You are here

Bibliography

Export 33 results:
Author Title Type [ Year(Asc)]
Filters: Author is Paul Syverson  [Clear All Filters]
2011
Johnson A, Syverson P, Dingledine R, Mathewson N. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
Wang W, Motani M, Srinivasan V. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Tsang PP, Au MH, Kapadia A, Smith S. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 333–345. Available from: http://portal.acm.org/citation.cfm?id=1455813
2007
Øverlier L, Syverson P. Improving Efficiency and Simplicity of Tor circuit establishment and hidden services. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://www.springerlink.com/content/j68v312681l8v874/
2006
Dingledine R, Serjantov A, Syverson P. Blending Different Latency Traffic with Alpha-Mixing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 245–257. Available from: http://www.springerlink.com/content/m23510526727k317/
Øverlier L, Syverson P. Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS; 2006. Available from: http://portal.acm.org/citation.cfm?id=1130366
Øverlier L, Syverson P. Valet Services: Improving Hidden Servers with a Personal Touch. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 223–244. Available from: http://www.springerlink.com/content/d58607007777r8l1/
2004
Dingledine R, Shmatikov V, Syverson P. Synchronous Batching: From Cascades to Free Routes. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 186–206. Available from: http://www.springerlink.com/content/uqvfwe97ehlldm8d/
Dingledine R, Mathewson N, Syverson P. Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium. Proceedings of the 13th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1251396
Golle P, Jakobsson M, Juels A, Syverson P. Universal Re-Encryption for Mixnets. In: Proceedings of the 2004 RSA Conference, Cryptographer's track. Proceedings of the 2004 RSA Conference, Cryptographer's track. San Francisco, USA: Springer Berlin / Heidelberg; 2004. Available from: http://www.springerlink.com/content/1fu5qrb1a2kfe7f9/
2003
Acquisti A, Dingledine R, Syverson P. On the Economics of Anonymity. In: Financial Cryptography. Springer-Verlag, LNCS 2742. Financial Cryptography. Springer-Verlag, LNCS 2742. ; 2003. pp. 84–102. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5636&rep=rep1&type=pdf
Newman RE, Moskowitz IS, Syverson P, Serjantov A. Metrics for Traffic Analysis Prevention. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 48–65.
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: Proceedings of Workshop on Economics of Peer-to-Peer Systems. Proceedings of Workshop on Economics of Peer-to-Peer Systems. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: In Workshop on Economics of Peer-to-Peer Systems. In Workshop on Economics of Peer-to-Peer Systems. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740
2002
Berthold O, Langos H. Dummy Traffic Against Long Term Intersection Attacks. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/66ybualwu5hmh563/
Hintz A. Fingerprinting Websites Using Traffic Analysis. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/c4qwe6d608p2cjyv/
Serjantov A, Dingledine R, Syverson P. From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://www.springerlink.com/content/um0kf3dp88b0eg5v/
Goldberg I. Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/740p21gl5a9f640m/
Dingledine R, Syverson P. Reliable MIX Cascade Networks through Reputation. In: Financial Cryptography. Springer-Verlag, LNCS 2357. Financial Cryptography. Springer-Verlag, LNCS 2357. Springer Verlag; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.9316&rep=rep1&type=pdf
Dingledine R, Syverson P. Reliable MIX Cascade Networks through Reputation. In: Blaze M Proceedings of Financial Cryptography (FC '02). Proceedings of Financial Cryptography (FC '02). Springer-Verlag, LNCS 2357; 2002. Available from: http://www.springerlink.com/content/g67u25lm80234qj4/
Serjantov A, Danezis G. Towards an Information Theoretic Metric for Anonymity. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/wwe2c7g3hmwn0klf/
Diaz C, Seys S, Claessens J, Preneel B. Towards measuring anonymity. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/3qb837jkpgukc6b5/

Pages