commit 8af4f293d704980874f1cccb3cd5383f123d05b7
parent db5c3fc12c4d7be6501869dce8ed13849d5d0002
Author: Nick Mathewson <nickm@torproject.org>
Date: Tue, 18 May 2010 18:59:17 +0000
Try to make anonbib.bib into actual valid bibtex: key-value entries must end with commas, and no comments inside a bibtex entry. Also, no @ signs inside a comment.
svn:r339
Diffstat:
| M | anonbib.bib | | | 186 | ++++++++++++++++++++++++++++++++++++++++--------------------------------------- |
1 file changed, 94 insertions(+), 92 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -33,7 +33,7 @@
@Proceedings{eurocrypt-02,
editor = {Lars R. Knudsen},
booktitle = "Proceedings of Eurocrypt 2002",
- month = may
+ month = may,
year = {2002},
bookurl = {http://www.ec2002.tue.nl/},
www_tags={selected},
@@ -45,7 +45,7 @@
month = {June},
year = {2006},
publisher = {Springer},
- address = {Cambridge, UK}
+ address = {Cambridge, UK},
bookurl = {http://petworkshop.org/2006/},
}
@@ -54,7 +54,7 @@
booktitle = "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)",
month = {June},
year = {2006},
- address = {Cambridge, UK}
+ address = {Cambridge, UK},
bookurl = {http://weis2006.econinfosec.org/},
}
@@ -64,7 +64,7 @@
month = {June},
year = {2007},
publisher = {Springer},
- address = {Ottawa, Canada}
+ address = {Ottawa, Canada},
bookurl = {http://petworkshop.org/2007/},
}
@@ -78,11 +78,11 @@
bookurl = {http://petsymposium.org/2008/},
}
-@Proceedings{eurocrypt2005,
- editor = {Ronald Cramer},
-% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International
+% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International
% Conference on the Theory and Applications of Cryptographic
% Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
+@Proceedings{eurocrypt2005,
+ editor = {Ronald Cramer},
booktitle = {Proceedings of EUROCRYPT 2005},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
@@ -106,9 +106,9 @@
www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html},
www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf},
www_important = {1},
-% www_remarks = {Chaum's paper that has all the big ideas.},
www_tags={selected},
}
+% www_remarks = {Chaum's paper that has all the big ideas.},
@ARTICLE{chaum-dc,
author = {David Chaum},
@@ -222,9 +222,9 @@
publisher = {Springer-Verlag, LNCS 1525},
www_section = comm,
www_pdf_url = "http://www.uow.edu.au/~ldn01/infohide98.pdf",
-% www_important = {1},
- www_tags={selected},
+ www_tags={selected},
}
+% www_important = {1},
@InProceedings{flash-mix,
author = {Markus Jakobsson},
@@ -440,7 +440,6 @@
author = {Andreas Pfitzmann and Marit Hansen},
title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology},
www_section = misc,
-% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf},
www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml},
howpublished = "Draft",
year = 2000,
@@ -448,6 +447,8 @@
OPTnote = {For date of the latest version, see the document itself},
www_tags={selected},
}
+% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf},
+
@inproceedings{goldberg97privacyenhancing,
author = "Ian Goldberg and David Wagner and Eric Brewer",
@@ -492,7 +493,7 @@
}
@InProceedings{mitkuro,
- author = {Masashi Mitomo and Kaoru Kurosawa}
+ author = {Masashi Mitomo and Kaoru Kurosawa},
title = {{Attack for Flash MIX}},
booktitle = {Proceedings of {ASIACRYPT} 2000},
year = {2000},
@@ -519,7 +520,7 @@
www_tags={selected},
}
-%@techreport{freedom-nyms,
+%techreport{freedom-nyms,
% author = {Russell Samuels},
% title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
% year = {1999},
@@ -541,11 +542,12 @@
pages = {672--681},
year = {1993},
www_section = traffic,
-% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm",
-% www_important = {1},
www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps},
www_tags={selected},
}
+% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm",
+% www_important = {1},
+
@InProceedings{raymond00,
author = {Jean-Fran\c{c}ois Raymond},
@@ -633,10 +635,10 @@
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = traffic,
- www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf"
-% www_important = {1},
- www_tags={selected},
+ www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf",
+ www_tags={selected},
}
+% www_important = {1},
%% Section: Anonymous publication
@@ -650,7 +652,7 @@
editor = {H. Federrath},
publisher = {Springer-Verlag, LNCS 2009},
www_section = pub,
- www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps"
+ www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps",
www_important = {1},
www_tags={selected},
}
@@ -793,9 +795,9 @@
author = "Michael J. Freedman and Robert Morris",
booktitle = {{Proceedings of the 9th ACM Conference on Computer and
Communications Security (CCS 2002)}},
- address = "Washington, DC"
+ address = "Washington, DC",
month = "November",
- year = "2002"
+ year = "2002",
www_section = comm,
www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf",
www_important = {1},
@@ -827,7 +829,7 @@
type = {White Paper},
institution = {Zero Knowledge Systems, {Inc.}},
www_section = comm,
- www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf}
+ www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf},
www_tags={selected},
}
@@ -840,7 +842,7 @@
type = {White Paper},
institution = {Zero Knowledge Systems, {Inc.}},
www_section = comm,
- www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf}
+ www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf},
www_tags={selected},
}
@@ -883,7 +885,7 @@
www_tags={selected},
}
-%@Misc{rprocess,
+%Misc{rprocess,
% author = {RProcess},
% title = {Selective Denial of Service Attacks},
% www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html",
@@ -902,8 +904,8 @@
month = January,
day = 19,
www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html",
- www_section = comm
- www_remarks = "First written in 1996 based on cypherpunks posts in 1995."
+ www_section = comm,
+ www_remarks = "First written in 1996 based on cypherpunks posts in 1995.",
www_tags={selected},
}
@@ -916,7 +918,7 @@
day = 26,
www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt",
www_section = comm,
- www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}
+ www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html},
www_tags={selected},
}
@@ -931,7 +933,7 @@
www_tags={selected},
}
-%@PhdThesis{malkin-thesis,
+% PhdThesis{malkin-thesis,
% author = {Tal Malkin},
% school = {{MIT}},
% title = {Private {I}nformation {R}etrieval},
@@ -1079,7 +1081,7 @@
www_tags={selected},
}
-%@InProceedings{Freedman-iptps,
+%InProceedings{Freedman-iptps,
% author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris},
% title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
% booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
@@ -1130,7 +1132,7 @@
{Uses formal methods to analyze probabilistic anonymity systems like
<a href="#crowds:tissec">Crowds</a>. Confirms that anonymity degrades
with a larger crowd: as N grows, the fact that the request came from
- you becomes more suspicious.}
+ you becomes more suspicious.},
www_tags={selected},
}
@@ -1141,7 +1143,6 @@
volume = {12},
number = {1},
pages = {3--36},
-% month = {},
year = {2004},
www_section = methods,
www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_anon.ps",
@@ -1266,7 +1267,7 @@
title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}},
journal = "Wirtschaftsinformatik",
publisher = "Springer-Verlag",
- year = "2003"
+ year = "2003",
month = "June",
www_section = economics,
www_ps_url = "http://www.ovmj.org/GNUnet/download/ebe.ps",
@@ -1360,7 +1361,6 @@
booktitle={{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}},
address={Pittsburgh, USA},
pages={49--54},
-% month={June 10--12},
month={June},
year={2002},
www_section = comm,
@@ -1368,13 +1368,13 @@
www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf",
www_tags={selected},
}
+% month={June 10--12},
@inproceedings{morphmix:wpes2002,
author={Marc Rennhard and Bernhard Plattner},
title={{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}},
booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}},
address={Washington, DC, USA},
-% month={November 21},
month={November},
year={2002},
www_important = {1},
@@ -1383,13 +1383,13 @@
www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz",
www_tags={selected},
}
+% month={November 21},
@inproceedings{RP03-1,
author={Marc Rennhard and Bernhard Plattner},
title={{Practical Anonymity for the Masses with Mix-Networks}},
booktitle={{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}},
address={Linz, Austria},
-% month={June 9--11},
month={June},
year={2003},
www_section = comm,
@@ -1397,6 +1397,7 @@
www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf",
www_tags={selected},
}
+% month={June 9--11},
@inproceedings{rep-anon,
author={Roger Dingledine and Nick Mathewson and Paul Syverson},
@@ -1429,12 +1430,11 @@
author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu},
title = {Statistical Identification of Encrypted Web Browsing Traffic},
booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
- %pages = {19}, % This can't be right. -NM
year = {2002},
address = {Berkeley, California},
month = {May},
www_section = traffic,
- www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}
+ www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf},
www_tags={selected},
}
@@ -1456,7 +1456,6 @@
@InProceedings{SN03,
author = {Andrei Serjantov and Richard E. Newman},
title = {On the Anonymity of Timed Pool Mixes},
-% booktitle = {Security and Privacy in the Age of Uncertainty},
booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems},
pages = {427--434},
year = {2003},
@@ -1467,6 +1466,7 @@
www_ps_url="http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps",
www_tags={selected},
}
+% booktitle = {Security and Privacy in the Age of Uncertainty},
@techreport{herbivore:tr,
author = "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer",
@@ -1511,7 +1511,7 @@
{Mix nodes should send out "heartbeat" messages (dummies that start and
end at that node). By measuring how many return in a given time, they
can detect whether the adversary is dropping or delaying traffic coming
- into them (possibly so he can launch an active blending attack).}
+ into them (possibly so he can launch an active blending attack).},
www_tags={selected},
}
@@ -1541,11 +1541,12 @@
year = {2004},
month = {February},
address = {San Francisco, USA},
- %editor = {},
www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf},
www_section = comm,
www_tags={selected},
}
+ %editor = {},
+
@InProceedings{cebolla,
author={Zach Brown},
@@ -1697,8 +1698,9 @@
pages = {227--232},
www_section = comm,
www_pdf_url = "http://freehaven.net/doc/fc04/minion-systems.pdf",
- % Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM
}
+% Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM
+
@InProceedings{credentials-fc2004,
author = {Guiseppe Persiano and Ivan Visconti},
@@ -1714,7 +1716,7 @@
@InProceedings{tor-design,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
- title = {{Tor}: The Second-Generation Onion Router}
+ title = {{Tor}: The Second-Generation Onion Router},
booktitle = {Proceedings of the 13th USENIX Security Symposium},
year = {2004},
month = {August},
@@ -1732,7 +1734,7 @@
year = {2004},
month = {May},
www_section = economics,
- www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf"
+ www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf",
www_tags={selected},
}
@@ -1745,7 +1747,7 @@
address = {Toronto},
month = {May},
www_section = traffic,
- www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps"
+ www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps",
www_tags={selected},
}
@@ -1758,10 +1760,11 @@
address = {Toronto},
month = {May},
www_section = comm,
-% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz",
www_pdf_url = "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf",
www_tags={selected},
}
+% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz",
+
@InProceedings{hitting-set04,
author = {Dogan Kesdogan and Lexi Pimenidis},
@@ -1927,7 +1930,7 @@
volume = {3424},
pages = {226--241},
www_section = traffic,
- www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}
+ www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf},
www_tags={selected},
}
@@ -2044,7 +2047,7 @@
month = {November},
editor = {Sanna Liimatainen and Teemupekka Virtanen},
www_section = traffic,
- www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf}
+ www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf},
www_tags={selected},
}
@@ -2054,7 +2057,7 @@
booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy},
year = {2005},
month = {May},
- publisher = {IEEE CS}
+ publisher = {IEEE CS},
www_section = traffic,
www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf},
www_important = 1,
@@ -2069,7 +2072,7 @@
year = {2005},
pages = {1--11},
www_section = traffic,
- www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf"
+ www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf",
www_tags={selected},
}
@@ -2105,7 +2108,7 @@
year = {2005},
pages = {110--127},
www_section = traffic,
- www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf}
+ www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf},
www_tags={selected},
}
@@ -2126,7 +2129,7 @@
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
- pages = {11--25}
+ pages = {11--25},
www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf},
www_section = comm,
www_tags={selected},
@@ -2138,7 +2141,7 @@
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
- pages = {26--38}
+ pages = {26--38},
www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
www_section = comm,
www_tags={selected},
@@ -2150,7 +2153,7 @@
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
- pages = {39--52}
+ pages = {39--52},
www_section = traffic,
www_tags={selected},
www_pdf_url={http://lukejamesoconnor.googlepages.com/blending-attacks.pdf},
@@ -2162,7 +2165,7 @@
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
- pages = {62--76}
+ pages = {62--76},
www_section = pub,
www_pdf_url = "http://gnunet.org/papers/IHW-CR.pdf",
www_tags={selected},
@@ -2230,7 +2233,7 @@
month = {August},
editor = {Victor Shoup},
publisher = {Springer-Verlag, LNCS 3621},
- pages = "169--187"
+ pages = "169--187",
www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf},
www_section = proofs,
www_tags={selected},
@@ -2284,7 +2287,7 @@
pages = {25--39},
volume = {16},
year = {2003},
- number = {1}
+ number = {1},
www_section = comm,
www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps",
www_tags={selected},
@@ -2306,8 +2309,8 @@
year = {2005},
month = {November},
www_section = proofs,
- www_html_url = {http://eprint.iacr.org/2005/394}
- www_pdf_url = {http://eprint.iacr.org/2005/394.pdf}
+ www_html_url = {http://eprint.iacr.org/2005/394},
+ www_pdf_url = {http://eprint.iacr.org/2005/394.pdf},
www_tags={selected},
}
@@ -2478,7 +2481,7 @@
crossref = {pet2006},
pages = {223--244},
www_section = nym,
- www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf}
+ www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf},
www_tags={selected},
}
@@ -2543,7 +2546,7 @@
Year=1977,
www_section = traffic,
- www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf}
+ www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf},
www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.},
www_tags={selected},
}
@@ -2587,7 +2590,7 @@
@InProceedings{fu-analytical,
author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks},
- Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}
+ Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing},
year = {2003},
pages={483--492},
www_section = traffic,
@@ -2673,7 +2676,7 @@ Distributed Computing Systems (ICDCS)},
series = {Lecture Notes in Computer Science},
pages = {326--341},
volume = {2576},
- year = {2002}
+ year = {2002},
www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf},
www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps},
www_section = pir,
@@ -2719,7 +2722,7 @@ Distributed Computing Systems (ICDCS)},
publisher = {ACM Press},
address = {New York, NY, USA},
www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf},
- www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}
+ www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps},
www_section = pir,
www_tags = {selected},
}
@@ -2838,17 +2841,18 @@ Sudan},
@inproceedings{chl05-full:eurocrypt2005,
author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
title = {Compact E-Cash},
-% booktitle = {Proceedings of EUROCRYPT 2005},
-% year = {2005},
pages = {302--321},
ee = {http://dx.doi.org/10.1007/11426639_18},
crossref = {eurocrypt2005},
-% bibsource = {DBLP, http://dblp.uni-trier.de}
www_section = credentials,
www_pdf_url = "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf",
www_important = {1},
www_tags = {selected},
}
+% booktitle = {Proceedings of EUROCRYPT 2005},
+% year = {2005},
+% bibsource = {DBLP, http://dblp.uni-trier.de}
+
@article{adams06,
title = {A Classification for Privacy Techniques},
@@ -2987,8 +2991,8 @@ Sudan},
}
@Inproceedings{guha-pet2007,
- author = {Saikat Guha and Paul Francis}
- title = {Identity Trail: Covert Surveillance Using DNS}
+ author = {Saikat Guha and Paul Francis},
+ title = {Identity Trail: Covert Surveillance Using DNS},
crossref = pet2007,
www_section = traffic,
www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf},
@@ -2999,7 +3003,7 @@ Sudan},
author={Steven J. Murdoch and Piotr Zieli{\'n}ski},
crossref= pet2007,
www_section = traffic,
- www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf}
+ www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf},
www_tags = {selected},
www_important = {1},
www_remarks = {Examines efficacy of traffic analysis against a
@@ -3025,7 +3029,7 @@ Sudan},
}
@Inproceedings{nagaraja-pet2007,
- title={Anonymity in the wild: Mixes on unstructured networks}
+ title={Anonymity in the wild: Mixes on unstructured networks},
author={Shishir Nagaraja},
crossref=pet2007,
www_section=comm,
@@ -3038,10 +3042,10 @@ Sudan},
Booktitle = {Proceedings of the 13th ACM conference on Computer and
Communications Security (CCS 2006)},
Month = {October},
- year = {2006}
+ year = {2006},
Pages = {255--263},
www_section = traffic,
- www_tags = {selected}
+ www_tags = {selected},
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf},
}
@@ -3053,7 +3057,7 @@ Sudan},
Pages = {213--240},
Title = {{Hordes --- A Multicast Based Protocol for Anonymity}},
Volume = 10,
- Year = {2002}
+ Year = {2002},
www_section = comm,
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf},
www_tags = {selected}
@@ -3067,12 +3071,12 @@ Sudan},
Keywords = {security; routing; peer-to-peer; anonymity},
Month = {November},
Pages = {272--280},
-%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf},
-
Year = {2001},
www_section = misc,
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf},
}
+%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf},
+
@article{Wright:2004,
Author = {Matthew Wright and Micah Adler and Brian Neil Levine and
@@ -3085,7 +3089,7 @@ Sudan},
Number = 7,
Pages = {489--522},
Volume = 4,
- Year = {2004}
+ Year = {2004},
www_section = traffic,
www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf},
www_tags = {selected}
@@ -3135,7 +3139,6 @@ Sudan},
author = {Meredith L. Patterson and Len Sassaman},
title = {Subliminal Channels in the Private Information Retrieval Protocols},
year = {2007},
- %pages = {8}, % This can't be right. -NM
booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux},
address = {Enschede,NL},
publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie},
@@ -3143,6 +3146,7 @@ Sudan},
www_tags={selected},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf},
}
+%pages = {8}, % This can't be right. -NM
@article{wagner,
author = {Robyn Wagner},
@@ -3171,7 +3175,6 @@ Sudan},
author = {George Danezis and Claudia Diaz},
title = {Space-Efficient Private Search},
year = {2007},
- %pages = {15}, % This can't be right. -NM
booktitle = {Proceedings of Financial Cryptography (FC2007)},
series = {Lecture Notes in Computer Science},
address = {Tobago},
@@ -3179,7 +3182,7 @@ Sudan},
www_section = pir,
www_tags = {selected},
}
-
+ %pages = {15}, % This can't be right. -NM
% -- Below are additions from gd on 01 July 2007 --
@@ -3338,7 +3341,7 @@ Information Networking and Applications-Volume 1 (AINA'06)-Volume 01},
www_section = comm,
}
-%@article{toth11aca,
+% article{toth11aca,
% title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}},
% author={G. Toth and Z. Hornak},
% journal={Security and Privacy in Dynamic Environments--Proceedings of
@@ -3932,17 +3935,17 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
title = {A Framework for the Analysis of Mix-Based Steganographic File Systems},
year = {2008},
month = {October},
- %% pages = {18},
booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)},
editor = {Sushil Jajodia and J. Lopez },
volume = {LNCS (in print)},
number = {},
series = {Lecture Notes in Computer Science},
address = {Malaga,ES},
- publisher = {Springer-Verlag}
+ publisher = {Springer-Verlag},
www_section = {misc},
www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf},
}
+ %% pages = {18},
@INPROCEEDINGS{diaz-wpes2007,
author = {Claudia Diaz and Carmela Troncoso and George Danezis},
@@ -3992,8 +3995,8 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
pages = {24--43},
crossref = pet2008,
www_section = misc,
- %NEED URL.
}
+ %NEED URL.
@inproceedings{diaz-pet2008,
title = {On the Impact of Social Network Profiling on Anonymity},
@@ -4025,9 +4028,9 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
@inproceedings{shimshock-pet2008,
title = {Breaking and Provably Fixing Minx},
- author = {Eric Shimshock and Matt Staats and Nick Hopper}
+ author = {Eric Shimshock and Matt Staats and Nick Hopper},
crossref = pet2008,
- pages = {99--114}
+ pages = {99--114},
www_section = comm,
www_tags = {selected},
www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf}
@@ -4076,7 +4079,7 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf",
@inproceedings{raykova-pet2008,
title = {PAR: Payment for Anonymous Routing},
- author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}
+ author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin},
pages = {219--236},
crossref = pet2008,
www_section = comm,
@@ -4264,7 +4267,7 @@ Omer Reingold",
@inproceedings{ccs2008:tsang,
title={PEREA: Towards Practical TTP-Free Revocation in Anonymous
- Authentication}
+ Authentication},
author={Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith},
crossref={ccs2008},
pages={333--345},
@@ -4313,7 +4316,7 @@ Omer Reingold",
year = {2008},
month = {September},
www_abstract_url = {http://hdl.handle.net/10012/4011},
- www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf}
+ www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf},
www_section = comm,
www_tags = {selected},
}
@@ -4435,7 +4438,7 @@ Omer Reingold",
journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},
month = sep,
year = {2009},
- doi = {10.1109/TDSC.2009.38}
+ doi = {10.1109/TDSC.2009.38},
www_section = misc,
www_pdf_url= {http://www.cs.indiana.edu/~kapadia/papers/nymble-tdsc-preprint.pdf},
www_tags = {selected},
@@ -4570,11 +4573,10 @@ Omer Reingold",
title = {Secure Pseudonymous Channels},
pages = {337--354},
crossref = {DBLP:conf/esorics/2009},
- www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/$File/rz3724_updated_August09.pdf},
+ www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf},
www_section = comm,
}
-
@proceedings{DBLP:conf/esorics/2009,
editor = {Michael Backes and
Peng Ning},
@@ -4718,7 +4720,7 @@ Omer Reingold",
Low-Bandwidth Access Networks},
booktitle = {Proceedings of the 7th International Conference on Applied
Cryptography and Network Security (ACNS 09), Paris-Rocquencourt,
- France, June 2-5, 2009}
+ France, June 2-5, 2009},
year = {2009},
month = {June},
editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque