You are here

Bibliography

Export 20 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is attack  [Clear All Filters]
2011
Herrmann M. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. Lehrstuhl für Netzarchitekturen und Netzdienste. 2011 ;M.S.:59.
Herrmann M, Grothoff C. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. In: Privacy Enhancing Technologies Symposium (PETS 2011). Privacy Enhancing Technologies Symposium (PETS 2011). Waterloo, Canada: Springer Verlag; 2011.
2009
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2008
Shimshock E, Staats M, Hopper NJ. Breaking and Provably Fixing Minx. In: Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 99–114. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428266
Pappas V, Athanasopoulos E, Ioannidis S, Markatos EP. Compromising Anonymity Using Packet Spinning. In: Proceedings of the 11th Information Security Conference (ISC 2008). Proceedings of the 11th Information Security Conference (ISC 2008). Springer-Verlag Berlin, Heidelberg; 2008. Available from: http://portal.acm.org/citation.cfm?id=1432478.1432493
Diaz C, Troncoso C, Serjantov A. On the Impact of Social Network Profiling on Anonymity. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 44–62. Available from: http://portal.acm.org/citation.cfm?id=1428263
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Narayanan A, Shmatikov V. Robust De-anonymization of Large Sparse Datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society; 2008. Available from: http://dx.doi.org/10.1109/SP.2008.33
2005
Nielson SJ, Crosby SA. A Taxonomy of Rational Attacks. In: Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS ’05. Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS ’05. Springer-Verlag; 2005. pp. 36–46. Available from: http://www.springerlink.com/content/lh21385ml723844j/
2004
Avizienis A, Laprie J-C, Randell B, Landwehr C. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Secur. Comput. [Internet]. 2004 ;1:11–33. Available from: http://portal.acm.org/citation.cfm?id=1026488.1026492#
Singh A, Castro M, Druschel P, Rowstron A. Defending against eclipse attacks on overlay networks. In: EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop. EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop. New York, NY, USA: ACM; 2004. p. 21. Available from: http://portal.acm.org/citation.cfm?id=1133572.1133613#
2003
Nguyen L, Safavi-Naini R. Breaking and Mending Resilient Mix-nets. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 66–80. Available from: http://www.springerlink.com/content/0e0mwvgyt008wxkf/
Wright M, Adler M, Levine BN, Shields C. Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2003. pp. 28–43. Available from: http://portal.acm.org/citation.cfm?id=830556
2002
Serjantov A, Dingledine R, Syverson P. From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://www.springerlink.com/content/um0kf3dp88b0eg5v/
Kesdogan D, Agrawal D, Penz S. Limits of Anonymity in Open Environments. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://portal.acm.org/citation.cfm?id=731881
Douceur JR. The Sybil Attack. In: IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer-Verlag London; 2002. pp. 251–260. Available from: http://dl.acm.org/citation.cfm?id=646334.687813
Diaz C, Seys S, Claessens J, Preneel B. Towards measuring anonymity. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/3qb837jkpgukc6b5/
2000
Berthold O, Pfitzmann A, Standtke R. The disadvantages of free MIX routes and how to overcome them. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009; 2000. pp. 30–45. Available from: http://portal.acm.org/citation.cfm?id=371975