Ссылки на использованные материалы (2)
[161] Birgit Pfitzmann and Andreas Pfitzmann. How to break the direct RSA-
walle, editors, Advances in Cryptology EUROCRYPT '89, pages 373
381, Houthalen, Belgium, April 1990. Springer-Verlag, LNCS 434.
[162] Charles Rackoff and Daniel R. Simon. Cryptographic defense against
symposium on Theory of computing, pages 672681, New York, NY, USA,
1993. ACM.
[163] Josyula R. Rao and Panka j Rohatgi. Can pseudonymity really guarantee
8596. USENIX Association, August 2000.
[164] Jean-Francois Raymond. Traffic analysis: Protocols, attacks, design is-
Enhancing Technologies: International Workshop on Design Issues in An-
onymity and Unobservability, pages 1029. Springer-Verlag, LNCS 2009,
July 2000.
[165] Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Anony-
Communications, 16(4):482494, May 1998.
[166] Michael Reiter and Aviel Rubin. Crowds: Anonymity for web transac-
1(1):6692, 1998.
[167] Michael Reiter and XiaoFeng Wang. Fragile mixing. In Birgit Pfitzmann
ence on Computer and Communications Security, pages 227235. ACM
Press, October 2004.
[168] Marc Rennhard and Bernhard Plattner. Introducing MorphMix: Peer-to-
De Capitani di Vimercati and Pierangela Samarati, editors, Proceedings
of the ACM Workshop on Privacy in the Electronic Society, WPES 2002,
pages 91102. ACM Press, 2002.
[169] Len Sassaman, Bram Cohen, and Nick Mathewson. The Pynchon Gate:
di Vimercati and Roger Dingledine, editors, WPES'05: Proceedings of the
2005 ACM Workshop on Privacy in the Electronic Society, pages 19.
ACM Press, October 2005.
[170] Andrei Serjantov. Anonymizing censorship resistant systems. In Peter
To-Peer Systems: First International Workshop, IPTPS 2002, pages 111
120, Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
[171] Andrei Serjantov. On the Anonymity of Anonymity Systems. PhD thesis,
[172] Andrei Serjantov and George Danezis. Towards an information theoretic
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 4153, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
[173] Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle
editor, Information Hiding: 5th International Workshop, IH 2002, pages
3652. Springer-Verlag, LNCS 2578, 2002.
[174] Andrei Serjantov and Peter Sewell. Passive attack analysis for connection-
itors, Computer Security ESORICS 2003, 8th European Symposium on
Research in Computer Security, pages 141159, Gjшvik, Norway, October
2003. Springer-Verlag, LNCS 2808.
[175] Claude Shannon. A mathematical theory of communication. The Bel l
1948.
[176] Rob Sherwood, Bobby Bhattacharjee, and Aravind Srinivasan. P5: A pro-
Symposium on Security and Privacy, pages 5872, Berkeley, California,
USA, May 2002. IEEE Computer Society.
[177] Erik Shimshock, Matt Staats, and Nick Hopper. Breaking and provably
ing Technologies: Eighth International Symposium, PETS 2008, pages
99114. Springer-Verlag, LNCS 5134, July 2008.
[178] Vitaly Shmatikov. Probabilistic analysis of anonymity. In 15th IEEE Com-
Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society.
[179] Michael Singer. CIA Funded SafeWeb Shuts Down. Inter-
3531_926921, November 20 2001.
[180] Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N.
browsing traffic. In Proceedings, IEEE Symposium on Security and Pri-
vacy, pages 1930. IEEE Computer Society, 2002.
[181] Paul Syverson. Why I'm not an entropist. In Seventeenth International
ing.
[182] Paul Syverson, Michael Reed, and David Goldschlag. Onion Routing
Conference & Exposition, DISCEX'00, volume 1, pages 3440. IEEE CS
Press, 1999.
[183] Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards
ing Privacy Enhancing Technologies: International Workshop on Design
Issues in Anonymity and Unobservability, pages 96114. Springer-Verlag,
LNCS 2009, July 2000.
[184] Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous
Security and Privacy, pages 4454. IEEE CS Press, May 1997.
[185] Paul F. Syverson and Stuart G. Stubblebine. Group principals and the
Jim Davies, editors, FM'99 Formal Methods, Vol. I, pages 814833.
Springer-Verlag, LNCS 1708, September 1999.
[186] Parisa Tabriz and Nikita Borisov. Breaking the collusion detection mecha-
Enhancing Technologies: 6th International Workshop, PET 2006, pages
368383. Springer-Verlag, LNCS 4258, 2006.
[187] Brenda Timmerman. A security model for dynamic adaptive traffic mask-
paradigms, pages 107116, New York, NY, USA, 1997. ACM.
[188] Brenda Timmerman. Secure dynamic adaptive traffic masking. In NSPW
1324, New York, NY, USA, 2000. ACM.
[189] Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Ver-
Ian Goldberg, editors, Privacy Enhancing Technologies: Eighth Interna-
tional Symposium, PETS 2008, pages 223. Springer-Verlag, LNCS 5134,
July 2008.
[190] B. R. Venkatraman and Richard E. Newman-Wolfe. Performance analysis
from a campus network. In Tenth Annual Computer Security Applications
Conference, pages 288297, Orlando, FL, December 1994. IEEE CS Press.
[191] Michael Waidner and Birgit Pfitzmann. The dining cryptographers in
computationally secure serviceability. In Jean-Jacques Quisquater and
Joos Vandewalle, editors, Advances in Cryptology EUROCRYPT '89,
page 690. Springer-Verlag, LNCS 434, 1990.
[192] G. Walton. Chinas golden shield: corporations and the development of
ternational Centre for Human Rights and Democratic Development, URL
(consulted 29 October 2001): http: // www. ichrdd. ca/ frame. iphtml ,
2001.
[193] Xinyuan Wang, Shiping Chen, and Sushil Ja jodia. Tracking anonymous
Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 8191. ACM Press,
November 2005.
[194] Xinyuan Wang and Douglas S. Reeves. Robust correlation of encrypted
lays. In Vijay Atluri and Peng Liu, editors, CCS 2003: Proceedings of the
10th ACM Conference on Computer and Communications Security, pages
2029, Washington, DC, USA, 2003.
[195] Douglas WikstrЁm. How to break, fix, and optimize "optimistic mix for
Science, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2002.
[196] Douglas WikstrЁm. Elements in Zp \Gq are dangerous. Technical Report
29 Kista, SWEDEN, 2003.
[197] Douglas WikstrЁm. Four practical attacks for "optimistic mixing for exit-
ence, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2003.
[198] Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields. An
Distributed Security Symposium (NDSS '02), San Diego, California, 6-8
February 2002. Internet Society.
[199] Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields. De-
Proceedings, 2003 IEEE Symposium on Security and Privacy, pages 28
- IEEE Computer Society, May 2003.
[200] Ye Zhu and Riccardo Bettati. Un-mixing mix traffic. In George Danezis
national Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag,
LNCS 3856.
[201] Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao.
David Martin and Andrei Serjantov, editors, Privacy Enhancing Tech-
nologies: 4th International Workshop, PET 2004. Springer-Verlag, LNCS
3424, May 2005.