You are here

Bibliography

Export 24 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is onion routing  [Clear All Filters]
2011
Herrmann M, Grothoff C. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. In: Privacy Enhancing Technologies Symposium (PETS 2011). Privacy Enhancing Technologies Symposium (PETS 2011). Waterloo, Canada: Springer Verlag; 2011.
Johnson A, Syverson P, Dingledine R, Mathewson N. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
2009
Chen Y, Sion R, Carbunar B. XPay: Practical anonymous payments for Tor routing and other networked services. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655195
2008
Shimshock E, Staats M, Hopper NJ. Breaking and Provably Fixing Minx. In: Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 99–114. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428266
Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 219–236. Available from: http://www.springerlink.com/content/r1h1046823587382/
Danezis G, Diaz C. A Survey of Anonymous Communication Channels. [Internet]. 2008 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7951
2007
Landsiedel O, Pimenidis A, Wehrle K. Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. [Internet]. 2007 . Available from: http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4410909%2F4410910%2F04410930.pdf%3Farnumber%3D4410930&authDecision=-203
Katti S, Cohen J, Katabi D. Information Slicing: Anonymity Using Unreliable Overlays. In: Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). ; 2007. Available from: http://dspace.mit.edu/handle/1721.1/36344a
Clark J, van Oorschot PC, Adams C. Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07). Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07). New York, NY, USA: ACM; 2007. pp. 41–51. Available from: http://portal.acm.org/citation.cfm?id=1280680.1280687
2005
Klonowski M, Kutylowski M, Zagorski F. Anonymous Communication with On-line and Off-line Onion Encoding. In: Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005). Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005). Springer Berlin / Heidelberg; 2005. Available from: http://www.springerlink.com/content/9023b6ad0thaf51p/
Camenisch J, Lysyanskaya A. A Formal Treatment of Onion Routing. In: Shoup V Proceedings of CRYPTO 2005. Proceedings of CRYPTO 2005. Springer-Verlag, LNCS 3621; 2005. pp. 169–187. Available from: http://www.springerlink.com/content/0jmg1krt9ph147ql/
Gogolewski M, Klonowski M, Kutylowski M. Local View Attack on Anonymous Communication. In: Proceedings of ESORICS 2005. Proceedings of ESORICS 2005. Springer Berlin / Heidelberg; 2005. Available from: http://www.springerlink.com/content/ewblt5k80xrgqe4j/
Murdoch SJ, Danezis G. Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS; 2005. Available from: http://portal.acm.org/citation.cfm?id=1059390
Garcia FD, Hasuo I, Pieters W, van Rossum P. Provable Anonymity. In: Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05). Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05). Alexandria, VA, USA; 2005. Available from: http://portal.acm.org/citation.cfm?id=1103576.1103585
2004
Gomulkiewicz M, Klonowski M, Kutylowski M. Anonymous Communication with On-line and Off-line Onion Encoding. In: Proceedings of Workshop on Information Security Applications (WISA 2004). Proceedings of Workshop on Information Security Applications (WISA 2004). Springer Berlin / Heidelberg; 2004.
Iwanik J, Klonowski M, Kutylowski M. DUO–Onions and Hydra–Onions – Failure and Adversary Resistant Onion Protocols. In: Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004. Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004. Springer Boston; 2004. Available from: http://www.springerlink.com/content/019lu6xp5b9fctn8/
Gritzalis S. Enhancing Web privacy and anonymity in the digital era. Information Management & Computer Security. 2004 ;12(3):255--287.
Mauw S, Verschuren J, de Vink EP. A formalization of anonymity and onion routing. In: Proceedings of ESORICS 2004. Proceedings of ESORICS 2004. Sophia Antipolis: LNCS 3193; 2004. pp. 109–124. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.2547
Dingledine R, Mathewson N, Syverson P. Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium. Proceedings of the 13th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1251396
2003
Clayton R. Improving Onion Notation. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 81–87. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965
2002
Wright M, Adler M, Levine BN, Shields C. An Analysis of the Degradation of Anonymous Protocols. In: Proceedings of the Network and Distributed Security Symposium - NDSS '02. Proceedings of the Network and Distributed Security Symposium - NDSS '02. IEEE; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.9435
1998
Reed M, Syverson P, Goldschlag D. Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications [Internet]. 1998 ;16:482–494. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.2362
1996
Goldschlag D, Reed M, Syverson P. Hiding Routing Information. In: Anderson R Proceedings of Information Hiding: First International Workshop. Proceedings of Information Hiding: First International Workshop. Springer-Verlag, LNCS 1174; 1996. pp. 137–150. Available from: http://portal.acm.org/citation.cfm?id=731526