commit 3f4551b2cb0b02ed9180770e5fe3141d30e5a884
parent 4189989048aca2fbd57996dcf285f2b5957f9975
Author: Roger Dingledine <arma@torproject.org>
Date: Thu, 22 May 2003 18:31:33 +0000
get the live alpha website up.
svn:r28
Diffstat:
| M | TODO | | | 23 | ++++++++++++++--------- |
| M | anonbib.bib | | | 778 | +++++++++++++++++++++++++++++++++++++------------------------------------------ |
2 files changed, 379 insertions(+), 422 deletions(-)
diff --git a/TODO b/TODO
@@ -19,12 +19,18 @@ First usable python version:
o "Important" note.
o Remarks
-Later:
+Next:
- Know about @book
- - Maybe uncrossref in tmp.bib
- - Maybe pull important papers to the start of their sections?
- - Clean \{}~ when going from note to url; add \{}~ when making
- note from url.
- - Look for urls in wherepublished.
- - Forgive newlines in wherepublished, note.
- - "Systems, Zero Knowledge"?
-\ No newline at end of file
+ - Maybe uncrossref in tmp.bib
+ - Maybe pull important papers to the start of their sections?
+ - Clean \{}~ when going from note to url; add \{}~ when making
+ note from url.
+ - Also clean \_ to _ and back
+ - Look for urls in wherepublished.
+ - Forgive newlines in wherepublished, note.
+ - "Systems, Zero Knowledge"?
+ - When sorting by author, is Paul Syverson different from Paul
+ F. Syverson?
+ - What the heck is the algorithm for sorting within a year,
+ when sorting by date? What should it be?
+
diff --git a/anonbib.bib b/anonbib.bib
@@ -12,7 +12,10 @@
@string{stream = "Stream-based anonymity"}
@string{traffic = "Traffic analysis"}
@string{pub = "Anonymous publication"}
+@string{proofs = "Robustness, Shuffles"}
@string{nym = "Pseudonymity"}
+@string{economics = "Economics"}
+@string{unsorted = "Unsorted"}
%% Journals and proceedings: used by reference
@@ -37,21 +40,23 @@
www_section = mix,
www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt},
www_important = {1},
- www_remarks = {Chaum's paper that has all the big ideas.}
+% www_remarks = {Chaum's paper that has all the big ideas.}
}
-@Misc{mixminion-spec,
- author = {George Danezis and Roger Dingledine and Nick Mathewson},
- title = {Type {III} ({M}ixminion) Mix Protocol Specification},
- howpublished = {},
- www_section = mix,
- www_txt_url = "http://mixminion.net/minion-spec.txt",
+@ARTICLE{chaum-dc,
+ author = {David Chaum},
+ title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability},
+ journal = {Journal of Cryptology},
+ year = {1988},
+ volume = {1},
+ pages = {65--75},
+ www_section = unsorted,
}
@InProceedings{BM:mixencrypt,
author = {Bodo M{\"o}ller},
title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
- booktitle = {{CT-RSA} 2003},
+ booktitle = {Proceedings of {CT-RSA} 2003},
publisher = {Springer-Verlag, LNCS 2612},
year = 2003,
www_section = mix,
@@ -61,7 +66,9 @@
@Misc{mixmaster-spec,
author = {Ulf M\"oller and Lance Cottrell},
title = {Mixmaster {P}rotocol --- {V}ersion 2},
- howpublished = {Unfinished draft, January 2000},
+ howpublished = {Unfinished draft},
+ year = 2000,
+ month = Jan,
www_section = mix,
www_txt_url = "http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol-00.txt",
}
@@ -70,38 +77,38 @@
author = {Masayuki Abe},
title = {Universally Verifiable {MIX} With Verification Work Independent of
The Number of {MIX} Servers},
- booktitle = {{EUROCRYPT} 1998},
+ booktitle = {Proceedings of {EUROCRYPT} 1998},
year = {1998},
publisher = {Springer-Verlag, LNCS 1403},
- www_section = mix,
+ www_section = proofs,
}
@InProceedings{desmedt,
author = {Yvo Desmedt and Kaoru Kurosawa},
title = {How To Break a Practical {MIX} and Design a New One},
- booktitle = {{EUROCRYPT} 2000},
+ booktitle = {Proceedings of {EUROCRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1803},
- www_section = mix,
+ www_section = proofs,
www_html_url = "http://citeseer.nj.nec.com/447709.html",
}
@InProceedings{hybrid-mix,
author = {Miyaku Ohkubo and Masayuki Abe},
title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
- booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
+ booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
- www_section = mix,
+ www_section = proofs,
}
@InProceedings{jakobsson-optimally,
author = "Markus Jakobsson and Ari Juels",
title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
- booktitle = {Principles of Distributed Computing - {PODC} '01},
+ booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01},
year = "2001",
publisher = {ACM Press},
- www_section = mix,
+ www_section = proofs,
www_html_url = "http://citeseer.nj.nec.com/492015.html",
}
@@ -109,31 +116,46 @@
author = {Dogan Kesdogan and M. Egner and T. B\"uschkes},
title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
System},
- booktitle = {Information Hiding (IH 1998)},
+ booktitle = {Proceedings of Information Hiding Workshop (IH 1998)},
year = {1998},
publisher = {Springer-Verlag, LNCS 1525},
www_section = mix,
www_pdf_url = "http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf",
+ www_important = {1},
}
@InProceedings{flash-mix,
author = {Markus Jakobsson},
title = {Flash {M}ixing},
- booktitle = {Principles of Distributed Computing - {PODC} '99},
+ booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99},
year = {1999},
publisher = {ACM Press},
- www_section = mix,
- www_html_url = "http://citeseer.nj.nec.com/jakobsson99flash.html",
+ www_section = proofs,
+% www_html_url = "http://citeseer.nj.nec.com/jakobsson99flash.html",
+ www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf",
+ www_important = {1},
}
@InProceedings{babel,
- author = {C. Gulcu and G. Tsudik},
+ author = {Ceki Gülcü and Gene Tsudik},
title = {Mixing {E}-mail With {B}abel},
- booktitle = {Network and Distributed Security Symposium - {NDSS} '96},
+ booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
year = {1996},
publisher = {IEEE},
www_section = mix,
www_html_url = "http://citeseer.nj.nec.com/2254.html",
+ www_important = {1},
+}
+
+@InProceedings{mixminion,
+ author = {George Danezis and Roger Dingledine and Nick Mathewson},
+ title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}},
+ booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
+ year = 2003,
+ month = may,
+ www_important = {1},
+ www_section = mix,
+ www_pdf_url = "http://mixminion.net/minion-design.pdf",
}
@Article{remailer-history,
@@ -148,20 +170,12 @@
www_html_url = "http://www.firstmonday.dk/issues/issue2/remailers/",
}
-@Misc{remailer-history-old,
- author = {Tim May},
- title = {Description of early remailer history},
- howpublished = {Archived e-mail}
- www_section = mix,
- www_html_url = "http://www.inet-one.com/cypherpunks/dir.1996.08.29-1996.09.04/msg00431.html",
-}
-
@InProceedings{mix-acc,
author = {Roger Dingledine and Michael J. Freedman and David
Hopwood and David Molnar},
title = {{A Reputation System to Increase MIX-net
Reliability}},
- booktitle = {Information Hiding (IH 2001)},
+ booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
pages = {126--141},
year = 2001,
editor = {Ira S. Moskowitz},
@@ -174,7 +188,7 @@
@InProceedings{casc-rep,
author = {Roger Dingledine and Paul Syverson},
title = {{Reliable MIX Cascade Networks through Reputation}},
- booktitle = {Financial Cryptography (FC '02)},
+ booktitle = {Proceedings of Financial Cryptography (FC '02)},
year = 2002,
editor = {Matt Blaze},
publisher = {Springer-Verlag, LNCS (forthcoming)},
@@ -188,18 +202,18 @@
@InProceedings{pfitzmann90how,
author = "Birgit Pfitzmann and Andreas Pfitzmann",
title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
- booktitle = {Eurocrypt 89},
+ booktitle = {Proceedings of {EUROCRYPT} 1989},
publisher = {Springer-Verlag, LNCS 434},
year = {1990},
www_section = mixattacks,
- www_abstract_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90",
+% www_abstract_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90",
www_ps_gz_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90",
}
@InProceedings{back01,
author = {Adam Back and Ulf M\"oller and Anton Stiglic},
title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
- booktitle = {Information Hiding (IH 2001)},
+ booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
pages = {245--257},
year = 2001,
editor = {Ira S. Moskowitz},
@@ -208,20 +222,21 @@
www_pdf_url = "http://www.cypherspace.org/adam/pubs/traffic.pdf",
}
-@Misc{mixmaster-attacks,
- author = {Lance Cottrell},
- title = {Mixmaster and Remailer Attacks},
- www_section = mixattacks,
- www_html_url = {http://www.obscura.com/~loki/remailer/remailer-essay.html},
-}
+%@Misc{mixmaster-attacks,
+% author = {Lance Cottrell},
+% title = {Mixmaster and Remailer Attacks},
+% www_section = mixattacks,
+% www_html_url = {http://www.obscura.com/~loki/remailer/remailer-essay.html},
+% www_important = {1},
+%}
@InProceedings{mitkuro,
author = {M. Mitomo and K. Kurosawa},
title = {{Attack for Flash MIX}},
- booktitle = {{ASIACRYPT} 2000},
+ booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
publisher = {Springer-Verlag, LNCS 1976},
- www_section = mixattacks,
+ www_section = proofs,
www_html_url = "http://citeseer.nj.nec.com/450148.html",
}
@@ -231,7 +246,7 @@
author = {David Mazi\`eres and M. Frans Kaashoek},
title = {{The Design, Implementation and Operation of an Email
Pseudonym Server}},
- booktitle = {$5^{th}$ ACM Conference on Computer and
+ booktitle = {Proceedings of the 5th ACM Conference on Computer and
Communications Security (CCS'98)},
year = 1998,
publisher = {ACM Press},
@@ -258,34 +273,34 @@
@InProceedings{rackoff93cryptographic,
author = {Charles Rackoff and Daniel R. Simon},
title = {Cryptographic Defense Against Traffic Analysis},
- booktitle = {{ACM} Symposium on Theory of Computing},
+ booktitle = {Proceedings of {ACM} Symposium on Theory of Computing},
pages = {672--681},
year = {1993},
www_section = traffic,
- www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm",
+% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm",
+ www_important = {1},
}
-
-
@InProceedings{raymond00,
author = {J. F. Raymond},
title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
and Open Problems}},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
year = 2000,
month = {July},
pages = {10-29},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = traffic,
+ www_important = {1},
}
@InProceedings{trickle02,
author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
title = {From a Trickle to a Flood: Active Attacks on Several
Mix Types},
- booktitle = {Information Hiding (IH 2002)},
+ booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
year = {2002},
editor = {Fabien Petitcolas},
publisher = {Springer-Verlag, LNCS (forthcoming)},
@@ -297,7 +312,7 @@
@InProceedings{langos02,
author = {Oliver Berthold and Heinrich Langos},
title = {Dummy Traffic Against Long Term Intersection Attacks},
- booktitle = {Privacy Enhancing Technologies (PET 2002)},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
year = {2002},
editor = {Roger Dingledine and Paul Syverson},
publisher = {Springer-Verlag, LNCS 2482},
@@ -308,14 +323,16 @@
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
title = {The disadvantages of free {MIX} routes and how to overcome
them},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
pages = {30--45},
+ month = {July},
year = 2000,
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = traffic,
- www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf",
+ www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf"
+ www_important = {1},
}
%% Section: Anonymous publication
@@ -323,43 +340,34 @@
@InProceedings{freehaven-berk,
author = {Roger Dingledine and Michael J. Freedman and David Molnar},
title = {The Free Haven Project: Distributed Anonymous Storage Service},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = pub,
www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps"
+ www_important = {1},
}
@InProceedings{freenet,
author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval
System},
- booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
pages = {46--66},
year = {2000},
www_section = pub,
www_html_url = "http://citeseer.nj.nec.com/clarke00freenet.html",
}
-@InProceedings{garay97secure,
- author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
- title = {Secure distributed storage and retrieval},
- booktitle = {11th International Workshop, WDAG '97},
- pages = {275--289},
- year = {1997},
- publisher = {Springer-Verlag, LNCS 1320},
- www_section = pub,
- www_html_url = "http://citeseer.nj.nec.com/garay97secure.html",
-}
-
@InProceedings{publius,
author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
title = {Publius: {A} robust, tamper-evident, censorship-resistant and
source-anonymous web publishing system},
- booktitle = {Proc. 9th USENIX Security Symposium},
+ booktitle = {Proceedings of the 9th USENIX Security Symposium},
pages = {59--72},
year = {2000},
month = {August},
@@ -387,35 +395,37 @@
}
@InProceedings{syverson_2000,
- author = {Paul F. Syverson and Gene Tsudik and Michael G. Reed
- and Carl E. Landwehr},
+ author = {Paul Syverson and Gene Tsudik and Michael Reed
+ and Carl Landwehr},
title = {Towards an Analysis of Onion Routing Security},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
year = 2000,
month = {July},
pages = {96--114},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = stream,
- www_html_url = "http://citeseer.nj.nec.com/syverson00towards.html"
+ www_html_url = "http://citeseer.nj.nec.com/syverson00towards.html"
+ www_important = {1},
}
@InProceedings{web-mix,
author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
title = {Web {MIX}es: A system for anonymous and unobservable
{I}nternet access},
- booktitle = {Designing Privacy Enhancing Technologies: Workshop
- on Design Issue in Anonymity and Unobservability},
+ booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+ on Design Issues in Anonymity and Unobservability},
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
pages = {115--129},
year = 2000,
www_section = stream,
+ www_pdf_url = "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf",
}
@Article{crowds,
- author = {Michael K. Reiter and Aviel D. Rubin},
+ author = {Michael Reiter and Aviel Rubin},
title = {Crowds: Anonymity for Web Transactions},
journal = {{DIMACS} Technical Report},
volume = {97},
@@ -424,25 +434,38 @@
year = {1997},
www_section = stream,
www_html_url = "http://citeseer.nj.nec.com/284739.html",
+ www_important = {1},
}
-@Misc{freedom,
- author = {Zero Knowledge Systems},
- title = {Freedom Version 2 White Papers},
- www_section = stream,
- www_html_url = {http://www.freedom.net/info/whitepapers/},
+@InProceedings{tarzan:ccs02,
+ title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer",
+ author = "Michael J. Freedman and Robert Morris",
+ booktitle = "Proceedings of the 9th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS 2002})",
+ address = "Washington, D.C."
+ month = "November",
+ year = "2002"
+ www_section = stream,
+ www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf",
+ www_important = {1},
}
-@Misc{realtime-mix,
+%@Misc{freedom,
+% author = {Zero Knowledge Systems},
+% title = {Freedom Version 2 White Papers},
+% www_section = stream,
+% www_html_url = {http://www.freedom.net/info/whitepapers/},
+%}
+
+@Article{realtime-mix,
author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
Birgit Pfitzmann and Michael Waidner},
title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
- howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
+ journal = {IEEE Journal on Selected Areas in Communications},
+ year = 1998,
www_section = stream,
www_html_url = "http://www.zurich.ibm.com/security/publications/1998.html",
}
-
%% Section: Misc
@inproceedings{rao-pseudonymity,
@@ -454,34 +477,15 @@
publisher = {USENIX},
pages = "85--96",
www_pdf_url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf",
-}
-
-@misc{echolot,
- author = {Peter Palfrader},
- title = {Echolot: a pinger for anonymous remailers},
- www_html_url = "http://www.palfrader.org/echolot/",
-}
-
-@Misc{hashcash,
- author = {Adam Back},
- title = {Hash cash},
- www_html_url = http://www.cypherspace.org/~adam/hashcash/",
-}
-
-@InProceedings{oreilly-acc,
- author = {Roger Dingledine and Michael J. Freedman and David Molnar},
- title = {Accountability},
- booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
- Technology},
- year = {2001},
- publisher = {O'Reilly and Associates},
+ www_section = nym,
}
@InProceedings{SK,
author = {Joe Kilian and Kazue Sako},
title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
the Implementation of a Voting Booth},
- booktitle = {EUROCRYPT '95},
+ booktitle = {Proceedings of {EUROCRYPT} 1995},
+ www_section = proofs,
year = {1995},
publisher = {Springer-Verlag},
}
@@ -489,328 +493,276 @@
@Misc{rprocess,
author = {RProcess},
title = {Selective Denial of Service Attacks},
- www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html",
+ www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html",
+ www_section = mixattacks,
+ month = Sep,
+ year = 1999,
+ howpublished = "Usenet post",
}
+@InProceedings{PIK,
+ author = {C. Park and K. Itoh and K. Kurosawa},
+ title = {Efficient anonymous channel and all/nothing election scheme},
+ booktitle = {Proceedings of {EUROCRYPT} 1993},
+ year = {1993}
+ pages = {248--259},
+ publisher = {Springer-Verlag, LNCS 765},
+ www_section = proofs,
+}
+
+%@PhdThesis{malkin-thesis,
+% author = {Tal Malkin},
+% school = {{MIT}},
+% title = {Private {I}nformation {R}etrieval},
+% year = {2000},
+% www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html",
+%}
+
+@InProceedings{shuffle,
+ author = {C. Andrew Neff},
+ title = {A Verifiable Secret Shuffle and its Application to E-Voting},
+ booktitle = {Proceedings of 8th ACM Conference on Computer and Communications
+ Security (CCS-8)},
+ pages = {116--125},
+ year = 2001,
+ editor = {P. Samarati},
+ month = {November},
+ publisher = {ACM Press},
+ note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
+ technicaldocs/shuffle.pdf}},
+ www_section = proofs,
+}
-@misc{neochaum,
- author = {Tim May},
- title = {Payment mixes for anonymity},
- howpublished = {Archived e-mail}
- www_html_url = "http://www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html",
+@InProceedings{PShuffle,
+ author = {Jun Furukawa and Kazue Sako},
+ title = {An Efficient Scheme for Proving a Shuffle},
+ editor = {Joe Kilian},
+ booktitle = {Proceedings of {CRYPTO} 2001},
+ year = {2001},
+ publisher = {Springer-Verlag, LNCS 2139},
+ www_section = proofs,
}
-@misc{pidaho,
- author = {Joel McNamara},
- title = {{P}rivate {I}daho},
- www_html_url = "http://www.eskimo.com/~joelm/pi.html",
+@InProceedings{econymics,
+ author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
+ title = {{On the Economics of Anonymity}},
+ booktitle = {Proceedings of Financial Cryptography (FC '03)},
+ year = 2003,
+ editor = {Jean Camp and Rebecca Wright},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = economics,
+ www_pdf_url = "http://freehaven.net/doc/fc03/econymics.pdf",
+ www_important = {1},
}
-@misc{potato,
- author = {RProcess},
- title = {{P}otato {S}oftware},
- www_html_url = "http://www.skuz.net/potatoware/",
+@article{cheap-pseudonyms,
+ author = {Eric Friedman and Paul Resnick},
+ title = {The social cost of cheap pseudonyms},
+ journal = {Journal of Economics and Management Strategy},
+ year = "2001",
+ volume = "10",
+ number = "2",
+ pages = "173-199",
+ www_section = economics,
+ www_html_url = "http://www.si.umich.edu/~presnick/papers/identifiers/",
+}
+
+@InProceedings{Diaz02,
+ author = {Claudia Diaz and Stefaan Seys and Joris Claessens
+ and Bart Preneel},
+ title = {Towards measuring anonymity},
+ booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
+ year = 2002,
+ editor = {Roger Dingledine and Paul Syverson},
+ publisher = {Springer-Verlag, LNCS 2482}
+ www_section = traffic,
+ www_important = {1},
+ www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/tmAnon.ps.gz",
}
-@misc{helsingius,
- author = {J. Helsingius},
- title = {Johan Helsingius closes his Internet remailer}
- howpublished = {Press Release},
- month = aug,
- year = {1996},
- www_html_url = "http://www.penet.fi/press-english.html",
+@InProceedings{Serj02,
+ author = {Andrei Serjantov and George Danezis},
+ title = {Towards an Information Theoretic Metric for Anonymity},
+ booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)},
+ year = 2002,
+ editor = {Roger Dingledine and Paul Syverson},
+ publisher = {Springer-Verlag, LNCS 2482}
+ www_section = traffic,
+ www_important = {1},
+ www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps",
+}
+
+@InProceedings{sybil,
+ author = "John Douceur",
+ title = {{The Sybil Attack}},
+ booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
+ month = Mar,
+ year = 2002,
+ www_section = mixattacks,
+ www_important = {1},
+ www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf",
+}
+
+@InProceedings{Serj02-iptps,
+ author = {Andrei Serjantov},
+ title = {Anonymizing censorship resistant systems},
+ booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
+ month = Mar,
+ year = 2002,
+ www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/120.pdf",
+ www_section = mixattacks,
+}
+
+@InProceedings{Freedman-iptps,
+ author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris},
+ title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
+ booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
+ month = Mar,
+ year = 2002,
+ www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf",
+ www_section = mix,
}
-@InProceedings{PIK,
- author = {C. Park and K. Itoh and K. Kurosawa},
- title = {Efficient anonymous channel and all/nothing election scheme},
- booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
- year = {1993}
- pages = {248--259},
- publisher = {Springer-Verlag, LNCS 765},
+@InProceedings{gup,
+ author = {Stuart Stubblebine and Paul Syverson},
+ title = {Authentic Attributes with Fine-Grained Anonymity Protection},
+ booktitle = {Proceedings of Financial Cryptography (FC 2000)},
+ pages = {276--294},
+ year = 2001,
+ editor = {Yair Frankel},
+ publisher = {Springer-Verlag, LNCS 1962}
+ www_section = unsorted,
}
-@Article{riordan-schneier,
- author = {James Riordan and Bruce Schneier},
- title = {A Certified E-mail Protocol with No Trusted Third Party},
- journal = {13th Annual Computer Security Applications Conference},
- month = {December},
- year = {1998},
- www_html_url = "http://www.counterpane.com/certified-email.html",
+@InProceedings{pet2002-kesdogan,
+ author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
+ title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
+ year = {2002},
+ editor = {Roger Dingledine and Paul Syverson},
+ publisher = {Springer-Verlag, LNCS 2482},
+ www_section = mix,
}
-@Misc{recovery,
- author = {Miguel Castro and Barbara Liskov},
- title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
- www_pdf_url = "http://www.pmg.lcs.mit.edu/~castro/application/recovery.pdf",
+@InProceedings{pet2003-danezis,
+ author = {George Danezis},
+ title = {Mix-networks with Restricted Routes},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = traffic,
+ www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf",
}
-@Misc{advogato,
- author = {Raph Levien},
- title = {Advogato's Trust Metric},
- www_html_url = "http://www.advogato.org/trust-metric.html",
+@InProceedings{pet2003-diaz,
+ author = {Claudia Diaz and Andrei Serjantov},
+ title = {Generalising Mixes},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = mix,
+ www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/DS03.ps.gz",
+ www_important = {1},
}
-@PhdThesis{malkin-thesis,
- author = {Tal Malkin},
- school = {{MIT}},
- title = {Private {I}nformation {R}etrieval},
- year = {2000},
- www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html",
+@InProceedings{pet2003-steinbrecher,
+ author = {Sandra Steinbrecher and Stefan Köpsell},
+ title = {Modelling Unlinkability},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = unsorted,
+ www_pdf_url = "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf",
}
-@InProceedings{zhou96certified,
- author = {Zhou and Gollmann},
- title = {Certified Electronic Mail},
- booktitle = {{ESORICS: European Symposium on Research in Computer
- Security}},
- publisher = {Springer-Verlag, LNCS 1146},
- year = {1996},
- www_html_url = "http://citeseer.nj.nec.com/zhou96certified.html",
-}
-
-%% These have little to do with anonymity, so I'm commenting them out.
-%%
-%% @InProceedings{BEAR-LIONESS,
-%% author = {Ross Anderson and Eli Biham},
-%% title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
-%% booktitle = {International Workshop on Fast Software Encryption},
-%% year = {1996},
-%% publisher = {Springer-Verlag},
-%% note = {\url{http://citeseer.nj.nec.com/anderson96two.html}},
-%% }
-%%
-%% @Misc{SPC,
-%% author = {Daniel Bleichenbacher and Anand Desai},
-%% title = {A Construction of a Super-Pseudorandom Cipher},
-%% howpublished = {Manuscript},
-%% }
-%%
-%% % Would a more recent reference for SPRPs be more useful?
-%% @Article{sprp,
-%% author = {Michael Luby and Charles Rackoff},
-%% title = {How to Construct Pseudorandom Permutations from
-%% Pseudorandom Functions},
-%% journal = {SIAM Journal on Computing},
-%% year = {1988},
-%% volume = {17},
-%% number = {2},
-%% pages = {373--386},
-%% }
-%%
-%% @Misc{TLS,
-%% author = {T. Dierks and C. Allen},
-%% title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
-%% howpublished = {IETF RFC 2246},
-%% month = {January},
-%% year = {1999},
-%% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
-%% }
-%%
-%% @Misc{SMTP,
-%% author = {J. Postel},
-%% title = {Simple {M}ail {T}ransfer {P}rotocol},
-%% howpublished = {IETF RFC 2821 (also STD0010)},
-%% month = {April},
-%% year = {2001},
-%% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
-%% }
-%%
-%% @Misc{IMAP,
-%% author = {M. Crispin},
-%% title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
-%% howpublished = {IETF RFC 2060},
-%% month = {December},
-%% year = {1996},
-%% note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
-%% }
-%%
-%% @Misc{POP3,
-%% author = {J. Myers and M. Rose},
-%% title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
-%% howpublished = {IETF RFC 1939 (also STD0053)},
-%% month = {May},
-%% year = {1996},
-%% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
-%% }
-%%
-%% @InProceedings{shuffle,
-%% author = {C. Andrew Neff},
-%% title = {A Verifiable Secret Shuffle and its Application to E-Voting},
-%% booktitle = {8th ACM Conference on Computer and Communications
-%% Security (CCS-8)},
-%% pages = {116--125},
-%% year = 2001,
-%% editor = {P. Samarati},
-%% month = {November},
-%% publisher = {ACM Press},
-%% note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
-%% technicaldocs/shuffle.pdf}},
-%% }
-%%
-%% @InProceedings{dolev91,
-%% author = {Danny Dolev and Cynthia Dwork and Moni Naor},
-%% title = {Non-Malleable Cryptography},
-%% booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
-%% pages = {542--552},
-%% year = 1991,
-%% note = {Updated version at
-%% \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
-%% }
-%%
-%% @TechReport{rsw96,
-%% author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
-%% title = {Time-lock puzzles and timed-release Crypto},
-%% year = 1996,
-%% type = {MIT LCS technical memo},
-%% number = {MIT/LCS/TR-684},
-%% month = {February},
-%% note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
-%% }
-%%
-%% @InProceedings{boneh00,
-%% author = {Dan Boneh and Moni Naor},
-%% title = {Timed Commitments},
-%% booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
-%% pages = {236--254},
-%% year = 2000,
-%% publisher = {Springer-Verlag, LNCS 1880},
-%% note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
-%% }
-%%
-%% @InProceedings{goldschlag98,
-%% author = {David M. Goldschlag and Stuart G. Stubblebine},
-%% title = {Publicly Verifiable Lotteries: Applications of
-%% Delaying Functions},
-%% booktitle = {Financial Cryptography, FC'98},
-%% pages = {214--226},
-%% year = 1998,
-%% publisher = {Springer-Verlag, LNCS 1465},
-%% note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
-%% }
-%%
-%% @InProceedings{syverson98,
-%% author = {Paul Syverson},
-%% title = {Weakly Secret Bit Commitment: Applications to
-%% Lotteries and Fair Exchange},
-%% booktitle = {Computer Security Foundations Workshop (CSFW11)},
-%% pages = {2--13},
-%% year = 1998,
-%% address = {Rockport Massachusetts},
-%% month = {June},
-%% publisher = {IEEE CS Press},
-%% note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
-%% }
-%%
-%% @Misc{shoup-iso,
-%% author = {Victor Shoup},
-%% title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
-%% note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
-%% }
-%%
-%% @Misc{shoup-oaep,
-%% author = {Victor Shoup},
-%% title = {{OAEP} Reconsidered},
-%% howpublished = {{IACR} e-print 2000/060},
-%% note = {\newline \url{http://eprint.iacr.org/2000/060/}},
-%% }
-%%
-%% @Misc{oaep-still-alive,
-%% author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
-%% title = {{RSA}-{OAEP} is Still Alive!},
-%% howpublished = {{IACR} e-print 2000/061},
-%% note = {\newline \url{http://eprint.iacr.org/2000/061/}},
-%% }
-%%
-%% @Article{mitzenm-loss,
-%% author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
-%% title = {Computational Complexity of Loss Networks},
-%% journal = {Theoretical Computer Science},
-%% year = {1994},
-%% volume = {125},
-%% pages = {45-59},
-%% note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
-%% }
-%%
-%% @InProceedings{han,
-%% author = {Yongfei Han},
-%% title = {Investigation of non-repudiation protocols},
-%% booktitle = {ACISP '96},
-%% year = {1996},
-%% publisher = {Springer-Verlag},
-%% }
-%%
-%% @InProceedings{PShuffle,
-%% author = {Jun Furukawa and Kazue Sako},
-%% title = {An Efficient Scheme for Proving a Shuffle},
-%% editor = {Joe Kilian},
-%% booktitle = {CRYPTO 2001},
-%% year = {2001},
-%% publisher = {Springer-Verlag, LNCS 2139},
-%% }
-%%
-%% @InProceedings{OAEP,
-%% author = {M. Bellare and P. Rogaway},
-%% year = {1994},
-%% booktitle = {EUROCRYPT '94},
-%% title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
-%% {RSA}},
-%% publisher = {Springer-Verlag},
-%% note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
-%% }
-%%
-%% @Misc{timmay,
-%% author = {Tim May},
-%% title = {Cyphernomicon},
-%% note = {\newline \url{http://www2.pro-ns.net/~crypto/cyphernomicon.html}},
-%% }
-%%
-%% @Misc{pgpfaq,
-%% key = {PGP},
-%% title = {{PGP} {FAQ}},
-%% note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
-%% }
-%%
-%% @Misc{rabin-ida,
-%% author = {Michael O. Rabin},
-%% title = {Efficient Dispersal of Information for security, load balancing,
-%% and fault tolerance},
-%% booktitle = {Journal of the ACM},
-%% year = {1989},
-%% volume = {36},
-%% number = {2},
-%% series = {335--348},
-%% month = {April},
-%% }
-%%
-%%
-%% @Article{raghavan87randomized,
-%% author = {P. Raghavan and C. Thompson},
-%% title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
-%% journal = {Combinatorica},
-%% volume = {7},
-%% pages = {365--374},
-%% year = {1987},
-%% }
-%%
-%% @InProceedings{leighton91fast,
-%% author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
-%% Clifford Stein and Eva Tardos and Spyros Tragoudas},
-%% title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
-%% booktitle = {{ACM} Symposium on Theory of Computing},
-%% pages = {101-111},
-%% year = {1991},
-%% note = {\newline \url{http://citeseer.nj.nec.com/91073.html}},
-%% }
-%%
-%% @Misc{pk-relations,
-%% author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
-%% title = {Relations Among Notions of Security for Public-Key Encryption
-%% Schemes},
-%% howpublished = {
-%% Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
-%% Springer-Verlag, 1998.
-%% Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
-%% }
-%%
-%%
+@InProceedings{pet2003-newman,
+ author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov},
+ title = {Metrics for Traffic Analysis Prevention},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = traffic,
+ www_ps_url = "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps",
+}
+
+@InProceedings{pet2003-nguyen,
+ author = {Lan Nguyen and Rei Safavi-Naini},
+ title = {Breaking and Mending Resilient Mix-nets},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = proofs,
+}
+
+@InProceedings{pet2003-clayton,
+ author = {Richard Clayton},
+ title = {Improving Onion Notation},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = unsorted,
+ www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/onions.pdf",
+}
+
+@InProceedings{pet2003-bennett,
+ author = {Krista Bennett and Christian Grothoff},
+ title = {{GAP} -- Practical anonymous networking},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = pub,
+ www_ps_url = "http://www.ovmj.org/GNUnet/download/aff.ps",
+}
+
+@InProceedings{pet2003-kugler,
+ author = {Dennis Kügler},
+ title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}},
+ booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
+ year = {2003},
+ editor = {Roger Dingledine},
+ publisher = {Springer-Verlag, LNCS (forthcoming)},
+ www_section = pub,
+ www_pdf_url = "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf",
+}
+
+@InProceedings{waldman01tangler,
+ author = "Marc Waldman and David Mazi`eres",
+ title = "Tangler: a censorship-resistant publishing system based on document entanglements",
+ booktitle = {Proceedings of the 8th ACM Conference on Computer and
+ Communications Security (CCS'01)},
+ pages = "126-135",
+ year = "2001",
+ www_section = pub,
+ www_important = {1},
+ www_ps_url = "http://www.cs.nyu.edu/~waldman/tangler.ps",
+}
+
+@InProceedings{anderson96eternity,
+ author = "Ross Anderson",
+ title = "The Eternity Service",
+ booktitle = {Proceedings of Pragocrypt '96},
+ year = "1996",
+ www_section = pub,
+ www_important = {1},
+ www_html_url = "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html",
+}
+
+@InProceedings{strong-eternity,
+ author = {Tonda Benes},
+ title = {The Strong Eternity Service},
+ booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
+ year = {2001},
+ editor = {Ira S. Moskowitz},
+ publisher = {Springer-Verlag, LNCS 2137},
+ www_section = pub,
+}
+
+
+