gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit d8fafd5d2cfa2e5d297e324e535a7c47d3760799
parent 3ea2efc06ccec1d6c628d2f948a83153b1b26b79
Author: Roger Dingledine <arma@torproject.org>
Date:   Mon, 11 Sep 2017 23:31:51 -0400

move usenix sec 2015 above sigcomm 2015 to sort temporally within august

Diffstat:
Manonbib.bib | 48++++++++++++++++++++++++------------------------
1 file changed, 24 insertions(+), 24 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -7907,6 +7907,30 @@ www_pdf_url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-pape www_tags = {selected} } +@inproceedings{circuit-fingerprinting2015, + title={Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services}, + author={Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas}, + year={2015}, + booktitle={Proceedings of the 24th Usenix Security Symposium}, + month={August}, + year={2015}, + www_section = traffic, + www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf", + www_tags={selected} +} + +@inproceedings{marionette2015, + title={Marionette: A Programmable Network Traffic Obfuscation System}, + author={Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton}, + year={2015}, + booktitle={Proceedings of the 24th Usenix Security Symposium}, + month={August}, + year={2015}, + www_section = censorship, + www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf", + www_tags={selected} +} + @inproceedings{herd-sigcomm2015, title = {Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems}, author = {Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and Nicholas Merritt}, @@ -7991,30 +8015,6 @@ www_pdf_url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-pape www_tags = {selected} } -@inproceedings{circuit-fingerprinting2015, - title={Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services}, - author={Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas}, - year={2015}, - booktitle={Proceedings of the 24th Usenix Security Symposium}, - month={August}, - year={2015}, - www_section = traffic, - www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf", - www_tags={selected} -} - -@inproceedings{marionette2015, - title={Marionette: A Programmable Network Traffic Obfuscation System}, - author={Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton}, - year={2015}, - booktitle={Proceedings of the 24th Usenix Security Symposium}, - month={August}, - year={2015}, - www_section = censorship, - www_pdf_url = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf", - www_tags={selected} -} - @inproceedings{tor-sybils2016, title={Identifying and Characterizing Sybils in the Tor Network}, author={Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster},