Ссылки на использованные материалы (1)
[1] Masayuki Abe. Universally verifiable mix-net with verification work in-
vances in Cryptology EUROCRYPT '98, pages 437447, Helsinki, Fin-
land, 1998. Springer-Verlag, LNCS 1403.
[2] Alessandro Acquisti, Roger Dingledine, and Paul Syverson. On the eco-
raphy, 7th International Conference, FC 2003, pages 84102. Springer-
Verlag, LNCS 2742, 2003.
[3] Ben Adida and Douglas WikstrЁm. Obfuscated ciphertext mixing. Cryp-
[4] Dakshi Agrawal, Dogan Kesdogan, and Stefan Penz. Probabilistic treat-
posium on Security and Privacy, pages 1627. IEEE Computer Society,
May 2003.
[5] Ross Anderson. The eternity service. In 1st International Conference on
252, Prague, Czech Republic, September/October 1996. Czech Technical
University Publishing House.
[6] Dmitri Asonov and Johann-Christoph Freytag. Almost optimal private
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 239243, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
[7] Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros. Untrace-
Paul Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 92101. ACM Press,
November 2005.
[8] Adam Back, Ian Goldberg, and Adam Shostack. Freedom systems 2.0
October 2001. The attributed date is that printed at the head of the
paper. The cited work is, however, superceded by documents that came
before Oct. 2001, e.g., [9].
[9] Adam Back, Ian Goldberg, and Adam Shostack. Freedom systems 2.1
May 2001.
[10] Adam Back, Ulf MЁller, and Anton Stiglic. Traffic analysis attacks and
Information Hiding: 4th International Workshop, IH 2001, pages 245
257, Pittsburgh, PA, USA, April 2001. Springer-Verlag, LNCS 2137.
[11] Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Dou-
WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in the
Electronic Society, pages 1120. ACM Press, October 2007.
[12] Amos Beimel and Shlomi Dolev. Buses for anonymous message delivery.
[13] Krista Bennett and Christian Grothoff. GAP practical anonymous
gies: Third International Workshop, PET 2003, pages 141160. Springer-
Verlag, LNCS 2760, 2003.
[14] Ron Berman, Amos Fiat, and Amnon Ta-Shma. Provable unlinkabil-
8th International Conference, FC 2004, pages 266289. Springer-Verlag,
LNCS 3110, February 2004.
[15] Oliver Berthold, Hannes Federrath, and Stefan KЁpsell. Web MIXes: A
errath, editor, Designing Privacy Enhancing Technologies: International
Workshop on Design Issues in Anonymity and Unobservability, pages 115
129. Springer-Verlag, LNCS 2009, July 2000.
[16] Oliver Berthold and Heinrich Langos. Dummy traffic against long term
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 110128, San Francisco, CA, USA, April 2002. Springer-
Verlag, LNCS 2482.
[17] Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvan-
editor, Designing Privacy Enhancing Technologies: International Work-
shop on Design Issues in Anonymity and Unobservability, pages 3045.
Springer-Verlag, LNCS 2009, July 2000.
[18] John Bethencourt, Dawn Xiaodong Song, and Brent Waters. New con-
tended abstract). In 2006 IEEE Symposium on Security and Privacy (S&
P 2006), Proceedings, pages 132139. IEEE Computer Society, May 2006.
[19] George Dean Bissias, Marc Liberatore,, and Brian Neil Levine. Pri-
David Martin, editors, Privacy Enhancing Technologies: 5th International
Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
[20] Avrim Blum, Dawn Xiaodong Song, and Shobha Venkataraman. Detec-
Erland Jonsson, Alfonso Valdes, and Magnus Almgren, editors, Recent Ad-
vances in Intrusion Detection 7th International Symposium, RAID 2004,
pages 258277, Sophia Antipolis, France, 2004. Springer-Verlag, LNCS
765.
[21] Nikita Borisov. An analysis of parallel mixing with attacker-controlled
ing Technologies: 5th International Workshop, PET 2005, pages 1225,
Cavtat Croatia, 2005. Springer-Verlag, LNCS 3856.
[22] Nikita Borisov. Anonymous Routing in Structured Peer-to-Peer Overlays.
[23] Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom systems
2000.
[24] Justin Boyan. The Anonymizer: Protecting user privacy on the web. CMC
[25] Zach Brown. Cebolla: Pragmatic IP Anonymity. In Proceedings of the
[26] Jan Camenisch and Anna Lysyanskaya. A formal treatment of onion
2005: 25th Annual International Cryptology Conference, pages 169187.
Springer-Verlag, LNCS 3621, August 2005.
[27] David Chaum. Untraceable electronic mail, return addresses, and digital
[28] David Chaum. Blind signatures for untraceable payments. In David
Cryptology CRYPTO '82, pages 199203, New York and London, 1983.
Plenum Press.
[29] David Chaum. Security without identification: Transaction systems to
1044, October 1985.
[30] David Chaum. The dining cryptographers problem: Unconditional sender
[31] Heyning Cheng and Ron Avnur. Traffic analysis of ssl encrypted web
[32] Giusseppe Ciaccio. Improving sender anonymity in a structured overlay
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 190207. Springer-Verlag, LNCS 4258, 2006.
[33] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong.
tem. In Hannes Federrath, editor, Designing Privacy Enhancing Tech-
nologies: International Workshop on Design Issues in Anonymity and
Unobservability, pages 4666. Springer-Verlag, LNCS 2009, 2000.
[34] Richard Clayton. Failure in a hybrid content blocking system. In George
International Workshop, PET 2005, pages 7892, Cavtat Croatia, 2005.
Springer-Verlag, LNCS 3856.
[35] Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson. Ignoring
Privacy Enhancing Technologies: 6th International Workshop, PET 2006,
pages 2035. Springer-Verlag, LNCS 4258, 2006.
[36] George Danezis. Traffic analysis of the HTTP protocol over TLS. http:
[37] George Danezis. Forward secure mixes. In Jonsson Fisher-Hubner, editor,
Karlstad, Sweden, November 2002.
[38] George Danezis. Mix-networks with restricted routes. In Roger Dingle-
shop, PET 2003, pages 117. Springer-Verlag, LNCS 2760, 2003.
[39] George Danezis. Statistical disclosure attacks. In Gritzalis, Vimercati,
certainty, (SEC2003), pages 421426, Athens, May 2003. IFIP TC11,
Kluwer.
[40] George Danezis. The traffic analysis of continuous-time mixes. In David
4th International Workshop, PET 2004. Springer-Verlag, LNCS 3424,
May 2005.
[41] George Danezis. Breaking four mix-related schemes based on universal
Stefanos Gritzalis, and Bart Preneel, editors, Information Security 9th
International Conference, ISC 2006, pages 4659, Samos Island, Greece,
September 2006. Springer-Verlag, LNCS 4176.
[42] George Danezis and Richard Clayton. Route fingerprinting in anonymous
Computing, P2P 2006, pages 6972. IEEE Computer Society Press, 2006.
[43] George Danezis and Jolyon Clulow. Compulsion resistant anonymous com-
beisser, and Fernando Pґrez-Gonzґlez, editors, Information Hiding: 7th
International Workshop, IH 2005, pages 1125. Springer-Verlag, LNCS
3727, June 2005.
[44] George Danezis and Claudia Diaz. Space-efficient private search with
editors, Financial Cryptography and Data Security, 11th International
Conference, FC 2007, and 1st International Workshop on Usable Security,
USEC 2007, pages 148162. Springer-Verlag, LNCS 4886, 2007.[45] George Danezis,
Claudia Diaz, and Carmela Troncoso. Two-sided statis-
tical disclosure attack. In Nikita Borisov and Philippe Golle, editors, Pri-
vacy Enhancing Technologies: 7th International Symposium, PET 2007,
pages 3044. Springer-Verlag, LNCS 4776, 2007.
[46] George Danezis, Roger Dingledine, and Nick Mathewson. Mixminion:
Symposium on Security and Privacy, pages 215, Berkeley, CA, May 2003.
IEEE Computer Society.
[47] George Danezis and Ben Laurie. Minx: A simple and efficient anonymous
editors, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy
in the Electronic Society, pages 5965, Washington, DC, USA, October
2004. ACM Press.
[48] George Danezis and Len Sassaman. Heartbeat traffic to counter (n – 1)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic So-
ciety, pages 8993, Washington, DC, USA, October 2003. ACM Press.
[49] George Danezis and Andrei Serjantov. Statistical disclosure or intersection
Hiding: 6th International Workshop, IH 2004, pages 293308. Springer-
Verlag, LNCS 3200, May 2004.
[50] George Danezis and Paul Syverson. Bridging and fingerprinting: Epis-
itors, Privacy Enhancing Technologies: Eighth International Symposium,
PETS 2008, pages 151166. Springer-Verlag, LNCS 5134, July 2008.
[51] Yvo Desmedt and Kaoru Kurosawa. How to break a practical MIX and
ROCRYPT 2000, pages 557572, Bruges, Belgium, May 2000. Springer-
Verlag, LNCS 1807.
[52] Claudia Diaz. Anonymity and Privacy in Electronic Services. PhD thesis,
[53] Claudia Diaz, George Danezis, Christian Grothoff, Andreas Pfitzmann,
Is one concept superior? In David Martin and Andrei Serjantov, editors,
Privacy Enhancing Technologies: 4th International Workshop, PET 2004,
page 242. Springer-Verlag, LNCS 3424, 2005.
[54] Claudia Diaz and Bart Preneel. Reasoning about the anonymity provided
Information Hiding: 6th International Workshop, IH 2004, pages 309
325. Springer-Verlag, LNCS 3200, May 2004.
[55] Claudia Diaz, Len Sassaman, and Evelyne Dewitte. Comparison between
Gollmann, and Refik Molva, editors, Computer Security ESORICS 2004,
9th European Symposium on Research in Computer Security, pages 141
159. Springer-Verlag, LNCS 3193, 2004.
[56] Claudia Diaz and Andrei Serjantov. Generalising mixes. In Roger Dingle-
shop, PET 2003, pages 1831, Dresden, Germany, 2003. Springer-Verlag,
LNCS 2760.
[57] Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 5468, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
[58] Claudia Diaz, Carmela Troncoso, and George Danezis. Does additional
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic So-
ciety, pages 7275. ACM Press, October 2007.
[59] Claudia Diaz, Carmela Troncoso, and Andrei Serjantov. On the impact
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 4462. Springer-Verlag, LNCS 5134, July 2008.
[60] T. Dierks and C. Allen. RFC 2246: The TLS protocol version 1.0. http:
[61] Roger Dingledine, Michael J. Freedman, David Hopwood, and David
Moskowitz, editor, Information Hiding: 4th International Workshop, IH
2001, pages 126141, Pittsburgh, PA, USA, April 2001. Springer-Verlag,
LNCS 2137.
[62] Roger Dingledine, Michael J. Freedman, and David Molnar. The free
errath, editor, Designing Privacy Enhancing Technologies: International
Workshop on Design Issues in Anonymity and Unobservability, pages 67
95. Springer-Verlag, LNCS 2009, 2000.
[63] Roger Dingledine and Nick Mathewson. Anonymity loves company: Us-
on the Economics of Information Security (WEIS 2006), June 2006.
[64] Roger Dingledine and Nick Mathewson. Design of a blocking-resistant
doc/design- paper/blocking.html, May 2007.
[65] Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-
Symposium, pages 303319. USENIX Association, August 2004.
[66] Roger Dingledine, Nick Mathewson, and Paul Syverson. Deploying low-
& Privacy, 5(5):8387, September/October 2007.
[67] Roger Dingledine, Andrei Serjantov, and Paul Syverson. Blending differ-
Golle, editors, Privacy Enhancing Technologies: 6th International Work-
shop, PET 2006, pages 245257. Springer-Verlag, LNCS 4258, 2006.
[68] Roger Dingledine, Vitaly Shmatikov, and Paul Syverson. Synchronous
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004, pages 186206. Springer-Verlag, LNCS 3424, May 2005.
[69] Roger Dingledine and Paul Syverson. Reliable mix cascade networks
6th International Conference, FC 2002, pages 253268. Springer-Verlag,
LNCS 2357, 2003.
[70] M. Dornseif. Government mandated blocking of foreign web content. In
E-Services: Proceedings of the 17. DFN-Arbeitstagung uber Kommunika-
tionsnetze, Dusseldorf, 2003.
[71] John Douceur. The sybil attack. In Peter Druschel, M. Frans Kaashoek,
national Workshop, IPTPS 2002, pages 251260, Cambridge, MA, USA,
2002. Springer-Verlag, LNCS 2429.
[72] Matthew Edman, Fikret Sivrikaya, and Bulent Yener. A combinatorial
Benjamin Melamed, and Daniel Zeng, editors, IEEE Intel ligence and Se-
curity Informatics (ISI 2007), pages 356363, New Brunswick, NJ, May
2007. IEEE.
[73] Matthew Edman and Paul Syverson. AS-awareness in Tor path selection.
Proceedings of the 16th ACM Conference on Computer and Communica-
tions Security. ACM Press, 2009.
[74] Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical
USENIX Security Symposium, pages 3350, Montreal, Canada, August
2009. USENIX Association.
[75] Peter Fairbrother. An improved construction for universal re-encryption.
nologies: 4th International Workshop, PET 2004, pages 7987. Springer-
Verlag, LNCS 3424, May 2005.
[76] N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger.
editor, USENIX Security Symposium, pages 247262, San Francisco, CA,
5-9 August 2002.
[77] Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan,
ger discovery. In Roger Dingledine, editor, Privacy Enhancing Technolo-
gies: Third International Workshop, PET 2003, pages 125140. Springer-
Verlag, LNCS 2760, 2003.
[78] Nick Feamster and Roger Dingledine. Location diversity in anonymity
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the
Electronic Society, pages 6676, Washington, DC, USA, October 2004.
ACM Press.
[79] Joan Feigenbaum, Aaron Johnson, and Paul Syverson. Probabilistic anal-
editor, WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in
the Electronic Society, pages 110. ACM Press, October 2007.
[80] Laurent Fousse and Jean-Ren Reinhard. Nymbaron: A type iii nymserver.
[81] Michael J. Freedman and Robert Morris. Tarzan: A peer-to-peer
9th ACM Conference on Computer and Communications Security, CCS
2002, pages 193206. ACM Press, 2002.
[82] Michael J. Freedman, Emil Sit, Josh Cates, and Robert Morris. Intro-
uschel, M. Frans Kaashoek, and Antony I. T. Rowstron, editors, Peer-To-
Peer Systems: First International Workshop, IPTPS 2002, pages 121129,
Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
[83] Jun Furukawa and Kazue Sako. An efficient scheme for proving a shuffle.
368387, Santa Barbara, CA, USA, August 2001. Springer-Verlag, LNCS
2139.
[84] Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and
suring anonymity. In Marianne Winslett, editor, WPES'08: Proceedings
of the 2008 ACM Workshop on Privacy in the Electronic Society, pages
111116, Alexandria,VA,USA, October 2008. ACM Press.
[85] Sharad Goel, Mark Robson, Milo Polte, and Emin Gun Sirer. Herbivore:
Report 2003-1890, Cornell University, Ithaca, NY, February 2003.
[86] Ian Goldberg. A Pseudonymous Communications Infrastructure for the
[87] Ian Goldberg and Adam Shostack. Freedom 1.0 security issues and anal-
[88] Ian Goldberg and Adam Shostack. Freedom network 1.0 architecture and
attributed date is that printed at the head of the paper. The cited work
is, however, superceded by documents that came before Oct. 2001. The
appendix indicates a change history with changes last made November 29,
1999. Also, in [87] the same authors refer to a paper with a similar title
as an "April 1999 whitepaper".
[89] David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Hid-
ing: First International Workshop, pages 137150. Springer-Verlag, LNCS
1174, 1996.
[90] Philippe Golle. Reputable mix networks. In David Martin and Andrei Ser-
shop, PET 2004, pages 5162. Springer-Verlag, LNCS 3424, May 2005.
[91] Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Uni-
Cryptology CT-RSA 2004, pages 163178, San Francisco, USA, February
2004. Springer-Verlag, LNCS 2964.
[92] Philippe Golle and Ari Juels. Dining cryptographers revisited. In Ad-
Switzerland, May 2004. Springer-Verlag, LNCS 3027.
[93] Philippe Golle and Ari Juels. Parallel mixing. In Birgit Pfitzmann and
on Computer and Communications Security, pages 220226. ACM Press,
October 2004.
[94] Philippe Golle, XiaoFeng Wang, Markus Jakobsson, and Alex Tsow. De-
IEEE Symposium on Security and Privacy (S& P 2006), Proceedings,
pages 121131, Oakland, CA, May 2006. IEEE Computer Society.
[95] Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, and Ari
in Cryptology ASIACRYPT 2002, pages 451465, Queenstown, New
Zealand, 1-5 December 2002. Springer-Verlag, LNCS 2501.
[96] Marcin Gomulkiewicz, Marek Klonowski, and Miroslaw Kutyllowski.
immune against repetitive attack. In Chae Hoon Lim and Moti Yung,
editors, Information Security Applications, 5th International Workshop,
WISA 2004, pages 400410, Jeju Island, Korea, August 2004. Springer-
Verlag, LNCS 3325.
[97] Marcin Gomulkiewicz, Marek Klonowski, and Miroslaw Kutylowski.
Snekkenes and Dieter Gollmann, editors, Computer Security ESORICS
2003, 8th European Symposium on Research in Computer Security, pages
132145, Gjшvik, Norway, October 2003. Springer-Verlag, LNCS 2808.
[98] Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati,
mission critical applications. IEEE Transactions on Systems, Man, and
Cybernetics, Part A 31(4):253265, 2001.
[99] Ceki Gulcu and Gene Tsudik. Mixing E-mail with Babel. In Proceedings of
'96, pages 216. IEEE, February 1996.
[100] Joseph Y. Halpern and Kevin R. O'Neill. Anonymity and information
514, 2005.
[101] Steven Hazel and Brandon Wiley. Achord: A variant of the chord
tems. In Peer-To-Peer Systems: First International Workshop, IPTPS
2002, Cambridge, MA, USA, 2002. A postproceedings of this work-
shop was published by Springer-Verlag (LNCS 2429). This paper is not
in that volume. It is only in the electronic proceedings available at
http://www.iptps.org/papers.html#2002.
[102] Sabine Helmers. A brief history of anon.penet.fi – the legendary anony-
[103] Johan Helsingius. Johan Helsingius closes his internet remailer. http:
[104] Johan Helsingius. Temporary injunction in the anonymous remailer case.
[105] Alejandro Hevia and Daniele Micciancio. An indistinguishability-based
berg, editors, Privacy Enhancing Technologies: Eighth International Sym-
posium, PETS 2008, pages 2443. Springer-Verlag, LNCS 5134, July 2008.
[106] Andrew Hintz. Fingerprinting websites using traffic analysis. In Roger
Second International Workshop, PET 2002, pages 171178, San Francisco,
CA, USA, April 2002. Springer-Verlag, LNCS 2482.
[107] Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin. How much
cati, Paul Syverson, and David Evans, editors, CCS'07: Proceedings of
the 14th ACM Conference on Computer and Communications Security,
pages 8291. ACM Press, 2007.
[108] Dominic Hughes and Vitaly Shmatikov. Information hiding, anonymity
36, 2004.
[109] Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Cryp-
IEEE Symposium on Foundations of Computer Science, pages 239248,
Washington, DC, USA, 2006. IEEE Computer Society.
[110] Markus Jakobsson. A practical mix. In Kaisa Nyberg, editor, Advances in
Springer-Verlag, LNCS 1403.
[111] Markus Jakobsson. Flash mixing. In PODC '99: Proceedings of the Eigh-
pages 8389, Atlanta, Georgia, USA, 1999. ACM Press.
[112] Markus Jakobsson and Ari Juels. An optimally robust hybrid mix network.
Principles of distributed computing, pages 284292, New York, NY, USA,
2001. ACM.
[113] Markus Jakobsson, Ari Juels, and Ronald L. Rivest. Making mix nets
editor, Proceedings of the 11th USENIX Security Symposium, pages 339
353, San Francisco, CA, USA, 5-9 August 2002. USENIX Association.
[114] Anja Jerichow, Jan Muller, Andreas Pfitzmann, Birgit Pfitzmann, and
protocol. IEEE Journal on Selected Areas in Communications, 16(4):495
509, May 1998.
[115] Shu Jiang, Nitin H. Vaidya, and Wei Zhao. Routing in packet radio
Security Workshop, June 2000.
[116] Aaron Johnson and Paul Syverson. More anonymous onion routing
sium, CSF 2009, pages 312, Port Jefferson, New York, July 2009. IEEE
Computer Society.
[117] Aniket Kate, Greg Zaverucha, and Ian Goldberg. Pairing-based onion
Technologies: 7th International Symposium, PET 2007, pages 95112.
Springer-Verlag, LNCS 4776, 2007.
[118] Sachin Katti, Dina Katabi, and Katay Puchala. Slicing the onion: Anony-
works (HotNets-IV). ACM, 2005. http://conferences.sigcomm.org/
hotnets/2005/papers/katti.pdf.
[119] Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity
ing: 5th International Workshop, IH 2002, pages 5369, Noordwijkerhout,
The Netherlands, October 2002. Springer-Verlag, LNCS 2578.
[120] Dogan Kesdogan, Mark Borning, and Michael Schmeink. Unobservable
ternative to the MIX based approach? In Roger Dingledine and Paul
Syverson, editors, Privacy Enhancing Technologies: Second International
Workshop, PET 2002, pages 214218, San Francisco, CA, USA, April
2002. Springer-Verlag, LNCS 2482.
[121] Dogan Kesdogan, Jan Egner, and Roland Buschkes. Stop-and-Go MIXes:
smith, editor, Information Hiding: Second International Workshop, IH
1998, pages 8398, Portland, Oregon, USA, April 1998. Springer-Verlag,
LNCS 1525.
[122] Joe Kilian and Kazue Sako. Receipt-free MIX-type voting scheme — a
Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology
EUROCRYPT '95, pages 393403, Saint-Malo, France, May 1995.
Springer-Verlag, LNCS 921.
[123] Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, and
mous communication. In Markus Jakobsson, MotiYung, and Jianying
Zhou, editors, Applied Cryptography and Network Security Second Inter-
national Conference, ACNS 2004, pages 1630. Springer-Verlag, LNCS
3089, 2004.
[124] Marek Klonowski, Miroslaw Kutyllowski, Anna Lauks, and Filip Zagґrski.
formation flow. In WARTACRYPT '04 Conference on Cryptology,
Bedlewo/Poznan, July 2004.
[125] Marek Klonowski, Miroslaw Kutyllowski, and Filip Zagґrski. Anonymous
Mґria Bielikovґ, Bernadette Charron-Bost, and Ondrej Sykora, editors,
SOFSEM 2005: Theory and Practice of Computer Science, 31st Confer-
ence on Current Trends in Theory and Practice of Computer Science, Lec-
ture Notes in Computer Science, pages 229238, Liptovsky Jґn, Slovakia,
January 2005. Springer-Verlag, LNCS 3381.
[126] Marek Klonowski and Miroslaw Kutylowski. Provable anonymity for
Katzenbeisser, and Fernando Pґrez-Gonzґlez, editors, Information Hid-
ing: 7th International Workshop, IH 2005, pages 2638. Springer-Verlag,
LNCS 3727, June 2005.
[127] Stefan KЁpsell and Ulf Hilling. How to achieve blocking resistance for
di Vimercati and Paul Syverson, editors, WPES'04: Proceedings of the
2004 ACM Workshop on Privacy in the Electronic Society, pages 4758,
Washington, DC, USA, October 2004. ACM Press.
[128] Dennis Kugler. An analysis of GNUnet and the implications for anony-
Enhancing Technologies: Third International Workshop, PET 2003, pages
161176. Springer-Verlag, LNCS 2760, 2003.
[129] Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K.
editor, Financial Cryptography, 8th International Conference, FC 2004,
pages 251265. Springer-Verlag, LNCS 3110, February 2004.
[130] Brian Neil Levine and Clay Shields. Hordes: a multicast based protocol
[131] John Leyden. Anonymizer looks for gaps in great firewall of China. The
[132] Tianbo Lu, Binxing Fang, Yuzhong Sun, and Xueqi Cheng. Performance
puter and Information Technology (CIT 2005), pages 716723, Shanghai,
China, September 2005. IEEE Computer Society.
[133] Tianbo Lu, Binxing Fang, Yuzhong Sun, and Li Guo. Some remarks
Xicheng Lu and Wei Zhao, editors, Networking and Mobile Computing,
Third International Conference, ICCNMC 2005, pages 853862, Zhangji-
a jie, China, 2005. Springer-Verlag, LNCS 3619.
[134] David Martin and Andrew Schulman. Deanonymizing users of the
versity Computer Science Department, February 2002.
[135] Nick Mathewson. Underhill: A proposed type 3 nymserver protocol speci-
nym- spec.txt.
[136] Nick Mathewson and Roger Dingledine. Practical traffic analysis: Extend-
jantov, editors, Privacy Enhancing Technologies: 4th International Work-
shop, PET 2004. Springer-Verlag, LNCS 3424, 2005.
[137] David Mazi`res and M. Frans Kaashoek. The Design, Implementation
Conference on Computer and Communications Security, pages 2736, San
Francisco, CA, USA, November 1998. ACM Press.
[138] Markus Michels and Patrick Horster. Some remarks on a receipt-free
Tsutomu Matsumoto, editors, Advances in Cryptology ASIACRYPT
'96, pages 125132, Kyongju, Korea, November 1996. Springer-Verlag,
LNCS 1163.
[139] Masashi Mitomo and Kaoru Kurosawa. Attack for flash MIX. In Tatsuaki
192204, Kyoto, Japan, December 2000. Springer-Verlag, LNCS 1976.
[140] Prateek Mittal and Nikita Borisov. Information leaks in structured peer-
Jha, and Xiaolan Zhang, editors, CCS'08: Proceedings of the 15th ACM
Conference on Computer and Communications Security, pages 267278.
ACM Press, 2008.
[141] Bodo MЁller. Provably secure public-key encryption for length-preserving
2003, pages 244262, San Francisco, CA, USA, 13-17 April 2003. Springer-
Verlag, LNCS 2612.
[142] Ulf MЁller, Lance Cottrell, Peter Palfrader, and Len Sassaman. Mixmaster
[143] Steven J. Murdoch and George Danezis. Low-cost traffic analysis of Tor.
Proceedings, pages 183195. IEEE CS, May 2005.
[144] Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by
editors, Privacy Enhancing Technologies: 7th International Symposium,
PET 2007, pages 167183. Springer-Verlag, LNCS 4776, 2007.
[145] Arjun Nambiar and Matthew Wright. Salsa: A structured approach to
Vimercati, and Vitaly Shmatikov, editors, CCS'06: Proceedings of the
13th ACM Conference on Computer and Communications Security, pages
1726. ACM Press, 2006.
[146] C. Andrew Neff. A verifiable secret shuffle and its application to e-
ference on Computer and Communications Security (CCS-8), pages 116
125, Philadelphia, PA, USA, November 2001. ACM Press.
[147] Richard E. Newman, Ira S. Moskowitz, Paul Syverson, and Andrei Ser-
editor, Privacy Enhancing Technologies: Third International Workshop,
PET 2003, pages 4865, Dresden, Germany, March 2003. Springer-Verlag,
LNCS 2760.
[148] Luke O'Connor. On blending attacks for mixes with memory. In Mauro
Pґrez-Gonzґlez, editors, Information Hiding: 7th International Work-
shop, IH 2005, pages 3952. Springer-Verlag, LNCS 3727, June 2005.
[149] Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, and Kazunori Takatani.
and Sihan Qing, editors, Information and Communication Security, First
International Conference, ICICS '97, pages 440444, Beijing, China,
November 1997. Springer-Verlag, LNCS 1334.
[150] Miyako Ohkubo and Masayuki Abe. A length-invariant hybrid mix. In
pages 178191, Kyoto, Japan, December 2000. Springer-Verlag, LNCS
1976.
[151] Rafail Ostrovsky and William E. Skeith III. Private searching on stream-
ternational Cryptology Conference, pages 223240. Springer-Verlag, LNCS
3621, 2005.
[152] Lasse Шverlier and Paul Syverson. Locating hidden servers. In 2006 IEEE
- IEEE CS, May 2006.
[153] Lasse Шverlier and Paul Syverson. Improving efficiency and simplicty
Philippe Golle, editors, Privacy Enhancing Technologies: 7th Interna-
tional Symposium, PET 2007, pages 134152. Springer-Verlag, LNCS
4776, 2007.
[154] Peter Palfrader. Echolot: a pinger for anonymous remailers. http://www.
[155] Sameer Parekh. Prospects for remailers: where is anonymity heading
http://www.firstmonday.dk/issues/issue2/remailers/.
[156] C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and
tology EUROCRYPT '93, pages 248259. Springer-Verlag, LNCS 765,
1994.
[157] Andreas Pfitzmann and Marit KЁhntopp. Anonymity, unobservability,
itor, Designing Privacy Enhancing Technologies: International Workshop
on Design Issues in Anonymity and Unobservability, pages 19. Springer-
Verlag, LNCS 2009, July 2000.
[158] Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. ISDN-
In Wolfgang Effelsberg, Hans Werner Meuer, and Gunter Muller, editors,
Kommunikation in Verteilten Systemen, Grund lagen, Anwendungen, Be-
trieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte, pages
451463. Springer-Verlag, February 1991.
[159] Andreas Pfitzmann and Michael Waidner. Networks without user observ-
EUROCRYPT '85, pages 245253. Springer-Verlag, LNCS 219, 1986.
[160] Birgit Pfitzmann. Breaking an efficient anonymous channel. In Alfredo De
340, Perugia, Italy, May 1994. Springer-Verlag, LNCS 950.