commit 053c8225a094b283ef812c8e4244acc1d32d0eb7
parent 0c40df969edaf411440ec883e238d33645168994
Author: Nick Mathewson <nickm@torproject.org>
Date: Mon, 24 Nov 2008 18:59:10 +0000
New papers via emails from Miroslaw Kutylowski, Claudia Diaz, Michael Freedman.
svn:r301
Diffstat:
| M | anonbib.bib | | | 205 | +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------- |
1 file changed, 154 insertions(+), 51 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -214,7 +214,7 @@
@InProceedings{stop-and-go,
author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes},
- title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open
+ title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open
System},
booktitle = {Proceedings of Information Hiding Workshop (IH 1998)},
year = {1998},
@@ -549,7 +549,7 @@
@InProceedings{raymond00,
author = {Jean-Fran\c{c}ois Raymond},
title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
- and Open Problems}},
+ and Open Problems}},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
on Design Issues in Anonymity and Unobservability},
year = 2000,
@@ -623,7 +623,7 @@
@InProceedings{disad-free-routes,
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
title = {The disadvantages of free {MIX} routes and how to overcome
- them},
+ them},
booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
on Design Issues in Anonymity and Unobservability},
pages = {30--45},
@@ -845,7 +845,7 @@
@Article{realtime-mix,
author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
- Birgit Pfitzmann and Michael Waidner},
+ Birgit Pfitzmann and Michael Waidner},
title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
journal = {IEEE Journal on Selected Areas in Communications},
year = 1998,
@@ -902,7 +902,7 @@
day = 19,
www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html",
www_section = comm
- www_remarks = "First written in 1996 based on cypherpunks posts in 1995."
+ www_remarks = "First written in 1996 based on cypherpunks posts in 1995."
www_tags={selected},
}
@@ -912,7 +912,7 @@
howpublished = "Post to Cypherpunks mailing list",
year = 1998,
month = November,
- day = 26,
+ day = 26,
www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt",
www_section = comm,
www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}
@@ -1713,7 +1713,7 @@
@InProceedings{tor-design,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
- title = {Tor: The Second-Generation Onion Router}
+ title = {Tor: The Second-Generation Onion Router}
booktitle = {Proceedings of the 13th USENIX Security Symposium},
year = {2004},
month = {August},
@@ -2065,7 +2065,7 @@
title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
month = {May},
- year = {2005},
+ year = {2005},
pages = {1--11},
www_section = traffic,
www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf"
@@ -2701,7 +2701,7 @@ Distributed Computing Systems (ICDCS)},
pages = {89--98},
year = {2001},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf},
- www_section = pir,
+ www_section = pir,
www_important = {1},
www_tags = {selected}
}
@@ -2725,7 +2725,7 @@ Distributed Computing Systems (ICDCS)},
@inproceedings{pir,
title = {Private Information Retrieval},
- author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu
+ author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu
Sudan},
booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science},
pages = {41--50},
@@ -2857,7 +2857,7 @@ Sudan},
issue = {1},
year = {2006},
pages = {35--52},
- www_pdf_url =
+ www_pdf_url =
{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf},
www_section = {Misc},
www_tags = {selected},
@@ -2871,7 +2871,7 @@ Sudan},
issue = {1},
year = {2006},
pages = {205--223},
- www_pdf_url =
+ www_pdf_url =
{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf},
www_section = {Misc},
www_tags = {selected},
@@ -3038,7 +3038,7 @@ Sudan},
@inproceedings{Liberatore:2006,
Author = {Marc Liberatore and Brian Neil Levine},
Title = {{Inferring the Source of Encrypted HTTP Connections}},
- Booktitle = {Proceedings of the 13th ACM conference on Computer and
+ Booktitle = {Proceedings of the 13th ACM conference on Computer and
Communications Security (CCS 2006)},
Month = {October},
year = {2006}
@@ -3065,7 +3065,7 @@ Sudan},
@inproceedings{Scarlata:2001,
Author = {Vincent Scarlata and Brian Neil Levine and Clay Shields},
Title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}},
- Booktitle = {Proceedings of the IEEE International Conference on Network
+ Booktitle = {Proceedings of the IEEE International Conference on Network
Protocols (ICNP)},
Keywords = {security; routing; peer-to-peer; anonymity},
Month = {November},
@@ -3125,12 +3125,12 @@ Sudan},
title = {Regroup-And-Go mixes to counter the $(n-1)$ attack},
journal = {Journal of Internet Research},
pages = {213--223},
- volume = {16},
+ volume = {16},
year = {2006},
doi = {http://dx.doi.org/10.1108/10662240610656528},
number = {2},
publisher = {Emerald Group Publishing Limited},
- www_section = comm,
+ www_section = comm,
www_tags={selected},
}
@@ -3154,17 +3154,17 @@ Sudan},
volume = {32},
number = {Winter},
pages = {99--142},
- year = {2002},
+ year = {2002},
www_section = misc,
www_tags = {selected},
}
@inproceedings{cooper,
- title = {Preserving Privacy in a Network of Mobile Computers},
- author = {David A. Cooper and Kenneth P. Birman},
- booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy},
- year = {1995},
- month = {May},
+ title = {Preserving Privacy in a Network of Mobile Computers},
+ author = {David A. Cooper and Kenneth P. Birman},
+ booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy},
+ year = {1995},
+ month = {May},
www_section = pir,
www_tags = {selected},
}
@@ -3400,7 +3400,7 @@ www_tags = {selected},
pages={1193--1203},
year={2005},
publisher={Elsevier},
- www_section = comm,
+ www_section = comm,
}
@article{danezis2006rfa,
@@ -3448,7 +3448,7 @@ Peer-to-Peer Computing},
year={2006},
publisher={Springer},
www_section = proofs,
- www_tags = {selected},
+ www_tags = {selected},
}
% -- end of additions from gd on 01 July 2007 --
@@ -3613,13 +3613,13 @@ Peer-to-Peer Computing},
}
@misc{CDFS07,
-author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati},
-editor = {T. Yu and S. Jajodia},
-booktitle = {Security in Decentralized Data Management},
-title = {k-Anonymity},
-publisher = {Springer},
-year = {2007},
-address = {Berlin Heidelberg},
+author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati},
+editor = {T. Yu and S. Jajodia},
+booktitle = {Security in Decentralized Data Management},
+title = {k-Anonymity},
+publisher = {Springer},
+year = {2007},
+address = {Berlin Heidelberg},
howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer},
www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf},
www_section = pub,
@@ -3727,14 +3727,14 @@ year = {2007},
www_pdf_url = "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf"
}
-@ARTICLE{EdmanSY07,
-title={A Combinatorial Approach to Measuring Anonymity},
-author={M. Edman and F. Sivrikaya and B. Yener},
-journal={Intelligence and Security Informatics, 2007 IEEE},
-year={2007},
-volume={},
-number={},
-pages={356--363},
+@ARTICLE{EdmanSY07,
+title={A Combinatorial Approach to Measuring Anonymity},
+author={M. Edman and F. Sivrikaya and B. Yener},
+journal={Intelligence and Security Informatics, 2007 IEEE},
+year={2007},
+volume={},
+number={},
+pages={356--363},
www_section = traffic,
www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
www_tags={selected},
@@ -3759,9 +3759,9 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
year = {2008},
number = {MSR-TR-2008-35},
month = {January},
- www_tags = {selected},
- www_section = {Anonymous communication},
- www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf},
+ www_tags = {selected},
+ www_section = {Anonymous communication},
+ www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf},
}
@InProceedings {MarPi08,
@@ -3774,7 +3774,7 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
address = {Gino-wan, Okinawa, Japan},
ISBN = {978-0-7695-3095-6},
www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf},
- www_tags = {selected},
+ www_tags = {selected},
www_section = comm,
author = {Igor Margasinski and Michal Pioro}
}
@@ -4093,16 +4093,16 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
@techreport{LOCEntropy2008,
- title = {Entropy Bounds for Traffic Confirmation},
- author = {Luke O'Connor},
- institution = {IACR},
- number = {2008/365},
- year = {2008},
- month = {October},
+ title = {Entropy Bounds for Traffic Confirmation},
+ author = {Luke O'Connor},
+ institution = {IACR},
+ number = {2008/365},
+ year = {2008},
+ month = {October},
www_tags = {selected},
- www_section = traffic,
- www_pdf_url = {http://eprint.iacr.org/2008/365.pdf},
+ www_section = traffic,
+ www_pdf_url = {http://eprint.iacr.org/2008/365.pdf},
}
@inproceedings{bauer:alpaca2008,
@@ -4118,3 +4118,106 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
www_section = comm,
}
+
+@proceedings{DBLP:conf/acns/2008,
+ editor = {Steven M. Bellovin and
+ Rosario Gennaro and
+ Angelos D. Keromytis and
+ Moti Yung},
+ booktitle = {Proceedings of the 6th International Conference on
+ Applied Cryptography and Network Security
+ (ACNS 2008), New York, NY, USA, June 3-6, 2008.
+ Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {5037},
+ year = {2008},
+ isbn = {978-3-540-68913-3},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+@proceedings{DBLP:conf/pervasive/2008,
+ editor = {Jadwiga Indulska and
+ Donald J. Patterson and
+ Tom Rodden and
+ Max Ott},
+ booktitle = {Proceedings of the 6th International Pervasive Computing
+ Conference (Pervasive
+ 2008) Sydney, Australia, May 19-22, 2008},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ volume = {5013},
+ year = {2008},
+ isbn = {978-3-540-79575-9},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+
+@inproceedings{DBLP:conf/acns/KlonowskiKL08,
+ author = {Marek Klonowski and
+ Miroslaw Kutylowski and
+ Anna Lauks},
+ title = {Repelling Detour Attack Against Onions with Re-encryption},
+ pages = {296--308},
+ ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18},
+ crossref = {DBLP:conf/acns/2008},
+ www_section = comm,
+ www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/}
+}
+
+@inproceedings{DBLP:conf/pervasive/CichonKK08,
+ author = {Jacek Cichon and
+ Marek Klonowski and
+ Miroslaw Kutylowski},
+ title = {Privacy Protection for RFID with Hidden Subset Identifiers},
+ pages = {298--314},
+ ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18},
+ crossref = {DBLP:conf/pervasive/2008},
+ www_section = misc,
+ www_publisher_url={http://www.springerlink.com/content/r754w32x71176057/}
+}
+
+@inproceedings{GTDPV-WPES08,
+ title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity},
+ author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede},
+ booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)},
+ year = {2008},
+ location = {Alexandria, VA, USA},
+ publisher = {ACM},
+ www_tags = {},
+ www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf},
+ www_section = traffic,
+}
+
+@inproceedings{FNP04,
+ title = "Efficient Private Matching and Set Intersection",
+ author = "Michael J. Freedman and Kobbi Nissim and Benny Pinkas",
+ booktitle = "Proceedings of {EUROCRYPT} 2004",
+ address = "Interlaken, Switzerland",
+ month = May,
+ year = 2004,
+ www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf},
+ www_section = misc,
+}
+
+@inproceedings{FIPR05,
+ title = "Keyword Search and Oblivious Pseudorandom Functions",
+ author = "Michael J. Freedman and Yuval Ishai and Benny Pinkas and
+Omer Reingold",
+ booktitle = "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})",
+ address = "Cambridge, MA",
+ month = Feb,
+ year = 2005,
+ www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf},
+ www_section = misc,
+}
+
+@inproceedings{fof:iptps07,
+ title = "Efficient Private Techniques for Verifying Social Proximity",
+ author = "Michael J. Freedman and Antonio Nicolosi",
+ booktitle = "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})",
+ address = "Bellevue, WA",
+ month = Feb,
+ year = "2007",
+ www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf},
+ www_section = misc,
+}