commit 7e98ebd0b4cc70038f1c64941f16596b57554ce4
parent 0d638abe313759a18cbed171c0e1f1358d0fad1d
Author: George Danezis <gdane@microsoft.com>
Date: Sun, 8 Jul 2007 20:59:53 +0000
svn:r232
Diffstat:
1 file changed, 13 insertions(+), 22 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -148,8 +148,8 @@
@InProceedings{abe,
author = {Masayuki Abe},
- title = {Universally Verifiable {MIX} With Verification Work Independent of
- The Number of {MIX} Servers},
+ title = {Universally Verifiable mix-net With Verification Work Independent of
+ The Number of mix Servers},
booktitle = {Proceedings of {EUROCRYPT} 1998},
year = {1998},
publisher = {Springer-Verlag, LNCS 1403},
@@ -159,7 +159,7 @@
@InProceedings{disco,
author = {Michael Waidner and Birgit Pfitzmann},
- title = {The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure servicability},
+ title = {The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability},
booktitle = {Proceedings of {EUROCRYPT} 1989},
year = {1990},
publisher = {Springer-Verlag, LNCS 434},
@@ -2677,8 +2677,7 @@ Distributed Computing Systems (ICDCS)},
@article{beimel01informationtheoretic,
author = {Amos Beimel and Yuval Ishai},
- title = {Information-Theoretic Private Information Retrieval: {A}
-Unified Construction},
+ title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction},
journal = {Lecture Notes in Computer Science},
volume = {2076},
pages = {89--98},
@@ -2743,7 +2742,7 @@ Sudan},
@article{kissner04private,
author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang},
- title = {Private keywordbased push and pull with applications to anonymous communication (Extended Abstract)},
+ title = {Private keyword-based push and pull with applications to anonymous communication},
journal = {Applied Cryptography and Network Security},
year = {2004},
www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf},
@@ -3179,8 +3178,7 @@ conference on Advances in computer science and technology (ACST '06)},
@inproceedings{Huang06,
author = {Dijiang Huang},
- title = {Traffic analysis-based unlinkability measure for IEEE
-802.11b-based communication systems},
+ title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems},
booktitle = {Proceedings of the 5th ACM workshop on Wireless
security (WiSe '06)},
year = {2006},
@@ -3221,8 +3219,7 @@ of Computer Science (FOCS'06)-Volume 00},
}
@misc{wang2006sam,
- title={{System and method for protecting privacy and anonymity of
-parties of network communications}},
+ title={{System and method for protecting privacy and anonymity of parties of network communications}},
author={Y.M. Wang and Q. Sun and D.R. Simon and W. Russell},
year={2006},
publisher={Google Patents},
@@ -3254,8 +3251,7 @@ Security-ETRICS, LNCS},
}
@article{huang2006sce,
- title={{Silent cascade: Enhancing location privacy without
-communication qos degradation}},
+ title={{Silent cascade: Enhancing location privacy without communication qos degradation}},
author={L. Huang and K. Matsuura and H. Yamane and K. Sezaki},
journal={Proc. of Security in Pervasive Computing (SPC)},
pages={165--180},
@@ -3264,8 +3260,7 @@ communication qos degradation}},
}
@article{melchor2006dnp,
- title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous
-Communications}},
+ title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}},
author={C.A. Melchor and Y. Deswarte},
journal={Proceedings of the Fifth IEEE International Symposium on
Network Computing and Applications},
@@ -3343,8 +3338,7 @@ society},
}
@article{toth11aca,
- title={{The {APROB} Channel: adaptive semi-real-time anonymous
-communication}},
+ title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}},
author={G. Toth and Z. Hornak},
journal={Security and Privacy in Dynamic Environments--Proceedings of
the IFIP TC-11 21st International Information Security Conference (SEC
@@ -3379,8 +3373,7 @@ www_tags = {selected},
}
@article{boukerche2005esd,
- title={{An efficient secure distributed anonymous routing protocol for
-mobile and wireless ad hoc networks}},
+ title={{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}},
author={A. Boukerche and K. El-Khatib and L. Xu and L. Korba},
journal={Computer Communications},
volume={28},
@@ -3415,8 +3408,7 @@ Peer-to-Peer Computing},
}
@article{gupta2006uns,
- title={{Utilizing node's selfishness for providing complete anonymity
-in peer-to-peer based grids}},
+ title={{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}},
author={R. Gupta and S. Ray and A.K. Somani and Z. Zhang},
journal={Multiagent and Grid Systems},
volume={2},
@@ -3428,8 +3420,7 @@ in peer-to-peer based grids}},
}
@article{nguyen2006vsf,
- title={{Verifiable shuffles: a formal model and a Paillier-based
-three-round construction with provable security}},
+ title={{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}},
author={L. Nguyen and R. Safavi-Naini and K. Kurosawa},
journal={International Journal of Information Security},
volume={5},