commit 3e7cb07cf19b60294aad8aa23d6f83c79473858e
parent f684f98b3405e2572c807dd4044c9b9bce8bc86c
Author: Nick Mathewson <nickm@torproject.org>
Date: Tue, 28 Jun 2011 14:40:29 +0000
delete trailing whitespace.
svn:r365
Diffstat:
2 files changed, 75 insertions(+), 52 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -4968,7 +4968,7 @@ Omer Reingold",
www_important = {1},
www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
}
-
+
@inproceedings{wk11-malice-vs-anon,
author = {Benedikt Westermann and Dogan Kesdogan},
title = {Malice versus AN.ON: Possible Risks of Missing Replay and
@@ -5014,89 +5014,89 @@ Pages = {429--438},
Booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks},
Year = {2009}
month = {July}
-www_section = {Anonymous communication},
-www_tags = {selected},
+www_section = {Anonymous communication},
+www_tags = {selected},
www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf},
}
-
-
-
-
+
+
+
+
@inproceedings{LZCLCP_NDSS11,
- title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows},
- author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci},
- booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11},
- year = {2011},
- month = {February},
+ title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows},
+ author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci},
+ booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11},
+ year = {2011},
+ month = {February},
publisher = {Internet Society},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf},
- www_section = {Traffic analysis},
+ www_section = {Traffic analysis},
}
@inproceedings{LZPL_ESORICS10,
- title = {On the Secrecy of Spread-Spectrum Flow Watermarks},
- author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee},
- booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10},
- year = {2010},
- month = {September},
+ title = {On the Secrecy of Spread-Spectrum Flow Watermarks},
+ author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee},
+ booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10},
+ year = {2010},
+ month = {September},
publisher = {Springer},
- www_section = {Traffic analysis},
+ www_section = {Traffic analysis},
}
@inproceedings{LZCCL_DSN11,
- title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks},
- author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee},
- booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11},
- year = {2011},
- month = {June},
- publisher = {IEEE},
- www_section = {Anonymous communication},
+ title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks},
+ author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee},
+ booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11},
+ year = {2011},
+ month = {June},
+ publisher = {IEEE},
+ www_section = {Anonymous communication},
}
@inproceedings{LCC_ICC09,
- title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding},
- author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
- booktitle = {Proceedings of the International Conference on Communications - {ICC}'09},
- year = {2009},
- month = {June},
- publisher = {IEEE},
+ title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding},
+ author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
+ booktitle = {Proceedings of the International Conference on Communications - {ICC}'09},
+ year = {2009},
+ month = {June},
+ publisher = {IEEE},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf},
- www_section = {Anonymous communication},
+ www_section = {Anonymous communication},
}
@inproceedings{LCC_DSN08,
- title = {{TCP} Covert Timing Channels: Design and Detection},
- author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
- booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08},
- year = {2008},
- month = {June},
- publisher = {IEEE},
+ title = {{TCP} Covert Timing Channels: Design and Detection},
+ author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
+ booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08},
+ year = {2008},
+ month = {June},
+ publisher = {IEEE},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf},
- www_section = {Anonymous communication},
+ www_section = {Anonymous communication},
}
@inproceedings{LCC_ESORICS07,
- title = {Cloak: A Ten-fold Way for Reliable Covert Communications},
- author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
- booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07},
- year = {2007},
- month = {September},
+ title = {Cloak: A Ten-fold Way for Reliable Covert Communications},
+ author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
+ booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07},
+ year = {2007},
+ month = {September},
publisher = {Springer},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf},
- www_section = {Anonymous communication},
+ www_section = {Anonymous communication},
}
@inproceedings{LCC_IFIPSEC07,
- title = {Crafting Web Counters into Covert Channels},
- author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
- booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07},
- year = {2007},
- month = {May},
+ title = {Crafting Web Counters into Covert Channels},
+ author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang},
+ booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07},
+ year = {2007},
+ month = {May},
publisher = {Springer},
www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf},
- www_section = {Anonymous communication},
+ www_section = {Anonymous communication},
}
@INPROCEEDINGS{ReedPierce10,
@@ -5121,3 +5121,18 @@ www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-Came
www_section = {Misc}
}
+@InProceedings{pro-pro:pet2000,
+ author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
+ title = {Web {MIX}es: A system for anonymous and unobservable
+ {I}nternet access},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
+ editor = {H. Federrath},
+ publisher = {Springer-Verlag, LNCS 2009},
+ pages = {115--129},
+ year = 2000,
+ month = {July},
+ www_section = comm,
+ www_pdf_url = "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf",
+ www_tags={selected},
+}
diff --git a/venue-checklist.txt b/venue-checklist.txt
@@ -29,3 +29,11 @@ Search: Papers that cite the original onion routing papers
Search: Papers mentioning "anonymity" or "anonymous"
Search: Papers mentioning "mixnet" or "mix-net"
+=== UNDERSERVED CONTENT; PLEASE SUGGEST SEARCHES AND VENUES
+
+Private information retrieval; PIR
+Anti-censorship; censorship
+Location privacy
+Anonymous credentials
+Anonymizing data
+Secure multiparty computation