gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 08c952a37a6d02473e2063258a2d1b1539441371
parent 8b74e8d820050c1e11bb41a39d104a435d3e74f3
Author: Nick Mathewson <nickm@torproject.org>
Date:   Mon, 11 May 2015 12:40:07 -0400

add papers, tweak a url, remove trailing ws

Diffstat:
Manonbib.bib | 31+++++++++++++++++++++++++++----
1 file changed, 27 insertions(+), 4 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -2757,7 +2757,7 @@ Sudan}, pages = {200--217}, publisher = {Springer-Verlag}, location = {London, UK}, - www_ps_url = {http://eprint.iacr.org/1998/013.ps.gz}, + www_ps_gz_url = {http://eprint.iacr.org/1998/013.ps.gz}, www_section = pir, www_tags = {selected}, } @@ -5711,7 +5711,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came @inproceedings{oakland2012-peekaboo, title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, - booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, year = {2012}, month = {May}, www_tags = {selected}, @@ -5722,7 +5722,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came @inproceedings{oakland2012-lastor, title = {{LASTor: A Low-Latency AS-Aware Tor Client}}, author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}, - booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, year = {2012}, month = {May}, www_tags = {selected}, @@ -7233,7 +7233,7 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came month = {November}, www_pdf_url = {https://labs.verisigninc.com/assets/labs/Measuring-the-Leakage-of-Onion-at-the-Root.pdf}, www_tags = {selected}, - www_section = comm + www_section = comm } @inproceedings{wpes14-imux, @@ -7508,3 +7508,25 @@ Financial Cryptography and Data Security ({FC} 2015)}, www_section = torperf, www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_71.pdf", } + + +@inproceedings{SPIR, + title={Protecting data privacy in private information retrieval schemes}, + author={Gertner, Yael and Ishai, Yuval and Kushilevitz, Eyal and Malkin, Tal}, + booktitle={Proceedings of the thirtieth annual ACM symposium on Theory of computing}, + pages={151--160}, + year={1998}, + organization={ACM}, + www_section = pir, + www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.50.6801&rep=rep1&type=pdf} +} + +@inproceedings{SalehCISS15, + title = {IM Session Identification by Outlier Detection in Cross-correlation Functions}, + author = {Saad Saleh and Muhammad U. Ilyas and Khawar Khurshid and Alex X. Liu and Hayder Radha}, + booktitle = {Proceedings of the 49th Annual Conference on Information Sciences and Systems (CISS 2015)}, + year = {2015}, + location = {Baltimore, MD, USA}, + www_pdf_url = {https://www.researchgate.net/publication/274635819_IM_Session_Identification_by_Outlier_Detection_in_Cross-correlation_Functions}, + www_section = {Anonymous communication}, +} +\ No newline at end of file