gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 053c8225a094b283ef812c8e4244acc1d32d0eb7
parent 0c40df969edaf411440ec883e238d33645168994
Author: Nick Mathewson <nickm@torproject.org>
Date:   Mon, 24 Nov 2008 18:59:10 +0000

New papers via emails from Miroslaw Kutylowski, Claudia Diaz, Michael Freedman.

svn:r301

Diffstat:
Manonbib.bib | 205+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------------------
1 file changed, 154 insertions(+), 51 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -214,7 +214,7 @@ @InProceedings{stop-and-go, author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes}, - title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open + title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System}, booktitle = {Proceedings of Information Hiding Workshop (IH 1998)}, year = {1998}, @@ -549,7 +549,7 @@ @InProceedings{raymond00, author = {Jean-Fran\c{c}ois Raymond}, title = {{Traffic Analysis: Protocols, Attacks, Design Issues, - and Open Problems}}, + and Open Problems}}, booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, year = 2000, @@ -623,7 +623,7 @@ @InProceedings{disad-free-routes, author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, title = {The disadvantages of free {MIX} routes and how to overcome - them}, + them}, booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, pages = {30--45}, @@ -845,7 +845,7 @@ @Article{realtime-mix, author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and - Birgit Pfitzmann and Michael Waidner}, + Birgit Pfitzmann and Michael Waidner}, title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, journal = {IEEE Journal on Selected Areas in Communications}, year = 1998, @@ -902,7 +902,7 @@ day = 19, www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html", www_section = comm - www_remarks = "First written in 1996 based on cypherpunks posts in 1995." + www_remarks = "First written in 1996 based on cypherpunks posts in 1995." www_tags={selected}, } @@ -912,7 +912,7 @@ howpublished = "Post to Cypherpunks mailing list", year = 1998, month = November, - day = 26, + day = 26, www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt", www_section = comm, www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html} @@ -1713,7 +1713,7 @@ @InProceedings{tor-design, author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, - title = {Tor: The Second-Generation Onion Router} + title = {Tor: The Second-Generation Onion Router} booktitle = {Proceedings of the 13th USENIX Security Symposium}, year = {2004}, month = {August}, @@ -2065,7 +2065,7 @@ title = {Privacy Vulnerabilities in Encrypted HTTP Streams}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, month = {May}, - year = {2005}, + year = {2005}, pages = {1--11}, www_section = traffic, www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf" @@ -2701,7 +2701,7 @@ Distributed Computing Systems (ICDCS)}, pages = {89--98}, year = {2001}, www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf}, - www_section = pir, + www_section = pir, www_important = {1}, www_tags = {selected} } @@ -2725,7 +2725,7 @@ Distributed Computing Systems (ICDCS)}, @inproceedings{pir, title = {Private Information Retrieval}, - author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu + author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan}, booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science}, pages = {41--50}, @@ -2857,7 +2857,7 @@ Sudan}, issue = {1}, year = {2006}, pages = {35--52}, - www_pdf_url = + www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf}, www_section = {Misc}, www_tags = {selected}, @@ -2871,7 +2871,7 @@ Sudan}, issue = {1}, year = {2006}, pages = {205--223}, - www_pdf_url = + www_pdf_url = {http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf}, www_section = {Misc}, www_tags = {selected}, @@ -3038,7 +3038,7 @@ Sudan}, @inproceedings{Liberatore:2006, Author = {Marc Liberatore and Brian Neil Levine}, Title = {{Inferring the Source of Encrypted HTTP Connections}}, - Booktitle = {Proceedings of the 13th ACM conference on Computer and + Booktitle = {Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006)}, Month = {October}, year = {2006} @@ -3065,7 +3065,7 @@ Sudan}, @inproceedings{Scarlata:2001, Author = {Vincent Scarlata and Brian Neil Levine and Clay Shields}, Title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}}, - Booktitle = {Proceedings of the IEEE International Conference on Network + Booktitle = {Proceedings of the IEEE International Conference on Network Protocols (ICNP)}, Keywords = {security; routing; peer-to-peer; anonymity}, Month = {November}, @@ -3125,12 +3125,12 @@ Sudan}, title = {Regroup-And-Go mixes to counter the $(n-1)$ attack}, journal = {Journal of Internet Research}, pages = {213--223}, - volume = {16}, + volume = {16}, year = {2006}, doi = {http://dx.doi.org/10.1108/10662240610656528}, number = {2}, publisher = {Emerald Group Publishing Limited}, - www_section = comm, + www_section = comm, www_tags={selected}, } @@ -3154,17 +3154,17 @@ Sudan}, volume = {32}, number = {Winter}, pages = {99--142}, - year = {2002}, + year = {2002}, www_section = misc, www_tags = {selected}, } @inproceedings{cooper, - title = {Preserving Privacy in a Network of Mobile Computers}, - author = {David A. Cooper and Kenneth P. Birman}, - booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy}, - year = {1995}, - month = {May}, + title = {Preserving Privacy in a Network of Mobile Computers}, + author = {David A. Cooper and Kenneth P. Birman}, + booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy}, + year = {1995}, + month = {May}, www_section = pir, www_tags = {selected}, } @@ -3400,7 +3400,7 @@ www_tags = {selected}, pages={1193--1203}, year={2005}, publisher={Elsevier}, - www_section = comm, + www_section = comm, } @article{danezis2006rfa, @@ -3448,7 +3448,7 @@ Peer-to-Peer Computing}, year={2006}, publisher={Springer}, www_section = proofs, - www_tags = {selected}, + www_tags = {selected}, } % -- end of additions from gd on 01 July 2007 -- @@ -3613,13 +3613,13 @@ Peer-to-Peer Computing}, } @misc{CDFS07, -author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati}, -editor = {T. Yu and S. Jajodia}, -booktitle = {Security in Decentralized Data Management}, -title = {k-Anonymity}, -publisher = {Springer}, -year = {2007}, -address = {Berlin Heidelberg}, +author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati}, +editor = {T. Yu and S. Jajodia}, +booktitle = {Security in Decentralized Data Management}, +title = {k-Anonymity}, +publisher = {Springer}, +year = {2007}, +address = {Berlin Heidelberg}, howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer}, www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf}, www_section = pub, @@ -3727,14 +3727,14 @@ year = {2007}, www_pdf_url = "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf" } -@ARTICLE{EdmanSY07, -title={A Combinatorial Approach to Measuring Anonymity}, -author={M. Edman and F. Sivrikaya and B. Yener}, -journal={Intelligence and Security Informatics, 2007 IEEE}, -year={2007}, -volume={}, -number={}, -pages={356--363}, +@ARTICLE{EdmanSY07, +title={A Combinatorial Approach to Measuring Anonymity}, +author={M. Edman and F. Sivrikaya and B. Yener}, +journal={Intelligence and Security Informatics, 2007 IEEE}, +year={2007}, +volume={}, +number={}, +pages={356--363}, www_section = traffic, www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", www_tags={selected}, @@ -3759,9 +3759,9 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", year = {2008}, number = {MSR-TR-2008-35}, month = {January}, - www_tags = {selected}, - www_section = {Anonymous communication}, - www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf}, + www_tags = {selected}, + www_section = {Anonymous communication}, + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf}, } @InProceedings {MarPi08, @@ -3774,7 +3774,7 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", address = {Gino-wan, Okinawa, Japan}, ISBN = {978-0-7695-3095-6}, www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf}, - www_tags = {selected}, + www_tags = {selected}, www_section = comm, author = {Igor Margasinski and Michal Pioro} } @@ -4093,16 +4093,16 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", @techreport{LOCEntropy2008, - title = {Entropy Bounds for Traffic Confirmation}, - author = {Luke O'Connor}, - institution = {IACR}, - number = {2008/365}, - year = {2008}, - month = {October}, + title = {Entropy Bounds for Traffic Confirmation}, + author = {Luke O'Connor}, + institution = {IACR}, + number = {2008/365}, + year = {2008}, + month = {October}, www_tags = {selected}, - www_section = traffic, - www_pdf_url = {http://eprint.iacr.org/2008/365.pdf}, + www_section = traffic, + www_pdf_url = {http://eprint.iacr.org/2008/365.pdf}, } @inproceedings{bauer:alpaca2008, @@ -4118,3 +4118,106 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", www_section = comm, } + +@proceedings{DBLP:conf/acns/2008, + editor = {Steven M. Bellovin and + Rosario Gennaro and + Angelos D. Keromytis and + Moti Yung}, + booktitle = {Proceedings of the 6th International Conference on + Applied Cryptography and Network Security + (ACNS 2008), New York, NY, USA, June 3-6, 2008. + Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {5037}, + year = {2008}, + isbn = {978-3-540-68913-3}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@proceedings{DBLP:conf/pervasive/2008, + editor = {Jadwiga Indulska and + Donald J. Patterson and + Tom Rodden and + Max Ott}, + booktitle = {Proceedings of the 6th International Pervasive Computing + Conference (Pervasive + 2008) Sydney, Australia, May 19-22, 2008}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5013}, + year = {2008}, + isbn = {978-3-540-79575-9}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +@inproceedings{DBLP:conf/acns/KlonowskiKL08, + author = {Marek Klonowski and + Miroslaw Kutylowski and + Anna Lauks}, + title = {Repelling Detour Attack Against Onions with Re-encryption}, + pages = {296--308}, + ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18}, + crossref = {DBLP:conf/acns/2008}, + www_section = comm, + www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/} +} + +@inproceedings{DBLP:conf/pervasive/CichonKK08, + author = {Jacek Cichon and + Marek Klonowski and + Miroslaw Kutylowski}, + title = {Privacy Protection for RFID with Hidden Subset Identifiers}, + pages = {298--314}, + ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18}, + crossref = {DBLP:conf/pervasive/2008}, + www_section = misc, + www_publisher_url={http://www.springerlink.com/content/r754w32x71176057/} +} + +@inproceedings{GTDPV-WPES08, + title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity}, + author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)}, + year = {2008}, + location = {Alexandria, VA, USA}, + publisher = {ACM}, + www_tags = {}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf}, + www_section = traffic, +} + +@inproceedings{FNP04, + title = "Efficient Private Matching and Set Intersection", + author = "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", + booktitle = "Proceedings of {EUROCRYPT} 2004", + address = "Interlaken, Switzerland", + month = May, + year = 2004, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf}, + www_section = misc, +} + +@inproceedings{FIPR05, + title = "Keyword Search and Oblivious Pseudorandom Functions", + author = "Michael J. Freedman and Yuval Ishai and Benny Pinkas and +Omer Reingold", + booktitle = "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", + address = "Cambridge, MA", + month = Feb, + year = 2005, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf}, + www_section = misc, +} + +@inproceedings{fof:iptps07, + title = "Efficient Private Techniques for Verifying Social Proximity", + author = "Michael J. Freedman and Antonio Nicolosi", + booktitle = "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", + address = "Bellevue, WA", + month = Feb, + year = "2007", + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf}, + www_section = misc, +}