You are here

Bibliography

Export 34 results:
Author Title Type [ Year(Asc)]
Filters: Author is Roger Dingledine  [Clear All Filters]
2011
Johnson A, Syverson P, Dingledine R, Mathewson N. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
2010
Ngan T-W ``J'', Dingledine R, Wallach DS. Building Incentives into Tor. In: Sion R Proceedings of Financial Cryptography (FC '10). Proceedings of Financial Cryptography (FC '10). ; 2010.
2009
Bogetoft P, Christensen DL, Damgárd I, Geisler M, Jakobsen T, Krøigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, et al. Financial Cryptography and Data Security. In: Dingledine R, Golle P Financial Cryptography and Data Security. Vol. 6052. 1stst ed. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer-Verlag; 2009. pp. 325–343. Available from: http://dx.doi.org/10.1007/978-3-642-03549-4_20
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2006
Dingledine R, Mathewson N. Anonymity Loves Company: Usability and the Network Effect. In: Anderson R Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Cambridge, UK; 2006. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.510
Dingledine R, Serjantov A, Syverson P. Blending Different Latency Traffic with Alpha-Mixing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 245–257. Available from: http://www.springerlink.com/content/m23510526727k317/
2004
Feamster N, Dingledine R. Location Diversity in Anonymity Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029199
Mathewson N, Dingledine R. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Springer Berlin / Heidelberg; 2004. pp. 17–34. Available from: http://www.springerlink.com/content/v6m6cat1lxvbd4yd/
Dingledine R, Shmatikov V, Syverson P. Synchronous Batching: From Cascades to Free Routes. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 186–206. Available from: http://www.springerlink.com/content/uqvfwe97ehlldm8d/
Dingledine R, Mathewson N, Syverson P. Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium. Proceedings of the 13th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1251396
2003
Nguyen L, Safavi-Naini R. Breaking and Mending Resilient Mix-nets. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 66–80. Available from: http://www.springerlink.com/content/0e0mwvgyt008wxkf/
Acquisti A, Dingledine R, Syverson P. On the Economics of Anonymity. In: Financial Cryptography. Springer-Verlag, LNCS 2742. Financial Cryptography. Springer-Verlag, LNCS 2742. ; 2003. pp. 84–102. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5636&rep=rep1&type=pdf
Diaz C, Serjantov A. Generalising Mixes. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 18–31. Available from: http://www.springerlink.com/content/jvuk0exyqxvcyhvy/
Clayton R. Improving Onion Notation. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 81–87. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965
Newman RE, Moskowitz IS, Syverson P, Serjantov A. Metrics for Traffic Analysis Prevention. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 48–65.
Danezis G, Dingledine R, Mathewson N. Mixminion: Design of a Type III Anonymous Remailer Protocol. In: In Proceedings of the 2003 IEEE Symposium on Security and Privacy. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. ; 2003. pp. 2–15. Available from: http://mixminion.net/minion-design.pdf
Danezis G. Mix-networks with Restricted Routes. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 1–17. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.1188
Steinbrecher S, Köpsell S. Modelling Unlinkability. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 32–47. Available from: http://www.springerlink.com/content/dxteg659uf2jtdd7/
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: Proceedings of Workshop on Economics of Peer-to-Peer Systems. Proceedings of Workshop on Economics of Peer-to-Peer Systems. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: In Workshop on Economics of Peer-to-Peer Systems. In Workshop on Economics of Peer-to-Peer Systems. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D. Thwarding Web Censorship with Untrusted Messenger Delivery. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 125–140.
2002
Berthold O, Langos H. Dummy Traffic Against Long Term Intersection Attacks. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/66ybualwu5hmh563/
Hintz A. Fingerprinting Websites Using Traffic Analysis. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/c4qwe6d608p2cjyv/
Serjantov A, Dingledine R, Syverson P. From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://www.springerlink.com/content/um0kf3dp88b0eg5v/
Goldberg I. Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/740p21gl5a9f640m/

Pages