of ESORICS 2003", "author": "Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski", "year": "2003", "month": "October", "www_pdf_url": "http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf", "key": "GKK03", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "ACM", "author": "Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)", "title": "Revisiting A Combinatorial Approach Toward Measuring Anonymity", "year": "2008", "month": "October", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf", "location": "Alexandria, VA, USA", "key": "GTDPV-WPES08", "www_tags": "", "www_section": "Traffic analysis"}, {"publisher": "IEEE CS", "author": "Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow", "booktitle": "Proceedings of the 2006 IEEE Symposium on Security and Privacy", "title": "Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks", "year": "2006", "month": "May", "pages": "121--131", "www_pdf_url": "http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf", "location": "Oakland, CA", "key": "Golle:sp2006", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson", "booktitle": "Proceedings of the 2004 RSA Conference, Cryptographer's track", "title": "Universal Re-Encryption for Mixnets", "year": "2004", "month": "February", "www_pdf_url": "http://www.syverson.org/univrenc-ctrsa.pdf", "location": "San Francisco, USA", "key": "GolleJakobssonJuelsSyverson:universal04", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Jinsong Han and Yunhao Liu and Li Lu and Lei Hu and Abhishek Patil", "key": "HanLLHP05", "www_tags": "selected", "booktitle": "Proceedings of ICCNMC", "title": "A Random Walk Based Anonymous Peer-to-Peer Protocol Design", "year": "2005", "www_section": "Anonymous communication", "pages": "143--152"}, {"publisher": "Springer, Berlin", "title": "Probabilistic Anonymity via Coalgebraic Simulations", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of the European Symposium on Programming (ESOP '07)", "author": "Ichiro Hasuo and Yoshinobu Kawabe", "pages": "379--394", "volume": "4421", "www_pdf_url": "http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf", "key": "HasuoK07a", "year": "2007", "www_section": "Formal methods"}, {"author": "Steven J. Murdoch", "booktitle": "Proceedings of CCS 2006", "title": "Hot or Not: Revealing Hidden Services by their Clock Skew", "year": "2006", "month": "November", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf", "key": "HotOrNot", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM Press", "doi": "http://doi.acm.org/10.1145/1161289.1161303", "isbn": "1-59593-557-6", "title": "Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems", "booktitle": "Proceedings of the 5th ACM workshop on Wireless security (WiSe '06)", "author": "Dijiang Huang", "pages": "65--74", "location": "Los Angeles, California", "key": "Huang06", "year": "2006", "www_section": "Traffic analysis", "address": "New York, NY, USA"}, {"title": "{ISDN-mixes: Untraceable communication with very small bandwidth overhead}", "booktitle": "Proceedings of the GI/ITG Conference on Communication in Distributed Systems", "author": "Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner", "year": "1991", "month": "February", "pages": "451--463", "key": "ISDN-mixes", "www_tags": "selected", "www_ps_gz_url": "http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz", "www_section": "Anonymous communication"}, {"author": "Dogan Kesdogan and Vinh Pham and Lexi Pimenidis", "booktitle": "Proceedings of 12th Nordic Workshop on IT-Security, NordSec", "title": "Information Disclosure in Identity Management", "month": "October", "pages": "141--152", "www_pdf_url": "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf", "location": "Reykjavik, Iceland", "key": "InfDisclosureIDM07", "year": "2007", "www_section": "E-Cash / Anonymous Credentials", "editor": "Ulfar Erlingsson and Andrei Sabelfeld"}, {"title": "Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis", "series": "Advances in Information Security", "booktitle": "Proceedings of First Workshop on Quality of Protection", "author": "Dogan Kesdogan and Lexi Pimenidis and Tobias K{\\\"o}lsch", "year": "2005", "locations": "Milan, Italy", "month": "September", "volume": "23", "www_pdf_url": "http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf", "key": "KesdoganPK06", "www_tags": "", "pages": "159--171", "www_section": "Anonymous communication"}, {"publisher": "IEEE Computer Society", "author": "Jiejun Kong and Xiaoyan Hong and Mario Gerla", "title": "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks", "journal": "IEEE Transactions on Mobile Computing", "issn": "1536-1233", "year": "2007", "number": "8", "pages": "888--902", "volume": "6", "www_pdf_url": "http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf", "key": "KongHG07", "www_tags": "selected", "www_section": "Anonymous communication", "address": "Los Alamitos, CA, USA"}, {"publisher": "IEEE", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08", "title": "{TCP} Covert Timing Channels: Design and Detection", "month": "June", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf", "key": "LCC_DSN08", "year": "2008", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'07", "title": "Cloak: A Ten-fold Way for Reliable Covert Communications", "month": "September", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf", "key": "LCC_ESORICS07", "year": "2007", "www_section": "Anonymous communication"}, {"publisher": "IEEE", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the International Conference on Communications - {ICC}'09", "title": "{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding", "month": "June", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf", "key": "LCC_ICC09", "year": "2009", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang", "booktitle": "Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07", "title": "Crafting Web Counters into Covert Channels", "month": "May", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf", "key": "LCC_IFIPSEC07", "year": "2007", "www_section": "Anonymous communication"}, {"author": "Luke O'Connor", "www_section": "Traffic analysis", "title": "Entropy Bounds for Traffic Confirmation", "year": "2008", "number": "2008/365", "month": "October", "www_pdf_url": "http://eprint.iacr.org/2008/365.pdf", "key": "LOCEntropy2008", "www_tags": "selected", "institution": "IACR"}, {"publisher": "IEEE", "key": "LZCCL_DSN11", "author": "Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee", "booktitle": "Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11", "title": "A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks", "year": "2011", "www_section": "Anonymous communication", "month": "June"}, {"publisher": "Internet Society", "author": "Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'11", "title": "{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows", "month": "February", "www_pdf_url": "http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf", "key": "LZCLCP_NDSS11", "year": "2011", "www_section": "Traffic analysis"}, {"publisher": "Springer", "key": "LZPL_ESORICS10", "author": "Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'10", "title": "On the Secrecy of Spread-Spectrum Flow Watermarks", "year": "2010", "www_section": "Traffic analysis", "month": "September"}, {"title": "{Hordes --- A Multicast Based Protocol for Anonymity}", "journal": "Journal of Computer Security", "author": "Brian Neil Levine and Clay Shields", "year": "2002", "number": "3", "volume": "10", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf", "key": "Levine:2002", "www_tags": "selected", "keywords": "anonymity; routing; security; multicast; Journal Paper", "pages": "213--240", "www_section": "Anonymous communication"}, {"title": "{Inferring the Source of Encrypted HTTP Connections}", "booktitle": "Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006)", "author": "Marc Liberatore and Brian Neil Levine", "year": "2006", "month": "November", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf", "pages": "255--263", "key": "Liberatore:2006", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel", "www_abstract_url": "http://www.springerlink.com/content/b3x4na87xbmcextx/", "booktitle": "Proceedings of ICCNMC", "author": "Tianbo Lu and Binxing Fang and Yuzhong Sun and Li Guo", "year": "2005", "pages": "853--862", "key": "LuFSG05", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "{More: A Peer-To-Peer Based Connectionless Onion Router}", "booktitle": "Proceedings of IEEE GLOBECOM, Globalcommunications Conference", "author": "Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko +Niedermayer and Georg Carle", "month": "November", "www_pdf_url": "http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf", "location": "Washington DC, USA", "key": "MORE", "year": "2007", "www_section": "Anonymous communication", "day": "26"}, {"publisher": "IEEE Computer Society Press", "isbn": "978-0-7695-3095-6", "author": "Igor Margasinski and Michal Pioro", "booktitle": "Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA)", "title": "A Concept of an Anonymous Direct P2P Distribution Overlay System", "year": "2008", "month": "March", "pages": "590--597", "www_pdf_url": "http://p2priv.org/pub/p2priv-aina2008.pdf", "location": "Gino-wan, Okinawa, Japan", "key": "MarPi08", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 765", "title": "Efficient anonymous channel and all/nothing election scheme", "booktitle": "Proceedings of {EUROCRYPT} 1993", "author": "C. Park and K. Itoh and K. Kurosawa", "year": "1993", "month": "May", "pages": "248--259", "key": "PIK", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "Springer-Verlag, LNCS 2139", "title": "An Efficient Scheme for Proving a Shuffle", "booktitle": "Proceedings of {CRYPTO} 2001", "author": "Jun Furukawa and Kazue Sako", "year": "2001", "www_pdf_url": "http://www.iacr.org/archive/crypto2001/21390366.pdf", "editor": "Joe Kilian", "key": "PShuffle", "www_tags": "selected", "www_section": "Provable shuffles"}, {"title": "Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006)", "author": "Andriy Panchenko and Lexi Pimenidis", "month": "October", "volume": "4237", "pages": "240--251", "location": "Heraklion, Crete, Greece", "key": "PanchenkoP06", "year": "2006", "www_section": "Anonymous communication"}, {"publisher": "IEEE Computer Society", "title": "Performance Analysis of Anonymous Communication Channels Provided by {Tor}", "booktitle": "Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008)", "author": "Andriy Panchenko and Lexi Pimenidis and Johannes Renner", "year": "2008", "month": "March", "pages": "221--228", "location": "Barcelona, Spain", "key": "PanchenkoPR08", "www_tags": "", "www_ps_url": "http://www.pimenidis.org/research/papers/PaPiRe08.ps", "www_section": "Anonymous communication"}, {"title": "{Practical Anonymity for the Masses with Mix-Networks}", "booktitle": "{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}", "author": "Marc Rennhard and Bernhard Plattner", "year": "2003", "month": "June", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", "location": "Linz, Austria", "key": "RP03-1", "www_tags": "selected", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz", "www_section": "Anonymous communication"}, {"title": "{Analysis of an Anonymity Network for Web Browsing}", "booktitle": "{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}", "author": "Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison", "year": "2002", "month": "June", "pages": "49--54", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", "location": "Pittsburgh, USA", "key": "RRMPH02-1", "www_tags": "selected", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "author": "Jason Reed and Benjamin C. Pierce", "booktitle": "Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on {F}unctional {P}rogramming ({ICFP})", "title": "Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy", "month": "September", "www_pdf_url": "http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf", "location": "Baltimore, Maryland", "key": "ReedPierce10", "year": "2010", "www_section": "Formal methods"}, {"doi": "10.1016/j.jnca.2012.02.011", "author": "Ruiz-Mart{\\'i}nez, A.", "journal": "Journal of Network and Computer Applications", "title": "A survey on solutions and main free tools for privacy enhancing Web communications", "number": "5", "month": "September", "volume": "35", "www_pdf_url": "http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf", "key": "Ruiz-Martinez_2012", "year": "2012", "pages": "1473--1492", "www_section": "Anonymous communication", "issn": "1084-8045"}, {"publisher": "IEEE Computer Society Press", "title": "{A Round--based Cover Traffic Algorithm for Anonymity Systems}", "booktitle": "{Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems}", "author": "Rybczy\\'{n}ska, Marta", "month": "November", "pages": "93--99", "www_pdf_url": "http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf", "location": "Barcelona, Spain", "key": "Rybczynska-incos2009", "year": "2009", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag", "title": "Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth", "booktitle": "Proceedings of {EUROCRYPT} 1995", "author": "Joe Kilian and Kazue Sako", "year": "1995", "month": "May", "key": "SK", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "Kluwer", "title": "On the Anonymity of Timed Pool Mixes", "booktitle": "Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems", "author": "Andrei Serjantov and Richard E. Newman", "year": "2003", "month": "May", "pages": "427--434", "location": "Athens, Greece", "key": "SN03", "www_tags": "selected", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", "www_section": "Traffic analysis"}, {"title": "Passive Attack Analysis for Connection-Based Anonymity Systems", "booktitle": "Proceedings of ESORICS 2003", "author": "Andrei Serjantov and Peter Sewell", "year": "2003", "www_section": "Traffic analysis", "month": "October", "key": "SS03", "www_tags": "selected", "www_remarks": "An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.", "www_ps_url": "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps"}, {"author": "Arjun Nambiar and Matthew Wright", "booktitle": "Proceedings of CCS 2006", "title": "Salsa: A Structured Approach to Large-Scale Anonymity", "year": "2006", "month": "November", "www_pdf_url": "http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf", "key": "Salsa", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}", "booktitle": "Proceedings of the IEEE International Conference on Network Protocols (ICNP)", "author": "Vincent Scarlata and Brian Neil Levine and Clay Shields", "month": "November", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf", "pages": "272--280", "key": "Scarlata:2001", "year": "2001", "keywords": "security; routing; peer-to-peer; anonymity", "www_section": "Misc"}, {"publisher": "Springer-Verlag, LNCS 2482", "author": "Andrei Serjantov and George Danezis", "title": "Towards an Information Theoretic Metric for Anonymity", "booktitle": "Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)", "www_important": "1", "year": "2002", "www_section": "Traffic analysis", "month": "April", "editor": "Roger Dingledine and Paul Syverson", "key": "Serj02", "www_tags": "selected", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps"}, {"author": "Andrei Serjantov", "booktitle": "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", "title": "Anonymizing censorship resistant systems", "year": "2002", "www_section": "Anonymous publication", "month": "March", "key": "Serj02-iptps", "www_tags": "selected", "www_ps_url": "http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps"}, {"author": "Vitaly Shmatikov and Ming-Hsiu Wang", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}", "title": "Measuring Relationship Anonymity in Mix Networks", "year": "2006", "month": "October", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf", "key": "ShWa-Relationship", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Vitaly Shmatikov and Ming-Hsiu Wang", "booktitle": "Proceedings of ESORICS 2006", "www_important": "1", "year": "2006", "month": "September", "www_pdf_url": "http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf", "key": "ShWa-Timing06", "www_tags": "selected", "title": "Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/pDCS.pdf", "key": "Shao-infocom07", "author": "Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao", "booktitle": "Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07)", "title": "{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}", "year": "2007", "www_section": "Anonymous communication", "month": "May"}, {"www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf", "key": "Shao-infocom08", "author": "Min Shao and Yi Yang and Sencun Zhu and Guohong Cao", "booktitle": "Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08)", "title": "{ Towards Statistically Strong Source Anonymity for Sensor Networks }", "year": "2008", "www_section": "Anonymous communication", "month": "May"}, {"author": "Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "title": "Quantifying location privacy", "pages": "247--262", "www_pdf_url": "http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf", "key": "Shokri11QLP1", "year": "2011", "organization": "IEEE", "www_section": "misc"}, {"publisher": "Springer", "author": "Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux, Jean-Pierre and Jean-Yves Le Boudec", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "title": "Quantifying Location Privacy: The Case of Sporadic Location Exposure", "pages": "57--76", "www_pdf_url": "http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf", "key": "Shokri11QLP2", "year": "2011", "www_section": "misc"}, {"title": "Measuring Anonymity in a Non-adaptive, Real-time System", "series": "Springer-Verlag, LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "year": "2004", "pages": "226--241", "volume": "3424", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf", "key": "TH04", "www_tags": "selected", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf", "key": "TH06a", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "booktitle": "Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and Distributed, Karlstad, Sweden", "title": "{The APROB Channel: adaptive semi-real-time anonymous communication}", "year": "2006", "www_section": "stream"}, {"www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf", "key": "TH06b", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak", "booktitle": "Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\\:oping, Sweden", "title": "{The Chances of Successful Attacks against Continuous-time Mixes}", "year": "2006", "www_section": "Traffic analysis"}, {"title": "Measuring Anonymity Revisited", "booktitle": "Proceedings of the Ninth Nordic Workshop on Secure IT Systems", "author": "Gergely T\\'oth and Zolt\\'an Horn\\'ak and Ferenc Vajda", "year": "2004", "month": "November", "pages": "85--90", "www_pdf_url": "http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf", "location": "Espoo, Finland", "key": "THV04", "www_tags": "selected", "www_section": "Traffic analysis", "editor": "Sanna Liimatainen and Teemupekka Virtanen"}, {"title": "Statistical Identification of Encrypted Web Browsing Traffic", "booktitle": "Proceedings of the 2002 IEEE Symposium on Security and Privacy", "author": "Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu", "year": "2002", "month": "May", "www_pdf_url": "ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf", "location": "Berkeley, California", "key": "TrafHTTP", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag", "author": "George Danezis", "booktitle": "Proceedings of Information Security Conference 2006", "title": "Breaking Four Mix-related Schemes Based on Universal Re-encryption", "year": "2006", "month": "September", "www_pdf_url": "http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf", "key": "UREbreak06", "www_tags": "selected", "www_section": "Provable shuffles"}, {"title": "Anonymous Networking amidst Eavesdroppers", "www_section": "Anonymous communication", "author": "Parvathinathan Venkitasubramaniam and Ting He and Lang Tong", "year": "2007", "month": "October", "www_pdf_url": "http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf", "key": "VenHeTon07", "www_tags": "selected", "howpublished": "Pre-print available as arXiv:0710.4903v1 at arxiv.org"}, {"author": "Xinyuan Wang and Shiping Chen and Sushil Jajodia", "booktitle": "Proceedings of the 2007 IEEE Symposium on Security and Privacy", "title": "{Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems}", "month": "May", "www_pdf_url": "http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf", "pages": "116--130", "key": "Wang-SP2007", "year": "2007", "www_section": "Traffic analysis"}, {"title": "Tracking anonymous peer-to-peer VoIP calls on the internet", "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security", "author": "Xinyuan Wang and Shiping Chen and Sushil Jajodia", "year": "2005", "month": "November", "www_pdf_url": "http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf", "pages": "81--91", "key": "WangCJ05", "www_tags": "selected", "www_section": "Anonymous communication"}, {"school": "TU Darmstadt, Germany", "www_pdf_url": "http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf", "key": "Weber11", "title": "Multilaterally Secure Pervasive Cooperation", "www_section": "comm", "author": "Stefan G. Weber", "year": "2011", "month": "December"}, {"title": "{The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems}", "journal": "ACM Transactions on Information and System Security (TISSEC)", "author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "year": "2004", "number": "7", "month": "November", "volume": "4", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf", "key": "Wright:2004", "www_tags": "selected", "keywords": "anonymity; Journal Paper", "pages": "489--522", "www_section": "Traffic analysis"}, {"publisher": "MIT Press", "issn": "1533-7928", "author": "Charles V. Wright and Fabian Monrose and Gerald M. Masson", "journal": "Journal of Machine Learning Research", "title": "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", "year": "2006", "pages": "2745--2769", "volume": "7", "www_pdf_url": "http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf", "key": "WrightMM06", "www_tags": "selected", "www_section": "Traffic analysis", "address": "Cambridge, MA, USA"}, {"author": "Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao", "key": "XuFZBCZ05", "www_tags": "selected", "booktitle": "Proceedings of ICCNMC", "title": "SAS: A Scalar Anonymous Communication System", "year": "2005", "www_section": "Anonymous communication", "pages": "452--461"}, {"www_pdf_url": "http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf", "key": "Yang-wisec08", "author": "Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao", "booktitle": "Proceedings of The ACM Conference on Wireless Network Security (WiSec)", "title": "{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks }", "year": "2008", "www_section": "Anonymous communication", "month": "March"}, {"publisher": "Springer", "author": "Timothy G and Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "title": "Browser-Based Attacks on {Tor}", "year": "2007", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "abbott-pet2007", "www_tags": "selected", "www_section": "Traffic analysis", "location": "Ottawa, Canada"}, {"publisher": "Springer-Verlag, LNCS 1403", "author": "Masayuki Abe", "key": "abe", "www_tags": "selected", "booktitle": "Proceedings of {EUROCRYPT} 1998", "title": "Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers", "year": "1998", "www_section": "Provable shuffles"}, {"www_tags": "selected", "title": "Fully Non-Interactive Onion Routing with Forward-Secrecy", "series": "Lecture Notes in Computer Science", "www_section": "Anonymous communication", "author": "Dario Catalano and Dario Fiore and Rosario Gennaro", "month": "June", "volume": "6715", "www_pdf_url": "http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf", "editor": "Javier Lopez and Gene Tsudik", "key": "acns11-certificateless", "year": "2011", "booktitle": "Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011)", "location": "Malaga, Spain"}, {"author": "Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "www_tags": "selected", "month": "December", "www_pdf_url": "http://freehaven.net/anonbib/papers/backlit-acsac11.pdf", "key": "acsac11-backlit", "year": "2011", "title": "Exposing Invisible Timing-based Traffic Watermarks with BACKLIT", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf", "key": "acsac11-supernodes", "author": "Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "title": "\"Super Nodes\" in Tor: Existence and Security Implication", "year": "2011", "www_section": "Anonymous communication", "month": "December"}, {"author": "W. Brad Moore and Chris Wacek and Micah Sherr", "booktitle": "Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA", "title": "Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise", "year": "2011", "month": "December", "www_pdf_url": "https://security.cs.georgetown.edu/papers/tortoise.pdf", "key": "acsac11-tortoise", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Aaron Johnson and Joan Feigenbaum and Paul Syverson", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "title": "Preventing Active Timing Attacks in Low-Latency Anonymous Communication", "year": "2010", "month": "July", "www_pdf_url": "http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf", "location": "Berlin, Germany", "key": "active-pet2010", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Carlisle Adams", "journal": "University of Ottawa Law & Technology Journal", "title": "A Classification for Privacy Techniques", "year": "2006", "pages": "35--52", "volume": "3", "www_pdf_url": "http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf", "key": "adams06", "www_tags": "selected", "issue": "1", "www_section": "Misc"}, {"title": "How to Shuffle in Public", "booktitle": "Proceedings of the Theory of Cryptography 2007", "author": "Ben Adida and Douglas Wikstr\\\"om", "year": "2007", "month": "February", "www_pdf_url": "http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf", "key": "adida07", "www_tags": "selected", "www_section": "Provable shuffles"}, {"title": "{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "author": "Dakshi Agrawal and Dogan Kesdogan and Stefan Penz", "year": "2003", "month": "May", "www_pdf_url": "http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf", "pages": "16--27", "key": "agrawal03", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer", "title": "Blending Different Latency Traffic with Alpha-Mixing", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Roger Dingledine and Andrei Serjantov and Paul Syverson", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf", "editor": "George Danezis and Philippe Golle", "key": "alpha-mixing:pet2006", "www_tags": "selected", "pages": "245--257", "www_section": "Anonymous communication", "location": "Cambridge, UK"}, {"www_important": "1", "author": "Ross Anderson", "booktitle": "Proceedings of Pragocrypt '96", "title": "The Eternity Service", "year": "1996", "www_section": "Anonymous publication", "key": "anderson96eternity", "www_tags": "selected", "www_ps_url": "http://www.ovmj.org/GNUnet/papers/eternity.ps", "www_html_url": "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html"}, {"school": "University of Cambridge", "title": "On the Anonymity of Anonymity Systems", "www_section": "Anonymous communication", "author": "Andrei Serjantov", "year": "2004", "month": "June", "key": "andrei-thesis", "www_tags": "selected", "www_ps_url": "http://home.arachsys.com/~aas/Thesis/2.ps"}, {"publisher": "Springer", "author": "Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Reputation Systems for Anonymous Networks", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "editor": "Nikita Borisov and Ian Goldberg", "key": "androulaki-pet2008", "www_tags": "selected", "pages": "202--218", "www_section": "Anonymous communication", "location": "Leuven, Belgium"}, {"title": "Cryptographic Protocol Analysis of {AN.ON}", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "author": "Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan", "year": "2010", "month": "January", "www_pdf_url": "http://freehaven.net/anonbib/papers/wwpk2010.pdf", "editor": "Radu Sion", "key": "anon-fc10", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "Almost Optimal Private Information Retrieval", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Dmitri Asonov and Johann-Christoph Freytag", "month": "April", "www_pdf_url": "http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "asonov:pet2002", "year": "2002", "www_section": "Private Information Retrieval"}, {"publisher": "IEEE", "author": "Ceki G\\\"ulc\\\"u and Gene Tsudik", "title": "Mixing {E}-mail With {B}abel", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '96", "www_important": "1", "year": "1996", "www_section": "Anonymous communication", "month": "February", "pages": "2--16", "key": "babel", "www_tags": "selected", "www_ps_url": "http://www.isoc.org/conferences/ndss96/gulcu.ps", "www_html_url": "http://citeseer.nj.nec.com/2254.html"}, {"publisher": "Springer-Verlag, LNCS 2137", "author": "Adam Back and Ulf M\\\"oller and Anton Stiglic", "title": "Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "www_important": "1", "year": "2001", "month": "April", "pages": "245--257", "www_pdf_url": "http://www.cypherspace.org/adam/pubs/traffic.pdf", "editor": "Ira S. Moskowitz", "key": "back01", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM", "author": "Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker", "booktitle": "{Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008)}", "title": "{BitBlender}: {L}ight-Weight Anonymity for BitTorrent", "year": "2008", "month": "September", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf", "location": "Istanbul, Turkey", "key": "bauer:alpaca2008", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Matthias Bauer", "title": "{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "www_important": "1", "year": "2003", "www_section": "Anonymous communication", "month": "October", "location": "Washington, DC, USA", "key": "bauer:wpes2003", "www_tags": "selected", "www_remarks": "Anonymity sets in deployed systems are small because few people think it's worthwhile to use them. But we can take advantage of ordinary web users to transfer messages (that is, mix them) from one webserver to another via cookies and http redirect tricks. Senders and receivers should also look like ordinary web users, so anonymity sets are large.", "www_ps_url": "http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps"}, {"author": "Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker", "title": "Low-Resource Routing Attacks Against {Tor}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "www_important": "1", "year": "2007", "month": "October", "www_pdf_url": "http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf", "location": "Washington, DC, USA", "key": "bauer:wpes2007", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\\c{c}ois Raymond", "booktitle": "Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02)", "title": "{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private Information Retrieval}", "year": "2002", "month": "November", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf", "key": "beimel-barrier", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"publisher": "Springer-Verlag", "author": "A. Beimel and Y. Stahl", "title": "Robust information-theoretic private information retrieval", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of the 3rd Conference on Security in Communication Networks", "www_important": "1", "year": "2002", "pages": "326--341", "volume": "2576", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf", "editor": "S. Cimato C. Galdi G. Persiano", "key": "beimel-robust", "www_tags": "selected", "www_ps_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps", "www_section": "Private Information Retrieval"}, {"author": "Amos Beimel and Yuval Ishai", "title": "Information-Theoretic Private Information Retrieval: {A} Unified Construction", "journal": "Lecture Notes in Computer Science", "www_important": "1", "year": "2001", "pages": "89--98", "volume": "2076", "www_pdf_url": "http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf", "key": "beimel01informationtheoretic", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "{GAP} -- Practical anonymous networking", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Krista Bennett and Christian Grothoff", "year": "2003", "month": "March", "pages": "141--160", "editor": "Roger Dingledine", "key": "bennett:pet2003", "www_tags": "selected", "www_ps_url": "http://www.ovmj.org/GNUnet/download/aff.ps", "www_section": "Anonymous publication"}, {"publisher": "Springer-Verlag, LNCS 3110", "title": "Provable Unlinkability Against Traffic Analysis", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "author": "Ron Berman and Amos Fiat and Amnon Ta-Shma", "year": "2004", "month": "February", "pages": "266--280", "www_pdf_url": "http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf", "editor": "Ari Juels", "key": "berman-fc2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"numpages": "33", "acmid": "1880033", "author": "Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.", "journal": "ACM Transactions on Information and System Security", "year": "2010", "month": "December", "volume": "13", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf", "key": "blac-tissec", "www_tags": "selected", "keywords": "Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior", "pages": "39:1--39:33", "publisher": "ACM", "issue_date": "December 2010", "doi": "http://doi.acm.org/10.1145/1880022.1880033", "title": "BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs", "url": "http://doi.acm.org/10.1145/1880022.1880033", "www_section": "Pseudonymity", "issn": "1094-9224", "articleno": "39", "issue": "4", "address": "New York, NY, USA"}, {"www_tags": "selected", "author": "Man Ho Au and Apu Kapadia and Willy Susilo", "booktitle": "Proceedings of the 19th Annual Network and Distributed System Security Symposium ({NDSS})", "title": "{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation", "month": "February", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf", "key": "blacr-ndss", "year": "2012", "www_section": "Pseudonymity"}, {"www_tags": "selected", "author": "Peter Lofgren and Nicholas Hopper", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "title": "BNymble: More anonymous blacklisting at almost no cost", "month": "February", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/bnymble.pdf", "key": "bnymble11", "year": "2011", "www_section": "Misc"}, {"publisher": "Elsevier", "author": "A. Boukerche and K. El-Khatib and L. Xu and L. Korba", "journal": "Computer Communications", "title": "{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}", "number": "10", "volume": "28", "www_pdf_url": "http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf", "key": "boukerche2005esd", "year": "2005", "pages": "1193--1203", "www_section": "Anonymous communication"}, {"author": "Stefan Brands", "journal": "University of Ottawa Law & Technology Journal", "title": "Secure User Identification Without Privacy Erosion", "year": "2006", "pages": "205--223", "volume": "3", "www_pdf_url": "http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf", "key": "brands06", "www_tags": "selected", "issue": "1", "www_section": "Misc"}, {"title": "Buses for Anonymous Message Delivery", "journal": "Journal of Cryptology", "author": "Amos Beimel and Shlomi Dolev", "year": "2003", "number": "1", "pages": "25--39", "volume": "16", "key": "buses03", "www_tags": "selected", "www_ps_url": "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", "www_section": "Anonymous communication"}, {"publisher": "Springer Verlag, LNCS 2442", "author": "Jan Camenisch and Anna Lysyanskaya", "booktitle": "Proceedings of {CRYPTO} 2002", "www_important": "0", "year": "2002", "pages": "61--76", "www_pdf_url": "http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm", "key": "camenisch2002da", "www_tags": "selected", "title": "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials", "www_section": "E-Cash / Anonymous Credentials"}, {"publisher": "Springer Verlag, LNCS 2576", "author": "Jan Camenisch and Anna Lysyanskaya", "booktitle": "Proceedings of {SCN '02}, Third Conference on Security in Communication Networks", "www_important": "1", "year": "2002", "pages": "268--289", "www_pdf_url": "http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf", "key": "camenisch2002ssep", "www_tags": "selected", "title": "A Signature Scheme with Efficient Protocols", "www_section": "E-Cash / Anonymous Credentials"}, {"publisher": "Springer Verlag, LNCS 2729", "author": "Jan Camenisch and Victor Shoup", "booktitle": "Proceedings of {CRYPTO} 2003", "www_important": "0", "year": "2003", "pages": "126--144", "www_pdf_url": "http://springerlink.metapress.com/openurl.asp?genre=article{\\&}issn=0302-9743{\\&}volume=2729{\\&}spage=126", "key": "camenisch2003pve", "www_tags": "selected", "title": "Practical Verifiable Encryption and Decryption of Discrete Logarithms", "www_section": "E-Cash / Anonymous Credentials"}, {"publisher": "Springer-Verlag, LNCS 3621", "title": "A Formal Treatment of Onion Routing", "booktitle": "Proceedings of {CRYPTO} 2005", "author": "Jan Camenisch and Anna Lysyanskaya", "year": "2005", "month": "August", "pages": "169--187", "www_pdf_url": "http://freehaven.net/anonbib/papers/onion21.pdf", "editor": "Victor Shoup", "key": "camlys05", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "Springer-Verlag, LNCS 2357", "title": "{Reliable MIX Cascade Networks through Reputation}", "booktitle": "Proceedings of Financial Cryptography (FC '02)", "author": "Roger Dingledine and Paul Syverson", "year": "2002", "www_section": "Anonymous communication", "month": "March", "www_pdf_url": "http://freehaven.net/doc/casc-rep/casc-rep.pdf", "editor": "Matt Blaze", "key": "casc-rep", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/casc-rep/casc-rep.ps"}, {"title": "On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?''", "series": "Springer-Verlag, LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Rainer B\\\"ohme and George Danezis and Claudia Diaz and Stefan K\\\"opsell and Andreas Pfitzmann", "pages": "226--241", "volume": "3424", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-523.pdf", "key": "cascades-vs-p2p:pet2004", "year": "2004", "www_section": "Anonymous communication"}, {"author": "Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith", "booktitle": "Proceedings of CCS 2007", "title": "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs", "month": "October", "www_pdf_url": "http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf", "key": "ccs07-blac", "year": "2007", "www_remarks": "Superseded by blac-tissec", "www_section": "Pseudonymity"}, {"author": "Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz", "booktitle": "Proceedings of CCS 2007", "www_important": "1", "year": "2007", "month": "October", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf", "key": "ccs07-doa", "www_tags": "selected", "title": "Denial of Service or Denial of Security? {H}ow Attacks on Reliability can Compromise Anonymity", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf", "key": "ccs07-latency-leak", "author": "Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin", "booktitle": "Proceedings of CCS 2007", "title": "How Much Anonymity does Network Latency Leak?", "year": "2007", "www_section": "Traffic analysis", "month": "October"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "Certificateless Onion Routing", "www_section": "Anonymous communication", "author": "Dario Catalano and Dario Fiore and Rosario Gennaro", "month": "November", "www_pdf_url": "http://www.ippari.unict.it/~catalano/CaGeFi09.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "ccs09-certificateless", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "{NISAN}: Network Information Service for Anonymization Networks", "www_section": "Anonymous communication", "author": "Andriy Panchenko and Arne Rache and Stefan Richter", "month": "November", "www_tags": "selected", "www_pdf_url": "http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "ccs09-nisan", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies", "www_section": "Anonymous communication", "author": "Prateek Mittal and Nikita Borisov", "month": "November", "www_tags": "selected", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "ccs09-shadowwalker", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "isbn": "978-1-60558-894-0", "title": "{Scalable onion routing with Torsk}", "www_section": "Anonymous communication", "author": "Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim", "month": "November", "www_tags": "selected", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf", "editor": "Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis", "key": "ccs09-torsk", "year": "2009", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "www_tags": "selected", "title": "Recruiting New {T}or Relays with {BRAIDS}", "www_section": "Anonymous communication", "author": "Rob Jansen and Nicholas Hopper and Yongdae Kim", "month": "October", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "key": "ccs10-braids", "year": "2010", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "www_tags": "selected", "title": "Dissent: Accountable Anonymous Group Messaging", "www_section": "Communications Censorship", "author": "Henry Corrigan-Gibbs and Bryan Ford", "month": "October", "www_pdf_url": "http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "key": "ccs10-dissent", "year": "2010", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "www_tags": "selected", "title": "In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems", "www_section": "Traffic analysis", "author": "Qiyan Wang and Prateek Mittal and Nikita Borisov", "month": "October", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "key": "ccs10-lookup", "year": "2010", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM", "www_tags": "selected", "title": "An Improved Algorithm for {T}or Circuit Scheduling", "www_section": "Anonymous communication", "author": "Can Tang and Ian Goldberg", "month": "October", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf", "editor": "Angelos D. Keromytis and Vitaly Shmatikov", "key": "ccs10-scheduling", "year": "2010", "booktitle": "Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)", "location": "Chicago, Illinois, USA"}, {"publisher": "ACM Press", "author": "Jan Camenisch and Thomas Gross", "www_section": "E-Cash / Anonymous Credentials", "title": "Efficient Attributes for Anonymous Credentials", "month": "October", "pages": "345--356", "www_pdf_url": "http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "key": "ccs2008:camenisch", "year": "2008", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "day": "27--31", "location": "Alexandria, Virginia, USA"}, {"publisher": "ACM Press", "www_tags": "selected", "author": "Prateek Mittal and Nikita Borisov", "www_section": "Anonymous communication", "title": "Information Leaks in Structured Peer-to-peer Anonymous Communication Systems", "month": "October", "pages": "267--278", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "key": "ccs2008:mittal", "year": "2008", "www_remarks": "Describes attacks against the SALSA and AP3 peer-to-peer anonymity network architectures.", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "day": "27--31", "location": "Alexandria, Virginia, USA"}, {"publisher": "ACM Press", "www_tags": "selected", "author": "Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith", "www_section": "Misc", "title": "PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication", "month": "October", "pages": "333--345", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "key": "ccs2008:tsang", "year": "2008", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "day": "27--31", "location": "Alexandria, Virginia, USA"}, {"publisher": "ACM Press", "www_tags": "selected", "author": "Wei Wang and Mehul Motani and Vikram Srinivasan", "www_section": "Traffic analysis", "title": "Dependent Link Padding Algorithms for Low Latency Anonymity Systems", "month": "October", "pages": "323--332", "editor": "Paul Syverson and Somesh Jha and Xiaolan Zhang", "key": "ccs2008:wang", "year": "2008", "booktitle": "{Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}", "day": "27--31", "location": "Alexandria, Virginia, USA"}, {"title": "Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "author": "Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov", "year": "2011", "month": "October", "www_pdf_url": "http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf", "key": "ccs2011-cirripede", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "Forensic Investigation of the OneSwarm Anonymous Filesharing System", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "author": "Swagatika Prusty and Marc Liberatore and Brian N. Levine", "year": "2011", "month": "October", "www_pdf_url": "http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf", "key": "ccs2011-oneswarm", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "author": "Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita Borisov", "year": "2011", "month": "October", "www_pdf_url": "https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf", "key": "ccs2011-stealthy", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Trust-based Anonymous Communication: Adversary Models and Routing Algorithms", "booktitle": "Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)", "author": "Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson", "year": "2011", "month": "October", "www_pdf_url": "http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf", "key": "ccs2011-trust", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "CensorSpoofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov", "year": "2012", "month": "October", "www_pdf_url": "https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf", "key": "ccs2012-censorspoofer", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "Enhancing Tor's Performance using Real-time Traffic Classification", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Mashael AlSabah and Kevin Bauer and Ian Goldberg", "year": "2012", "month": "October", "www_pdf_url": "https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf", "key": "ccs2012-classification", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Routing Around Decoys", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper", "year": "2012", "month": "October", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf", "key": "ccs2012-decoys", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "Touching from a Distance: Website Fingerprinting Attacks and Defenses", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson", "year": "2012", "month": "October", "www_pdf_url": "http://www.cs.sunysb.edu/~xcai/fp.pdf", "key": "ccs2012-fingerprinting", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "SkypeMorph: Protocol Obfuscation for {T}or Bridges", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg", "year": "2012", "month": "October", "www_pdf_url": "https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf", "key": "ccs2012-skypemorph", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System", "booktitle": "Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)", "author": "Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh", "year": "2012", "month": "October", "www_pdf_url": "http://www.owlfolio.org/media/2010/05/stegotorus.pdf", "key": "ccs2012-stegotorus", "www_tags": "selected", "www_section": "Communications Censorship"}, {"publisher": "ACM", "doi": "http://doi.acm.org/10.1145/1655008.1655013", "isbn": "978-1-60558-784-4", "author": "Dominik Herrmann and Rolf Wendolsky and Hannes Federrath", "booktitle": "Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)", "title": "Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\\\"{\\i}ve-bayes classifier", "year": "2009", "month": "October", "pages": "31--42", "www_pdf_url": "http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf", "location": "Chicago, Illinois, USA", "key": "ccsw09-fingerprinting", "www_tags": "selected", "www_section": "Traffic analysis", "address": "New York, NY, USA"}, {"title": "{Cebolla: Pragmatic IP Anonymity}", "booktitle": "Proceedings of the 2002 Ottawa Linux Symposium", "author": "Zach Brown", "year": "2002", "month": "June", "www_pdf_url": "http://cypherspace.org/cebolla/cebolla.pdf", "key": "cebolla", "www_tags": "selected", "www_remarks": "Written by a former Freedom developer, Cebolla has a UDP-based design similar to second-generation Freedom. The initiator incrementally builds her circuit, giving her end-to-end forward-secrecy and also better recovery from broken nodes.", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2578", "title": "Chaffinch: Confidentiality in the Face of Legal Threats", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "author": "Richard Clayton and George Danezis", "year": "2002", "www_section": "Misc", "month": "October", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf", "editor": "Fabien Petitcolas", "key": "chaffinch", "www_tags": "selected", "www_html_url": "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html"}, {"www_tags": "selected", "key": "chatzikokolakis2006apn", "author": "K. Chatzikokolakis and C. Palamidessi and P. Panangaden", "title": "{Anonymity Protocols as Noisy Channels?}", "journal": "Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer", "year": "2006", "www_section": "Formal methods"}, {"title": "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", "journal": "Journal of Cryptology", "author": "David Chaum", "year": "1988", "pages": "65--75", "volume": "1", "www_pdf_url": "http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf", "key": "chaum-dc", "www_tags": "selected", "www_section": "Anonymous communication"}, {"key": "chaum-mix", "author": "David Chaum", "title": "Untraceable electronic mail, return addresses, and digital pseudonyms", "journal": "Communications of the ACM", "www_important": "1", "year": "1981", "number": "2", "month": "February", "volume": "24", "www_pdf_url": "http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf", "www_txt_url": "http://www.eskimo.com/~weidai/mix-net.txt", "www_tags": "selected", "www_html_url": "http://world.std.com/~franl/crypto/chaum-acm-1981.html", "www_section": "Anonymous communication"}, {"title": "Security without Identification: Transaction Systems to Make Big Brother Obsolete", "journal": "CACM", "author": "David Chaum", "year": "1985", "number": "10", "month": "October", "volume": "28", "key": "chaum85", "www_tags": "selected", "www_section": "Misc"}, {"title": "The social cost of cheap pseudonyms", "journal": "Journal of Economics and Management Strategy", "author": "Eric Friedman and Paul Resnick", "year": "2001", "number": "2", "volume": "10", "www_pdf_url": "http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf", "key": "cheap-pseudonyms", "www_tags": "selected", "pages": "173--199", "www_section": "Economics"}, {"isbn": "3-540-25910-4", "ee": "http://dx.doi.org/10.1007/11426639_18", "series": "Lecture Notes in Computer Science", "www_important": "1", "month": "May", "volume": "3494", "www_pdf_url": "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", "key": "chl05-full:eurocrypt2005", "year": "2005", "pages": "302--321", "publisher": "Springer", "title": "Compact E-Cash", "www_section": "E-Cash / Anonymous Credentials", "author": "Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya", "www_tags": "selected", "editor": "Ronald Cramer", "bibsource": "DBLP, http://dblp.uni-trier.de", "booktitle": "Proceedings of EUROCRYPT 2005"}, {"publisher": "Springer", "title": "Improving Sender Anonymity in a Structured Overlay with Imprecise Routing", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Giuseppe Ciaccio", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://petworkshop.org/2006/preproc/preproc_11.pdf", "editor": "George Danezis and Philippe Golle", "key": "ciaccio:pet2006", "www_tags": "selected", "pages": "190--207", "www_section": "Anonymous communication", "location": "Cambridge, UK"}, {"publisher": "Springer-Verlag", "isbn": "3-540-42070-3", "title": "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", "booktitle": "Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01)", "author": "Jan Camenisch and Anna Lysyanskaya", "year": "2001", "pages": "93--118", "www_pdf_url": "http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf", "location": "London, UK", "key": "cl01a", "www_tags": "selected", "www_section": "E-Cash / Anonymous Credentials"}, {"publisher": "ACM Press New York, NY, USA", "key": "clauss2006sam", "author": "S. Clau{\\ss} and S. Schiffner", "journal": "Proceedings of the second ACM workshop on Digital identity management", "title": "{Structuring anonymity metrics}", "year": "2006", "www_section": "Formal methods", "pages": "55--62"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "Improving Onion Notation", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Richard Clayton", "year": "2003", "month": "March", "pages": "81--87", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/onions.pdf", "editor": "Roger Dingledine", "key": "clayton:pet2003", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "title": "{Ignoring the Great Firewall of China}", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Richard Clayton and Steven J. Murdoch and Robert N. M. Watson", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf", "editor": "George Danezis and Philippe Golle", "key": "clayton:pet2006", "www_tags": "selected", "pages": "20--35", "www_section": "Communications Censorship", "location": "Cambridge, UK"}, {"title": "Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes", "booktitle": "Proceedings of Financial Cryptography (FC '08)", "author": "Jon McLachlan and Nicholas Hopper", "year": "2008", "month": "January", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf", "key": "clog-the-queue", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "doi": "http://doi.acm.org/10.1145/1180405.1180431", "isbn": "1-59593-518-5", "title": "How to win the clonewars: efficient periodic n-times anonymous authentication", "booktitle": "Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006)", "author": "Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich", "year": "2006", "www_important": "1", "month": "November", "pages": "201--210", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-812.pdf", "location": "Alexandria, Virginia, USA", "key": "clonewars", "www_tags": "selected", "www_section": "E-Cash / Anonymous Credentials", "address": "New York, NY, USA"}, {"publisher": "Springer", "author": "Aaron H. Coble", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover", "bookurl": "http://petsymposium.org/2008/", "month": "July", "editor": "Nikita Borisov and Ian Goldberg", "key": "coble-pet2008", "year": "2008", "pages": "77--98", "www_section": "Formal methods", "location": "Leuven, Belgium"}, {"publisher": "{IEEE} Computer Society Press", "author": "Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny", "booktitle": "Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA", "title": "{Closed-Circuit Unobservable Voice Over IP}", "year": "2007", "www_pdf_url": "http://www.acsac.org/2007/papers/110.pdf", "key": "conf/acsac/ADC07", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "A Practical Congestion Attack on {T}or Using Long Paths", "booktitle": "Proceedings of the 18th USENIX Security Symposium", "author": "Nathan Evans and Roger Dingledine and Christian Grothoff", "year": "2009", "month": "August", "www_pdf_url": "http://freehaven.net/anonbib/papers/congestion-longpaths.pdf", "key": "congestion-longpaths", "www_tags": "selected", "www_section": "Traffic analysis"}, {"www_tags": "selected", "author": "Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'12)", "title": "{Congestion-aware Path Selection for Tor}", "month": "February", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf", "key": "congestion-tor12", "year": "2012", "www_section": "Anonymous communication"}, {"author": "David A. Cooper and Kenneth P. Birman", "booktitle": "Proceedings of the 1995 IEEE Symposium on Security and Privacy", "title": "Preserving Privacy in a Network of Mobile Computers", "year": "1995", "month": "May", "www_pdf_url": "http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf", "key": "cooper", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"title": "{The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers}", "www_section": "Private Information Retrieval", "author": "Len Sassaman and Bart Preneel", "year": "2007", "number": "ESAT-COSIC 2007-001", "month": "February", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-880.pdf", "key": "cosic-2007-001", "www_tags": "selected", "institution": "Katholieke Universiteit Leuven"}, {"publisher": "Springer-Verlag, LNCS 3110", "title": "An Efficient and Usable Multi-show Non-transferable Anonymous Credential System", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "author": "Guiseppe Persiano and Ivan Visconti", "month": "February", "pages": "196--211", "editor": "Ari Juels", "key": "credentials-fc2004", "year": "2004", "www_section": "E-Cash / Anonymous Credentials"}, {"title": "Probabilistic Model Checking of an Anonymity System", "journal": "Journal of Computer Security", "author": "Vitaly Shmatikov", "year": "2004", "number": "3-4", "pages": "355--377", "volume": "12", "key": "crowds-model", "www_tags": "selected", "www_remarks": "Uses formal methods to analyze probabilistic anonymity systems like <a href=\"#crowds:tissec\">Crowds</a>. Confirms that anonymity degrades with a larger crowd: as N grows, the fact that the request came from you becomes more suspicious.", "www_ps_url": "http://www.csl.sri.com/users/shmat/shmat_crowds.ps", "www_section": "Formal methods"}, {"author": "Michael Reiter and Aviel Rubin", "title": "Crowds: Anonymity for Web Transactions", "journal": "ACM Transactions on Information and System Security", "www_important": "1", "year": "1998", "number": "1", "month": "June", "volume": "1", "www_pdf_url": "http://avirubin.com/crowds.pdf", "key": "crowds:tissec", "www_tags": "selected", "www_ps_gz_url": "http://avirubin.com/crowds.ps.gz", "www_section": "Anonymous communication"}, {"title": "Obfuscated Ciphertext Mixing", "www_section": "Provable shuffles", "author": "Ben Adida and Douglas Wikstr\\\"om", "year": "2005", "month": "November", "www_pdf_url": "http://eprint.iacr.org/2005/394.pdf", "key": "cryptoeprint:2005:394", "www_tags": "selected", "howpublished": "Cryptology ePrint Archive, Report 2005/394", "www_html_url": "http://eprint.iacr.org/2005/394"}, {"title": "ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation", "booktitle": "Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011)", "author": "Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald", "year": "2011", "month": "August", "www_pdf_url": "http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf", "key": "cset11-experimentor", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Methodically Modeling the Tor Network", "booktitle": "Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)", "author": "Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine", "year": "2012", "month": "August", "www_pdf_url": "http://www-users.cs.umn.edu/~jansen/papers/tormodel-cset2012.pdf", "key": "cset12-modeling", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "title": "Linking Anonymous Transactions: The Consistent View Attack", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Andreas Pashalidis and Bernd Meyer", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://petworkshop.org/2006/preproc/preproc_22.pdf", "editor": "George Danezis and Philippe Golle", "key": "cview:pet2006", "www_tags": "selected", "pages": "384--392", "www_section": "Traffic analysis", "location": "Cambridge, UK"}, {"publisher": "Springer", "title": "Two-Sided Statistical Disclosure Attack", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "George Danezis and Claudia Diaz and Carmela Troncoso", "year": "2007", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "danezis-pet2007", "www_tags": "selected", "www_remarks": "Extends the Statistical Disclosure attack to take advantage of reply messages.", "www_section": "Traffic analysis", "location": "Ottawa, Canada"}, {"publisher": "Springer", "author": "George Danezis and Paul Syverson", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "www_important": "1", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/bridge.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "danezis-pet2008", "www_tags": "selected", "title": "Bridging and Fingerprinting: Epistemic Attacks on Route Selection", "pages": "133--150", "www_section": "traffic", "location": "Leuven, Belgium"}, {"publisher": "IEEE Computer Society Washington, DC, USA", "author": "George Danezis and Richard Clayton", "journal": "Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing", "title": "{Route Fingerprinting in Anonymous Communications}", "pages": "69--72", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf", "key": "danezis2006rfa", "year": "2006", "www_section": "mixattacks"}, {"publisher": "Springer-Verlag, LNCS 2760", "author": "George Danezis", "title": "Mix-networks with Restricted Routes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "www_important": "1", "year": "2003", "month": "March", "pages": "1--17", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf", "editor": "Roger Dingledine", "key": "danezis:pet2003", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "George Danezis", "title": "The Traffic Analysis of Continuous-Time Mixes", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "www_important": "1", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf", "pages": "35--50", "key": "danezis:pet2004", "www_tags": "selected", "www_section": "Traffic analysis"}, {"www_tags": "selected", "author": "George Danezis and Bettina Wittneben", "www_section": "Traffic analysis", "www_important": "1", "bookurl": "http://weis2006.econinfosec.org/", "month": "June", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-788.pdf", "location": "Cambridge, UK", "key": "danezis:weis2006", "year": "2006", "title": "The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications", "booktitle": "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", "editor": "Ross Anderson"}, {"title": "Heartbeat Traffic to Counter (n-1) Attacks", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "author": "George Danezis and Len Sassaman", "year": "2003", "month": "October", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf", "location": "Washington, DC, USA", "key": "danezis:wpes2003", "www_tags": "selected", "www_remarks": "Mix nodes should send out \"heartbeat\" messages (dummies that start and end at that node). By measuring how many return in a given time, they can detect whether the adversary is dropping or delaying traffic coming into them (possibly so he can launch an active blending attack).", "www_section": "Anonymous communication"}, {"title": "Minx: A simple and efficient anonymous packet format", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "author": "George Danezis and Ben Laurie", "year": "2004", "month": "October", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/minx.pdf", "location": "Washington, DC, USA", "key": "danezis:wpes2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "A Passive Attack on the Privacy of Web Users Using Standard Log Information", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Thomas Demuth", "year": "2002", "month": "April", "www_pdf_url": "http://demuth.biz/veroeffentlichungen/pet02.pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "demuth:pet2002", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "{Measuring anonymity with relative entropy}", "journal": "Proc. of FAST", "author": "Y. Deng and J. Pang and P. Wu", "key": "deng2006mar", "year": "2006", "www_section": "Formal methods"}, {"publisher": "Springer-Verlag, LNCS 1803", "title": "How To Break a Practical {MIX} and Design a New One", "booktitle": "Proceedings of {EUROCRYPT} 2000", "author": "Yvo Desmedt and Kaoru Kurosawa", "year": "2000", "www_section": "Provable shuffles", "key": "desmedt", "www_tags": "selected", "www_html_url": "http://citeseer.nj.nec.com/447709.html"}, {"publisher": "Springer-Verlag", "title": "A Framework for the Analysis of Mix-Based Steganographic File Systems", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)", "author": "Claudia Diaz and Carmela Troncoso and Bart Preneel", "number": "", "month": "October", "volume": "LNCS (in print)", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf", "editor": "Sushil Jajodia and J. Lopez", "key": "diaz-esorics2008", "year": "2008", "www_section": "misc", "location": "Malaga,ES"}, {"publisher": "Springer", "author": "Claudia Diaz and Carmela Troncoso and Andrei Serjantov", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "On the Impact of Social Network Profiling on Anonymity", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "diaz-pet2008", "www_tags": "selected", "pages": "44--62", "www_section": "Traffic analysis", "location": "Leuven, Belgium"}, {"publisher": "ACM", "title": "Does additional information always reduce anonymity?", "series": "", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society 2007", "author": "Claudia Diaz and Carmela Troncoso and George Danezis", "year": "2007", "number": "", "month": "October", "volume": "", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-925.pdf", "editor": "Ting Yu", "key": "diaz-wpes2007", "www_tags": "selected", "pages": "72--75", "www_section": "traffic", "location": "Alexandria,VA,USA"}, {"publisher": "Springer-Verlag, LNCS 2760", "author": "Claudia Diaz and Andrei Serjantov", "title": "Generalising Mixes", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "www_important": "1", "year": "2003", "month": "March", "pages": "18--31", "editor": "Roger Dingledine", "key": "diaz:pet2003", "www_tags": "selected", "www_ps_gz_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2009", "title": "The disadvantages of free {MIX} routes and how to overcome them", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "author": "Oliver Berthold and Andreas Pfitzmann and Ronny Standtke", "year": "2000", "month": "July", "pages": "30--45", "www_pdf_url": "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", "editor": "H. Federrath", "key": "disad-free-routes", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag, LNCS 434", "title": "The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability", "booktitle": "Proceedings of {EUROCRYPT} 1989", "author": "Michael Waidner and Birgit Pfitzmann", "year": "1990", "key": "disco", "www_tags": "selected", "www_ps_gz_url": "http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz", "www_section": "Anonymous communication"}, {"author": "George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "title": "Drac: An Architecture for Anonymous Low-Volume Communications", "year": "2010", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf", "location": "Berlin, Germany", "key": "drac-pet2010", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Jing Jin and Xinyuan Wang", "booktitle": "Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks", "address": "Lisbon", "year": "2009", "month": "July", "www_pdf_url": "http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf", "pages": "429--438", "key": "dsn-09-jing", "www_tags": "selected", "title": "On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks", "www_section": "Anonymous communication"}, {"publisher": "IEEE Computer Society Washington, DC, USA", "author": "A. Durresi and V. Paruchuri and L. Barolli and R. Jain and M. Takizawa", "journal": "Proceedings of the 17th International Conference on Database and Expert Systems Applications", "title": "{Tokens for Anonymous Communications in the Internet}", "pages": "83--90", "www_pdf_url": "http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf", "key": "durresi2006tac", "year": "2006", "www_section": "Anonymous communication"}, {"author": "Nick Mathewson and Roger Dingledine", "title": "Practical Traffic Analysis: Extending and Resisting Statistical Disclosure", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "www_important": "1", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf", "pages": "17--34", "key": "e2e-traffic", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag", "title": "{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}", "journal": "Wirtschaftsinformatik", "author": "Christian Grothoff", "year": "2003", "www_section": "Economics", "month": "June", "key": "ebe2003", "www_tags": "selected", "www_ps_url": "http://www.ovmj.org/GNUnet/download/ebe.ps"}, {"publisher": "Springer-Verlag, LNCS 2742", "author": "Alessandro Acquisti and Roger Dingledine and Paul Syverson", "title": "{On the Economics of Anonymity}", "booktitle": "Proceedings of Financial Cryptography (FC '03)", "www_important": "1", "year": "2003", "month": "January", "www_pdf_url": "http://freehaven.net/doc/fc03/econymics.pdf", "editor": "Rebecca N. Wright", "key": "econymics", "www_tags": "selected", "www_section": "Economics"}, {"publisher": "ACM", "doi": "http://doi.acm.org/10.1145/1592451.1592456", "author": "Matthew Edman and B\\\"{u}lent Yener", "title": "On anonymity in an electronic society: A survey of anonymous communication systems", "journal": "ACM Computing Surveys", "issn": "0360-0300", "year": "2009", "number": "1", "pages": "1--35", "volume": "42", "www_pdf_url": "http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf", "key": "edman2009survey", "www_tags": "selected", "www_section": "Misc", "address": "New York, NY, USA"}, {"title": "Making P2P Accountable without Losing Privacy", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "author": "Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna Lysyanskaya and Mira Meyerovich and Eric Rachlin", "month": "October", "www_pdf_url": "http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf", "location": "Washington, DC, USA", "key": "erway:wpes2007", "year": "2007", "www_section": "Economics"}, {"publisher": "LNCS 3193", "author": "S. Mauw and J. Verschuren and E.P. de Vink", "booktitle": "Proceedings of ESORICS 2004", "title": "A formalization of anonymity and onion routing", "year": "2004", "pages": "109--124", "www_pdf_url": "http://www.win.tue.nl/~ecss/downloads/esorics04.pdf", "editor": "P. Samarati, P. Ryan, D. Gollmann, and R. Molva", "key": "esorics04-mauw", "www_tags": "selected", "www_section": "Formal methods", "location": "Sophia Antipolis"}, {"author": "Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of ESORICS 2005", "www_ps_url": "http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps", "year": "2005", "month": "September", "key": "esorics05-Klonowski", "www_tags": "selected", "title": "Local View Attack on Anonymous Communication", "www_section": "Traffic analysis"}, {"publisher": "Springer", "author": "Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'10", "title": "Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation", "year": "2010", "month": "September", "www_pdf_url": "http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf", "key": "esorics10-bandwidth", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer", "author": "Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann", "booktitle": "Proceedings of the European Symposium Research Computer Security - {ESORICS}'12", "title": "{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks", "year": "2012", "month": "September", "www_pdf_url": "http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf", "key": "esorics12-torscan", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "An Improved Construction for Universal Re-encryption", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Peter Fairbrother", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://www.m-o-o-t.org/ICUR.pdf", "pages": "79--87", "key": "fairbrother:pet2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "title": "Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and Bart Preneel", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "faust-pet2007", "year": "2007", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "{Thwarting Web Censorship with Untrusted Messenger Delivery}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger", "year": "2003", "month": "March", "pages": "125--140", "www_pdf_url": "http://nms.lcs.mit.edu/papers/disc-pet2003.pdf", "editor": "Roger Dingledine", "key": "feamster:pet2003", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "Location Diversity in Anonymity Networks", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "author": "Nick Feamster and Roger Dingledine", "year": "2004", "www_section": "Anonymous communication", "month": "October", "location": "Washington, DC, USA", "key": "feamster:wpes2004", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/routing-zones/routing-zones.ps"}, {"title": "A Probabilistic Analysis of Onion Routing in a Black-box Model", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}", "author": "Joan Feigenbaum and Aaron Johnson and Paul Syverson", "month": "October", "www_pdf_url": "http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf", "location": "Washington, DC, USA", "key": "feigenbaum:wpes2007", "year": "2007", "www_section": "Provable shuffles"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "{Privacy-enhancing technologies for the Internet, II: Five years later}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Ian Goldberg", "year": "2002", "www_section": "Misc", "month": "April", "www_pdf_url": "http://freehaven.net/anonbib/papers/petfive.pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "fiveyearslater", "www_tags": "selected", "www_ps_url": "http://freehaven.net/anonbib/papers/petfive.ps"}, {"publisher": "ACM Press", "author": "Markus Jakobsson", "title": "Flash {M}ixing", "booktitle": "Proceedings of Principles of Distributed Computing - {PODC} '99", "www_important": "1", "year": "1999", "www_pdf_url": "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf", "key": "flash-mix", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "Springer", "author": "David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "title": "Evading Censorship with Browser-Based Proxies", "year": "2012", "month": "July", "www_pdf_url": "https://crypto.stanford.edu/flashproxy/flashproxy.pdf", "key": "flashproxy-pets12", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "On Flow Correlation Attacks and Countermeasures in Mix Networks", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf", "pages": "207--225", "key": "flow-correlation04", "www_tags": "selected", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf", "key": "foci11-clouds", "title": "Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)", "author": "Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman", "year": "2011", "www_section": "Anonymous communication", "month": "August"}, {"title": "Decoy Routing: Toward Unblockable Internet Communication", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)", "author": "Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer", "year": "2011", "month": "August", "www_pdf_url": "http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf", "key": "foci11-decoy", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "Bootstrapping Communications into an Anti-Censorship System", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)", "author": "Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh", "year": "2012", "month": "August", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf", "key": "foci12-defiance", "www_tags": "selected", "www_section": "Communications Censorship"}, {"title": "{How the Great Firewall of China is blocking Tor}", "booktitle": "Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)", "author": "Philipp Winter and Stefan Lindskog", "year": "2012", "month": "August", "www_pdf_url": "https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf", "key": "foci12-winter", "www_tags": "selected", "www_section": "Communications Censorship"}, {"author": "Michael J. Freedman and Antonio Nicolosi", "booktitle": "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", "title": "Efficient Private Techniques for Verifying Social Proximity", "month": "February", "www_pdf_url": "http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf", "location": "Bellevue, WA", "key": "fof:iptps07", "year": "2007", "www_section": "Misc"}, {"publisher": "Springer", "title": "Attacking Unlinkability: The Importance of Context", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Matthias Franz and Bernd Meyer and Andreas Pashalidis", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "franz-pet2007", "year": "2007", "www_section": "Formal methods", "location": "Ottawa, Canada"}, {"title": "Freedom Systems 2.0 Architecture", "www_section": "Anonymous communication", "author": "Philippe Boucher and Adam Shostack and Ian Goldberg", "year": "2000", "month": "December", "www_pdf_url": "http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf", "key": "freedom2-arch", "www_tags": "selected", "type": "White Paper", "institution": "Zero Knowledge Systems, {Inc.}", "day": "18"}, {"title": "Freedom Systems 2.1 Security Issues and Analysis", "www_section": "Anonymous communication", "author": "Adam Back and Ian Goldberg and Adam Shostack", "year": "2001", "month": "May", "www_pdf_url": "http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf", "key": "freedom21-security", "www_tags": "selected", "type": "White Paper", "institution": "Zero Knowledge Systems, {Inc.}", "day": "3"}, {"publisher": "Springer-Verlag, LNCS 2009", "author": "Roger Dingledine and Michael J. Freedman and David Molnar", "title": "The Free Haven Project: Distributed Anonymous Storage Service", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "www_important": "1", "year": "2000", "www_section": "Anonymous publication", "month": "July", "editor": "H. Federrath", "key": "freehaven-berk", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/berk/freehaven-berk.ps"}, {"title": "Freenet: {A} Distributed Anonymous Information Storage and Retrieval System", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "author": "Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong", "year": "2000", "www_section": "Anonymous publication", "month": "July", "pages": "46--66", "key": "freenet", "www_tags": "selected", "www_html_url": "http://citeseer.nj.nec.com/clarke00freenet.html"}, {"title": "Active Traffic Analysis Attacks and Countermeasures", "booktitle": "Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing", "author": "Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "year": "2003", "pages": "31--39", "www_pdf_url": "http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf", "key": "fu-active", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks", "booktitle": "Proceedings of the 2003 International Conference on Parallel Processing", "author": "Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao", "year": "2003", "pages": "483--492", "www_pdf_url": "http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf", "key": "fu-analytical", "www_tags": "selected", "www_section": "Traffic analysis"}, {"school": "University of Cambridge", "title": "Better Anonymous Communications", "www_section": "Anonymous communication", "author": "George Danezis", "year": "2004", "month": "July", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/thesis.pdf", "key": "george-thesis", "www_tags": "selected"}, {"publisher": "Springer-Verlag", "author": "Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu", "booktitle": "{Proceedings of ASCIP 2002}", "title": "{Efficient Sharing of Encrypted Data}", "year": "2002", "www_section": "Anonymous publication", "month": "July", "pages": "107--120", "key": "gnunetencoding", "www_tags": "selected", "www_ps_url": "http://www.ovmj.org/GNUnet/download/esed.ps"}, {"author": "Ian Goldberg", "booktitle": "Proceedings of the 2007 IEEE Symposium on Security and Privacy", "title": "{Improving the Robustness of Private Information Retrieval}", "year": "2007", "month": "May", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf", "key": "goldberg-2007", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"publisher": "IEEE Computer Society Press", "isbn": "0-8186-7804-6", "title": "Privacy-enhancing Technologies for the Internet", "booktitle": "Proceedings of the 42nd IEEE Spring COMPCON", "author": "Ian Goldberg and David Wagner and Eric Brewer", "year": "1997", "www_section": "Misc", "month": "February", "key": "goldberg97privacyenhancing", "www_tags": "selected", "www_ps_url": "http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps"}, {"publisher": "ACM Press", "title": "Parallel Mixing", "booktitle": "{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}", "author": "Philippe Golle and Ari Juels", "year": "2004", "www_section": "Anonymous communication", "month": "October", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/parallel.pdf", "key": "golle:ccs2004", "www_tags": "selected", "www_ps_url": "http://crypto.stanford.edu/~pgolle/papers/parallel.ps"}, {"title": "Dining Cryptographers Revisited", "booktitle": "Proceedings of Eurocrypt 2004", "author": "Philippe Golle and Ari Juels", "year": "2004", "month": "May", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/nim.pdf", "key": "golle:eurocrypt2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Reputable Mix Networks", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Philippe Golle", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/reputable.pdf", "pages": "51--63", "key": "golle:pet2004", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "Springer", "title": "Identity Trail: Covert Surveillance Using DNS", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Saikat Guha and Paul Francis", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "guha-pet2007", "year": "2007", "www_section": "Traffic analysis", "location": "Ottawa, Canada"}, {"publisher": "Springer-Verlag, LNCS 1962", "title": "Authentic Attributes with Fine-Grained Anonymity Protection", "booktitle": "Proceedings of Financial Cryptography (FC 2000)", "author": "Stuart Stubblebine and Paul Syverson", "year": "2001", "pages": "276--294", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf", "editor": "Yair Frankel", "key": "gup", "www_tags": "selected", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps", "www_section": "Pseudonymity"}, {"publisher": "IOS Press", "author": "R. Gupta and S. Ray and A.K. Somani and Z. Zhang", "journal": "Multiagent and Grid Systems", "title": "{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}", "number": "1", "volume": "2", "www_pdf_url": "http://www.public.iastate.edu/~rsouvik/Article531.pdf", "key": "gupta2006uns", "year": "2006", "pages": "11--27", "www_section": "Economics"}, {"title": "Anonymity and Information Hiding in Multiagent Systems", "journal": "Journal of Computer Security", "author": "Joseph Y. Halpern and Kevin R. O'Neill", "year": "2004", "number": "", "volume": "", "www_pdf_url": "http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf", "key": "halpern-oneill-2003", "www_tags": "selected", "www_section": "Formal methods"}, {"title": "{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}", "www_section": "Anonymous communication", "author": "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", "year": "2003", "number": "2003-1890", "month": "February", "www_pdf_url": "http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf", "key": "herbivore:tr", "www_tags": "selected", "institution": "Cornell University", "address": "Ithaca, NY"}, {"publisher": "Springer", "author": "Alejandro Hevia and Daniele Micciancio", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "An Indistinguishability-Based Characterization of Anonymous Channels", "bookurl": "http://petsymposium.org/2008/", "month": "July", "editor": "Nikita Borisov and Ian Goldberg", "key": "hevia-pet2008", "year": "2008", "pages": "24--43", "www_section": "Misc", "location": "Leuven, Belgium"}, {"publisher": "Springer", "author": "Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "title": "Privacy for Public Transportation", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf", "editor": "George Danezis and Philippe Golle", "key": "heydt-benjamin:pet2006", "www_tags": "selected", "pages": "1--19", "www_section": "E-Cash / Anonymous Credentials", "location": "Cambridge, UK"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "Fingerprinting Websites Using Traffic Analysis", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Andrew Hintz", "year": "2002", "www_section": "Traffic analysis", "month": "April", "www_pdf_url": "http://guh.nu/projects/ta/safeweb/safeweb.pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "hintz02", "www_tags": "selected", "www_ps_url": "http://guh.nu/projects/ta/safeweb/safeweb.ps", "www_html_url": "http://guh.nu/projects/ta/safeweb/safeweb.html"}, {"title": "The Hitting Set Attack on Anonymity Protocols", "series": "LNCS", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "author": "Dogan Kesdogan and Lexi Pimenidis", "year": "2004", "month": "May", "www_pdf_url": "http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf", "location": "Toronto", "key": "hitting-set04", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "IEEE CS", "author": "Lasse {\\O}verlier and Paul Syverson", "booktitle": "Proceedings of the 2006 IEEE Symposium on Security and Privacy", "www_important": "1", "year": "2006", "month": "May", "www_pdf_url": "http://www.onion-router.net/Publications/locating-hidden-servers.pdf", "key": "hs-attack06", "www_tags": "selected", "www_remarks": "Motivates and describes Tor's entry guard design.", "title": "Locating Hidden Servers", "www_section": "Traffic analysis"}, {"key": "huang2006sce", "author": "L. Huang and K. Matsuura and H. Yamane and K. Sezaki", "journal": "Proc. of Security in Pervasive Computing (SPC)", "title": "{Silent cascade: Enhancing location privacy without communication qos degradation}", "year": "2006", "www_section": "Misc", "pages": "165--180"}, {"publisher": "Springer", "author": "Markus Huber and Martin Mulazzani and Edgar Weippl", "series": "LNCS", "booktitle": "Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2010)", "title": "{Tor HTTP Usage and Information Leakage}", "year": "2010", "month": "May", "volume": "6109", "pages": "245--255", "www_pdf_url": "http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf", "location": "Linz, Austria", "key": "huber2010tor", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 1976", "author": "Miyako Ohkubo and Masayuki Abe", "key": "hybrid-mix", "www_tags": "selected", "booktitle": "Proceedings of {ASIACRYPT} 2000", "title": "A {L}ength-{I}nvariant {H}ybrid {MIX}", "year": "2000", "www_section": "Provable shuffles"}, {"school": "UC Berkeley", "title": "A Pseudonymous Communications Infrastructure for the Internet", "www_section": "Anonymous communication", "author": "Ian Goldberg", "year": "2000", "month": "December", "www_pdf_url": "http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf", "key": "ian-thesis", "www_tags": "selected"}, {"author": "Ginger Perng and Michael K. Reiter and Chenxi Wang", "booktitle": "Proceedings of the 26th IEEE Conference on Distributed Computing Systems", "title": "M2: Multicasting Mixes for Efficient and Anonymous Communication", "year": "2006", "month": "July", "www_pdf_url": "http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf", "key": "icdcs2006:m2", "www_tags": "selected", "www_section": "Anonymous communication", "day": "4--7"}, {"publisher": "ACM Press", "doi": "http://doi.acm.org/10.1145/586110.586114", "isbn": "1-58113-612-9", "title": "Design and implementation of the idemix anonymous credential system", "booktitle": "Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002)", "author": "Jan Camenisch and Els Van Herreweghen", "year": "2002", "www_important": "1", "pages": "21--30", "www_pdf_url": "http://www.zurich.ibm.com/~jca/papers/camvan02.pdf", "location": "Washington, DC, USA", "key": "idemix", "www_tags": "selected", "www_section": "E-Cash / Anonymous Credentials", "address": "New York, NY, USA"}, {"author": "Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "title": "Provable Anonymity for Networks of Mixes", "year": "2005", "month": "June", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf", "pages": "26--38", "key": "ih05-Klonowski", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Luke O'Connor", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "title": "On Blending Attacks For Mixes with Memory", "year": "2005", "month": "June", "www_pdf_url": "http://lukejamesoconnor.googlepages.com/blending-attacks.pdf", "pages": "39--52", "key": "ih05-Luke", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Ginger Perng and Michael K. Reiter and Chenxi Wang", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "title": "Censorship Resistance Revisited", "year": "2005", "month": "June", "www_pdf_url": "http://gnunet.org/papers/IHW-CR.pdf", "pages": "62--76", "key": "ih05-csispir", "www_tags": "selected", "www_section": "Anonymous publication"}, {"author": "George Danezis and Jolyon Clulow", "booktitle": "Proceedings of Information Hiding Workshop (IH 2005)", "title": "Compulsion Resistant Anonymous Communications", "year": "2005", "month": "June", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/compel.pdf", "pages": "11--25", "key": "ih05-danezisclulow", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "An Improved Clock-skew Measurement Technique for Revealing Hidden Services", "booktitle": "Proceedings of the 17th USENIX Security Symposium", "author": "Sebastian Zander and Steven J. Murdoch", "year": "2008", "month": "July", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf", "location": "San Jose, CA, US", "key": "improved-clockskew", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "{Building Incentives into Tor}", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "author": "Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach", "year": "2010", "month": "January", "www_pdf_url": "http://freehaven.net/anonbib/papers/incentives-fc10.pdf", "editor": "Radu Sion", "key": "incentives-fc10", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "title": "Receiver Anonymity via Incomparable Public Keys", "booktitle": "{Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)}", "author": "Brent Waters and Ed Felten and Amit Sahai", "year": "2003", "month": "October", "pages": "112--121", "www_pdf_url": "http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf", "editor": "Vijay Atluri and Peng Liu", "key": "incomparable-pkeys", "www_tags": "selected", "www_ps_url": "http://www.cs.princeton.edu/~bwaters/research/incomparable.ps", "www_section": "Anonymous communication"}, {"title": "Infranet: Circumventing Web Censorship and Surveillance", "booktitle": "Proceedings of the 11th USENIX Security Symposium", "author": "Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger", "year": "2002", "month": "August", "www_pdf_url": "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf", "key": "infranet", "www_tags": "selected", "www_ps_gz_url": "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz", "www_section": "Communications Censorship"}, {"title": "Improving Performance and Anonymity in the Tor Network", "booktitle": "Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012)", "author": "Andriy Panchenko and Fabian Lanze and Thomas Engel", "year": "2012", "month": "December", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf", "key": "ipccc12-performance", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "IEEE Computer Society Washington, DC, USA", "author": "Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai", "journal": "Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)-Volume 00", "title": "{Cryptography from Anonymity}", "year": "2006", "month": "October", "www_pdf_url": "http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf", "pages": "239--248", "key": "ishai2006ca", "www_tags": "selected", "www_section": "Formal methods"}, {"publisher": "ACM Press", "title": "An Optimally Robust Hybrid Mix Network (Extended Abstract)", "booktitle": "Proceedings of Principles of Distributed Computing - {PODC} '01", "author": "Markus Jakobsson and Ari Juels", "year": "2001", "www_section": "Provable shuffles", "key": "jakobsson-optimally", "www_tags": "selected", "www_html_url": "http://citeseer.nj.nec.com/492015.html"}, {"publisher": "Springer", "author": "Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "title": "Nymble: Anonymous IP-address Blocking", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "johnson-pet2007", "year": "2007", "www_remarks": "Superseded by nymble-tdsc.", "www_section": "Misc", "location": "Ottawa, Canada"}, {"school": "Department of Computer Science, University of York, York", "www_pdf_url": "http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf", "key": "joss-thesis", "author": "Joss Wright", "www_section": "Formal methods", "title": "Characterising Anonymity Systems", "year": "2007", "month": "November"}, {"publisher": "ACM Press", "title": "k-Anonymous Message Transmission", "booktitle": "{Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)}", "author": "Luis von Ahn and Andrew Bortz and Nicholas J. Hopper", "year": "2003", "month": "October", "pages": "122--130", "www_pdf_url": "http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf", "editor": "Vijay Atluri and Peng Liu", "key": "k-anonymous:ccs2003", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Non-Discretionary Access Control for Decentralized Computing Systems", "www_section": "Traffic analysis", "author": "Paul A. Karger", "year": "1977", "number": "MIT/LCS/TR-179", "month": "May", "www_pdf_url": "http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf", "key": "karger77", "www_tags": "selected", "www_remarks": "Chapter 11, \"Limitations of End-to-End Encryption,\" has some early discussion of traffic analysis issues.", "type": "S. M. & E. E. thesis", "institution": "Laboratory for Computer Science, Massachusetts Institute of Technology", "address": "Cambridge, MA"}, {"publisher": "Springer", "title": "Pairing-Based Onion Routing", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Aniket Kate and Greg Zaverucha and Ian Goldberg", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Pairing_based.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "kate-pet2007", "year": "2007", "www_remarks": "Describes a circuit-establishment protocol for a Tor-like network. Uses Pairing- and Identity-Based crypto for efficiency, at the expense of having all private keys generated by a trusted IBE authority.", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"publisher": "Elsevier", "author": "D. Kesdogan and C. Palmer", "journal": "Computer Communications", "title": "{Technical challenges of network anonymity}", "number": "3", "volume": "29", "key": "kesdogan2006tcn", "year": "2006", "pages": "306--324", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Dogan Kesdogan and Mark Borning and Michael Schmeink", "year": "2002", "month": "April", "www_pdf_url": "http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "kesdogan:pet2002", "www_tags": "selected", "www_section": "Anonymous communication"}, {"school": "University of Colorado", "title": "Improving Security and Performance in Low Latency Anonymity Networks", "www_section": "Anonymous communication", "author": "Kevin Bauer", "year": "2011", "month": "May", "www_pdf_url": "http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf", "key": "kevin-thesis", "www_tags": "selected"}, {"www_pdf_url": "http://www.cs.cmu.edu/~alina/papers/p3.pdf", "author": "L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang", "key": "kissner04private", "www_tags": "selected", "journal": "Applied Cryptography and Network Security", "title": "Private keyword-based push and pull with applications to anonymous communication", "year": "2004", "www_section": "Private Information Retrieval"}, {"title": "How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}", "author": "Stefan K\\\"opsell and Ulf Hilling", "year": "2004", "month": "October", "www_pdf_url": "http://freehaven.net/anonbib/papers/p103-koepsell.pdf", "location": "Washington, DC, USA", "key": "koepsell:wpes2004", "www_tags": "selected", "www_section": "Communications Censorship"}, {"school": "University of Amsterdam", "author": "Matthijs R. Koot", "www_section": "Traffic analysis", "title": "Measuring and Predicting Anonymity", "year": "2012", "month": "June", "www_pdf_url": "http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf", "key": "koot2012", "address": "Amsterdam, The Netherlands"}, {"volume": "3995", "key": "kopsell2006ra", "author": "S. Kopsell and R. Wendolsky and H. Federrath", "journal": "Emerging Trends in Information and Communication Security-ETRICS, LNCS", "title": "{Revocable Anonymity}", "year": "2006", "www_section": "Anonymous communication", "pages": "206--220"}, {"school": "Laboratoire d'Informatique (LIX), {\\'E}cole Polytechnique, Paris", "title": "Probabilistic and Information-Theoretic Approaches to Anonymity", "www_section": "Anonymous communication", "author": "Konstantinos Chatzikokolakis", "year": "2007", "month": "October", "www_pdf_url": "http://www.lix.polytechnique.fr/~kostas/thesis.pdf", "key": "kostas-thesis", "www_tags": "selected"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Dennis K\\\"ugler", "year": "2003", "month": "March", "pages": "161--176", "www_pdf_url": "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf", "editor": "Roger Dingledine", "key": "kugler:pet2003", "www_tags": "selected", "www_section": "Anonymous publication"}, {"title": "On the Anonymity of Banknotes", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Dennis K{\\\"u}gler", "month": "May", "volume": "3424", "pages": "108--120", "key": "kugler:pet2004", "year": "2004", "www_section": "Misc"}, {"publisher": "Springer-Verlag, LNCS 2482", "title": "Dummy Traffic Against Long Term Intersection Attacks", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2002)", "author": "Oliver Berthold and Heinrich Langos", "year": "2002", "month": "April", "www_pdf_url": "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf", "editor": "Roger Dingledine and Paul Syverson", "key": "langos02", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer", "author": "Fernando Perez-Gonzalez and Carmela Troncoso", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "title": "Understanding Statistical Disclosure: A Least Squares approach", "year": "2012", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf", "key": "leastsquares-pets12", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "USENIX Association", "author": "Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous", "series": "LEET'11", "booktitle": "Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats", "title": "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users", "www_pdf_url": "http://arxiv.org/pdf/1103.1518", "key": "leet2011:TorBunchApple", "year": "2011", "www_section": "Traffic analysis"}, {"isbn": "978-3-642-01956-2", "title": "Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, France, June 2-5, 2009", "author": "J{\\\"o}rg Lenhard and Karsten Loesing and Guido Wirtz", "year": "2009", "month": "June", "volume": "5536", "www_pdf_url": "http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf", "editor": "Michel Abdalla and David Pointcheval and Pierre-Alain Fouque and Damien Vergnaud", "key": "lenhard2009hidserv-lowbw", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2578", "title": "Limits of Anonymity in Open Environments", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "author": "Dogan Kesdogan and Dakshi Agrawal and Stefan Penz", "year": "2002", "month": "October", "www_pdf_url": "http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf", "editor": "Fabien Petitcolas", "key": "limits-open", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "IEEE CS Press", "title": "{Performance Measurements and Statistics of Tor Hidden Services}", "booktitle": "Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)", "author": "Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz", "year": "2008", "month": "July", "www_pdf_url": "http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf", "location": "Turku, Finland", "key": "loesing2008performance", "www_tags": "selected", "www_section": "Anonymous communication"}, {"school": "University of Bamberg", "author": "Karsten Loesing", "www_section": "Anonymous communication", "title": "Privacy-enhancing Technologies for Private Services", "year": "2009", "month": "May", "www_pdf_url": "http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf", "key": "loesing2009thesis", "www_tags": "selected"}, {"publisher": "Springer", "author": "Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Shining Light in Dark Places: Understanding the {Tor} Network", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "mccoy-pet2008", "www_tags": "selected", "pages": "63--76", "www_section": "Misc", "location": "Leuven, Belgium"}, {"publisher": "IEEE Computer Society Washington, DC, USA", "key": "melchor2006dnp", "author": "C.A. Melchor and Y. Deswarte", "journal": "Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications", "title": "{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}", "year": "2006", "www_section": "Anonymous communication", "pages": "163--172"}, {"author": "George Danezis and Roger Dingledine and Nick Mathewson", "title": "{Mixminion: Design of a Type III Anonymous Remailer Protocol}", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "www_important": "1", "year": "2003", "month": "May", "www_pdf_url": "http://mixminion.net/minion-design.pdf", "pages": "2--15", "key": "minion-design", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 1976", "title": "{Attack for Flash MIX}", "booktitle": "Proceedings of {ASIACRYPT} 2000", "author": "Masashi Mitomo and Kaoru Kurosawa", "year": "2000", "www_section": "Provable shuffles", "key": "mitkuro", "www_tags": "selected", "www_html_url": "http://citeseer.nj.nec.com/450148.html"}, {"publisher": "Springer-Verlag, LNCS 2137", "title": "{A Reputation System to Increase MIX-net Reliability}", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "author": "Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar", "year": "2001", "month": "April", "pages": "126--141", "www_pdf_url": "http://freehaven.net/doc/mix-acc/mix-acc.pdf", "editor": "Ira S. Moskowitz", "key": "mix-acc", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/mix-acc/mix-acc.ps", "www_section": "Anonymous communication"}, {"author": "Claudia Diaz and Len Sassaman and Evelyne Dewitte", "title": "Comparison between two practical mix designs", "series": "LNCS", "booktitle": "Proceedings of ESORICS 2004", "www_important": "1", "year": "2004", "month": "September", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-98.pdf", "location": "France", "key": "mixmaster-reliable", "www_tags": "selected", "www_ps_gz_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz", "www_section": "Traffic analysis"}, {"author": "Ulf M{\\\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman", "title": "Mixmaster {P}rotocol --- {V}ersion 2", "www_section": "Anonymous communication", "www_important": "1", "year": "2003", "www_txt_url": "http://www.abditum.com/mixmaster-spec.txt", "month": "July", "key": "mixmaster-spec", "www_tags": "selected", "howpublished": "IETF Internet Draft"}, {"publisher": "Springer-Verlag, LNCS 3110", "title": "Mixminion: Strong Anonymity for Financial cryptography", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "author": "Nick Mathewson and Roger Dingledine", "month": "February", "pages": "227--232", "www_pdf_url": "http://freehaven.net/doc/fc04/minion-systems.pdf", "editor": "Ari Juels", "key": "mixminion-fc2004", "year": "2004", "www_section": "Anonymous communication"}, {"key": "mmsec04-Klonowski", "www_tags": "selected", "title": "DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion Protocols", "booktitle": "Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004", "author": "Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski", "year": "2004", "www_section": "Anonymous communication", "month": "September"}, {"title": "Information Hiding, Anonymity and Privacy: A Modular Approach", "journal": "Journal of Computer Security", "author": "Dominic Hughes and Vitaly Shmatikov", "year": "2004", "number": "1", "pages": "3--36", "volume": "12", "key": "modular-approach", "www_tags": "selected", "www_ps_url": "http://www.csl.sri.com/users/shmat/shmat_anon.ps", "www_section": "Formal methods"}, {"publisher": "IEEE", "title": "Traffic Morphing: An efficient defense against statistical traffic analysis", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '09", "author": "Charles Wright and Scott Coull and Fabian Monrose", "year": "2009", "month": "February", "www_pdf_url": "http://freehaven.net/anonbib/papers/morphing09.pdf", "key": "morphing09", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag, LNCS 3110", "title": "Practical Anonymity for the Masses with MorphMix", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "author": "Marc Rennhard and Bernhard Plattner", "year": "2004", "month": "February", "pages": "233--250", "www_pdf_url": "http://home.zhwin.ch/~rer/publications/FC2004.pdf", "editor": "Ari Juels", "key": "morphmix-fc2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "title": "Breaking the Collusion Detection Mechanism of MorphMix", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Parisa Tabriz and Nikita Borisov", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://petworkshop.org/2006/preproc/preproc_21.pdf", "editor": "George Danezis and Philippe Golle", "key": "morphmix:pet2006", "www_tags": "selected", "pages": "368--384", "www_section": "Traffic analysis", "location": "Cambridge, UK"}, {"author": "Marc Rennhard and Bernhard Plattner", "title": "{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}", "www_important": "1", "year": "2002", "month": "November", "www_pdf_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf", "location": "Washington, DC, USA", "key": "morphmix:wpes2002", "www_tags": "selected", "www_ps_gz_url": "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Steven J. Murdoch and Piotr Zieli{\\'n}ski", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "www_important": "1", "year": "2007", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "murdoch-pet2007", "www_tags": "selected", "www_remarks": "Examines efficacy of traffic analysis against a low-latency anonymity network by an adversary who controls Internet exchanges, and who can only sample a fraction of traffic.", "title": "Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries", "www_section": "Traffic analysis", "location": "Ottawa, Canada"}, {"publisher": "Springer", "author": "Steven J. Murdoch and Robert N. M. Watson", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Metrics for Security and Performance in Low-Latency Anonymity Networks", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "murdoch-pet2008", "www_tags": "selected", "pages": "115--132", "www_section": "traffic", "location": "Leuven, Belgium"}, {"publisher": "Springer", "author": "Shishir Nagaraja", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "title": "Anonymity in the wild: Mixes on unstructured networks", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "nagaraja-pet2007", "year": "2007", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"publisher": "Internet Society", "author": "Amir Houmansadr and Negar Kiyavash and Nikita Borisov", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'09", "title": "RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows", "year": "2009", "month": "February", "www_pdf_url": "http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf", "key": "ndss09-rainbow", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Internet Society", "author": "Amir Houmansadr and Nikita Borisov", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS}'11", "title": "SWIRL: A Scalable Watermark to Detect Correlated Network Flows", "year": "2011", "month": "February", "www_pdf_url": "http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf", "key": "ndss11-swirl", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Internet Society", "author": "Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "title": "{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}", "year": "2013", "month": "February", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf", "key": "ndss13-freewave", "www_tags": "selected", "www_section": "Communications Censorship"}, {"publisher": "Internet Society", "author": "Rob Jansen and Aaron Johnson and Paul Syverson", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "title": "{LIRA: Lightweight Incentivized Routing for Anonymity}", "year": "2013", "month": "February", "www_pdf_url": "http://www-users.cs.umn.edu/~jansen/papers/lira-ndss2013.pdf", "key": "ndss13-lira", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Internet Society", "author": "Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "title": "{rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation}", "year": "2013", "month": "February", "www_pdf_url": "http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf", "key": "ndss13-rbridge", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Internet Society", "author": "Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "title": "{An Empirical Evaluation of Relay Selection in Tor}", "year": "2013", "month": "February", "www_pdf_url": "https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf", "key": "ndss13-relay-selection", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Internet Society", "author": "Michael Backes and Goran Doychev and Boris K\\\"opf", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13", "title": "{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}", "year": "2013", "month": "February", "www_pdf_url": "http://software.imdea.org/~bkoepf/papers/ndss13.pdf", "key": "ndss13-website-fingerprinting", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "Metrics for Traffic Analysis Prevention", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov", "year": "2003", "month": "March", "pages": "48--65", "editor": "Roger Dingledine", "key": "newman:pet2003", "www_tags": "selected", "www_ps_url": "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps", "www_section": "Traffic analysis"}, {"title": "Anonymity and Covert Channels in Simple Timed Mix-firewalls", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf", "pages": "1--16", "key": "newman:pet2004", "www_tags": "selected", "www_remarks": "If we think about leaked anonymity as a covert channel between the sender Alice and the adversary Eve, then by measuring covert channel capacity we can get an upper bound on the amount of information Alice could leak.", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps", "www_section": "Traffic analysis"}, {"publisher": "Springer", "author": "L. Nguyen and R. Safavi-Naini and K. Kurosawa", "journal": "International Journal of Information Security", "title": "{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}", "year": "2006", "number": "4", "volume": "5", "key": "nguyen2006vsf", "www_tags": "selected", "pages": "241--255", "www_section": "Provable shuffles"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "Breaking and Mending Resilient Mix-nets", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Lan Nguyen and Rei Safavi-Naini", "year": "2003", "month": "March", "pages": "66--80", "www_pdf_url": "http://www.petworkshop.org/2003/preproc/05-preproc.pdf", "editor": "Roger Dingledine", "key": "nguyen:pet2003", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "ACM Press", "title": "{The Design, Implementation and Operation of an Email Pseudonym Server}", "booktitle": "{Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS 1998)}", "author": "David Mazi\\`eres and M. Frans Kaashoek", "year": "1998", "month": "November", "www_pdf_url": "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", "key": "nym-alias-net", "www_tags": "selected", "www_ps_gz_url": "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", "www_section": "Pseudonymity"}, {"doi": "10.1109/TDSC.2009.38", "title": "Nymble: Blocking Misbehaving Users in Anonymizing Networks", "journal": "IEEE Transactions on Dependable and Secure Computing", "author": "Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith", "year": "2011", "number": "2", "www_important": "1", "month": "March--April", "volume": "8", "key": "nymble-tdsc", "www_tags": "selected", "www_remarks": "Describes Nymble, a system that allows services to block anonymous users that misbehave, without making their transactions linkable.", "pages": "256--269", "www_section": "Misc"}, {"author": "Ryan Henry and Kevin Henry and Ian Goldberg", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "title": "{Making a Nymbler Nymble using VERBS (Extended Version)}", "year": "2010", "month": "July", "www_pdf_url": "http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf", "location": "Berlin, Germany", "key": "nymbler", "www_tags": "selected", "www_section": "Misc"}, {"www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf", "key": "oakland11-extending", "title": "Extending Nymble-like Systems", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "author": "Ryan Henry and Ian Goldberg", "year": "2011", "www_section": "Misc", "month": "May"}, {"title": "Formalizing Anonymous Blacklisting Systems", "booktitle": "Proceedings of the 2011 IEEE Symposium on Security and Privacy", "author": "Ryan Henry and Ian Goldberg", "year": "2011", "month": "May", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf", "key": "oakland11-formalizing", "www_tags": "selected", "www_section": "Misc"}, {"author": "Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "www_tags": "selected", "month": "May", "www_pdf_url": "http://freehaven.net/anonbib/papers/LAP.pdf", "key": "oakland2012-lap", "year": "2012", "title": "{LAP}: Lightweight Anonymity and Privacy", "www_section": "Anonymous communication"}, {"author": "Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "www_tags": "selected", "month": "May", "www_pdf_url": "http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf", "key": "oakland2012-lastor", "year": "2012", "title": "{LASTor: A Low-Latency AS-Aware Tor Client}", "www_section": "Anonymous communication"}, {"author": "Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton", "booktitle": "Proceedings of the 2012 IEEE Symposium on Security and Privacy", "www_tags": "selected", "month": "May", "www_pdf_url": "http://kpdyer.com/publications/oakland2012.pdf", "key": "oakland2012-peekaboo", "year": "2012", "title": "Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail", "www_section": "Traffic analysis"}, {"author": "Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov", "booktitle": "Proceedings of the 2013 IEEE Symposium on Security and Privacy", "www_tags": "selected", "month": "May", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/parrot.pdf", "key": "oakland2013-parrot", "year": "2013", "title": "The Parrot is Dead: Observing Unobservable Network Communications", "www_section": "Communications Censorship"}, {"author": "Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann", "booktitle": "Proceedings of the 2013 IEEE Symposium on Security and Privacy", "www_tags": "selected", "month": "May", "www_pdf_url": "http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf", "key": "oakland2013-trawling", "year": "2013", "title": "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization", "www_section": "Traffic analysis"}, {"publisher": "IEEE CS Press", "title": "{O}nion {R}outing Access Configurations", "www_abstract_url": "http://www.onion-router.net/Publications.html", "www_ps_url": "http://www.onion-router.net/Publications/DISCEX-2000.ps", "booktitle": "Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000)", "author": "Paul Syverson and Michael Reed and David Goldschlag", "year": "2000", "pages": "34--40", "volume": "1", "www_pdf_url": "http://www.onion-router.net/Publications/DISCEX-2000.pdf", "key": "onion-discex00", "www_tags": "selected", "www_ps_gz_url": "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 1174", "author": "David M. Goldschlag and Michael G. Reed and Paul F. Syverson", "booktitle": "Proceedings of Information Hiding: First International Workshop", "title": "{Hiding Routing Information}", "year": "1996", "month": "May", "pages": "137--150", "www_pdf_url": "http://www.onion-router.net/Publications/IH-1996.pdf", "editor": "R. Anderson", "key": "onion-routing:ih96", "www_tags": "selected", "www_ps_gz_url": "http://www.onion-router.net/Publications/IH-1996.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2009", "author": "Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr", "title": "{Towards an Analysis of Onion Routing Security}", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "www_important": "1", "year": "2000", "month": "July", "pages": "96--114", "editor": "H. Federrath", "key": "onion-routing:pet2000", "www_tags": "selected", "www_ps_gz_url": "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Lasse {\\O}verlier and Paul Syverson", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "title": "Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden services", "year": "2007", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "overlier-pet2007", "www_tags": "selected", "www_remarks": "Introduces Diffie-Hellman-based handshakes to build Tor circuits with fewer exponentiations than the original circuit-establishment protocol.", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"title": "Limitations of End-to-End Encryption in Secure Computer Networks", "www_section": "Traffic analysis", "author": "Michael A. Padlipsky and David W. Snow and Paul A. Karger", "year": "1978", "number": "ESD-TR-78-158", "month": "August", "www_pdf_url": "http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf", "key": "padlipky78", "www_tags": "selected", "institution": "The MITRE Corporation: Bedford MA, HQ Electronic Systems Division", "address": "Hanscom AFB, MA"}, {"publisher": "Springer-Verlag, LNCS 2137", "title": "Real World Patterns of Failure in Anonymity Systems", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "author": "Richard Clayton and George Danezis and Markus G. Kuhn", "year": "2001", "month": "April", "pages": "230--244", "www_pdf_url": "http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf", "editor": "Ira S. Moskowitz", "key": "patterns-failure", "www_tags": "selected", "www_section": "Misc"}, {"numpages": "34", "acmid": "204363", "author": "Man Ho Au and Patrick P. Tsang and Apu Kapadia", "journal": "ACM Transactions on Information and System Security ({ACM TISSEC})", "year": "2011", "month": "December", "volume": "14", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf", "key": "perea-tissec11", "www_tags": "selected", "keywords": "Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior", "pages": "29:1--29:34", "publisher": "ACM", "issue_date": "December 2011", "doi": "http://doi.acm.org/10.1145/2043628.2043630", "title": "{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous users", "url": "http://doi.acm.org/10.1145/2043628.2043630", "www_section": "Misc", "issn": "1094-9224", "articleno": "29", "issue": "4", "address": "New York, NY, USA"}, {"publisher": "ACM", "doi": "10.1145/2382196.2382294", "title": "{PERM}: Practical Reputation-Based Blacklisting without {TTPs}", "booktitle": "Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS)", "author": "Man Ho Au and Apu Kapadia", "year": "2012", "month": "October", "www_pdf_url": "http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf", "pages": "929--940", "key": "perm-ccs12", "www_tags": "selected", "www_section": "Pseudonymity"}, {"title": "Privacy Vulnerabilities in Encrypted HTTP Streams", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "author": "George Dean Bissias and Marc Liberatore and Brian Neil Levine", "year": "2005", "month": "May", "www_pdf_url": "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", "pages": "1--11", "key": "pet05-bissias", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "An Analysis of Parallel Mixing with Attacker-Controlled Inputs", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "author": "Nikita Borisov", "year": "2005", "month": "May", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf", "pages": "12--25", "key": "pet05-borisov", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Mix-network with Stronger Security", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "author": "Jan Camenisch and Anton Mityagin", "year": "2005", "month": "May", "pages": "128--147", "key": "pet05-camenisch", "www_tags": "selected", "www_section": "Provable shuffles"}, {"author": "Andrei Serjantov and Steven J. Murdoch", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "title": "Message Splitting Against the Partial Adversary", "year": "2005", "month": "May", "www_pdf_url": "http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf", "pages": "26--39", "key": "pet05-serjantov", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Unmixing Mix Traffic", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2005)", "author": "Ye Zhu and Riccardo Bettati", "year": "2005", "month": "May", "www_pdf_url": "http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf", "pages": "110--127", "key": "pet05-zhu", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Amir Houmansadr and Nikita Borisov", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "www_tags": "selected", "month": "July", "www_pdf_url": "http://www.cs.utexas.edu/~amir/papers/Fancy.pdf", "key": "pets13-flow-fingerprints", "year": "2013", "title": "The need for flow fingerprints to link correlated network flows", "www_section": "Traffic analysis"}, {"author": "John Geddes and Rob Jansen and Nicholas Hopper", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "www_tags": "selected", "month": "July", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf", "key": "pets13-how-low", "year": "2013", "title": "How Low Can You Go: Balancing Performance with Anonymity in Tor", "www_section": "Traffic analysis"}, {"author": "David Fifield and Gabi Nakibly and Dan Boneh", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "www_tags": "selected", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf", "key": "pets13-oss", "year": "2013", "title": "{OSS}: Using Online Scanning Services for Censorship Circumvention", "www_section": "Communications Censorship"}, {"author": "Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg", "booktitle": "Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)", "www_tags": "selected", "month": "July", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf", "key": "pets13-splitting", "year": "2013", "title": "The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting", "www_section": "Anonymous communication"}, {"author": "Peter Eckersley", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium", "title": "How unique is your web browser?", "year": "2010", "month": "July", "pages": "1--18", "www_pdf_url": "http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf", "location": "Berlin, Germany", "key": "pets2010:eckersley2010unique", "www_tags": "selected", "www_section": "Misc"}, {"author": "Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "title": "An Accurate System-Wide Anonymity Metric for Probabilistic Attacks", "year": "2011", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf", "location": "Waterloo, Canada", "key": "pets2011-bagai", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey Voelker", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "title": "DefenestraTor: Throwing out Windows in Tor", "year": "2011", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf", "location": "Waterloo, Canada", "key": "pets2011-defenestrator", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Michael Herrmann and Christian Grothoff", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)", "title": "Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P", "year": "2011", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf", "location": "Waterloo, Canada", "key": "pets2011-i2p", "www_tags": "selected", "www_section": "Traffic analysis"}, {"www_pdf_url": "http://arxiv.org/pdf/1101.5578", "key": "pets2011:TorUsernames", "author": "Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils", "booktitle": "Proceedings of the 11th Privacy Enhancing Technologies Symposium", "title": "How Unique and Traceable are Usernames?", "year": "2011", "www_section": "Pseudonymity", "month": "July"}, {"publisher": "Springer-Verlag, LNCS 219", "title": "Networks Without User Observability -- Design Options", "booktitle": "Proceedings of {EUROCRYPT} 1985", "author": "Andreas Pfitzmann and Michael Waidner", "year": "1985", "www_section": "Anonymous communication", "month": "April", "key": "pfitzmann85", "www_tags": "selected", "www_html_url": "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html"}, {"publisher": "Springer-Verlag, LNCS 434", "key": "pfitzmann90how", "title": "How to Break the Direct {RSA}-Implementation of {MIXes}", "booktitle": "Proceedings of {EUROCRYPT} 1989", "author": "Birgit Pfitzmann and Andreas Pfitzmann", "year": "1990", "www_ps_gz_url": "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90", "www_section": "Traffic analysis"}, {"title": "PipeNet 1.1", "www_section": "Anonymous communication", "author": "Wei Dai", "year": "1998", "www_txt_url": "http://www.eskimo.com/~weidai/pipenet.txt", "month": "November", "howpublished": "Post to Cypherpunks mailing list", "key": "pipenet", "www_tags": "selected", "www_remarks": "Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html", "day": "26"}, {"title": "PipeNet 1.0", "www_section": "Anonymous communication", "author": "Wei Dai", "year": "1998", "month": "January", "howpublished": "Post to Cypherpunks mailing list", "key": "pipenet10", "www_tags": "selected", "www_remarks": "First written in 1996 based on cypherpunks posts in 1995.", "www_html_url": "http://cypherpunks.venona.com/date/1998/01/msg00878.html", "day": "19"}, {"author": "Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan", "www_ps_url": "http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps", "booktitle": "Proceedings of the {IEEE} Symposium on Foundations of Computer Science", "www_important": "1", "year": "1995", "pages": "41--50", "key": "pir", "www_tags": "selected", "title": "Private Information Retrieval", "www_section": "Private Information Retrieval"}, {"title": "Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic", "series": "LNCS", "booktitle": "Proceedings of 6th Information Hiding Workshop (IH 2004)", "author": "Claudia Diaz and Bart Preneel", "year": "2004", "month": "May", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", "location": "Toronto", "key": "pool-dummy04", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2009", "title": "Protection Profiles for Remailer Mixes", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "author": "Kai Rannenberg and Giovanni Iachello", "month": "July", "www_pdf_url": "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", "editor": "H. Federrath", "key": "pro-pro:pet2000", "year": "2000", "www_section": "Anonymous communication"}, {"www_tags": "selected", "author": "Kirill Levchenko and Damon McCoy", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "title": "Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies", "month": "February", "www_pdf_url": "http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf", "key": "proximax11", "year": "2011", "www_section": "Communications Censorship"}, {"title": "Publius: {A} robust, tamper-evident, censorship-resistant and source-anonymous web publishing system", "booktitle": "Proceedings of the 9th USENIX Security Symposium", "author": "Marc Waldman and Aviel Rubin and Lorrie Cranor", "year": "2000", "month": "August", "www_pdf_url": "http://www.cs.nyu.edu/~waldman/publius/publius.pdf", "pages": "59--72", "key": "publius", "www_tags": "selected", "www_section": "Anonymous publication"}, {"title": "Quantification of Anonymity for Mobile Ad Hoc Networks", "booktitle": "Proceedings of the 4th International Workshop on Security and Trust Management (STM 08)", "author": "Marie Elisabeth Gaup Moe", "year": "2008", "month": "June", "pages": "25--36", "www_pdf_url": "http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf", "location": "Trondheim, Norway", "key": "quant-adhoc", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Cryptographic Defense Against Traffic Analysis", "booktitle": "Proceedings of {ACM} Symposium on Theory of Computing", "author": "Charles Rackoff and Daniel R. Simon", "year": "1993", "pages": "672--681", "key": "rackoff93cryptographic", "www_tags": "selected", "www_ps_url": "http://research.microsoft.com/crypto/papers/ta.ps", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag", "author": "Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis", "series": "RAID'11", "booktitle": "Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection", "title": "Detecting Traffic Snooping in Tor Using Decoys", "year": "2011", "month": "September", "pages": "222--241", "www_pdf_url": "http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf", "location": "Menlo Park, CA", "key": "raid2011:chakravartydetecting", "www_tags": "selected", "www_section": "Traffic analysis", "address": "Berlin, Heidelberg"}, {"www_important": "1", "author": "Markus Jakobsson and Ari Juels and Ronald L. Rivest", "booktitle": "Proceedings of the 11th USENIX Security Symposium", "title": "Making mix nets robust for electronic voting by randomized partial checking", "year": "2002", "month": "August", "www_pdf_url": "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf", "key": "randomized-checking", "www_tags": "selected", "www_section": "Provable shuffles"}, {"publisher": "USENIX", "title": "Can Pseudonymity Really Guarantee Privacy?", "booktitle": "Proceedings of the 9th USENIX Security Symposium", "author": "Josyula R. Rao and Pankaj Rohatgi", "year": "2000", "month": "August", "www_pdf_url": "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", "pages": "85--96", "key": "rao-pseudonymity", "www_tags": "selected", "www_section": "Pseudonymity"}, {"publisher": "Springer", "author": "Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "PAR: Payment for Anonymous Routing", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "raykova-pet2008", "www_tags": "selected", "pages": "219--236", "www_section": "Anonymous communication", "location": "Leuven, Belgium"}, {"publisher": "Springer-Verlag, LNCS 2009", "author": "Jean-Fran\\c{c}ois Raymond", "title": "{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "www_important": "1", "year": "2000", "month": "July", "pages": "10--29", "www_pdf_url": "http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf", "editor": "H. Federrath", "key": "raymond00", "www_tags": "selected", "www_ps_url": "http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps", "www_section": "Traffic analysis"}, {"title": "{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}", "journal": "IEEE Journal on Selected Areas in Communications", "author": "Anja Jerichow and Jan M\\\"uller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner", "year": "1998", "number": "4", "volume": "16", "key": "realtime-mix", "www_tags": "selected", "www_html_url": "http://www.zurich.ibm.com/security/publications/1998.html", "www_section": "Anonymous communication"}, {"school": "University of Waterloo", "title": "Improving {Tor} using a {TCP}-over-{DTLS} Tunnel", "www_abstract_url": "http://hdl.handle.net/10012/4011", "www_section": "Anonymous communication", "author": "Reardon, Joel", "year": "2008", "month": "September", "www_pdf_url": "http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf", "key": "reardon-thesis", "www_tags": "selected"}, {"title": "The Economics of Censorship Resistance", "booktitle": "Proceedings of Workshop on Economics and Information Security (WEIS04)", "author": "George Danezis and Ross Anderson", "year": "2004", "month": "May", "www_pdf_url": "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", "key": "redblue", "www_tags": "selected", "www_section": "Economics"}, {"publisher": "Emerald Group Publishing Limited", "doi": "http://dx.doi.org/10.1108/10662240610656528", "title": "Regroup-And-Go mixes to counter the $(n-1)$ attack", "journal": "Journal of Internet Research", "author": "Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao", "year": "2006", "number": "2", "volume": "16", "key": "regroup2006", "www_tags": "selected", "pages": "213--223", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "title": "Fragile Mixing", "booktitle": "{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}", "author": "Michael Reiter and XiaoFeng Wang", "year": "2004", "month": "October", "www_pdf_url": "http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf", "key": "reiter:ccs2004", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Prospects for Remailers", "journal": "First Monday", "author": "Sameer Parekh", "year": "1996", "number": "2", "month": "August", "volume": "1", "key": "remailer-history", "www_tags": "selected", "www_html_url": "http://www.firstmonday.dk/issues/issue2/remailers/", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "title": "Website Detection Using Remote Traffic Analysis", "year": "2012", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf", "key": "remote-traffic-pets12", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "{Reputation in P2P Anonymity Systems}", "booktitle": "Proceedings of Workshop on Economics of Peer-to-Peer Systems", "author": "Roger Dingledine and Nick Mathewson and Paul Syverson", "year": "2003", "month": "June", "www_pdf_url": "http://freehaven.net/doc/econp2p03/econp2p03.pdf", "key": "rep-anon", "www_tags": "selected", "www_section": "Economics"}, {"title": "Reusable Anonymous Return Channels", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}", "author": "Philippe Golle and Markus Jakobsson", "year": "2003", "www_section": "Anonymous communication", "month": "October", "www_pdf_url": "http://crypto.stanford.edu/~pgolle/papers/return.pdf", "location": "Washington, DC, USA", "key": "reusable-channels:wpes2003", "www_tags": "selected", "www_remarks": "Reencryption mix-nets can allow users to use a single reply channel even when they maintain multiple separate nyms (think of it like a reply block but it looks different each time you give it to somebody).", "www_ps_url": "http://crypto.stanford.edu/~pgolle/papers/return.ps"}, {"title": "{TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web}", "journal": "First Monday", "author": "Ian Goldberg and David Wagner", "year": "1998", "number": "4", "month": "August", "volume": "3", "key": "rewebber", "www_tags": "selected", "www_ps_url": "http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps", "www_html_url": "http://www.firstmonday.dk/issues/issue3_4/goldberg/", "www_section": "Anonymous publication"}, {"publisher": "Werkgemeenschap voor Informatie- en Communicatietheorie", "title": "Subliminal Channels in the Private Information Retrieval Protocols", "booktitle": "Proceedings of the 28th Symposium on Information Theory in the Benelux", "author": "Meredith L. Patterson and Len Sassaman", "year": "2007", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-895.pdf", "location": "Enschede, NL", "key": "ringstwice07", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"publisher": "Springer", "author": "George Danezis and Len Sassaman", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "How to Bypass Two Anonymity Revocation Systems", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://research.microsoft.com/~gdane/papers/KWF.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "sassaman-pet2008", "www_tags": "selected", "pages": "187--201", "www_section": "Anonymous communication", "location": "Leuven, Belgium"}, {"author": "Len Sassaman and Bram Cohen and Nick Mathewson", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005)}", "www_important": "1", "year": "2005", "month": "November", "www_pdf_url": "http://www.abditum.com/pynchon/sassaman-wpes2005.pdf", "location": "Arlington, VA, USA", "key": "sassaman:wpes2005", "www_tags": "selected", "title": "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval", "www_section": "Pseudonymity"}, {"publisher": "Springer", "title": "A Fresh Look at the Generalized Mix Framework", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Andrei Serjantov", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "serjantov-pet2007", "year": "2007", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"publisher": "Internet Society", "author": "Rob Jansen and Nicholas Hopper", "booktitle": "Proceedings of the Network and Distributed System Security Symposium - {NDSS}'12", "title": "{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}", "year": "2012", "month": "February", "www_pdf_url": "http://www.internetsociety.org/sites/default/files/09_3.pdf", "key": "shadow-ndss12", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "{SHALON}: Lightweight Anonymization based on Open Standards", "booktitle": "Proceedings of 18th International Conference on Computer Communications and Networks", "author": "Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson", "year": "2009", "month": "August", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf", "location": "San Francisco, CA, USA", "key": "shalon-anon", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "P5: A Protocol for Scalable Anonymous Communication", "booktitle": "Proceedings of the 2002 IEEE Symposium on Security and Privacy", "author": "Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan", "year": "2002", "www_section": "Anonymous communication", "month": "May", "www_pdf_url": "http://www.cs.umd.edu/projects/p5/p5.pdf", "key": "sherwood-protocol", "www_tags": "selected", "www_ps_url": "http://www.cs.umd.edu/projects/p5/p5.ps"}, {"publisher": "Springer", "author": "Eric Shimshock and Matt Staats and Nicholas Hopper", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Breaking and Provably Fixing Minx", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "shimshock-pet2008", "www_tags": "selected", "pages": "99--114", "www_section": "Anonymous communication", "location": "Leuven, Belgium"}, {"title": "Using Caching for Browsing Anonymity", "journal": "ACM SIGEcom Exchanges", "author": "Anna Shubina and Sean Smith", "year": "2003", "number": "2", "month": "September", "volume": "4", "www_pdf_url": "http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf", "key": "shsm03", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "title": "A Verifiable Secret Shuffle and its Application to E-Voting", "booktitle": "{Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}", "author": "C. Andrew Neff", "year": "2001", "month": "November", "pages": "116--125", "www_pdf_url": "http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf", "editor": "P. Samarati", "key": "shuffle:ccs01", "www_tags": "selected", "www_section": "Provable shuffles"}, {"author": "A. Singh and B. Gedik and L. Liu", "journal": "Internet Research", "title": "{Agyaat: mutual anonymity over structured P2P networks}", "number": "2", "volume": "16", "key": "singh2006ama", "year": "2006", "pages": "189--212", "www_section": "Anonymous communication"}, {"title": "Information Slicing: Anonymity Using Unreliable Overlays", "booktitle": "Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI)", "author": "Sachin Katti and Jeffery Cohen and Dina Katabi", "year": "2007", "month": "April", "www_pdf_url": "http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf", "key": "slicing07", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Internet Society", "title": "A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '08", "author": "Robin Snader and Nikita Borisov", "year": "2008", "month": "February", "www_pdf_url": "http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf", "key": "snader08", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski", "booktitle": "Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005)", "title": "Anonymous Communication with On-line and Off-line Onion Encoding", "year": "2005", "month": "January", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf", "key": "sofem05-Klonowski", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag", "title": "Space-Efficient Private Search", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of Financial Cryptography (FC2007)", "author": "George Danezis and Claudia Diaz", "year": "2007", "month": "February", "location": "Tobago", "key": "space-efficient", "www_tags": "selected", "www_section": "Private Information Retrieval"}, {"title": "Using Sphinx to Improve Onion Routing Circuit Construction", "booktitle": "Proceedings of Financial Cryptography (FC '10)", "author": "Aniket Kate and Ian Goldberg", "year": "2010", "month": "January", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf", "editor": "Radu Sion", "key": "sphinx-onion-fc10", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Kluwer", "title": "Statistical Disclosure Attacks: Traffic Confirmation in Open Environments", "booktitle": "Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})", "author": "George Danezis", "year": "2003", "month": "May", "pages": "421--426", "www_pdf_url": "http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf", "editor": "Gritzalis and Vimercati and Samarati and Katsikas", "key": "statistical-disclosure", "www_tags": "selected", "organization": "{IFIP TC11}", "www_section": "Traffic analysis", "location": "Athens"}, {"publisher": "Springer-Verlag, LNCS 2760", "title": "Modelling Unlinkability", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2003)", "author": "Sandra Steinbrecher and Stefan K\\\"opsell", "year": "2003", "month": "March", "pages": "32--47", "www_pdf_url": "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf", "editor": "Roger Dingledine", "key": "steinbrecher:pet2003", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones", "booktitle": "Proceedings of ESORICS 2002", "author": "Xinyuan Wang and Douglas S. Reeves and S. Felix Wu", "year": "2002", "month": "October", "www_pdf_url": "http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf", "pages": "244--263", "key": "stepping-stones", "www_tags": "selected", "www_section": "Traffic analysis"}, {"school": "University of Cambridge", "title": "Covert channel vulnerabilities in anonymity systems", "www_section": "Anonymous communication", "author": "Steven J. Murdoch", "year": "2007", "month": "December", "www_pdf_url": "http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf", "key": "steven-thesis", "www_tags": "selected"}, {"publisher": "Springer-Verlag, LNCS 1525", "title": "Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System", "booktitle": "Proceedings of Information Hiding Workshop (IH 1998)", "author": "Dogan Kesdogan and Jan Egner and Roland B\\\"uschkes", "year": "1998", "www_pdf_url": "http://www.uow.edu.au/~ldn01/infohide98.pdf", "key": "stop-and-go", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag, LNCS 2137", "title": "The Strong Eternity Service", "booktitle": "Proceedings of Information Hiding Workshop (IH 2001)", "author": "Tonda Benes", "year": "2001", "month": "April", "www_pdf_url": "http://freehaven.net/anonbib/papers/strong-eternity.pdf", "editor": "Ira S. Moskowitz", "key": "strong-eternity", "www_tags": "selected", "www_section": "Anonymous publication"}, {"author": "John Douceur", "title": "{The Sybil Attack}", "booktitle": "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", "www_important": "1", "year": "2002", "month": "March", "www_pdf_url": "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf", "key": "sybil", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Synchronous Batching: From Cascades to Free Routes", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Roger Dingledine and Vitaly Shmatikov and Paul Syverson", "year": "2004", "month": "May", "volume": "3424", "www_pdf_url": "http://freehaven.net/doc/sync-batching/sync-batching.pdf", "pages": "186--206", "key": "sync-batching", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/sync-batching/sync-batching.ps", "www_section": "Anonymous communication"}, {"publisher": "Chapman \\& Hall", "title": "{Systems for Anonymous Communication}", "series": "CRC Cryptography and Network Security Series", "booktitle": "CRC Handbook of Financial Cryptography and Security", "author": "George Danezis and Claudia Diaz and Paul F. Syverson", "year": "2010", "month": "August", "volume": "", "pages": "341--390", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf", "editor": "B. Rosenberg and D. Stinson", "key": "systems-anon-communication", "www_tags": "selected", "www_section": "Anonymous communication"}, {"title": "Group Principals and the Formalization of Anonymity", "booktitle": "Proceedings of the World Congress on Formal Methods (1)", "author": "Paul F. Syverson and Stuart G. Stubblebine", "year": "1999", "pages": "814--833", "www_pdf_url": "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf", "key": "syverson99", "www_tags": "selected", "www_ps_url": "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps", "www_section": "Formal methods"}, {"publisher": "Springer", "title": "On the Security of the {Tor} Authentication Protocol", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Ian Goldberg", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/torsec.pdf", "editor": "George Danezis and Philippe Golle", "key": "tap:pet2006", "www_tags": "selected", "pages": "316--331", "www_section": "Formal methods", "location": "Cambridge, UK"}, {"author": "Michael J. Freedman and Robert Morris", "booktitle": "{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}", "www_important": "1", "year": "2002", "month": "November", "www_pdf_url": "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", "location": "Washington, DC", "key": "tarzan:ccs02", "www_tags": "selected", "title": "Tarzan: A Peer-to-Peer Anonymizing Network Layer", "www_section": "Anonymous communication"}, {"publisher": "Springer-Verlag", "isbn": "3-540-65142-X", "title": "A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication", "booktitle": "Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98)", "author": "Yael Gertner and Shafi Goldwasser and Tal Malkin", "year": "1998", "pages": "200--217", "location": "London, UK", "key": "tau-indy", "www_tags": "selected", "www_ps_url": "http://eprint.iacr.org/1998/013.ps.gz", "www_section": "Private Information Retrieval"}, {"title": "Taxonomy of Mixes and Dummy Traffic", "booktitle": "Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems", "author": "Claudia Diaz and Bart Preneel", "year": "2004", "month": "August", "www_pdf_url": "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf", "location": "Toulouse, France", "key": "taxonomy-dummy", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Yossi Gilad and Amir Herzberg", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "title": "{Spying in the Dark: TCP and Tor Traffic Analysis}", "year": "2012", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf", "key": "tcp-tor-pets12", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", "year": "2000", "www_section": "Misc", "author": "Andreas Pfitzmann and Marit Hansen", "optnote": "For date of the latest version, see the document itself", "month": "July", "key": "terminology", "www_tags": "selected", "howpublished": "Draft", "www_html_url": "http://dud.inf.tu-dresden.de/Anon_Terminology.shtml"}, {"author": "Rob Jansen and Paul Syverson and Nicholas Hopper", "booktitle": "Proceedings of the 21st USENIX Security Symposium", "www_tags": "selected", "month": "August", "www_pdf_url": "http://www-users.cs.umn.edu/~jansen/papers/throttling-sec2012.pdf", "key": "throttling-sec12", "year": "2012", "title": "{Throttling Tor Bandwidth Parasites}", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag, LNCS 3110", "title": "Timing Attacks in Low-Latency Mix-Based Systems", "booktitle": "Proceedings of Financial Cryptography (FC '04)", "author": "Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright", "year": "2004", "month": "February", "pages": "251--265", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf", "editor": "Ari Juels", "key": "timing-fc2004", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin", "journal": "ACM Transactions on Information and System Security", "www_important": "1", "year": "2010", "number": "2", "month": "February", "volume": "13", "www_pdf_url": "http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf", "key": "tissec-latency-leak", "www_tags": "selected", "title": "How Much Anonymity does Network Latency Leak?", "www_section": "Traffic analysis"}, {"author": "Claudia Diaz and Steven J. Murdoch and Carmela Troncoso", "booktitle": "Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)", "title": "Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks", "year": "2010", "month": "July", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf", "location": "Berlin, Germany", "key": "topology-pet2010", "www_tags": "selected", "www_section": "Traffic analysis"}, {"author": "Roger Dingledine and Nick Mathewson", "www_section": "Anonymous communication", "www_important": "1", "year": "2006", "number": "2006-1", "month": "November", "www_pdf_url": "https://svn.torproject.org/svn/projects/design-paper/blocking.pdf", "key": "tor-blocking", "www_tags": "selected", "title": "Design of a blocking-resistant anonymity system", "institution": "The Tor Project"}, {"author": "Roger Dingledine and Nick Mathewson and Paul Syverson", "title": "{Tor}: The Second-Generation Onion Router", "booktitle": "Proceedings of the 13th USENIX Security Symposium", "www_important": "1", "year": "2004", "www_section": "Anonymous communication", "month": "August", "www_pdf_url": "https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf", "key": "tor-design", "www_tags": "selected", "www_html_url": "https://svn.torproject.org/svn/projects/design-paper/tor-design.html"}, {"publisher": "ACM", "doi": "http://doi.acm.org/10.1145/1280680.1280687", "isbn": "978-1-59593-801-5", "title": "{Usability of anonymous web browsing: an examination of Tor interfaces and deployability}", "booktitle": "{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)}", "author": "Jeremy Clark and P. C. van Oorschot and Carlisle Adams", "year": "2007", "month": "July", "pages": "41--51", "www_pdf_url": "http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf", "location": "Pittsburgh, Pennsylvania", "key": "tor-soups07", "www_tags": "selected", "www_section": "Anonymous communication", "address": "New York, NY, USA"}, {"author": "Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P. Markatos", "booktitle": "Proceedings of the 11th Information Security Conference (ISC 2008)", "title": "Compromising Anonymity Using Packet Spinning", "year": "2008", "month": "September", "www_pdf_url": "http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf", "location": "Taipei, Taiwan", "key": "torspinISC08", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "IEEE CS", "author": "Steven J. Murdoch and George Danezis", "booktitle": "Proceedings of the 2005 IEEE Symposium on Security and Privacy", "www_important": "1", "year": "2005", "month": "May", "www_pdf_url": "http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf", "key": "torta05", "www_tags": "selected", "title": "Low-Cost Traffic Analysis of {Tor}", "www_section": "Traffic analysis"}, {"publisher": "Springer", "author": "Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi", "booktitle": "Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)", "title": "k-Indistinguishable Traffic Padding in Web Applications", "year": "2012", "month": "July", "www_pdf_url": "http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf", "key": "traffic-padding-pets12", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "Springer-Verlag, LNCS 2578", "author": "Andrei Serjantov and Roger Dingledine and Paul Syverson", "title": "From a Trickle to a Flood: Active Attacks on Several Mix Types", "booktitle": "Proceedings of Information Hiding Workshop (IH 2002)", "www_important": "1", "year": "2002", "www_section": "Traffic analysis", "month": "October", "www_pdf_url": "http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", "editor": "Fabien Petitcolas", "key": "trickle02", "www_tags": "selected", "www_ps_url": "http://freehaven.net/doc/batching-taxonomy/taxonomy.ps"}, {"publisher": "Springer-Verlag", "title": "Traffic Analysis Attacks on a Continuously-Observable Steganographic File System", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of Information Hiding Workshop (IH 2007)", "author": "Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel", "year": "2007", "number": "", "month": "June", "volume": "4567", "www_pdf_url": "https://www.cosic.esat.kuleuven.be/publications/article-890.pdf", "editor": "T. Furon et al", "key": "troncoso-ih2007", "www_tags": "selected", "pages": "220--236", "www_section": "misc", "location": "Saint-Malo,FR"}, {"publisher": "Springer", "author": "Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede", "booktitle": "Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)", "title": "Perfect Matching Statistical Disclosure Attacks", "year": "2008", "bookurl": "http://petsymposium.org/2008/", "month": "July", "www_pdf_url": "http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf", "editor": "Nikita Borisov and Ian Goldberg", "key": "troncoso-pet2008", "www_tags": "selected", "pages": "2--23", "www_section": "Traffic analysis", "location": "Leuven, Belgium"}, {"publisher": "IEEE Computer Society Washington, DC, USA", "key": "tsai2006sas", "author": "H. Tsai and A. Harwood", "journal": "Proceedings of the 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA'06)-Volume 01", "title": "{A Scalable Anonymous Server Overlay Network}", "year": "2006", "www_section": "Anonymous communication", "pages": "973--978"}, {"www_tags": "selected", "author": "Florian Tschorsch and , Bj{\\\"{o}}rn Scheurmann", "booktitle": "Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy", "title": "How (not) to build a transport layer for anonymity overlays", "month": "June", "www_pdf_url": "http://pade12.mytestbed.net/pade12-final6.pdf", "key": "tschorsch:translayeranon", "year": "2012", "www_section": "Anonymous communication"}, {"publisher": "Springer", "title": "A Family of Dunces", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Gene Tsudik", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Family_dunces.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "tsudik-pet2007", "year": "2007", "www_section": "Misc", "location": "Ottawa, Canada"}, {"www_tags": "selected", "author": "Roger Dingledine and Nick Mathewson", "www_section": "Economics", "title": "Anonymity Loves Company: Usability and the Network Effect", "bookurl": "http://weis2006.econinfosec.org/", "month": "June", "www_pdf_url": "http://freehaven.net/doc/wupss04/usability.pdf", "location": "Cambridge, UK", "key": "usability:weis2006", "year": "2006", "booktitle": "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", "editor": "Ross Anderson"}, {"title": "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval", "booktitle": "Proceedings of the 20th USENIX Security Symposium", "author": "Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and Ian Goldberg", "year": "2011", "month": "August", "www_pdf_url": "http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf", "key": "usenix11-pirtor", "www_tags": "selected", "www_section": "Anonymous communication"}, {"author": "Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman", "title": "Telex: Anticensorship in the Network Infrastructure", "booktitle": "Proceedings of the 20th USENIX Security Symposium", "www_important": "1", "year": "2011", "month": "August", "www_pdf_url": "http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf", "key": "usenix11-telex", "www_tags": "selected", "www_section": "Communications Censorship"}, {"author": "Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh", "booktitle": "Proceedings of the 19th Usenix Security Symposium", "title": "An Analysis of Private Browsing Modes in Modern Browsers", "year": "2010", "month": "August", "www_pdf_url": "http://www.collinjackson.com/research/private-browsing.pdf", "key": "usenix2010:aggarwal2010analysis", "www_tags": "selected", "www_section": "Misc"}, {"publisher": "Springer", "title": "Valet Services: Improving Hidden Servers with a Personal Touch", "booktitle": "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", "author": "Lasse {\\O}verlier and Paul Syverson", "year": "2006", "bookurl": "http://petworkshop.org/2006/", "month": "June", "www_pdf_url": "http://www.onion-router.net/Publications/valet-services.pdf", "editor": "George Danezis and Philippe Golle", "key": "valet:pet2006", "www_tags": "selected", "pages": "223--244", "www_section": "Pseudonymity", "location": "Cambridge, UK"}, {"publisher": "Springer", "title": "Security Analysis of {AN.ON}'s Payment Scheme", "series": "Lecture Notes in Computer Science", "booktitle": "Proceedings of NordSec 2009", "author": "Benedikt Westermann", "month": "October", "volume": "5838/2009", "pages": "255--270", "editor": "Audun J\\osang and Torleiv Maseng and Svein Johan Knapskog", "key": "w09", "year": "2009", "www_section": "Anonymous communication"}, {"title": "{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}", "journal": "New Mexico Law Review", "author": "Robyn Wagner", "year": "2002", "number": "Winter", "volume": "32", "key": "wagner", "www_tags": "selected", "pages": "99--142", "www_section": "Misc"}, {"author": "Marc Waldman and David Mazi\\`eres", "title": "Tangler: a censorship-resistant publishing system based on document entanglements", "booktitle": "{Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}", "www_important": "1", "year": "2001", "month": "November", "pages": "126--135", "key": "waldman01tangler", "www_tags": "selected", "www_ps_url": "http://www.cs.nyu.edu/~waldman/tangler.ps", "www_section": "Anonymous publication"}, {"note": "US Patent 6,986,036", "publisher": "Google Patents", "key": "wang2006sam", "author": "Y.M. Wang and Q. Sun and D.R. Simon and W. Russell", "howpublished": "US Patent 6,986,036", "www_section": "Anonymous communication", "title": "{System and method for protecting privacy and anonymity of parties of network communications}", "year": "2006"}, {"author": "Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski", "booktitle": "Proceedings of WARTACRYPT '04", "title": "Universal Re-encryption of Signatures and Controlling Anonymous Information Flow", "year": "2004", "month": "July", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf", "key": "warta04-Klonowski", "www_tags": "selected", "www_section": "Misc"}, {"publisher": "Springer-Verlag, LNCS 2009", "title": "Web {MIX}es: A system for anonymous and unobservable {I}nternet access", "booktitle": "Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability", "author": "Oliver Berthold and Hannes Federrath and Stefan K\\\"opsell", "year": "2000", "month": "July", "pages": "115--129", "www_pdf_url": "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf", "editor": "H. Federrath", "key": "web-mix:pet2000", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Karsten Loesing and Steven J. Murdoch and Roger Dingledine", "series": "LNCS", "booktitle": "Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)", "title": "A Case Study on Measuring Statistical Data in the {T}or Anonymity Network", "year": "2010", "month": "January", "www_pdf_url": "http://metrics.torproject.org/papers/wecsr10.pdf", "location": "Tenerife, Canary Islands, Spain", "key": "wecsr10measuring-tor", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "Springer", "author": "Rolf Wendolsky and Dominik Herrmann and Hannes Federrath", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "title": "Performance Comparison of low-latency Anonymisation Services from a User Perspective", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Performance_comparison.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "wendolsky-pet2007", "year": "2007", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"publisher": "Australian Computer Society, Inc", "isbn": "1-920-68285-X", "title": "Design principles for low latency anonymous network systems secure against timing attacks", "booktitle": "Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07)", "author": "Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini", "year": "2007", "pages": "183--191", "www_pdf_url": "http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=", "location": "Ballarat, Australia", "key": "wiangsripanawan-acsw07", "www_tags": "selected", "www_section": "Traffic analysis", "address": "Darlinghurst, Australia, Australia"}, {"www_pdf_url": "http://blanu.net/Dust.pdf", "www_tags": "selected", "key": "wileydust", "author": "Brandon Wiley", "title": "Dust: A Blocking-Resistant Internet Transport Protocol", "www_section": "Communications Censorship", "year": "2011", "institution": "School of Information, University of Texas at Austin"}, {"author": "Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski", "booktitle": "Proceedings of Workshop on Information Security Applications (WISA 2004)", "title": "Anonymous Communication with On-line and Off-line Onion Encoding", "year": "2004", "month": "August", "www_pdf_url": "http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf", "key": "wisa04-Klonowski", "www_tags": "selected", "www_section": "Anonymous communication"}, {"www_tags": "selected", "author": "Benedikt Westermann and Dogan Kesdogan", "booktitle": "Proceedings of Financial Cryptography and Data Security (FC'11)", "title": "Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection", "month": "February", "www_pdf_url": "http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf", "key": "wk11-malice-vs-anon", "year": "2011", "www_section": "Anonymous communication"}, {"publisher": "ACM Press", "doi": "http://doi.acm.org/10.1145/1179601.1179603", "isbn": "1-59593-556-8", "title": "Nonesuch: a mix network with sender unobservability", "booktitle": "{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}", "author": "Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend", "year": "2006", "month": "October", "pages": "1--8", "www_pdf_url": "http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf", "location": "Alexandria, Virginia, USA", "key": "wpes06:heydt-benjamin", "www_tags": "selected", "www_section": "Anonymous communication", "address": "New York, NY, USA"}, {"publisher": "ACM", "author": "Jon McLachlan and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "title": "{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design}", "year": "2009", "month": "November", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf", "location": "Chicago, IL, USA", "key": "wpes09-bridge-attack", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM", "author": "Andrew Tran and Nicholas Hopper and Yongdae Kim", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "title": "{Hashing it out in public: Common failure modes of DHT-based anonymity schemes}", "year": "2009", "month": "November", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf", "location": "Chicago, IL, USA", "key": "wpes09-dht-attack", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM", "author": "Yao Chen and Radu Sion and Bogdan Carbunar", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)", "title": "{XPay: Practical anonymous payments for Tor routing and other networked services}", "year": "2009", "month": "November", "www_pdf_url": "http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf", "location": "Chicago, IL, USA", "key": "wpes09-xpay", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM", "author": "Zi Lin and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "title": "Jack: Scalable Accumulator-based Nymble System", "year": "2010", "month": "October", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf", "location": "Chicago, IL, USA", "key": "wpes10-jack", "www_tags": "selected", "www_section": "Misc"}, {"publisher": "ACM", "author": "Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "title": "Balancing the Shadows", "month": "October", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf", "location": "Chicago, IL, USA", "key": "wpes10-shadows", "year": "2010", "www_section": "Anonymous communication"}, {"publisher": "ACM", "author": "Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and Jean-Pierre Hubaux", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)", "title": "Unraveling an Old Cloak: k-anonymity for Location Privacy", "year": "2010", "month": "October", "www_pdf_url": "http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2", "location": "Chicago, IL, USA", "key": "wpes10-unraveling", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM", "author": "Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "title": "{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization", "year": "2011", "month": "October", "www_pdf_url": "http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf", "location": "Chicago, IL, USA", "key": "wpes11-bridgespa", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM", "author": "Peter Lofgren and Nicholas Hopper", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "title": "FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting", "year": "2011", "month": "October", "www_pdf_url": "http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf", "location": "Chicago, IL, USA", "key": "wpes11-faust", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "ACM", "author": "Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)", "title": "Website Fingerprinting in Onion Routing Based Anonymization Networks", "year": "2011", "month": "October", "www_pdf_url": "http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf", "location": "Chicago, IL, USA", "key": "wpes11-panchenko", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM", "author": "Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)", "title": "Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor", "year": "2012", "month": "October", "www_pdf_url": "http://freehaven.net/~arma/cogs-wpes.pdf", "location": "Raleigh, NC, USA", "key": "wpes12-cogs", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM", "author": "Deepika Gopal and Nadia Heninger", "booktitle": "Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)", "title": "Torchestra: Reducing interactive traffic delays over Tor", "year": "2012", "month": "October", "www_pdf_url": "http://freehaven.net/anonbib/papers/torchestra-wpes.pdf", "location": "Raleigh, NC, USA", "key": "wpes12-torchestra", "www_tags": "selected", "www_section": "Anonymous communication"}, {"publisher": "IEEE", "title": "An Analysis of the Degradation of Anonymous Protocols", "booktitle": "Proceedings of the Network and Distributed Security Symposium - {NDSS} '02", "author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "year": "2002", "month": "February", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf", "key": "wright02", "www_tags": "selected", "www_section": "Traffic analysis"}, {"title": "Defending Anonymous Communication Against Passive Logging Attacks", "booktitle": "Proceedings of the 2003 IEEE Symposium on Security and Privacy", "author": "Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields", "year": "2003", "month": "May", "www_pdf_url": "http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf", "pages": "28--43", "key": "wright03", "www_tags": "selected", "www_section": "Traffic analysis"}, {"publisher": "ACM Press", "title": "Xor-trees for efficient anonymous multicast and reception", "www_section": "Anonymous communication", "author": "Shlomi Dolev and Rafail Ostrobsky", "year": "2000", "number": "2", "pages": "63--84", "volume": "3", "key": "xor-trees", "www_tags": "selected", "www_ps_url": "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps", "journal": "ACM Trans. Inf. Syst. Secur", "address": "New York, NY, USA"}, {"publisher": "Springer", "title": "Louis, Lester, and Pierre: Three Protocols for Location Privacy", "booktitle": "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", "author": "Ge Zhong and Ian Goldberg and Urs Hengartner", "bookurl": "http://petworkshop.org/2007/", "month": "June", "www_pdf_url": "http://petworkshop.org/2007/papers/PET2007_preproc_Louis_Lester.pdf", "editor": "Nikita Borisov and Philippe Golle", "key": "zhong-pet2007", "year": "2007", "www_section": "Anonymous communication", "location": "Ottawa, Canada"}, {"title": "{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users", "series": "LNCS", "booktitle": "Proceedings of Privacy Enhancing Technologies workshop (PET 2004)", "author": "Alf Zugenmaier", "month": "May", "volume": "3424", "pages": "121--141", "key": "zugenmaier:pet2004", "year": "2004", "www_section": "Anonymous communication"}]