commit 08c952a37a6d02473e2063258a2d1b1539441371
parent 8b74e8d820050c1e11bb41a39d104a435d3e74f3
Author: Nick Mathewson <nickm@torproject.org>
Date: Mon, 11 May 2015 12:40:07 -0400
add papers, tweak a url, remove trailing ws
Diffstat:
1 file changed, 27 insertions(+), 4 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -2757,7 +2757,7 @@ Sudan},
pages = {200--217},
publisher = {Springer-Verlag},
location = {London, UK},
- www_ps_url = {http://eprint.iacr.org/1998/013.ps.gz},
+ www_ps_gz_url = {http://eprint.iacr.org/1998/013.ps.gz},
www_section = pir,
www_tags = {selected},
}
@@ -5711,7 +5711,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came
@inproceedings{oakland2012-peekaboo,
title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail},
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
- booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
+ booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_tags = {selected},
@@ -5722,7 +5722,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came
@inproceedings{oakland2012-lastor,
title = {{LASTor: A Low-Latency AS-Aware Tor Client}},
author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha},
- booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
+ booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy},
year = {2012},
month = {May},
www_tags = {selected},
@@ -7233,7 +7233,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came
month = {November},
www_pdf_url = {https://labs.verisigninc.com/assets/labs/Measuring-the-Leakage-of-Onion-at-the-Root.pdf},
www_tags = {selected},
- www_section = comm
+ www_section = comm
}
@inproceedings{wpes14-imux,
@@ -7508,3 +7508,25 @@ Financial Cryptography and Data Security ({FC} 2015)},
www_section = torperf,
www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_71.pdf",
}
+
+
+@inproceedings{SPIR,
+ title={Protecting data privacy in private information retrieval schemes},
+ author={Gertner, Yael and Ishai, Yuval and Kushilevitz, Eyal and Malkin, Tal},
+ booktitle={Proceedings of the thirtieth annual ACM symposium on Theory of computing},
+ pages={151--160},
+ year={1998},
+ organization={ACM},
+ www_section = pir,
+ www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.50.6801&rep=rep1&type=pdf}
+}
+
+@inproceedings{SalehCISS15,
+ title = {IM Session Identification by Outlier Detection in Cross-correlation Functions},
+ author = {Saad Saleh and Muhammad U. Ilyas and Khawar Khurshid and Alex X. Liu and Hayder Radha},
+ booktitle = {Proceedings of the 49th Annual Conference on Information Sciences and Systems (CISS 2015)},
+ year = {2015},
+ location = {Baltimore, MD, USA},
+ www_pdf_url = {https://www.researchgate.net/publication/274635819_IM_Session_Identification_by_Outlier_Detection_in_Cross-correlation_Functions},
+ www_section = {Anonymous communication},
+}
+\ No newline at end of file