You are here

Bibliography

Export 150 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is anonymity  [Clear All Filters]
2013
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
2011
Moore BW, Wacek C, Sherr M. Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise. In: ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. Orlando, FL, USA; 2011.
Prusty S, Levine BN, Liberatore M. Forensic investigation of the OneSwarm anonymous filesharing system. In: Proceedings of the 18th ACM conference on Computer and communications security. Proceedings of the 18th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2011. pp. 201–214.
Henry R, Goldberg I. Formalizing Anonymous Blacklisting Systems. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy. Proceedings of the 2011 IEEE Symposium on Security and Privacy. San Francisco, CA, USA; 2011.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Le Blond S, Manils P, Abdelberi C, Kaafar MA, Castelluccia C, Legout A, Dabbous W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). Boston, United States: USENIX; 2011. Available from: http://hal.inria.fr/inria-00574178/PDF/btor.pdf
Herrmann M. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. Lehrstuhl für Netzarchitekturen und Netzdienste. 2011 ;M.S.:59.
Herrmann M, Grothoff C. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. In: Privacy Enhancing Technologies Symposium (PETS 2011). Privacy Enhancing Technologies Symposium (PETS 2011). Waterloo, Canada: Springer Verlag; 2011.
Mittal P, Khurshid A, Juen J, Caesar M, Borisov N. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Houmansadr A, Borisov N. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA; 2011.
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Narayanan A, Shmatikov V. De-anonymizing Social Networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 173–187. Available from: http://randomwalker.info/social-networks/
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
Mittal P, Borisov N. ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. Proceedings of the 16th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM; 2009. Available from: http://doi.acm.org/10.1145/1653662.1653683
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
Danezis G, Diaz C, Käsper E, Troncoso C. The Wisdom of Crowds: Attacks and Optimal Constructions. In: Backes M, Ning P Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Vol. 5789. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Springer; 2009. pp. 406–423. Available from: http://www.springerlink.com/content/t6q86u137t4762k8/
Chen Y, Sion R, Carbunar B. XPay: Practical anonymous payments for Tor routing and other networked services. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655195
2008
Bauer K, McCoy D, Grunwald D, Sicker D. BitBlender: Light-Weight Anonymity for BitTorrent. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Istanbul, Turkey: ACM; 2008. Available from: http://portal.acm.org/citation.cfm?id=1461465
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/

Pages