| Publications by date - 1977
- Non-Discretionary Access Control for Decentralized Computing Systems (PDF) (Cached: PDF)
by Paul A. Karger. Laboratory for Computer Science, Massachusetts Institute of Technology S. M. & E. E. thesis MIT/LCS/TR-179, May 1977. (BibTeX entry)· Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.
- 1978
- Limitations of End-to-End Encryption in Secure Computer Networks (PDF) (Cached: PDF)
by Michael A. Padlipsky, David W. Snow, and Paul A. Karger. The MITRE Corporation: Bedford MA, HQ Electronic Systems Division technical report ESD-TR-78-158, August 1978. (BibTeX entry)·
- 1981
- 1985
- 1988
- The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability (PDF) (Cached: PDF)
by David Chaum. In Journal of Cryptology 1, 1988, pages 65-75. (BibTeX entry)·
- 1990
- 1991
- 1993
- 1995
- Private Information Retrieval (PS) (Cached: PS, gzipped PS)
by Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. In the Proceedings of the IEEE Symposium on Foundations of Computer Science, 1995, pages 41-50. (BibTeX entry)·
- Receipt-Free MIX-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth
by Joe Kilian and Kazue Sako. In the Proceedings of EUROCRYPT 1995, May 1995. (BibTeX entry)· - Preserving Privacy in a Network of Mobile Computers (PDF) (Cached: PDF)
by David A. Cooper and Kenneth P. Birman. In the Proceedings of the 1995 IEEE Symposium on Security and Privacy, May 1995. (BibTeX entry)·
- ...
- 2013
- LIRA: Lightweight Incentivized Routing for Anonymity (PDF) (Cached: PDF)
by Rob Jansen, Aaron Johnson, and Paul Syverson. In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)· - rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation (PDF) (Cached: PDF)
by Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas J. Hopper. In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)· - An Empirical Evaluation of Relay Selection in Tor (PDF) (Cached: PDF)
by Christopher Wacek, Henry Tan, Kevin Bauer, and Micah Sherr. In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)· - Preventing Side-channel Leaks in Web Traffic: A Formal Approach (PDF) (Cached: PDF)
by Michael Backes, Goran Doychev, and Boris Köpf. In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)· - I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention (PDF) (Cached: PDF)
by Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew Singer. In the Proceedings of the Network and Distributed System Security Symposium - NDSS'13, February 2013. (BibTeX entry)· - The Parrot is Dead: Observing Unobservable Network Communications (PDF) (Cached: PDF)
by Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov. In the Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 2013. (BibTeX entry)· - Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization (PDF) (Cached: PDF)
by Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. In the Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 2013. (BibTeX entry)· - The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting (PDF) (Cached: PDF)
by Mashael Alsabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg. In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)· - How Low Can You Go: Balancing Performance with Anonymity in Tor (PDF) (Cached: PDF)
by John Geddes, Rob Jansen, and Nicholas Hopper. In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)· - OSS: Using Online Scanning Services for Censorship Circumvention (PDF) (Cached: PDF)
by David Fifield, Gabi Nakibly, and Dan Boneh. In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)· - The need for flow fingerprints to link correlated network flows (PDF) (Cached: PDF)
by Amir Houmansadr and Nikita Borisov. In the Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013), July 2013. (BibTeX entry)· - ( http://www.freehaven.net/anonbib/date.html )
|