gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 8af4f293d704980874f1cccb3cd5383f123d05b7
parent db5c3fc12c4d7be6501869dce8ed13849d5d0002
Author: Nick Mathewson <nickm@torproject.org>
Date:   Tue, 18 May 2010 18:59:17 +0000

Try to make anonbib.bib into actual valid bibtex: key-value entries must end with commas, and no comments inside a bibtex entry.  Also, no @ signs inside a comment.

svn:r339

Diffstat:
Manonbib.bib | 186++++++++++++++++++++++++++++++++++++++++---------------------------------------
1 file changed, 94 insertions(+), 92 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -33,7 +33,7 @@ @Proceedings{eurocrypt-02, editor = {Lars R. Knudsen}, booktitle = "Proceedings of Eurocrypt 2002", - month = may + month = may, year = {2002}, bookurl = {http://www.ec2002.tue.nl/}, www_tags={selected}, @@ -45,7 +45,7 @@ month = {June}, year = {2006}, publisher = {Springer}, - address = {Cambridge, UK} + address = {Cambridge, UK}, bookurl = {http://petworkshop.org/2006/}, } @@ -54,7 +54,7 @@ booktitle = "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", month = {June}, year = {2006}, - address = {Cambridge, UK} + address = {Cambridge, UK}, bookurl = {http://weis2006.econinfosec.org/}, } @@ -64,7 +64,7 @@ month = {June}, year = {2007}, publisher = {Springer}, - address = {Ottawa, Canada} + address = {Ottawa, Canada}, bookurl = {http://petworkshop.org/2007/}, } @@ -78,11 +78,11 @@ bookurl = {http://petsymposium.org/2008/}, } -@Proceedings{eurocrypt2005, - editor = {Ronald Cramer}, -% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International +% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International % Conference on the Theory and Applications of Cryptographic % Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, +@Proceedings{eurocrypt2005, + editor = {Ronald Cramer}, booktitle = {Proceedings of EUROCRYPT 2005}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, @@ -106,9 +106,9 @@ www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html}, www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf}, www_important = {1}, -% www_remarks = {Chaum's paper that has all the big ideas.}, www_tags={selected}, } +% www_remarks = {Chaum's paper that has all the big ideas.}, @ARTICLE{chaum-dc, author = {David Chaum}, @@ -222,9 +222,9 @@ publisher = {Springer-Verlag, LNCS 1525}, www_section = comm, www_pdf_url = "http://www.uow.edu.au/~ldn01/infohide98.pdf", -% www_important = {1}, - www_tags={selected}, + www_tags={selected}, } +% www_important = {1}, @InProceedings{flash-mix, author = {Markus Jakobsson}, @@ -440,7 +440,6 @@ author = {Andreas Pfitzmann and Marit Hansen}, title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology}, www_section = misc, -% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf}, www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml}, howpublished = "Draft", year = 2000, @@ -448,6 +447,8 @@ OPTnote = {For date of the latest version, see the document itself}, www_tags={selected}, } +% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf}, + @inproceedings{goldberg97privacyenhancing, author = "Ian Goldberg and David Wagner and Eric Brewer", @@ -492,7 +493,7 @@ } @InProceedings{mitkuro, - author = {Masashi Mitomo and Kaoru Kurosawa} + author = {Masashi Mitomo and Kaoru Kurosawa}, title = {{Attack for Flash MIX}}, booktitle = {Proceedings of {ASIACRYPT} 2000}, year = {2000}, @@ -519,7 +520,7 @@ www_tags={selected}, } -%@techreport{freedom-nyms, +%techreport{freedom-nyms, % author = {Russell Samuels}, % title = {Untraceable Nym Creation on the {F}reedom {N}etwork}, % year = {1999}, @@ -541,11 +542,12 @@ pages = {672--681}, year = {1993}, www_section = traffic, -% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", -% www_important = {1}, www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps}, www_tags={selected}, } +% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", +% www_important = {1}, + @InProceedings{raymond00, author = {Jean-Fran\c{c}ois Raymond}, @@ -633,10 +635,10 @@ editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = traffic, - www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf" -% www_important = {1}, - www_tags={selected}, + www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", + www_tags={selected}, } +% www_important = {1}, %% Section: Anonymous publication @@ -650,7 +652,7 @@ editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = pub, - www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps" + www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps", www_important = {1}, www_tags={selected}, } @@ -793,9 +795,9 @@ author = "Michael J. Freedman and Robert Morris", booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}}, - address = "Washington, DC" + address = "Washington, DC", month = "November", - year = "2002" + year = "2002", www_section = comm, www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", www_important = {1}, @@ -827,7 +829,7 @@ type = {White Paper}, institution = {Zero Knowledge Systems, {Inc.}}, www_section = comm, - www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf} + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf}, www_tags={selected}, } @@ -840,7 +842,7 @@ type = {White Paper}, institution = {Zero Knowledge Systems, {Inc.}}, www_section = comm, - www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf} + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf}, www_tags={selected}, } @@ -883,7 +885,7 @@ www_tags={selected}, } -%@Misc{rprocess, +%Misc{rprocess, % author = {RProcess}, % title = {Selective Denial of Service Attacks}, % www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html", @@ -902,8 +904,8 @@ month = January, day = 19, www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html", - www_section = comm - www_remarks = "First written in 1996 based on cypherpunks posts in 1995." + www_section = comm, + www_remarks = "First written in 1996 based on cypherpunks posts in 1995.", www_tags={selected}, } @@ -916,7 +918,7 @@ day = 26, www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt", www_section = comm, - www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html} + www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}, www_tags={selected}, } @@ -931,7 +933,7 @@ www_tags={selected}, } -%@PhdThesis{malkin-thesis, +% PhdThesis{malkin-thesis, % author = {Tal Malkin}, % school = {{MIT}}, % title = {Private {I}nformation {R}etrieval}, @@ -1079,7 +1081,7 @@ www_tags={selected}, } -%@InProceedings{Freedman-iptps, +%InProceedings{Freedman-iptps, % author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris}, % title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, % booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", @@ -1130,7 +1132,7 @@ {Uses formal methods to analyze probabilistic anonymity systems like <a href="#crowds:tissec">Crowds</a>. Confirms that anonymity degrades with a larger crowd: as N grows, the fact that the request came from - you becomes more suspicious.} + you becomes more suspicious.}, www_tags={selected}, } @@ -1141,7 +1143,6 @@ volume = {12}, number = {1}, pages = {3--36}, -% month = {}, year = {2004}, www_section = methods, www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_anon.ps", @@ -1266,7 +1267,7 @@ title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}}, journal = "Wirtschaftsinformatik", publisher = "Springer-Verlag", - year = "2003" + year = "2003", month = "June", www_section = economics, www_ps_url = "http://www.ovmj.org/GNUnet/download/ebe.ps", @@ -1360,7 +1361,6 @@ booktitle={{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}}, address={Pittsburgh, USA}, pages={49--54}, -% month={June 10--12}, month={June}, year={2002}, www_section = comm, @@ -1368,13 +1368,13 @@ www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", www_tags={selected}, } +% month={June 10--12}, @inproceedings{morphmix:wpes2002, author={Marc Rennhard and Bernhard Plattner}, title={{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}}, booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}}, address={Washington, DC, USA}, -% month={November 21}, month={November}, year={2002}, www_important = {1}, @@ -1383,13 +1383,13 @@ www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", www_tags={selected}, } +% month={November 21}, @inproceedings{RP03-1, author={Marc Rennhard and Bernhard Plattner}, title={{Practical Anonymity for the Masses with Mix-Networks}}, booktitle={{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}}, address={Linz, Austria}, -% month={June 9--11}, month={June}, year={2003}, www_section = comm, @@ -1397,6 +1397,7 @@ www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", www_tags={selected}, } +% month={June 9--11}, @inproceedings{rep-anon, author={Roger Dingledine and Nick Mathewson and Paul Syverson}, @@ -1429,12 +1430,11 @@ author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu}, title = {Statistical Identification of Encrypted Web Browsing Traffic}, booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, - %pages = {19}, % This can't be right. -NM year = {2002}, address = {Berkeley, California}, month = {May}, www_section = traffic, - www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf} + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}, www_tags={selected}, } @@ -1456,7 +1456,6 @@ @InProceedings{SN03, author = {Andrei Serjantov and Richard E. Newman}, title = {On the Anonymity of Timed Pool Mixes}, -% booktitle = {Security and Privacy in the Age of Uncertainty}, booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems}, pages = {427--434}, year = {2003}, @@ -1467,6 +1466,7 @@ www_ps_url="http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", www_tags={selected}, } +% booktitle = {Security and Privacy in the Age of Uncertainty}, @techreport{herbivore:tr, author = "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", @@ -1511,7 +1511,7 @@ {Mix nodes should send out "heartbeat" messages (dummies that start and end at that node). By measuring how many return in a given time, they can detect whether the adversary is dropping or delaying traffic coming - into them (possibly so he can launch an active blending attack).} + into them (possibly so he can launch an active blending attack).}, www_tags={selected}, } @@ -1541,11 +1541,12 @@ year = {2004}, month = {February}, address = {San Francisco, USA}, - %editor = {}, www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf}, www_section = comm, www_tags={selected}, } + %editor = {}, + @InProceedings{cebolla, author={Zach Brown}, @@ -1697,8 +1698,9 @@ pages = {227--232}, www_section = comm, www_pdf_url = "http://freehaven.net/doc/fc04/minion-systems.pdf", - % Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM } +% Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM + @InProceedings{credentials-fc2004, author = {Guiseppe Persiano and Ivan Visconti}, @@ -1714,7 +1716,7 @@ @InProceedings{tor-design, author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, - title = {{Tor}: The Second-Generation Onion Router} + title = {{Tor}: The Second-Generation Onion Router}, booktitle = {Proceedings of the 13th USENIX Security Symposium}, year = {2004}, month = {August}, @@ -1732,7 +1734,7 @@ year = {2004}, month = {May}, www_section = economics, - www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf" + www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", www_tags={selected}, } @@ -1745,7 +1747,7 @@ address = {Toronto}, month = {May}, www_section = traffic, - www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps" + www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps", www_tags={selected}, } @@ -1758,10 +1760,11 @@ address = {Toronto}, month = {May}, www_section = comm, -% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz", www_pdf_url = "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", www_tags={selected}, } +% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz", + @InProceedings{hitting-set04, author = {Dogan Kesdogan and Lexi Pimenidis}, @@ -1927,7 +1930,7 @@ volume = {3424}, pages = {226--241}, www_section = traffic, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf} + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}, www_tags={selected}, } @@ -2044,7 +2047,7 @@ month = {November}, editor = {Sanna Liimatainen and Teemupekka Virtanen}, www_section = traffic, - www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf} + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf}, www_tags={selected}, } @@ -2054,7 +2057,7 @@ booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy}, year = {2005}, month = {May}, - publisher = {IEEE CS} + publisher = {IEEE CS}, www_section = traffic, www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf}, www_important = 1, @@ -2069,7 +2072,7 @@ year = {2005}, pages = {1--11}, www_section = traffic, - www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf" + www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", www_tags={selected}, } @@ -2105,7 +2108,7 @@ year = {2005}, pages = {110--127}, www_section = traffic, - www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf} + www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf}, www_tags={selected}, } @@ -2126,7 +2129,7 @@ booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, year = {2005}, month = {June}, - pages = {11--25} + pages = {11--25}, www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf}, www_section = comm, www_tags={selected}, @@ -2138,7 +2141,7 @@ booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, year = {2005}, month = {June}, - pages = {26--38} + pages = {26--38}, www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, www_section = comm, www_tags={selected}, @@ -2150,7 +2153,7 @@ booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, year = {2005}, month = {June}, - pages = {39--52} + pages = {39--52}, www_section = traffic, www_tags={selected}, www_pdf_url={http://lukejamesoconnor.googlepages.com/blending-attacks.pdf}, @@ -2162,7 +2165,7 @@ booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, year = {2005}, month = {June}, - pages = {62--76} + pages = {62--76}, www_section = pub, www_pdf_url = "http://gnunet.org/papers/IHW-CR.pdf", www_tags={selected}, @@ -2230,7 +2233,7 @@ month = {August}, editor = {Victor Shoup}, publisher = {Springer-Verlag, LNCS 3621}, - pages = "169--187" + pages = "169--187", www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf}, www_section = proofs, www_tags={selected}, @@ -2284,7 +2287,7 @@ pages = {25--39}, volume = {16}, year = {2003}, - number = {1} + number = {1}, www_section = comm, www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", www_tags={selected}, @@ -2306,8 +2309,8 @@ year = {2005}, month = {November}, www_section = proofs, - www_html_url = {http://eprint.iacr.org/2005/394} - www_pdf_url = {http://eprint.iacr.org/2005/394.pdf} + www_html_url = {http://eprint.iacr.org/2005/394}, + www_pdf_url = {http://eprint.iacr.org/2005/394.pdf}, www_tags={selected}, } @@ -2478,7 +2481,7 @@ crossref = {pet2006}, pages = {223--244}, www_section = nym, - www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf} + www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf}, www_tags={selected}, } @@ -2543,7 +2546,7 @@ Year=1977, www_section = traffic, - www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf} + www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf}, www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.}, www_tags={selected}, } @@ -2587,7 +2590,7 @@ @InProceedings{fu-analytical, author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks}, - Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing} + Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}, year = {2003}, pages={483--492}, www_section = traffic, @@ -2673,7 +2676,7 @@ Distributed Computing Systems (ICDCS)}, series = {Lecture Notes in Computer Science}, pages = {326--341}, volume = {2576}, - year = {2002} + year = {2002}, www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf}, www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps}, www_section = pir, @@ -2719,7 +2722,7 @@ Distributed Computing Systems (ICDCS)}, publisher = {ACM Press}, address = {New York, NY, USA}, www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf}, - www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps} + www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}, www_section = pir, www_tags = {selected}, } @@ -2838,17 +2841,18 @@ Sudan}, @inproceedings{chl05-full:eurocrypt2005, author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, title = {Compact E-Cash}, -% booktitle = {Proceedings of EUROCRYPT 2005}, -% year = {2005}, pages = {302--321}, ee = {http://dx.doi.org/10.1007/11426639_18}, crossref = {eurocrypt2005}, -% bibsource = {DBLP, http://dblp.uni-trier.de} www_section = credentials, www_pdf_url = "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", www_important = {1}, www_tags = {selected}, } +% booktitle = {Proceedings of EUROCRYPT 2005}, +% year = {2005}, +% bibsource = {DBLP, http://dblp.uni-trier.de} + @article{adams06, title = {A Classification for Privacy Techniques}, @@ -2987,8 +2991,8 @@ Sudan}, } @Inproceedings{guha-pet2007, - author = {Saikat Guha and Paul Francis} - title = {Identity Trail: Covert Surveillance Using DNS} + author = {Saikat Guha and Paul Francis}, + title = {Identity Trail: Covert Surveillance Using DNS}, crossref = pet2007, www_section = traffic, www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf}, @@ -2999,7 +3003,7 @@ Sudan}, author={Steven J. Murdoch and Piotr Zieli{\'n}ski}, crossref= pet2007, www_section = traffic, - www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf} + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf}, www_tags = {selected}, www_important = {1}, www_remarks = {Examines efficacy of traffic analysis against a @@ -3025,7 +3029,7 @@ Sudan}, } @Inproceedings{nagaraja-pet2007, - title={Anonymity in the wild: Mixes on unstructured networks} + title={Anonymity in the wild: Mixes on unstructured networks}, author={Shishir Nagaraja}, crossref=pet2007, www_section=comm, @@ -3038,10 +3042,10 @@ Sudan}, Booktitle = {Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006)}, Month = {October}, - year = {2006} + year = {2006}, Pages = {255--263}, www_section = traffic, - www_tags = {selected} + www_tags = {selected}, www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf}, } @@ -3053,7 +3057,7 @@ Sudan}, Pages = {213--240}, Title = {{Hordes --- A Multicast Based Protocol for Anonymity}}, Volume = 10, - Year = {2002} + Year = {2002}, www_section = comm, www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf}, www_tags = {selected} @@ -3067,12 +3071,12 @@ Sudan}, Keywords = {security; routing; peer-to-peer; anonymity}, Month = {November}, Pages = {272--280}, -%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf}, - Year = {2001}, www_section = misc, www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf}, } +%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf}, + @article{Wright:2004, Author = {Matthew Wright and Micah Adler and Brian Neil Levine and @@ -3085,7 +3089,7 @@ Sudan}, Number = 7, Pages = {489--522}, Volume = 4, - Year = {2004} + Year = {2004}, www_section = traffic, www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf}, www_tags = {selected} @@ -3135,7 +3139,6 @@ Sudan}, author = {Meredith L. Patterson and Len Sassaman}, title = {Subliminal Channels in the Private Information Retrieval Protocols}, year = {2007}, - %pages = {8}, % This can't be right. -NM booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux}, address = {Enschede,NL}, publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie}, @@ -3143,6 +3146,7 @@ Sudan}, www_tags={selected}, www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf}, } +%pages = {8}, % This can't be right. -NM @article{wagner, author = {Robyn Wagner}, @@ -3171,7 +3175,6 @@ Sudan}, author = {George Danezis and Claudia Diaz}, title = {Space-Efficient Private Search}, year = {2007}, - %pages = {15}, % This can't be right. -NM booktitle = {Proceedings of Financial Cryptography (FC2007)}, series = {Lecture Notes in Computer Science}, address = {Tobago}, @@ -3179,7 +3182,7 @@ Sudan}, www_section = pir, www_tags = {selected}, } - + %pages = {15}, % This can't be right. -NM % -- Below are additions from gd on 01 July 2007 -- @@ -3338,7 +3341,7 @@ Information Networking and Applications-Volume 1 (AINA'06)-Volume 01}, www_section = comm, } -%@article{toth11aca, +% article{toth11aca, % title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}}, % author={G. Toth and Z. Hornak}, % journal={Security and Privacy in Dynamic Environments--Proceedings of @@ -3932,17 +3935,17 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, year = {2008}, month = {October}, - %% pages = {18}, booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)}, editor = {Sushil Jajodia and J. Lopez }, volume = {LNCS (in print)}, number = {}, series = {Lecture Notes in Computer Science}, address = {Malaga,ES}, - publisher = {Springer-Verlag} + publisher = {Springer-Verlag}, www_section = {misc}, www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf}, } + %% pages = {18}, @INPROCEEDINGS{diaz-wpes2007, author = {Claudia Diaz and Carmela Troncoso and George Danezis}, @@ -3992,8 +3995,8 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", pages = {24--43}, crossref = pet2008, www_section = misc, - %NEED URL. } + %NEED URL. @inproceedings{diaz-pet2008, title = {On the Impact of Social Network Profiling on Anonymity}, @@ -4025,9 +4028,9 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", @inproceedings{shimshock-pet2008, title = {Breaking and Provably Fixing Minx}, - author = {Eric Shimshock and Matt Staats and Nick Hopper} + author = {Eric Shimshock and Matt Staats and Nick Hopper}, crossref = pet2008, - pages = {99--114} + pages = {99--114}, www_section = comm, www_tags = {selected}, www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf} @@ -4076,7 +4079,7 @@ www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", @inproceedings{raykova-pet2008, title = {PAR: Payment for Anonymous Routing}, - author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin} + author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, pages = {219--236}, crossref = pet2008, www_section = comm, @@ -4264,7 +4267,7 @@ Omer Reingold", @inproceedings{ccs2008:tsang, title={PEREA: Towards Practical TTP-Free Revocation in Anonymous - Authentication} + Authentication}, author={Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, crossref={ccs2008}, pages={333--345}, @@ -4313,7 +4316,7 @@ Omer Reingold", year = {2008}, month = {September}, www_abstract_url = {http://hdl.handle.net/10012/4011}, - www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf} + www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf}, www_section = comm, www_tags = {selected}, } @@ -4435,7 +4438,7 @@ Omer Reingold", journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)}, month = sep, year = {2009}, - doi = {10.1109/TDSC.2009.38} + doi = {10.1109/TDSC.2009.38}, www_section = misc, www_pdf_url= {http://www.cs.indiana.edu/~kapadia/papers/nymble-tdsc-preprint.pdf}, www_tags = {selected}, @@ -4570,11 +4573,10 @@ Omer Reingold", title = {Secure Pseudonymous Channels}, pages = {337--354}, crossref = {DBLP:conf/esorics/2009}, - www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/$File/rz3724_updated_August09.pdf}, + www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf}, www_section = comm, } - @proceedings{DBLP:conf/esorics/2009, editor = {Michael Backes and Peng Ning}, @@ -4718,7 +4720,7 @@ Omer Reingold", Low-Bandwidth Access Networks}, booktitle = {Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, - France, June 2-5, 2009} + France, June 2-5, 2009}, year = {2009}, month = {June}, editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque