commit 4e63c3027a9a1a09d7b266cba3f1fea2a19917f8
parent 2dfa4b1bbf98fa0294a7bd520b4644266d367e9a
Author: Len Sassaman <rabbi@abditum.com>
Date: Sun, 1 Jul 2007 14:32:53 +0000
Added some missing papers.
svn:r222
Diffstat:
| M | anonbib.bib | | | 85 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------- |
1 file changed, 74 insertions(+), 11 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -19,7 +19,7 @@
@string{proofs = "Provable shuffles"}
@string{methods = "Formal methods"}
@string{nym = "Pseudonymity"}
-%@string{pir = "Private Information Retrieval"}
+@string{pir = "Private Information Retrieval"}
@string{economics = "Economics"}
@string{censorship = "Communications Censorship"}
@string{credentials = "E-Cash / Anonymous Credentials"}
@@ -2131,6 +2131,7 @@
address = {Arlington, VA, USA},
www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf},
www_section = nym,
+ www_important = {1},
www_tags={selected},
}
@@ -2540,7 +2541,7 @@ Distributed Computing Systems (ICDCS)},
year = {2007},
month = {May},
www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2556,7 +2557,7 @@ Distributed Computing Systems (ICDCS)},
year = {2002}
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf},
www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2569,7 +2570,7 @@ Distributed Computing Systems (ICDCS)},
institution = {Katholieke Universiteit Leuven},
number = {ESAT-COSIC 2007-001},
www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2582,7 +2583,7 @@ Unified Construction},
pages = {89--98},
year = {2001},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2599,7 +2600,7 @@ Unified Construction},
address = {New York, NY, USA},
www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf},
www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2611,7 +2612,7 @@ Sudan},
pages = {41-50},
year = {1995},
www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2621,7 +2622,7 @@ Sudan},
booktitle = {Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS)},
year = {2002},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2635,7 +2636,7 @@ Sudan},
publisher = {Springer-Verlag},
address = {London, UK},
www_ps_url = {http://eprint.iacr.org/1998/013.ps.gz},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2645,7 +2646,7 @@ Sudan},
journal = {Applied Cryptography and Network Security},
year = {2004},
www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf},
- www_section = comm,
+ www_section = pir,
www_tags = {selected},
}
@@ -2995,6 +2996,68 @@ Sudan},
VOLUME = "4421",
YEAR = 2007,
www_section = methods,
- www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf}
+ www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf},
+}
+
+@article{regroup2006,
+ author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao},
+ title = {Regroup-And-Go mixes to counter the $(n-1)$ attack},
+ journal = {Journal of Internet Research},
+ pages = {213--223},
+ volume = {16},
+ year = {2006},
+ doi = {http://dx.doi.org/10.1108/10662240610656528},
+ number = {2},
+ publisher = {Emerald Group Publishing Limited},
+ www_section = comm,
+ www_tags={selected},
+}
+
+@INPROCEEDINGS{ringstwice07,
+ author = {Meredith L. Patterson and Len Sassaman},
+ title = {Subliminal Channels in the Private Information Retrieval Protocols},
+ year = {2007},
+ pages = {8},
+ booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux},
+ address = {Enschede,NL},
+ publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie},
+ www_section = pir,
+ www_tags={selected},
+ www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf},
+}
+
+@article{wagner,
+ author = {Robyn Wagner},
+ title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remail
+ journal = {New Mexico Law Review},
+ volume = {32},
+ number = {Winter},
+ pages = {99--142},
+ year = {2002},
+ www_section = misc,
+ www_tags = {selected},
+
+}
+
+@inproceedings{cooper,
+ title = {Preserving Privacy in a Network of Mobile Computers},
+ author = {David A. Cooper and Kenneth P. Birman},
+ booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy},
+ year = {1995},
+ month = {May},
+ www_section = pir,
+ www_tags = {selected},
+}
+
+@INPROCEEDINGS{space-efficient,
+ author = {George Danezis and Claudia Diaz},
+ title = {Space-Efficient Private Search},
+ year = {2007},
+ pages = {15},
+ booktitle = {Proceedings of Financial Cryptography (FC2007)},
+ series = {Lecture Notes in Computer Science},
+ address = {Tobago},
+ publisher = {Springer-Verlag},
+ www_tags = {selected},
}