commit d8fafd5d2cfa2e5d297e324e535a7c47d3760799
parent 3ea2efc06ccec1d6c628d2f948a83153b1b26b79
Author: Roger Dingledine <arma@torproject.org>
Date: Mon, 11 Sep 2017 23:31:51 -0400
move usenix sec 2015 above sigcomm 2015 to sort temporally within august
Diffstat:
| M | anonbib.bib | | | 48 | ++++++++++++++++++++++++------------------------ |
1 file changed, 24 insertions(+), 24 deletions(-)
diff --git a/anonbib.bib b/anonbib.bib
@@ -7907,6 +7907,30 @@ www_pdf_url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-pape
www_tags = {selected}
}
+@inproceedings{circuit-fingerprinting2015,
+ title={Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services},
+ author={Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas},
+ year={2015},
+ booktitle={Proceedings of the 24th Usenix Security Symposium},
+ month={August},
+ year={2015},
+ www_section = traffic,
+ www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf",
+ www_tags={selected}
+}
+
+@inproceedings{marionette2015,
+ title={Marionette: A Programmable Network Traffic Obfuscation System},
+ author={Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
+ year={2015},
+ booktitle={Proceedings of the 24th Usenix Security Symposium},
+ month={August},
+ year={2015},
+ www_section = censorship,
+ www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf",
+ www_tags={selected}
+}
+
@inproceedings{herd-sigcomm2015,
title = {Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems},
author = {Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and Nicholas Merritt},
@@ -7991,30 +8015,6 @@ www_pdf_url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-pape
www_tags = {selected}
}
-@inproceedings{circuit-fingerprinting2015,
- title={Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services},
- author={Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas},
- year={2015},
- booktitle={Proceedings of the 24th Usenix Security Symposium},
- month={August},
- year={2015},
- www_section = traffic,
- www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf",
- www_tags={selected}
-}
-
-@inproceedings{marionette2015,
- title={Marionette: A Programmable Network Traffic Obfuscation System},
- author={Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
- year={2015},
- booktitle={Proceedings of the 24th Usenix Security Symposium},
- month={August},
- year={2015},
- www_section = censorship,
- www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf",
- www_tags={selected}
-}
-
@inproceedings{tor-sybils2016,
title={Identifying and Characterizing Sybils in the Tor Network},
author={Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster},