gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 3e7cb07cf19b60294aad8aa23d6f83c79473858e
parent f684f98b3405e2572c807dd4044c9b9bce8bc86c
Author: Nick Mathewson <nickm@torproject.org>
Date:   Tue, 28 Jun 2011 14:40:29 +0000

delete trailing whitespace.

svn:r365

Diffstat:
Manonbib.bib | 119++++++++++++++++++++++++++++++++++++++++++++-----------------------------------
Mvenue-checklist.txt | 8++++++++
2 files changed, 75 insertions(+), 52 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -4968,7 +4968,7 @@ Omer Reingold", www_important = {1}, www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, } - + @inproceedings{wk11-malice-vs-anon, author = {Benedikt Westermann and Dogan Kesdogan}, title = {Malice versus AN.ON: Possible Risks of Missing Replay and @@ -5014,89 +5014,89 @@ Pages = {429--438}, Booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, Year = {2009} month = {July} -www_section = {Anonymous communication}, -www_tags = {selected}, +www_section = {Anonymous communication}, +www_tags = {selected}, www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf}, } - - - - + + + + @inproceedings{LZCLCP_NDSS11, - title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, - author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, - booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, - year = {2011}, - month = {February}, + title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, + year = {2011}, + month = {February}, publisher = {Internet Society}, www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf}, - www_section = {Traffic analysis}, + www_section = {Traffic analysis}, } @inproceedings{LZPL_ESORICS10, - title = {On the Secrecy of Spread-Spectrum Flow Watermarks}, - author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, - year = {2010}, - month = {September}, + title = {On the Secrecy of Spread-Spectrum Flow Watermarks}, + author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, + year = {2010}, + month = {September}, publisher = {Springer}, - www_section = {Traffic analysis}, + www_section = {Traffic analysis}, } @inproceedings{LZCCL_DSN11, - title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks}, - author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, - booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11}, - year = {2011}, - month = {June}, - publisher = {IEEE}, - www_section = {Anonymous communication}, + title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11}, + year = {2011}, + month = {June}, + publisher = {IEEE}, + www_section = {Anonymous communication}, } @inproceedings{LCC_ICC09, - title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the International Conference on Communications - {ICC}'09}, - year = {2009}, - month = {June}, - publisher = {IEEE}, + title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the International Conference on Communications - {ICC}'09}, + year = {2009}, + month = {June}, + publisher = {IEEE}, www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf}, - www_section = {Anonymous communication}, + www_section = {Anonymous communication}, } @inproceedings{LCC_DSN08, - title = {{TCP} Covert Timing Channels: Design and Detection}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08}, - year = {2008}, - month = {June}, - publisher = {IEEE}, + title = {{TCP} Covert Timing Channels: Design and Detection}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08}, + year = {2008}, + month = {June}, + publisher = {IEEE}, www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf}, - www_section = {Anonymous communication}, + www_section = {Anonymous communication}, } @inproceedings{LCC_ESORICS07, - title = {Cloak: A Ten-fold Way for Reliable Covert Communications}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07}, - year = {2007}, - month = {September}, + title = {Cloak: A Ten-fold Way for Reliable Covert Communications}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07}, + year = {2007}, + month = {September}, publisher = {Springer}, www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf}, - www_section = {Anonymous communication}, + www_section = {Anonymous communication}, } @inproceedings{LCC_IFIPSEC07, - title = {Crafting Web Counters into Covert Channels}, - author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, - booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07}, - year = {2007}, - month = {May}, + title = {Crafting Web Counters into Covert Channels}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07}, + year = {2007}, + month = {May}, publisher = {Springer}, www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf}, - www_section = {Anonymous communication}, + www_section = {Anonymous communication}, } @INPROCEEDINGS{ReedPierce10, @@ -5121,3 +5121,18 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came www_section = {Misc} } +@InProceedings{pro-pro:pet2000, + author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, + title = {Web {MIX}es: A system for anonymous and unobservable + {I}nternet access}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + pages = {115--129}, + year = 2000, + month = {July}, + www_section = comm, + www_pdf_url = "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", + www_tags={selected}, +} diff --git a/venue-checklist.txt b/venue-checklist.txt @@ -29,3 +29,11 @@ Search: Papers that cite the original onion routing papers Search: Papers mentioning "anonymity" or "anonymous" Search: Papers mentioning "mixnet" or "mix-net" +=== UNDERSERVED CONTENT; PLEASE SUGGEST SEARCHES AND VENUES + +Private information retrieval; PIR +Anti-censorship; censorship +Location privacy +Anonymous credentials +Anonymizing data +Secure multiparty computation