Ññûëêè íà èñïîëüçîâàííûå ìàòåðèàëû (1)
[1] Masayuki Abe. Universally verifiable mix-net with verification work in-
dependent of the number of mix-servers. In Kaisa Nyberg, editor, Ad-
vances in Cryptology EUROCRYPT '98, pages 437447, Helsinki, Fin-
land, 1998. Springer-Verlag, LNCS 1403.
vances in Cryptology EUROCRYPT '98, pages 437447, Helsinki, Fin-
land, 1998. Springer-Verlag, LNCS 1403.
nomics of anonymity. In Rebecca N. Wright, editor, Financial Cryptog-
raphy, 7th International Conference, FC 2003, pages 84102. Springer-
Verlag, LNCS 2742, 2003.
raphy, 7th International Conference, FC 2003, pages 84102. Springer-
Verlag, LNCS 2742, 2003.
tology ePrint Archive, Report 2005/394, November 2005.
ment of mixes to hamper traffic analysis. In Proceedings, 2003 IEEE Sym-
posium on Security and Privacy, pages 1627. IEEE Computer Society,
May 2003.
posium on Security and Privacy, pages 1627. IEEE Computer Society,
May 2003.
the Theory and Applications of Cryptology (Pragocrypt '96), pages 242
252, Prague, Czech Republic, September/October 1996. Czech Technical
University Publishing House.
252, Prague, Czech Republic, September/October 1996. Czech Technical
University Publishing House.
information retrieval. In Roger Dingledine and Paul Syverson, editors,
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 239243, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 239243, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
able RFID tags via insubvertible encryption. In Catherine Meadows and
Paul Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 92101. ACM Press,
November 2005.
Paul Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 92101. ACM Press,
November 2005.
security issues and analysis. White paper, Zero Knowledge Systems, Inc.,
October 2001. The attributed date is that printed at the head of the
paper. The cited work is, however, superceded by documents that came
before Oct. 2001, e.g., [9].
October 2001. The attributed date is that printed at the head of the
paper. The cited work is, however, superceded by documents that came
before Oct. 2001, e.g., [9].
security issues and analysis. White paper, Zero Knowledge Systems, Inc.,
May 2001.
May 2001.
trade-offs in anonymity providing systems. In Ira S. Moskowitz, editor,
Information Hiding: 4th International Workshop, IH 2001, pages 245
257, Pittsburgh, PA, USA, April 2001. Springer-Verlag, LNCS 2137.
Information Hiding: 4th International Workshop, IH 2001, pages 245
257, Pittsburgh, PA, USA, April 2001. Springer-Verlag, LNCS 2137.
glas Sicker. Low-resource routing attacks against Tor. In Ting Yu, editor,
WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in the
Electronic Society, pages 1120. ACM Press, October 2007.
WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in the
Electronic Society, pages 1120. ACM Press, October 2007.
Journal of Cryptology, 16(1):2539, 2003.
networking. In Roger Dingledine, editor, Privacy Enhancing Technolo-
gies: Third International Workshop, PET 2003, pages 141160. Springer-
Verlag, LNCS 2760, 2003.
gies: Third International Workshop, PET 2003, pages 141160. Springer-
Verlag, LNCS 2760, 2003.
ity against traffic analysis. In Ari Juels, editor, Financial Cryptography,
8th International Conference, FC 2004, pages 266289. Springer-Verlag,
LNCS 3110, February 2004.
8th International Conference, FC 2004, pages 266289. Springer-Verlag,
LNCS 3110, February 2004.
o
errath, editor, Designing Privacy Enhancing Technologies: International
Workshop on Design Issues in Anonymity and Unobservability, pages 115
129. Springer-Verlag, LNCS 2009, July 2000.
intersection attacks. In Roger Dingledine and Paul Syverson, editors,
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 110128, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 110128, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
tages of free MIX routes and how to overcome them. In Hannes Federrath,
editor, Designing Privacy Enhancing Technologies: International Work-
shop on Design Issues in Anonymity and Unobservability, pages 3045.
Springer-Verlag, LNCS 2009, July 2000.
editor, Designing Privacy Enhancing Technologies: International Work-
shop on Design Issues in Anonymity and Unobservability, pages 3045.
Springer-Verlag, LNCS 2009, July 2000.
structions and practical applications for private stream searching (ex-
tended abstract). In 2006 IEEE Symposium on Security and Privacy (S&
P 2006), Proceedings, pages 132139. IEEE Computer Society, May 2006.
tended abstract). In 2006 IEEE Symposium on Security and Privacy (S&
P 2006), Proceedings, pages 132139. IEEE Computer Society, May 2006.
vacy vulnerabilities in encrypted HTTP streams. In George Danezis and
David Martin, editors, Privacy Enhancing Technologies: 5th International
Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
David Martin, editors, Privacy Enhancing Technologies: 5th International
Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
tion of interactive stepping stones: Algorithms and confidence bounds. In
Erland Jonsson, Alfonso Valdes, and Magnus Almgren, editors, Recent Ad-
vances in Intrusion Detection 7th International Symposium, RAID 2004,
pages 258277, Sophia Antipolis, France, 2004. Springer-Verlag, LNCS
765.
Erland Jonsson, Alfonso Valdes, and Magnus Almgren, editors, Recent Ad-
vances in Intrusion Detection 7th International Symposium, RAID 2004,
pages 258277, Sophia Antipolis, France, 2004. Springer-Verlag, LNCS
765.
inputs. In George Danezis and David Martin, editors, Privacy Enhanc-
ing Technologies: 5th International Workshop, PET 2005, pages 1225,
Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
ing Technologies: 5th International Workshop, PET 2005, pages 1225,
Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
PhD thesis, University of California, Berkeley, 2005.
2.0 architecture. White paper, Zero Knowledge Systems, Inc., December
2000.
2000.
Magazine, September 1997.
2002 Ottawa Linux Symposium, June 2002.
routing. In Victor Shoup, editor, Advances in Cryptology CRYPTO
2005: 25th Annual International Cryptology Conference, pages 169187.
Springer-Verlag, LNCS 3621, August 2005.
2005: 25th Annual International Cryptology Conference, pages 169187.
Springer-Verlag, LNCS 3621, August 2005.
pseudonyms. Communications of the ACM, 4(2):8488, February 1981.
Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in
Cryptology CRYPTO '82, pages 199203, New York and London, 1983.
Plenum Press.
Cryptology CRYPTO '82, pages 199203, New York and London, 1983.
Plenum Press.
make big brother obsolete. Communications of the ACM, 28(10):1030
1044, October 1985.
1044, October 1985.
and recipient untraceability. Journal of Cryptology, 1(1):6575, 1988.
browsing. http://citeseer.ist.psu.edu/656522.html.
with imprecise routing. In George Danezis and Philippe Golle, editors,
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 190207. Springer-Verlag, LNCS 4258, 2006.
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 190207. Springer-Verlag, LNCS 4258, 2006.
Freenet: A distributed anonymous information storage and retrieval sys-
tem. In Hannes Federrath, editor, Designing Privacy Enhancing Tech-
nologies: International Workshop on Design Issues in Anonymity and
Unobservability, pages 4666. Springer-Verlag, LNCS 2009, 2000.
tem. In Hannes Federrath, editor, Designing Privacy Enhancing Tech-
nologies: International Workshop on Design Issues in Anonymity and
Unobservability, pages 4666. Springer-Verlag, LNCS 2009, 2000.
Danezis and David Martin, editors, Privacy Enhancing Technologies: 5th
International Workshop, PET 2005, pages 7892, Cavtat Croatia, 2005.
Springer-Verlag, LNCS 3856.
International Workshop, PET 2005, pages 7892, Cavtat Croatia, 2005.
Springer-Verlag, LNCS 3856.
the great firewall of china. In George Danezis and Philippe Golle, editors,
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 2035. Springer-Verlag, LNCS 4258, 2006.
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 2035. Springer-Verlag, LNCS 4258, 2006.
//www.cl.cam.ac.uk/gd216/TLSanon.pdf.
Nordic workshop on Secure IT Systems (NordSec 2002), pages 195207,
Karlstad, Sweden, November 2002.
Karlstad, Sweden, November 2002.
dine, editor, Privacy Enhancing Technologies: Third International Work-
shop, PET 2003, pages 117. Springer-Verlag, LNCS 2760, 2003.
shop, PET 2003, pages 117. Springer-Verlag, LNCS 2760, 2003.
Samarati, and Katsikas, editors, Security and Privacy in the Age of Un-
certainty, (SEC2003), pages 421426, Athens, May 2003. IFIP TC11,
Kluwer.
certainty, (SEC2003), pages 421426, Athens, May 2003. IFIP TC11,
Kluwer.
Martin and Andrei Serjantov, editors, Privacy Enhancing Technologies:
4th International Workshop, PET 2004. Springer-Verlag, LNCS 3424,
May 2005.
4th International Workshop, PET 2004. Springer-Verlag, LNCS 3424,
May 2005.
re-encryption. In Sokratis K. Katsikas, Javier Lopez, Michael Backes,
Stefanos Gritzalis, and Bart Preneel, editors, Information Security 9th
International Conference, ISC 2006, pages 4659, Samos Island, Greece,
September 2006. Springer-Verlag, LNCS 4176.
Stefanos Gritzalis, and Bart Preneel, editors, Information Security 9th
International Conference, ISC 2006, pages 4659, Samos Island, Greece,
September 2006. Springer-Verlag, LNCS 4176.
communications. In Sixth IEEE International Conference on Peer-to-Peer
Computing, P2P 2006, pages 6972. IEEE Computer Society Press, 2006.
Computing, P2P 2006, pages 6972. IEEE Computer Society Press, 2006.
munications. In Mauro Barni, Jordi Herrera-Joancomart´, Stefan Katzen-
beisser, and Fernando P´rez-Gonz´lez, editors, Information Hiding: 7th
International Workshop, IH 2005, pages 1125. Springer-Verlag, LNCS
3727, June 2005.
beisser, and Fernando P´rez-Gonz´lez, editors, Information Hiding: 7th
International Workshop, IH 2005, pages 1125. Springer-Verlag, LNCS
3727, June 2005.
applications to rateless codes. In Sven Dietrich and Rachna Dahamija,
editors, Financial Cryptography and Data Security, 11th International
Conference, FC 2007, and 1st International Workshop on Usable Security,
USEC 2007, pages 148162. Springer-Verlag, LNCS 4886, 2007.[45] George Danezis,
Claudia Diaz, and Carmela Troncoso. Two-sided statis-
tical disclosure attack. In Nikita Borisov and Philippe Golle, editors, Pri-
vacy Enhancing Technologies: 7th International Symposium, PET 2007,
pages 3044. Springer-Verlag, LNCS 4776, 2007.
editors, Financial Cryptography and Data Security, 11th International
Conference, FC 2007, and 1st International Workshop on Usable Security,
USEC 2007, pages 148162. Springer-Verlag, LNCS 4886, 2007.[45] George Danezis,
Claudia Diaz, and Carmela Troncoso. Two-sided statis-
tical disclosure attack. In Nikita Borisov and Philippe Golle, editors, Pri-
vacy Enhancing Technologies: 7th International Symposium, PET 2007,
pages 3044. Springer-Verlag, LNCS 4776, 2007.
Design of a type III anonymous remailer protocol. In Proceedings, IEEE
Symposium on Security and Privacy, pages 215, Berkeley, CA, May 2003.
IEEE Computer Society.
Symposium on Security and Privacy, pages 215, Berkeley, CA, May 2003.
IEEE Computer Society.
packet format. In Sabrina De Capitani di Vimercati and Paul Syverson,
editors, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy
in the Electronic Society, pages 5965, Washington, DC, USA, October
2004. ACM Press.
editors, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy
in the Electronic Society, pages 5965, Washington, DC, USA, October
2004. ACM Press.
attacks. In Pierangela Samarati and Paul Syverson, editors, WPES'03:
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic So-
ciety, pages 8993, Washington, DC, USA, October 2003. ACM Press.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic So-
ciety, pages 8993, Washington, DC, USA, October 2003. ACM Press.
attacks on anonymity systems. In Jessica Fridrich, editor, Information
Hiding: 6th International Workshop, IH 2004, pages 293308. Springer-
Verlag, LNCS 3200, May 2004.
Hiding: 6th International Workshop, IH 2004, pages 293308. Springer-
Verlag, LNCS 3200, May 2004.
temic attacks on route selection. In Nikita Borisov and Ian Goldberg, ed-
itors, Privacy Enhancing Technologies: Eighth International Symposium,
PETS 2008, pages 151166. Springer-Verlag, LNCS 5134, July 2008.
itors, Privacy Enhancing Technologies: Eighth International Symposium,
PETS 2008, pages 151166. Springer-Verlag, LNCS 5134, July 2008.
design a new one. In Bart Preneel, editor, Advances in Cryptology EU-
ROCRYPT 2000, pages 557572, Bruges, Belgium, May 2000. Springer-
Verlag, LNCS 1807.
ROCRYPT 2000, pages 557572, Bruges, Belgium, May 2000. Springer-
Verlag, LNCS 1807.
Katholieke Universiteit Leuven, 2005.
and Paul F. Syverson. Panel discussion – mix cascades versus peer-to-peer:
Is one concept superior? In David Martin and Andrei Serjantov, editors,
Privacy Enhancing Technologies: 4th International Workshop, PET 2004,
page 242. Springer-Verlag, LNCS 3424, 2005.
Is one concept superior? In David Martin and Andrei Serjantov, editors,
Privacy Enhancing Technologies: 4th International Workshop, PET 2004,
page 242. Springer-Verlag, LNCS 3424, 2005.
by pool mixes that generate dummy traffic. In Jessica Fridrich, editor,
Information Hiding: 6th International Workshop, IH 2004, pages 309
325. Springer-Verlag, LNCS 3200, May 2004.
Information Hiding: 6th International Workshop, IH 2004, pages 309
325. Springer-Verlag, LNCS 3200, May 2004.
two practical mix designs. In Pierangela Samarati, Peter Ryan, Dieter
Gollmann, and Refik Molva, editors, Computer Security ESORICS 2004,
9th European Symposium on Research in Computer Security, pages 141
159. Springer-Verlag, LNCS 3193, 2004.
Gollmann, and Refik Molva, editors, Computer Security ESORICS 2004,
9th European Symposium on Research in Computer Security, pages 141
159. Springer-Verlag, LNCS 3193, 2004.
dine, editor, Privacy Enhancing Technologies: Third International Work-
shop, PET 2003, pages 1831, Dresden, Germany, 2003. Springer-Verlag,
LNCS 2760.
shop, PET 2003, pages 1831, Dresden, Germany, 2003. Springer-Verlag,
LNCS 2760.
measuring anonymity. In Roger Dingledine and Paul Syverson, editors,
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 5468, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 5468, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
information always reduce anonymity? In Ting Yu, editor, WPES'07:
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic So-
ciety, pages 7275. ACM Press, October 2007.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic So-
ciety, pages 7275. ACM Press, October 2007.
of social network profiling on anonymity. In Nikita Borisov and Ian Gold-
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 4462. Springer-Verlag, LNCS 5134, July 2008.
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 4462. Springer-Verlag, LNCS 5134, July 2008.
//www.ietf.org/rfc/rfc2246.txt, January 1999.
Molnar. A reputation system to increase MIX-net reliability. In Ira S.
Moskowitz, editor, Information Hiding: 4th International Workshop, IH
2001, pages 126141, Pittsburgh, PA, USA, April 2001. Springer-Verlag,
LNCS 2137.
Moskowitz, editor, Information Hiding: 4th International Workshop, IH
2001, pages 126141, Pittsburgh, PA, USA, April 2001. Springer-Verlag,
LNCS 2137.
haven pro ject: Distributed anonymous storage service. In Hannes Fed-
errath, editor, Designing Privacy Enhancing Technologies: International
Workshop on Design Issues in Anonymity and Unobservability, pages 67
95. Springer-Verlag, LNCS 2009, 2000.
errath, editor, Designing Privacy Enhancing Technologies: International
Workshop on Design Issues in Anonymity and Unobservability, pages 67
95. Springer-Verlag, LNCS 2009, 2000.
ability and the network effect. In Ross Anderson, editor, Fifth Workshop
on the Economics of Information Security (WEIS 2006), June 2006.
on the Economics of Information Security (WEIS 2006), June 2006.
anonymity system (draft). https://www.torproject.org/svn/trunk/
doc/design- paper/blocking.html, May 2007.
doc/design- paper/blocking.html, May 2007.
generation onion router. In Proceedings of the 13th USENIX Security
Symposium, pages 303319. USENIX Association, August 2004.
Symposium, pages 303319. USENIX Association, August 2004.
latency anonymity: Design challenges and social factors. IEEE Security
& Privacy, 5(5):8387, September/October 2007.
& Privacy, 5(5):8387, September/October 2007.
ent latency traffic with alpha-mixing. In George Danezis and Philippe
Golle, editors, Privacy Enhancing Technologies: 6th International Work-
shop, PET 2006, pages 245257. Springer-Verlag, LNCS 4258, 2006.
Golle, editors, Privacy Enhancing Technologies: 6th International Work-
shop, PET 2006, pages 245257. Springer-Verlag, LNCS 4258, 2006.
batching: From cascades to free routes. In David Martin and Andrei Ser-
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004, pages 186206. Springer-Verlag, LNCS 3424, May 2005.
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004, pages 186206. Springer-Verlag, LNCS 3424, May 2005.
through reputation. In Matt Blaze, editor, Financial Cryptography,
6th International Conference, FC 2002, pages 253268. Springer-Verlag,
LNCS 2357, 2003.
6th International Conference, FC 2002, pages 253268. Springer-Verlag,
LNCS 2357, 2003.
J. von Knop, W. Haverkamp, and E. Jessen, editors, Security, E-Learning,
E-Services: Proceedings of the 17. DFN-Arbeitstagung uber Kommunika-
tionsnetze, Dusseldorf, 2003.
E-Services: Proceedings of the 17. DFN-Arbeitstagung uber Kommunika-
tionsnetze, Dusseldorf, 2003.
and Antony I. T. Rowstron, editors, Peer-To-Peer Systems: First Inter-
national Workshop, IPTPS 2002, pages 251260, Cambridge, MA, USA,
2002. Springer-Verlag, LNCS 2429.
national Workshop, IPTPS 2002, pages 251260, Cambridge, MA, USA,
2002. Springer-Verlag, LNCS 2429.
approach to measuring anonymity. In Gheorghe Muresan, Tayfur Altiok,
Benjamin Melamed, and Daniel Zeng, editors, IEEE Intel ligence and Se-
curity Informatics (ISI 2007), pages 356363, New Brunswick, NJ, May
2007. IEEE.
Benjamin Melamed, and Daniel Zeng, editors, IEEE Intel ligence and Se-
curity Informatics (ISI 2007), pages 356363, New Brunswick, NJ, May
2007. IEEE.
In Somesh Jha, Angelos D. Keromytis, and Hao Chen, editors, CCS'09:
Proceedings of the 16th ACM Conference on Computer and Communica-
tions Security. ACM Press, 2009.
Proceedings of the 16th ACM Conference on Computer and Communica-
tions Security. ACM Press, 2009.
congestion attack on Tor using long paths. In Proceedings of the 18th
USENIX Security Symposium, pages 3350, Montreal, Canada, August
2009. USENIX Association.
USENIX Security Symposium, pages 3350, Montreal, Canada, August
2009. USENIX Association.
In David Martin and Andrei Serjantov, editors, Privacy Enhancing Tech-
nologies: 4th International Workshop, PET 2004, pages 7987. Springer-
Verlag, LNCS 3424, May 2005.
nologies: 4th International Workshop, PET 2004, pages 7987. Springer-
Verlag, LNCS 3424, May 2005.
Infranet: Circumventing web censorship and surveillance. In Dan Boneh,
editor, USENIX Security Symposium, pages 247262, San Francisco, CA,
5-9 August 2002.
editor, USENIX Security Symposium, pages 247262, San Francisco, CA,
5-9 August 2002.
and David Karger. Thwarting web censorship with untrusted messen-
ger discovery. In Roger Dingledine, editor, Privacy Enhancing Technolo-
gies: Third International Workshop, PET 2003, pages 125140. Springer-
Verlag, LNCS 2760, 2003.
ger discovery. In Roger Dingledine, editor, Privacy Enhancing Technolo-
gies: Third International Workshop, PET 2003, pages 125140. Springer-
Verlag, LNCS 2760, 2003.
networks. In Sabrina De Capitani di Vimercati and Paul Syverson, editors,
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the
Electronic Society, pages 6676, Washington, DC, USA, October 2004.
ACM Press.
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the
Electronic Society, pages 6676, Washington, DC, USA, October 2004.
ACM Press.
ysis of onion routing in a black-box model [extended abstract]. In Ting Yu,
editor, WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in
the Electronic Society, pages 110. ACM Press, October 2007.
editor, WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in
the Electronic Society, pages 110. ACM Press, October 2007.
On-line, 2006. http://www.komite.net/laurent/soft/nymbaron/.
anonymizing network layer. In Vijay Atluri, editor, Proceedings of the
9th ACM Conference on Computer and Communications Security, CCS
2002, pages 193206. ACM Press, 2002.
9th ACM Conference on Computer and Communications Security, CCS
2002, pages 193206. ACM Press, 2002.
ducing tarzan, a peer-to-peer anonymizing network layer. In Peter Dr-
uschel, M. Frans Kaashoek, and Antony I. T. Rowstron, editors, Peer-To-
Peer Systems: First International Workshop, IPTPS 2002, pages 121129,
Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
uschel, M. Frans Kaashoek, and Antony I. T. Rowstron, editors, Peer-To-
Peer Systems: First International Workshop, IPTPS 2002, pages 121129,
Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
In Joe Kilian, editor, Advances in Cryptology CRYPTO 2001, pages
368387, Santa Barbara, CA, USA, August 2001. Springer-Verlag, LNCS
2139.
368387, Santa Barbara, CA, USA, August 2001. Springer-Verlag, LNCS
2139.
Ingrid Verbauwhede. Revisiting a combinatorial approach toward mea-
suring anonymity. In Marianne Winslett, editor, WPES'08: Proceedings
of the 2008 ACM Workshop on Privacy in the Electronic Society, pages
111116, Alexandria,VA,USA, October 2008. ACM Press.
suring anonymity. In Marianne Winslett, editor, WPES'08: Proceedings
of the 2008 ACM Workshop on Privacy in the Electronic Society, pages
111116, Alexandria,VA,USA, October 2008. ACM Press.
A scalable and efficient protocol for anonymous communication. Technical
Report 2003-1890, Cornell University, Ithaca, NY, February 2003.
Report 2003-1890, Cornell University, Ithaca, NY, February 2003.
Internet. PhD thesis, University of California at Berkeley, 2000.
ysis. White paper, Zero Knowledge Systems, Inc., November 1999.
protocols. White paper, Zero Knowledge Systems, Inc., October 2001. The
attributed date is that printed at the head of the paper. The cited work
is, however, superceded by documents that came before Oct. 2001. The
appendix indicates a change history with changes last made November 29,
1999. Also, in [87] the same authors refer to a paper with a similar title
as an "April 1999 whitepaper".
attributed date is that printed at the head of the paper. The cited work
is, however, superceded by documents that came before Oct. 2001. The
appendix indicates a change history with changes last made November 29,
1999. Also, in [87] the same authors refer to a paper with a similar title
as an "April 1999 whitepaper".
ing routing information. In Ross Anderson, editor, Information Hid-
ing: First International Workshop, pages 137150. Springer-Verlag, LNCS
1174, 1996.
ing: First International Workshop, pages 137150. Springer-Verlag, LNCS
1174, 1996.
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004, pages 5162. Springer-Verlag, LNCS 3424, May 2005.
shop, PET 2004, pages 5162. Springer-Verlag, LNCS 3424, May 2005.
versal re-encryption for mixnets. In Tatsuaki Okamoto, editor, Topics in
Cryptology CT-RSA 2004, pages 163178, San Francisco, USA, February
2004. Springer-Verlag, LNCS 2964.
Cryptology CT-RSA 2004, pages 163178, San Francisco, USA, February
2004. Springer-Verlag, LNCS 2964.
vances in Cryptology EUROCRYPT 2004, pages 456473, Interlaken,
Switzerland, May 2004. Springer-Verlag, LNCS 3027.
Switzerland, May 2004. Springer-Verlag, LNCS 3027.
Peng Liu, editors, CCS 2004: Proceedings of the 11th ACM Conference
on Computer and Communications Security, pages 220226. ACM Press,
October 2004.
on Computer and Communications Security, pages 220226. ACM Press,
October 2004.
terring voluntary trace disclosure in re-encryption mix networks. In 2006
IEEE Symposium on Security and Privacy (S& P 2006), Proceedings,
pages 121131, Oakland, CA, May 2006. IEEE Computer Society.
IEEE Symposium on Security and Privacy (S& P 2006), Proceedings,
pages 121131, Oakland, CA, May 2006. IEEE Computer Society.
Juels. Optimistic mixing for exit-polls. In Yuliang Zheng, editor, Advances
in Cryptology ASIACRYPT 2002, pages 451465, Queenstown, New
Zealand, 1-5 December 2002. Springer-Verlag, LNCS 2501.
in Cryptology ASIACRYPT 2002, pages 451465, Queenstown, New
Zealand, 1-5 December 2002. Springer-Verlag, LNCS 2501.
Onions based on universal re-encryption anonymous communication
immune against repetitive attack. In Chae Hoon Lim and Moti Yung,
editors, Information Security Applications, 5th International Workshop,
WISA 2004, pages 400410, Jeju Island, Korea, August 2004. Springer-
Verlag, LNCS 3325.
immune against repetitive attack. In Chae Hoon Lim and Moti Yung,
editors, Information Security Applications, 5th International Workshop,
WISA 2004, pages 400410, Jeju Island, Korea, August 2004. Springer-
Verlag, LNCS 3325.
Rapid mixing and security of chaum's visual electronic voting. In Einar
Snekkenes and Dieter Gollmann, editors, Computer Security ESORICS
2003, 8th European Symposium on Research in Computer Security, pages
132145, Gjøvik, Norway, October 2003. Springer-Verlag, LNCS 2808.
Snekkenes and Dieter Gollmann, editors, Computer Security ESORICS
2003, 8th European Symposium on Research in Computer Security, pages
132145, Gjøvik, Norway, October 2003. Springer-Verlag, LNCS 2808.
and Wei Zhao. Netcamo: camouflaging network traffic for qos-guaranteed
mission critical applications. IEEE Transactions on Systems, Man, and
Cybernetics, Part A 31(4):253265, 2001.
mission critical applications. IEEE Transactions on Systems, Man, and
Cybernetics, Part A 31(4):253265, 2001.
¨¨
'96, pages 216. IEEE, February 1996.
hiding in multiagent systems. Jounal of Computer Security, 13(3):483
514, 2005.
514, 2005.
lookup service for use in censorship resistant peer-to-peer publishing sys-
tems. In Peer-To-Peer Systems: First International Workshop, IPTPS
2002, Cambridge, MA, USA, 2002. A postproceedings of this work-
shop was published by Springer-Verlag (LNCS 2429). This paper is not
in that volume. It is only in the electronic proceedings available at
http://www.iptps.org/papers.html#2002.
tems. In Peer-To-Peer Systems: First International Workshop, IPTPS
2002, Cambridge, MA, USA, 2002. A postproceedings of this work-
shop was published by Springer-Verlag (LNCS 2429). This paper is not
in that volume. It is only in the electronic proceedings available at
http://www.iptps.org/papers.html#2002.
mous remailer. CMC Magazine, September 1997.
//www.penet.fi/press- english.html, August 1996.
http://www.penet.fi/injuncl.html, September 1996.
characterization of anonymous channels. In Nikita Borisov and Ian Gold-
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 2443. Springer-Verlag, LNCS 5134, July 2008.
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 2443. Springer-Verlag, LNCS 5134, July 2008.
Dingledine and Paul Syverson, editors, Privacy Enhancing Technologies:
Second International Workshop, PET 2002, pages 171178, San Francisco,
CA, USA, April 2002. Springer-Verlag, LNCS 2482.
Second International Workshop, PET 2002, pages 171178, San Francisco,
CA, USA, April 2002. Springer-Verlag, LNCS 2482.
anonymity does network latency leak? In Sabrina De Capitani di Vimer-
cati, Paul Syverson, and David Evans, editors, CCS'07: Proceedings of
the 14th ACM Conference on Computer and Communications Security,
pages 8291. ACM Press, 2007.
cati, Paul Syverson, and David Evans, editors, CCS'07: Proceedings of
the 14th ACM Conference on Computer and Communications Security,
pages 8291. ACM Press, 2007.
and privacy: A modular approach. Journal of Computer Security, 12(1):3
36, 2004.
36, 2004.
tography from anonymity. In FOCS '06: Proceedings of the 47th Annual
IEEE Symposium on Foundations of Computer Science, pages 239248,
Washington, DC, USA, 2006. IEEE Computer Society.
IEEE Symposium on Foundations of Computer Science, pages 239248,
Washington, DC, USA, 2006. IEEE Computer Society.
Cryptology EUROCRYPT '98, pages 448461, Helsinki, Finland, 1998.
Springer-Verlag, LNCS 1403.
Springer-Verlag, LNCS 1403.
teenth Annual ACM Symposium on Principles of Distributed Computing,
pages 8389, Atlanta, Georgia, USA, 1999. ACM Press.
pages 8389, Atlanta, Georgia, USA, 1999. ACM Press.
In PODC '01: Proceedings of the twentieth annual ACM symposium on
Principles of distributed computing, pages 284292, New York, NY, USA,
2001. ACM.
Principles of distributed computing, pages 284292, New York, NY, USA,
2001. ACM.
robust for electronic voting by randomized partial checking. In Dan Boneh,
editor, Proceedings of the 11th USENIX Security Symposium, pages 339
353, San Francisco, CA, USA, 5-9 August 2002. USENIX Association.
editor, Proceedings of the 11th USENIX Security Symposium, pages 339
353, San Francisco, CA, USA, 5-9 August 2002. USENIX Association.
Michael Waidner. Real-time MIXes: A bandwidth-efficient anonymity
protocol. IEEE Journal on Selected Areas in Communications, 16(4):495
509, May 1998.
protocol. IEEE Journal on Selected Areas in Communications, 16(4):495
509, May 1998.
networks to prevent traffic analsyis. In IEEE Information Assurance and
Security Workshop, June 2000.
Security Workshop, June 2000.
through trust. In 22nd IEEE Computer Security Foundations Sympo-
sium, CSF 2009, pages 312, Port Jefferson, New York, July 2009. IEEE
Computer Society.
sium, CSF 2009, pages 312, Port Jefferson, New York, July 2009. IEEE
Computer Society.
routing. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing
Technologies: 7th International Symposium, PET 2007, pages 95112.
Springer-Verlag, LNCS 4776, 2007.
Technologies: 7th International Symposium, PET 2007, pages 95112.
Springer-Verlag, LNCS 4776, 2007.
mous routing without pki. In Fourth Workshop on Hot Topics in Net-
works (HotNets-IV). ACM, 2005. http://conferences.sigcomm.org/
hotnets/2005/papers/katti.pdf.
works (HotNets-IV). ACM, 2005. http://conferences.sigcomm.org/
hotnets/2005/papers/katti.pdf.
in open environments. In Fabien A. P. Petitcolas, editor, Information Hid-
ing: 5th International Workshop, IH 2002, pages 5369, Noordwijkerhout,
The Netherlands, October 2002. Springer-Verlag, LNCS 2578.
ing: 5th International Workshop, IH 2002, pages 5369, Noordwijkerhout,
The Netherlands, October 2002. Springer-Verlag, LNCS 2578.
surfing on the world wide web: Is private information retrieval an al-
ternative to the MIX based approach? In Roger Dingledine and Paul
Syverson, editors, Privacy Enhancing Technologies: Second International
Workshop, PET 2002, pages 214218, San Francisco, CA, USA, April
2002. Springer-Verlag, LNCS 2482.
ternative to the MIX based approach? In Roger Dingledine and Paul
Syverson, editors, Privacy Enhancing Technologies: Second International
Workshop, PET 2002, pages 214218, San Francisco, CA, USA, April
2002. Springer-Verlag, LNCS 2482.
Providing probabilistic anonymity in an open system. In David Auc-
smith, editor, Information Hiding: Second International Workshop, IH
1998, pages 8398, Portland, Oregon, USA, April 1998. Springer-Verlag,
LNCS 1525.
smith, editor, Information Hiding: Second International Workshop, IH
1998, pages 8398, Portland, Oregon, USA, April 1998. Springer-Verlag,
LNCS 1525.
practical solution to the implementation of a voting booth. In Louis C.
Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology
EUROCRYPT '95, pages 393403, Saint-Malo, France, May 1995.
Springer-Verlag, LNCS 921.
Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology
EUROCRYPT '95, pages 393403, Saint-Malo, France, May 1995.
Springer-Verlag, LNCS 921.
Ke Yang. Private keyword-based push and pull with applications to anony-
mous communication. In Markus Jakobsson, MotiYung, and Jianying
Zhou, editors, Applied Cryptography and Network Security Second Inter-
national Conference, ACNS 2004, pages 1630. Springer-Verlag, LNCS
3089, 2004.
mous communication. In Markus Jakobsson, MotiYung, and Jianying
Zhou, editors, Applied Cryptography and Network Security Second Inter-
national Conference, ACNS 2004, pages 1630. Springer-Verlag, LNCS
3089, 2004.
Universal re-encryption of signatures and controlling anonymous in-
formation flow. In WARTACRYPT '04 Conference on Cryptology,
Bedlewo/Poznan, July 2004.
formation flow. In WARTACRYPT '04 Conference on Cryptology,
Bedlewo/Poznan, July 2004.
communication with on-line and off-line onion encoding. In Peter Vo jt´,
M´ria Bielikov´, Bernadette Charron-Bost, and Ondrej Sykora, editors,
SOFSEM 2005: Theory and Practice of Computer Science, 31st Confer-
ence on Current Trends in Theory and Practice of Computer Science, Lec-
ture Notes in Computer Science, pages 229238, Liptovsky J´n, Slovakia,
January 2005. Springer-Verlag, LNCS 3381.
M´ria Bielikov´, Bernadette Charron-Bost, and Ondrej Sykora, editors,
SOFSEM 2005: Theory and Practice of Computer Science, 31st Confer-
ence on Current Trends in Theory and Practice of Computer Science, Lec-
ture Notes in Computer Science, pages 229238, Liptovsky J´n, Slovakia,
January 2005. Springer-Verlag, LNCS 3381.
networks of mixes. In Mauro Barni, Jordi Herrera-Joancomart´, Stefan
Katzenbeisser, and Fernando P´rez-Gonz´lez, editors, Information Hid-
ing: 7th International Workshop, IH 2005, pages 2638. Springer-Verlag,
LNCS 3727, June 2005.
Katzenbeisser, and Fernando P´rez-Gonz´lez, editors, Information Hid-
ing: 7th International Workshop, IH 2005, pages 2638. Springer-Verlag,
LNCS 3727, June 2005.
existing systems enabling anonymous web surfing. In Sabrina De Capitani
di Vimercati and Paul Syverson, editors, WPES'04: Proceedings of the
2004 ACM Workshop on Privacy in the Electronic Society, pages 4758,
Washington, DC, USA, October 2004. ACM Press.
di Vimercati and Paul Syverson, editors, WPES'04: Proceedings of the
2004 ACM Workshop on Privacy in the Electronic Society, pages 4758,
Washington, DC, USA, October 2004. ACM Press.
mous, censorship-resistant networks. In Roger Dingledine, editor, Privacy
Enhancing Technologies: Third International Workshop, PET 2003, pages
161176. Springer-Verlag, LNCS 2760, 2003.
Enhancing Technologies: Third International Workshop, PET 2003, pages
161176. Springer-Verlag, LNCS 2760, 2003.
Wright. Timing attacks in low-latency mix-based systems. In Ari Juels,
editor, Financial Cryptography, 8th International Conference, FC 2004,
pages 251265. Springer-Verlag, LNCS 3110, February 2004.
editor, Financial Cryptography, 8th International Conference, FC 2004,
pages 251265. Springer-Verlag, LNCS 3110, February 2004.
for anonymity. Journal of Computer Security, 10(3):213240, 2002.
Register, April 3 2006.
analysis of WonGoo system. In Fifth International Conference on Com-
puter and Information Technology (CIT 2005), pages 716723, Shanghai,
China, September 2005. IEEE Computer Society.
puter and Information Technology (CIT 2005), pages 716723, Shanghai,
China, September 2005. IEEE Computer Society.
on universal re-encryption and a novel practical anonymous tunnel. In
Xicheng Lu and Wei Zhao, editors, Networking and Mobile Computing,
Third International Conference, ICCNMC 2005, pages 853862, Zhangji-
a jie, China, 2005. Springer-Verlag, LNCS 3619.
Xicheng Lu and Wei Zhao, editors, Networking and Mobile Computing,
Third International Conference, ICCNMC 2005, pages 853862, Zhangji-
a jie, China, 2005. Springer-Verlag, LNCS 3619.
SafeWeb anonymizing service. Technical Report 2002-003, Boston Uni-
versity Computer Science Department, February 2002.
versity Computer Science Department, February 2002.
fication. On-line, 2005. http://svn.conuropsis.org/nym3/trunk/doc/
nym- spec.txt.
nym- spec.txt.
ing and resisting statistical disclosure. In David Martin and Andrei Ser-
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004. Springer-Verlag, LNCS 3424, 2005.
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004. Springer-Verlag, LNCS 3424, 2005.
and Operation of an Email Pseudonym Server. In CCS'98 5th ACM
Conference on Computer and Communications Security, pages 2736, San
Francisco, CA, USA, November 1998. ACM Press.
Conference on Computer and Communications Security, pages 2736, San
Francisco, CA, USA, November 1998. ACM Press.
and universally verifiable mix-type voting scheme. In Kwangjo Kim and
Tsutomu Matsumoto, editors, Advances in Cryptology ASIACRYPT
'96, pages 125132, Kyongju, Korea, November 1996. Springer-Verlag,
LNCS 1163.
Tsutomu Matsumoto, editors, Advances in Cryptology ASIACRYPT
'96, pages 125132, Kyongju, Korea, November 1996. Springer-Verlag,
LNCS 1163.
Okamoto, editor, Advances in Cryptology ASIACRYPT 2000, pages
192204, Kyoto, Japan, December 2000. Springer-Verlag, LNCS 1976.
192204, Kyoto, Japan, December 2000. Springer-Verlag, LNCS 1976.
to-peer anonymous communication systems. In Paul Syverson, Somesh
Jha, and Xiaolan Zhang, editors, CCS'08: Proceedings of the 15th ACM
Conference on Computer and Communications Security, pages 267278.
ACM Press, 2008.
Jha, and Xiaolan Zhang, editors, CCS'08: Proceedings of the 15th ACM
Conference on Computer and Communications Security, pages 267278.
ACM Press, 2008.
chaumian mixes. In Marc Joye, editor, Topics in Cryptology CT-RSA
2003, pages 244262, San Francisco, CA, USA, 13-17 April 2003. Springer-
Verlag, LNCS 2612.
2003, pages 244262, San Francisco, CA, USA, 13-17 April 2003. Springer-
Verlag, LNCS 2612.
protocol – version 3. IETF Internet Draft, 2003.
In 2005 IEEE Symposium on Security and Privacy,(IEEE S&P 2005)
Proceedings, pages 183195. IEEE CS, May 2005.
Proceedings, pages 183195. IEEE CS, May 2005.
internet-exchange-level adversaries. In Nikita Borisov and Philippe Golle,
editors, Privacy Enhancing Technologies: 7th International Symposium,
PET 2007, pages 167183. Springer-Verlag, LNCS 4776, 2007.
editors, Privacy Enhancing Technologies: 7th International Symposium,
PET 2007, pages 167183. Springer-Verlag, LNCS 4776, 2007.
large-scale anonymity. In Rebecca N. Wright, Sabrina De Capitani di
Vimercati, and Vitaly Shmatikov, editors, CCS'06: Proceedings of the
13th ACM Conference on Computer and Communications Security, pages
1726. ACM Press, 2006.
Vimercati, and Vitaly Shmatikov, editors, CCS'06: Proceedings of the
13th ACM Conference on Computer and Communications Security, pages
1726. ACM Press, 2006.
voting. In Pierangela Samarati, editor, Proceedings of the 8th ACM Con-
ference on Computer and Communications Security (CCS-8), pages 116
125, Philadelphia, PA, USA, November 2001. ACM Press.
ference on Computer and Communications Security (CCS-8), pages 116
125, Philadelphia, PA, USA, November 2001. ACM Press.
jantov. Metrics for traffic analysis prevention. In Roger Dingledine,
editor, Privacy Enhancing Technologies: Third International Workshop,
PET 2003, pages 4865, Dresden, Germany, March 2003. Springer-Verlag,
LNCS 2760.
editor, Privacy Enhancing Technologies: Third International Workshop,
PET 2003, pages 4865, Dresden, Germany, March 2003. Springer-Verlag,
LNCS 2760.
Barni, Jordi Herrera-Joancomart´, Stefan Katzenbeisser, and Fernando
P´rez-Gonz´lez, editors, Information Hiding: 7th International Work-
shop, IH 2005, pages 3952. Springer-Verlag, LNCS 3727, June 2005.
P´rez-Gonz´lez, editors, Information Hiding: 7th International Work-
shop, IH 2005, pages 3952. Springer-Verlag, LNCS 3727, June 2005.
Fault tolerant anonymous channel. In Yongfei Han, Tatsuaki Okamoto,
and Sihan Qing, editors, Information and Communication Security, First
International Conference, ICICS '97, pages 440444, Beijing, China,
November 1997. Springer-Verlag, LNCS 1334.
and Sihan Qing, editors, Information and Communication Security, First
International Conference, ICICS '97, pages 440444, Beijing, China,
November 1997. Springer-Verlag, LNCS 1334.
Tatsuaki Okamoto, editor, Advances in Cryptology ASIACRYPT 2000,
pages 178191, Kyoto, Japan, December 2000. Springer-Verlag, LNCS
1976.
pages 178191, Kyoto, Japan, December 2000. Springer-Verlag, LNCS
1976.
ing data. In Advances in Cryptology – CRYPTO 2005: 25th Annual In-
ternational Cryptology Conference, pages 223240. Springer-Verlag, LNCS
3621, 2005.
ternational Cryptology Conference, pages 223240. Springer-Verlag, LNCS
3621, 2005.
Symposium on Security and Privacy (S& P 2006), Proceedings, pages 100
- IEEE CS, May 2006.
of Tor circuit establishment and hidden services. In Nikita Borisov and
Philippe Golle, editors, Privacy Enhancing Technologies: 7th Interna-
tional Symposium, PET 2007, pages 134152. Springer-Verlag, LNCS
4776, 2007.
Philippe Golle, editors, Privacy Enhancing Technologies: 7th Interna-
tional Symposium, PET 2007, pages 134152. Springer-Verlag, LNCS
4776, 2007.
palfrader.org/echolot/.
on the internet? First Monday, 1(2), August 5 1996. On-line journal
http://www.firstmonday.dk/issues/issue2/remailers/.
http://www.firstmonday.dk/issues/issue2/remailers/.
all/nothing election scheme. In Tor Helleseth, editor, Advances in Cryp-
tology EUROCRYPT '93, pages 248259. Springer-Verlag, LNCS 765,
1994.
tology EUROCRYPT '93, pages 248259. Springer-Verlag, LNCS 765,
1994.
and pseudonymity a proposal for terminology. In Hannes Federrath, ed-
itor, Designing Privacy Enhancing Technologies: International Workshop
on Design Issues in Anonymity and Unobservability, pages 19. Springer-
Verlag, LNCS 2009, July 2000.
itor, Designing Privacy Enhancing Technologies: International Workshop
on Design Issues in Anonymity and Unobservability, pages 19. Springer-
Verlag, LNCS 2009, July 2000.
MIXes: Untraceable communication with very small bandwidth overhead.
In Wolfgang Effelsberg, Hans Werner Meuer, and Gunter Muller, editors,
Kommunikation in Verteilten Systemen, Grund lagen, Anwendungen, Be-
trieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte, pages
451463. Springer-Verlag, February 1991.
In Wolfgang Effelsberg, Hans Werner Meuer, and Gunter Muller, editors,
Kommunikation in Verteilten Systemen, Grund lagen, Anwendungen, Be-
trieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte, pages
451463. Springer-Verlag, February 1991.
ability design options. In Franz Pichler, editor, Advances in Cryptology
EUROCRYPT '85, pages 245253. Springer-Verlag, LNCS 219, 1986.
EUROCRYPT '85, pages 245253. Springer-Verlag, LNCS 219, 1986.
Santis, editor, Advances in Cryptology EUROCRYPT '94, pages 332
340, Perugia, Italy, May 1994. Springer-Verlag, LNCS 950.
340, Perugia, Italy, May 1994. Springer-Verlag, LNCS 950.
Îãëàâëåíèå[link1] | Äàëüøå[link2]
[link2] http://www.pgpru.com/biblioteka/statji/sac/references2