From 7c42ce8329cbf11ab97648e15cac3c93cc5392ef Mon Sep 17 00:00:00 2001 From: str4d Date: Sun, 11 Aug 2013 11:14:00 +0000 Subject: [PATCH] Added anonbib for use in papers list Source: https://gitweb.torproject.org/anonbib.git Commit: b478fc493d4be2115185d94e077bf06196495417 --- i2p2www/anonbib/BibTeX.py | 1268 +++++ i2p2www/anonbib/Makefile | 39 + i2p2www/anonbib/README | 52 + i2p2www/anonbib/TODO | 33 + i2p2www/anonbib/_template_.html | 74 + i2p2www/anonbib/_template_bibtex.html | 28 + i2p2www/anonbib/anonbib.bib | 6293 +++++++++++++++++++++++++ i2p2www/anonbib/anonbib.cfg | 163 + i2p2www/anonbib/config.py | 56 + i2p2www/anonbib/css/main.css | 111 + i2p2www/anonbib/css/pubs.css | 121 + i2p2www/anonbib/gold.gif | Bin 0 -> 540 bytes i2p2www/anonbib/metaphone.py | 193 + i2p2www/anonbib/rank.py | 202 + i2p2www/anonbib/reconcile.py | 292 ++ i2p2www/anonbib/silver.gif | Bin 0 -> 539 bytes i2p2www/anonbib/testbib/pdos.bib | 1742 +++++++ i2p2www/anonbib/tests.py | 86 + i2p2www/anonbib/upb.gif | Bin 0 -> 555 bytes i2p2www/anonbib/updateCache.py | 169 + i2p2www/anonbib/ups.gif | Bin 0 -> 536 bytes i2p2www/anonbib/venue-checklist.txt | 41 + i2p2www/anonbib/writeHTML.py | 246 + 23 files changed, 11209 insertions(+) create mode 100644 i2p2www/anonbib/BibTeX.py create mode 100644 i2p2www/anonbib/Makefile create mode 100644 i2p2www/anonbib/README create mode 100644 i2p2www/anonbib/TODO create mode 100644 i2p2www/anonbib/_template_.html create mode 100644 i2p2www/anonbib/_template_bibtex.html create mode 100644 i2p2www/anonbib/anonbib.bib create mode 100644 i2p2www/anonbib/anonbib.cfg create mode 100644 i2p2www/anonbib/config.py create mode 100644 i2p2www/anonbib/css/main.css create mode 100644 i2p2www/anonbib/css/pubs.css create mode 100644 i2p2www/anonbib/gold.gif create mode 100644 i2p2www/anonbib/metaphone.py create mode 100644 i2p2www/anonbib/rank.py create mode 100644 i2p2www/anonbib/reconcile.py create mode 100644 i2p2www/anonbib/silver.gif create mode 100644 i2p2www/anonbib/testbib/pdos.bib create mode 100644 i2p2www/anonbib/tests.py create mode 100644 i2p2www/anonbib/upb.gif create mode 100755 i2p2www/anonbib/updateCache.py create mode 100644 i2p2www/anonbib/ups.gif create mode 100644 i2p2www/anonbib/venue-checklist.txt create mode 100755 i2p2www/anonbib/writeHTML.py diff --git a/i2p2www/anonbib/BibTeX.py b/i2p2www/anonbib/BibTeX.py new file mode 100644 index 00000000..110e5ff3 --- /dev/null +++ b/i2p2www/anonbib/BibTeX.py @@ -0,0 +1,1268 @@ +#!/usr/bin/python2 +# Copyright 2003-2008, Nick Mathewson. See LICENSE for licensing info. + +"""BibTeX.py -- parse and manipulate BibTeX files and entries. + + Based on perl code by Eddie Kohler; heavily modified. +""" + +import cStringIO +import re +import sys +import os + +import config + +import rank + +__all__ = [ 'ParseError', 'BibTeX', 'BibTeXEntry', 'htmlize', + 'ParsedAuthor', 'FileIter', 'Parser', 'parseFile', + 'splitBibTeXEntriesBy', 'sortBibTexEntriesBy', ] + +# List: must map from month number to month name. +MONTHS = [ None, + "January", "February", "March", "April", "May", "June", + "July", "August", "September", "October", "November", "December"] + +# Fields that we only care about for making web pages (BibTeX doesn't +# recognize them.) +WWW_FIELDS = [ 'www_section', 'www_important', 'www_remarks', + 'www_abstract_url', 'www_html_url', 'www_pdf_url', 'www_ps_url', + 'www_txt_url', 'www_ps_gz_url', 'www_amazon_url', + 'www_excerpt_url', 'www_publisher_url', + 'www_cache_section', 'www_tags' ] + +def url_untranslate(s): + """Change a BibTeX key into a string suitable for use in a URL.""" + s = re.sub(r'([%<>`#, &_\';])', + lambda m: "_%02x"%ord(m.group(1)), + s) + s = s.replace("/",":") + return s + +class ParseError(Exception): + """Raised on invalid BibTeX""" + pass + + +def smartJoin(*lst): + """Equivalent to os.path.join, but handle"." and ".." entries a bit better. + """ + lst = [ item for item in lst if item != "." ] + idx = 0 + while idx < len(lst): + if idx > 0 and lst[idx] == "..": + del lst[idx] + else: + idx += 1 + return os.path.join(*lst) + +class BibTeX: + """A parsed BibTeX file""" + def __init__(self): + self.entries = [] # List of BibTeXEntry + self.byKey = {} # Map from BibTeX key to BibTeX entry. + def addEntry(self, ent): + """Add a BibTeX entry to this file.""" + k = ent.key + if self.byKey.get(ent.key.lower()): + print >> sys.stderr, "Already have an entry named %s"%k + return + self.entries.append(ent) + self.byKey[ent.key.lower()] = ent + def resolve(self): + """Validate all entries in this file, and resolve cross-references""" + seen = {} + for ent in self.entries: + seen.clear() + while ent.get('crossref'): + try: + cr = self.byKey[ent['crossref'].lower()] + except KeyError: + print "No such crossref: %s"% ent['crossref'] + break + if seen.get(cr.key): + raise ParseError("Circular crossref at %s" % ent.key) + seen[cr.key] = 1 + del ent.entries['crossref'] + + if cr.entryLine < ent.entryLine: + print "Warning: crossref %s used after declaration"%cr.key + + for k in cr.entries.keys(): + if ent.entries.has_key(k): + print "ERROR: %s defined both in %s and in %s"%( + k,ent.key,cr.key) + else: + ent.entries[k] = cr.entries[k] + + ent.resolve() + newEntries = [] + rk = config.REQUIRE_KEY + if rk is None: + # hack: if no key is required, require "title", since every + # entry will have a title. + rk = "title" + + for ent in self.entries: + if ent.type in config.OMIT_ENTRIES or not ent.has_key(rk): + ent.check() + del self.byKey[ent.key.lower()] + else: + newEntries.append(ent) + self.entries = newEntries + +def buildAuthorTable(entries): + """Given a list of BibTeXEntry, return a map from parsed author name to + parsed canonical name. + """ + authorsByLast = {} + for e in entries: + for a in e.parsedAuthor: + authorsByLast.setdefault(tuple(a.last), []).append(a) + # map from author to collapsed author. + result = {} + for k,v in config.COLLAPSE_AUTHORS.items(): + a = parseAuthor(k)[0] + c = parseAuthor(v)[0] + result[c] = c + result[a] = c + + for e in entries: + for author in e.parsedAuthor: + if result.has_key(author): + continue + + c = author + for a in authorsByLast[tuple(author.last)]: + if a is author: + continue + c = c.collapsesTo(a) + result[author] = c + + if 0: + for a,c in result.items(): + if a != c: + print "Collapsing authors: %s => %s" % (a,c) + if 0: + print parseAuthor("Franz Kaashoek")[0].collapsesTo( + parseAuthor("M. Franz Kaashoek")[0]) + print parseAuthor("Paul F. Syverson")[0].collapsesTo( + parseAuthor("Paul Syverson")[0]) + print parseAuthor("Paul Syverson")[0].collapsesTo( + parseAuthor("Paul F. Syverson")[0]) + + return result + +def splitEntriesBy(entries, field): + """Take a list of BibTeX entries and the name of a bibtex field; return + a map from vield value to list of entry.""" + result = {} + for ent in entries: + key = ent.get(field) + try: + result[key].append(ent) + except: + result[key] = [ent] + return result + +def splitSortedEntriesBy(entries, field): + """Take inputs as in splitEntriesBy, where 'entries' is sorted by 'field'. + Return a list of (field-value, entry-list) tuples, in the order + given in 'entries'.""" + result = [] + curVal = "alskjdsakldj" + curList = [] + for ent in entries: + key = ent.get(field) + if key == curVal: + curList.append(ent) + else: + curVal = key + curList = [ent] + result.append((curVal, curList)) + return result + +def sortEntriesBy(entries, field, default): + """Take inputs as in splitEntriesBy, and return a list of entries sorted + by the value of 'field'. Entries without 'field' are sorted as if their + value were 'default'. + """ + tmp = [] + i = 0 + for ent in entries: + i += 1 + v = ent.get(field, default) + if v.startswith(""): + v = default + tmp.append((txtize(v), i, ent)) + tmp.sort() + return [ t[2] for t in tmp ] + +def splitEntriesByAuthor(entries): + """Take a list of entries, sort them by author names, and return: + a sorted list of (authorname-in-html, bibtex-entry-list) tuples, + a map from authorname-in-html to name-for-url. + Entries with multiple authors appear once per author. + """ + collapsedAuthors = buildAuthorTable(entries) + entries = sortEntriesByDate(entries) + result = {} # Name in sorting order -> entries + htmlResult = {} # name in sorting order -> Full name + url_map = {} # Full name -> Url + for ent in entries: + for a in ent.parsedAuthor: + canonical = collapsedAuthors[a] + url = canonical.getHomepage() + sortkey = canonical.getSortingName() + secname = canonical.getSectionName() + if url: + url_map[secname] = url + + htmlResult[sortkey] = secname + result.setdefault(sortkey, []).append(ent) + sortnames = result.keys() + sortnames.sort() + sections = [ (htmlResult[n], result[n]) for n in sortnames ] + return sections, url_map + +## def sortEntriesByAuthor(entries): +## tmp = [] +## i = 0 +## for ent in entries: +## i += 1 +## authors = [ txtize(" ".join(a.von+a.last+a.first+a.jr)) +## for a in ent.parsedAuthor ] +## tmp.append((tuple(authors), i, ent)) +## tmp.sort() +## return [ t[2] for t in tmp ] + +def sortEntriesByDate(entries): + """Sort a list of entries by their publication date.""" + tmp = [] + i = 0 + for ent in entries: + i += 1 + if (ent.get('month') == "forthcoming" or + ent.get('year') == "forthcoming"): + tmp.append((20000*13, i, ent)) + continue + try: + monthname = ent.get("month") + if monthname is not None: + match = re.match(r"(\w+)--\w+", monthname) + if match: + monthname = match.group(1) + mon = MONTHS.index(monthname) + except ValueError: + print "Unknown month %r in %s"%(ent.get("month"), ent.key) + mon = 0 + + try: + date = int(ent['year'])*13 + mon + except KeyError: + print "ERROR: No year field in %s"%ent.key + date = 10000*13 + except ValueError: + date = 10000*13 + tmp.append((date, i, ent)) + tmp.sort() + return [ t[2] for t in tmp ] + + +# List of fields that appear when we display the entries as BibTeX. +DISPLAYED_FIELDS = [ 'title', 'author', 'journal', 'booktitle', +'school', 'institution', 'organization', 'volume', 'number', 'year', +'month', 'address', 'location', 'chapter', 'edition', 'pages', 'editor', +'howpublished', 'key', 'publisher', 'type', 'note', 'series' ] + +class BibTeXEntry: + """A single BibTeX entry.""" + def __init__(self, type, key, entries): + self.type = type # What kind of entry is it? (@book,@injournal,etc) + self.key = key # What key does it have? + self.entries = entries # Map from key to value. + self.entryLine = 0 # Defined on this line number + def get(self, k, v=None): + return self.entries.get(k,v) + def has_key(self, k): + return self.entries.has_key(k) + def __getitem__(self, k): + return self.entries[k] + def __setitem__(self, k, v): + self.entries[k] = v + def __str__(self): + return self.format(70,1) + def getURL(self): + """Return the best URL to use for this paper, or None.""" + best = None + for field in ['www_pdf_url', 'www_ps_gz_url', 'www_ps_url', + 'www_html_url', 'www_txt_url', ]: + u = self.get(field) + if u: + if not best: + best = u + elif (best.startswith("http://citeseer.nj.nec.com/") + and not u.startswith("http://citeseer.nj.nec.com/")): + best = u + return best + + def format(self, width=70, indent=8, v=0, invStrings={}): + """Format this entry as BibTeX.""" + d = ["@%s{%s,\n" % (self.type, self.key)] + if v: + df = DISPLAYED_FIELDS[:] + for k in self.entries.keys(): + if k not in df: + df.append(k) + else: + df = DISPLAYED_FIELDS + for f in df: + if not self.entries.has_key(f): + continue + v = self.entries[f] + if v.startswith(""): + d.append("%%%%% ERROR: Missing field\n") + d.append("%% %s = {?????},\n"%f) + continue + np = v.translate(ALLCHARS, PRINTINGCHARS) + if np: + d.append("%%%%% "+("ERROR: Non-ASCII characters: '%r'\n"%np)) + d.append(" ") + v = v.replace("&", "&") + if invStrings.has_key(v): + s = "%s = %s,\n" %(f, invStrings[v]) + else: + s = "%s = {%s},\n" % (f, v) + d.append(_split(s,width,indent)) + d.append("}\n") + return "".join(d) + def resolve(self): + """Handle post-processing for this entry""" + a = self.get('author') + if a: + self.parsedAuthor = parseAuthor(a) + #print a + #print " => ",repr(self.parsedAuthor) + else: + self.parsedAuthor = None + + def isImportant(self): + """Return 1 iff this entry is marked as important""" + imp = self.get("www_important") + if imp and imp.strip().lower() not in ("no", "false", "0"): + return 1 + return 0 + + def check(self): + """Print any errors for this entry, and return true if there were + none.""" + errs = self._check() + for e in errs: + print e + return not errs + + def _check(self): + errs = [] + if self.type == 'inproceedings': + fields = 'booktitle', 'year' + elif self.type == 'incollection': + fields = 'booktitle', 'year' + elif self.type == 'proceedings': + fields = 'booktitle', 'editor' + elif self.type == 'article': + fields = 'journal', 'year' + elif self.type == 'techreport': + fields = 'institution', + elif self.type == 'misc': + fields = 'howpublished', + elif self.type in ('mastersthesis', 'phdthesis'): + fields = () + else: + fields = () + errs.append("ERROR: odd type %s"%self.type) + if self.type != 'proceedings': + fields += 'title', 'author', 'www_section', 'year' + + for field in fields: + if self.get(field) is None or \ + self.get(field).startswith(""): + errs.append("ERROR: %s has no %s field" % (self.key, field)) + self.entries[field] = "%s:??"%field + + if self.type == 'inproceedings': + if self.get("booktitle"): + if not self['booktitle'].startswith("Proceedings of") and \ + not self['booktitle'].startswith("{Proceedings of"): + errs.append("ERROR: %s's booktitle (%r) doesn't start with 'Proceedings of'" % (self.key, self['booktitle'])) + + if self.has_key("pages") and not re.search(r'\d+--\d+', self['pages']): + errs.append("ERROR: Misformed pages in %s"%self.key) + + if self.type == 'proceedings': + if self.get('title'): + errs.append("ERROR: %s is a proceedings: it should have a booktitle, not a title." % self.key) + + for field, value in self.entries.items(): + if value.translate(ALLCHARS, PRINTINGCHARS): + errs.append("ERROR: %s.%s has non-ASCII characters"%( + self.key, field)) + if field.startswith("www_") and field not in WWW_FIELDS: + errs.append("ERROR: unknown www field %s"% field) + if value.strip()[-1:] == '.' and \ + field not in ("notes", "www_remarks", "author"): + errs.append("ERROR: %s.%s has an extraneous period"%(self.key, + field)) + return errs + + def biblio_to_html(self): + """Return the HTML for the citation portion of entry.""" + if self.type in ('inproceedings', 'incollection'): + booktitle = self['booktitle'] + bookurl = self.get('bookurl') + if bookurl: + m = PROCEEDINGS_RE.match(booktitle) + if m: + res = ["In the ", m.group(1), + ''%bookurl, m.group(2), ""] + else: + res = ['In the %s' % (bookurl,booktitle)] + else: + res = ["In the ", booktitle ] + + if self.get("edition"): + res.append(",") + res.append(self['edition']) + if self.get("location"): + res.append(", ") + res.append(self['location']) + elif self.get("address"): + res.append(", ") + res.append(self['address']) + res.append(", %s %s" % (self.get('month',""), self['year'])) + if not self.get('pages'): + pass + elif "-" in self['pages']: + res.append(", pages %s"%self['pages']) + else: + res.append(", page %s"%self['pages']) + elif self.type == 'article': + res = ["In "] + if self.get('journalurl'): + res.append('%s'% + (self['journalurl'],self['journal'])) + else: + res.append(self['journal']) + if self.get('volume'): + res.append(" %s"%self['volume']) + if self.get('number'): + res.append("(%s)"%self['number']) + res.append(", %s %s" % (self.get('month',""), self['year'])) + if not self.get('pages'): + pass + elif "-" in self['pages']: + res.append(", pages %s"%self['pages']) + else: + res.append(", page %s"%self['pages']) + elif self.type == 'techreport': + res = [ "%s %s %s" % (self['institution'], + self.get('type', 'technical report'), + self.get('number', "")) ] + if self.get('month') or self.get('year'): + res.append(", %s %s" % (self.get('month', ''), + self.get('year', ''))) + elif self.type == 'mastersthesis' or self.type == 'phdthesis': + if self.get('type'): + res = [self['type']] + elif self.type == 'mastersthesis': + res = ["Masters's thesis"] + else: + res = ["Ph.D. thesis"] + if self.get('school'): + res.append(", %s"%(self['school'])) + if self.get('month') or self.get('year'): + res.append(", %s %s" % (self.get('month', ''), + self.get('year', ''))) + elif self.type == 'book': + res = [self['publisher']] + if self.get('year'): + res.append(" "); + res.append(self.get('year')); + # res.append(", %s"%(self.get('year'))) + if self.get('series'): + res.append(","); + res.append(self['series']); + elif self.type == 'misc': + res = [self['howpublished']] + if self.get('month') or self.get('year'): + res.append(", %s %s" % (self.get('month', ''), + self.get('year', ''))) + if not self.get('pages'): + pass + elif "-" in self['pages']: + res.append(", pages %s"%self['pages']) + else: + res.append(", page %s"%self['pages']) + else: + res = ["<Odd type %s>"%self.type] + + res[0:0] = [""] + res.append(".") + + bibtexurl = "./bibtex.html#%s"%url_untranslate(self.key) + res.append((" " + "(BibTeX entry)" + "") %bibtexurl) + return htmlize("".join(res)) + + def to_html(self, cache_path="./cache", base_url="."): + """Return the HTML for this entry.""" + imp = self.isImportant() + draft = self.get('year') == 'forthcoming' + if imp: + res = ["
  • " ] + elif draft: + res = ["

  • " ] + else: + res = ["

  • "] + + if imp or not draft: + # Add a picture of the rank + # Only if year is known or paper important! + r = rank.get_rank_html(self['title'], self.get('year'), + update=False, base_url=base_url) + if r is not None: + res.append(r) + + res.append("%s"%( + url_untranslate(self.key),htmlize(self['title']))) + + for cached in 0,1: + availability = [] + if not cached: + for which in [ "amazon", "excerpt", "publisher" ]: + key = "www_%s_url"%which + if self.get(key): + url=self[key] + url = unTeXescapeURL(url) + availability.append('%s' %(url,which)) + + cache_section = self.get('www_cache_section', ".") + if cache_section not in config.CACHE_SECTIONS: + if cache_section != ".": + print >>sys.stderr, "Unrecognized cache section %s"%( + cache_section) + cache_section="." + + for key, name, ext in (('www_abstract_url', 'abstract','abstract'), + ('www_html_url', 'HTML', 'html'), + ('www_pdf_url', 'PDF', 'pdf'), + ('www_ps_url', 'PS', 'ps'), + ('www_txt_url', 'TXT', 'txt'), + ('www_ps_gz_url', 'gzipped PS','ps.gz') + ): + if cached: + #XXXX the URL needs to be relative to the absolute + #XXXX cache path. + url = smartJoin(cache_path,cache_section, + "%s.%s"%(self.key,ext)) + fname = smartJoin(config.OUTPUT_DIR, config.CACHE_DIR, + cache_section, + "%s.%s"%(self.key,ext)) + if not os.path.exists(fname): continue + else: + url = self.get(key) + if not url: continue + url = unTeXescapeURL(url) + url = url.replace('&', '&') + availability.append('%s' %(url,name)) + + if availability: + res.append([" ", " "][cached]) + res.append("(") + if cached: res.append("Cached: ") + res.append(", ".join(availability)) + res.append(")") + + res.append("
    by ") + + #res.append("\n\n" % self.parsedAuthor) + htmlAuthors = [ a.htmlizeWithLink() for a in self.parsedAuthor ] + + if len(htmlAuthors) == 1: + res.append(htmlAuthors[0]) + elif len(htmlAuthors) == 2: + res.append(" and ".join(htmlAuthors)) + else: + res.append(", ".join(htmlAuthors[:-1])) + res.append(", and ") + res.append(htmlAuthors[-1]) + + if res[-1][-1] != '.': + res.append(".") + res.append("
    \n") + res.append(self.biblio_to_html()) + res.append("·"%url_untranslate(self.key)) + res.append("

    ") + + if self.get('www_remarks'): + res.append("

    %s

    "%htmlize( + self['www_remarks'])) + + if imp or draft: + res.append("") + res.append("
  • \n\n") + + return "".join(res) + +def unTeXescapeURL(s): + """Turn a URL as formatted in TeX into a real URL.""" + s = s.replace("\\_", "_") + s = s.replace("\\-", "") + s = s.replace("\{}", "") + s = s.replace("{}", "") + return s + +def TeXescapeURL(s): + """Escape a URL for use in TeX""" + s = s.replace("_", "\\_") + s = s.replace("~", "\{}~") + return s + +RE_LONE_AMP = re.compile(r'&([^a-z0-9])') +RE_LONE_I = re.compile(r'\\i([^a-z0-9])') +RE_ACCENT = re.compile(r'\\([\'`~^"c])([^{]|{.})') +RE_LIGATURE = re.compile(r'\\(AE|ae|OE|oe|AA|aa|O|o|ss)([^a-z0-9])') +ACCENT_MAP = { "'" : 'acute', + "`" : 'grave', + "~" : 'tilde', + "^" : 'circ', + '"' : 'uml', + "c" : 'cedil', + } +UNICODE_MAP = { 'ń' : 'ń', } +HTML_LIGATURE_MAP = { + 'AE' : 'Æ', + 'ae' : 'æ', + 'OE' : 'Œ', + 'oe' : 'œ', + 'AA' : 'Å', + 'aa' : 'å', + 'O' : 'Ø', + 'o' : 'ø', + 'ss' : 'ß', + } +RE_TEX_CMD = re.compile(r"(?:\\[a-zA-Z@]+|\\.)") +RE_PAGE_SPAN = re.compile(r"(\d)--(\d)") +def _unaccent(m): + accent,char = m.groups() + if char[0] == '{': + char = char[1] + accented = "&%s%s;" % (char, ACCENT_MAP[accent]) + return UNICODE_MAP.get(accented, accented) +def _unlig_html(m): + return "%s%s"%(HTML_LIGATURE_MAP[m.group(1)],m.group(2)) +def htmlize(s): + """Turn a TeX string into good-looking HTML.""" + s = RE_LONE_AMP.sub(lambda m: "&%s" % m.group(1), s) + s = RE_LONE_I.sub(lambda m: "i%s" % m.group(1), s) + s = RE_ACCENT.sub(_unaccent, s) + s = unTeXescapeURL(s) + s = RE_LIGATURE.sub(_unlig_html, s); + s = RE_TEX_CMD.sub("", s) + s = s.translate(ALLCHARS, "{}") + s = RE_PAGE_SPAN.sub(lambda m: "%s-%s"%(m.groups()), s) + s = s.replace("---", "—"); + s = s.replace("--", "–"); + return s + +def author_url(author): + """Given an author's name, return a URL for his/her homepage.""" + for pat, url in config.AUTHOR_RE_LIST: + if pat.search(author): + return url + return None + +def txtize(s): + """Turn a TeX string into decnent plaintext.""" + s = RE_LONE_I.sub(lambda m: "i%s" % m.group(1), s) + s = RE_ACCENT.sub(lambda m: "%s" % m.group(2), s) + s = RE_LIGATURE.sub(lambda m: "%s%s"%m.groups(), s) + s = RE_TEX_CMD.sub("", s) + s = s.translate(ALLCHARS, "{}") + return s + +PROCEEDINGS_RE = re.compile( + r'((?:proceedings|workshop record) of(?: the)? )(.*)', + re.I) + +class ParsedAuthor: + """The parsed name of an author. + + Eddie deserves credit for this incredibly hairy business. + """ + def __init__(self, first, von, last, jr): + self.first = first + self.von = von + self.last = last + self.jr = jr + self.collapsable = 1 + + self.html = htmlize(str(self)) + self.txt = txtize(str(self)) + + s = self.html + for pat in config.NO_COLLAPSE_AUTHORS_RE_LIST: + if pat.search(s): + self.collapsable = 0 + break + + def __eq__(self, o): + return ((self.first == o.first) and + (self.last == o.last) and + (self.von == o.von) and + (self.jr == o.jr)) + + def __hash__(self): + return hash(repr(self)) + + def collapsesTo(self, o): + """Return true iff 'o' could be a more canonical version of this author + """ + if not self.collapsable or not o.collapsable: + return self + + if self.last != o.last or self.von != o.von or self.jr != o.jr: + return self + if not self.first: + return o + + if len(self.first) == len(o.first): + n = [] + for a,b in zip(self.first, o.first): + if a == b: + n.append(a) + elif len(a) == 2 and a[1] == '.' and a[0] == b[0]: + n.append(b) + elif len(b) == 2 and b[1] == '.' and a[0] == b[0]: + n.append(a) + else: + return self + if n == self.first: + return self + elif n == o.first: + return o + else: + return self + else: + realname = max([len(n) for n in self.first+o.first])>2 + if not realname: + return self + + if len(self.first) < len(o.first): + short = self.first; long = o.first + else: + short = o.first; long = self.first + + initials_s = "".join([n[0] for n in short]) + initials_l = "".join([n[0] for n in long]) + idx = initials_l.find(initials_s) + if idx < 0: + return self + n = long[:idx] + for i in range(idx, idx+len(short)): + a = long[i]; b = short[i-idx] + if a == b: + n.append(a) + elif len(a) == 2 and a[1] == '.' and a[0] == b[0]: + n.append(b) + elif len(b) == 2 and b[1] == '.' and a[0] == b[0]: + n.append(a) + else: + return self + n += long[idx+len(short):] + + if n == self.first: + return self + elif n == o.first: + return o + else: + return self + + def __repr__(self): + return "ParsedAuthor(%r,%r,%r,%r)"%(self.first,self.von, + self.last,self.jr) + def __str__(self): + a = " ".join(self.first+self.von+self.last) + if self.jr: + return "%s, %s" % (a,self.jr) + return a + + def getHomepage(self): + s = self.html + for pat, url in config.AUTHOR_RE_LIST: + if pat.search(s): + return url + return None + + def getSortingName(self): + """Return a representation of this author's name in von-last-first-jr + order, unless overridden by ALPH """ + s = self.html + for pat,v in config.ALPHABETIZE_AUTHOR_AS_RE_LIST: + if pat.search(s): + return v + + return txtize(" ".join(self.von+self.last+self.first+self.jr)) + + def getSectionName(self): + """Return a HTML representation of this author's name in + last, first von, jr order""" + secname = " ".join(self.last) + more = self.first+self.von + if more: + secname += ", "+" ".join(more) + if self.jr: + secname += ", "+" ".join(self.jr) + secname = htmlize(secname) + return secname + + def htmlizeWithLink(self): + a = self.html + u = self.getHomepage() + if u: + return "%s"%(u,a) + else: + return a + +def _split(s,w=79,indent=8): + r = [] + s = re.sub(r"\s+", " ", s) + first = 1 + indentation = "" + while len(s) > w: + for i in xrange(w-1, 20, -1): + if s[i] == ' ': + r.append(indentation+s[:i]) + s = s[i+1:] + break + else: + r.append(indentation+s.strip()) + s = "" + if first: + first = 0 + w -= indent + indentation = " "*indent + if (s): + r.append(indentation+s) + r.append("") + return "\n".join(r) + +class FileIter: + def __init__(self, fname=None, file=None, it=None, string=None): + if fname: + file = open(fname, 'r') + if string: + file = cStringIO.StringIO(string) + if file: + it = iter(file.xreadlines()) + self.iter = it + assert self.iter + self.lineno = 0 + self._next = it.next + def next(self): + self.lineno += 1 + return self._next() + + +def parseAuthor(s): + try: + return _parseAuthor(s) + except: + print >>sys.stderr, "Internal error while parsing author %r"%s + raise + +def _parseAuthor(s): + """Take an author string and return a list of ParsedAuthor.""" + items = [] + + s = s.strip() + while s: + s = s.strip() + bracelevel = 0 + for i in xrange(len(s)): + if s[i] == '{': + bracelevel += 1 + elif s[i] == '}': + bracelevel -= 1 + elif bracelevel <= 0 and s[i] in " \t\n,": + break + if i+1 == len(s): + items.append(s) + else: + items.append(s[0:i]) + if (s[i] == ','): + items.append(',') + s = s[i+1:] + + authors = [[]] + for item in items: + if item == 'and': + authors.append([]) + else: + authors[-1].append(item) + + parsedAuthors = [] + # Split into first, von, last, jr + for author in authors: + commas = 0 + fvl = [] + vl = [] + f = [] + v = [] + l = [] + j = [] + cur = fvl + for item in author: + if item == ',': + if commas == 0: + vl = fvl + fvl = [] + cur = f + else: + j.extend(f) + cur = f = [] + commas += 1 + else: + cur.append(item) + + if commas == 0: + split_von(f,v,l,fvl) + else: + f_tmp = [] + split_von(f_tmp,v,l,vl) + + parsedAuthors.append(ParsedAuthor(f,v,l,j)) + + return parsedAuthors + +ALLCHARS = "".join(map(chr,range(256))) +PRINTINGCHARS = "\t\n\r"+"".join(map(chr,range(32, 127))) +LC_CHARS = "abcdefghijklmnopqrstuvwxyz" +SV_DELCHARS = ("ABCDEFGHIJKLMNOPQRSTUVWXYZ" + "abcdefghijklmnopqrstuvwxyz" + "@") +RE_ESCAPED = re.compile(r'\\.') +def split_von(f,v,l,x): + in_von = 0 + while x: + tt = t = x[0] + del x[0] + if tt[:2] == '{\\': + tt = tt.translate(ALLCHARS, SV_DELCHARS) + tt = RE_ESCAPED.sub("", tt) + tt = tt.translate(ALLCHARS, "{}") + if tt.translate(ALLCHARS, LC_CHARS) == "": + v.append(t) + in_von = 1 + elif in_von and f is not None: + l.append(t) + l.extend(x) + return + else: + f.append(t) + if not in_von: + l.append(f[-1]) + del f[-1] + + +class Parser: + """Parser class: reads BibTeX from a file and returns a BibTeX object.""" + ## Fields + # strings: maps entry string keys to their values. + # newStrings: all string definitions not in config.INITIAL_STRINGS + # invStrings: map from string values to their keys. + # fileiter: the line iterator we're parsing from. + # result: the BibTeX object that we're parsing into + # litStringLine: the line on which we started parsing a literal string; + # 0 for none. + # entryLine: the line on which the current entry started; 0 for none. + # + # curEntType: the type of the entry we're parsing now. (paper,article,etc) + def __init__(self, fileiter, initial_strings, result=None): + self.strings = config.INITIAL_STRINGS.copy() + self.strings.update(initial_strings) + self.newStrings = {} + self.invStrings = {} + for k,v in config.INITIAL_STRINGS.items(): + self.invStrings[v]=k + self.fileiter = fileiter + if result is None: + result = BibTeX() + self.result = result + self.litStringLine = 0 + self.entryLine = 0 + + def _parseKey(self, line): + it = self.fileiter + line = _advance(it,line) + m = KEY_RE.match(line) + if not m: + raise ParseError("Expected key at line %s"%self.fileiter.lineno) + key, line = m.groups() + return key, line + + def _parseValue(self, line): + it = self.fileiter + bracelevel = 0 + data = [] + while 1: + line = _advance(it,line) + line = line.strip() + assert line + + # Literal string? + if line[0] == '"': + line=line[1:] + self.litStringLine = it.lineno + while 1: + if bracelevel: + m = BRACE_CLOSE_RE.match(line) + if m: + data.append(m.group(1)) + data.append('}') + line = m.group(2) + bracelevel -= 1 + continue + else: + m = STRING_CLOSE_RE.match(line) + if m: + data.append(m.group(1)) + line = m.group(2) + break + m = BRACE_OPEN_RE.match(line) + if m: + data.append(m.group(1)) + line = m.group(2) + bracelevel += 1 + continue + data.append(line) + data.append(" ") + line = it.next() + self.litStringLine = 0 + elif line[0] == '{': + bracelevel += 1 + line = line[1:] + while bracelevel: + m = BRACE_CLOSE_RE.match(line) + if m: + #print bracelevel, "A", repr(m.group(1)) + data.append(m.group(1)) + bracelevel -= 1 + if bracelevel > 0: + #print bracelevel, "- '}'" + data.append('}') + line = m.group(2) + continue + m = BRACE_OPEN_RE.match(line) + if m: + bracelevel += 1 + #print bracelevel, "B", repr(m.group(1)) + data.append(m.group(1)) + line = m.group(2) + continue + else: + #print bracelevel, "C", repr(line) + data.append(line) + data.append(" ") + line = it.next() + elif line[0] == '#': + print >>sys.stderr, "Weird concat on line %s"%it.lineno + elif line[0] in "},": + if not data: + print >>sys.stderr, "No data after field on line %s"%( + it.lineno) + else: + m = RAW_DATA_RE.match(line) + if m: + s = self.strings.get(m.group(1).lower()) + if s is not None: + data.append(s) + else: + data.append(m.group(1)) + line = m.group(2) + else: + raise ParseError("Questionable line at line %s"%it.lineno) + + # Got a string, check for concatenation. + if line.isspace() or not line: + data.append(" ") + line = _advance(it,line) + line = line.strip() + assert line + if line[0] == '#': + line = line[1:] + else: + data = "".join(data) + data = re.sub(r'\s+', ' ', data) + data = re.sub(r'^\s+', '', data) + data = re.sub(r'\s+$', '', data) + return data, line + + def _parseEntry(self, line): #name, strings, entries + it = self.fileiter + self.entryLine = it.lineno + line = _advance(it,line) + + m = BRACE_BEGIN_RE.match(line) + if not m: + raise ParseError("Expected an opening brace at line %s"%it.lineno) + line = m.group(1) + + proto = { 'string' : 'p', + 'preamble' : 'v', + }.get(self.curEntType, 'kp*') + + v = [] + while 1: + line = _advance(it,line) + + m = BRACE_END_RE.match(line) + if m: + line = m.group(1) + break + if not proto: + raise ParseError("Overlong entry starting on line %s" + % self.entryLine) + elif proto[0] == 'k': + key, line = self._parseKey(line) + v.append(key) + elif proto[0] == 'v': + value, line = self._parseValue(line) + v.append(value) + elif proto[0] == 'p': + key, line = self._parseKey(line) + v.append(key) + line = _advance(it,line) + line = line.lstrip() + if line[0] == '=': + line = line[1:] + value, line = self._parseValue(line) + v.append(value) + else: + assert 0 + line = line.strip() + if line and line[0] == ',': + line = line[1:] + if proto and proto[1:] != '*': + proto = proto[1:] + if proto and proto[1:] != '*': + raise ParseError("Missing arguments to %s on line %s" % ( + self.curEntType, self.entryLine)) + + if self.curEntType == 'string': + self.strings[v[0]] = v[1] + self.newStrings[v[0]] = v[1] + self.invStrings[v[1]] = v[0] + elif self.curEntType == 'preamble': + pass + else: + key = v[0] + d = {} + for i in xrange(1,len(v),2): + d[v[i].lower()] = v[i+1] + ent = BibTeXEntry(self.curEntType, key, d) + ent.entryLine = self.entryLine + self.result.addEntry(ent) + + return line + + def parse(self): + try: + self._parse() + except StopIteration: + if self.litStringLine: + raise ParseError("Unexpected EOF in string (started on %s)" % + self.litStringLine) + elif self.entryLine: + raise ParseError("Unexpected EOF at line %s (entry started " + "on %s)" % (self.fileiter.lineno, + self.entryLine)) + + self.result.invStrings = self.invStrings + self.result.newStrings = self.newStrings + + return self.result + + def _parse(self): + it = self.fileiter + line = it.next() + while 1: + # Skip blank lines. + while not line or line.isspace() or OUTER_COMMENT_RE.match(line): + line = it.next() + # Get the first line of an entry. + m = ENTRY_BEGIN_RE.match(line) + if m: + self.curEntType = m.group(1).lower() + line = m.group(2) + line = self._parseEntry(line) + self.entryLine = 0 + else: + raise ParseError("Bad input at line %s (expected a new entry.)" + % it.lineno) + +def _advance(it,line): + while not line or line.isspace() or COMMENT_RE.match(line): + line = it.next() + return line + +# Matches a comment line outside of an entry. +OUTER_COMMENT_RE = re.compile(r'^\s*[\#\%]') +# Matches a comment line inside of an entry. +COMMENT_RE = re.compile(r'^\s*\%') +# Matches the start of an entry. group 1 is the type of the entry. +# group 2 is the rest of the line. +ENTRY_BEGIN_RE = re.compile(r'''^\s*\@([^\s\"\%\'\(\)\,\=\{\}]+)(.*)''') +# Start of an entry. group 1 is the keyword naming the entry. +BRACE_BEGIN_RE = re.compile(r'\s*\{(.*)') +BRACE_END_RE = re.compile(r'\s*\}(.*)') +KEY_RE = re.compile(r'''\s*([^\"\#\%\'\(\)\,\=\{\}\s]+)(.*)''') + +STRING_CLOSE_RE = re.compile(r'^([^\{\}\"]*)\"(.*)') +BRACE_CLOSE_RE = re.compile(r'^([^\{\}]*)\}(.*)') +BRACE_OPEN_RE = re.compile(r'^([^\{\}]*\{)(.*)') +RAW_DATA_RE = re.compile(r'^([^\s\},]+)(.*)') + +def parseFile(filename, result=None): + """Helper function: parse a single BibTeX file""" + f = FileIter(fname=filename) + p = Parser(f, {}, result) + r = p.parse() + r.resolve() + for e in r.entries: + e.check() + return r + +def parseString(string, result=None): + """Helper function: parse BibTeX from a string""" + f = FileIter(string=string) + p = Parser(f, {}, result) + r = p.parse() + r.resolve() + for e in r.entries: + e.check() + return r + +if __name__ == '__main__': + if len(sys.argv)>1: + fname=sys.argv[1] + else: + fname="testbib/pdos.bib" + + r = parseFile(fname) + + for e in r.entries: + if e.type in ("proceedings", "journal"): continue + print e.to_html() + diff --git a/i2p2www/anonbib/Makefile b/i2p2www/anonbib/Makefile new file mode 100644 index 00000000..90cb8e16 --- /dev/null +++ b/i2p2www/anonbib/Makefile @@ -0,0 +1,39 @@ +PYTHON=python +VERSION=0.3-dev + +all: + $(PYTHON) writeHTML.py anonbib.cfg + +clean: + rm -f *~ */*~ *.pyc *.pyo + +update: + $(PYTHON) updateCache.py anonbib.cfg + $(PYTHON) rank.py anonbib.cfg + +suggest: + $(PYTHON) rank.py suggest anonbib.cfg + +test: + $(PYTHON) test.py + +veryclean: clean + rm -f author.html date.html topic.html bibtex.html tmp.bib + +TEMPLATES=_template_.html _template_bibtex.html +CSS=css/main.css css/pubs.css +BIBTEX=anonbib.bib +SOURCE=BibTeX.py config.py metaphone.py reconcile.py updateCache.py \ + writeHTML.py rank.py tests.py +EXTRAS=TODO README Makefile ChangeLog anonbib.cfg gold.gif silver.gif \ + upb.gif ups.gif + +DISTFILES=$(TEMPLATES) $(CSS) $(BIBTEX) $(SOURCE) $(EXTRAS) + +dist: clean + rm -rf anonbib-$(VERSION) + mkdir anonbib-$(VERSION) + tar cf - $(DISTFILES) | (cd anonbib-$(VERSION); tar xf -) + mkdir anonbib-$(VERSION)/cache + tar czf anonbib-$(VERSION).tar.gz anonbib-$(VERSION) + rm -rf anonbib-$(VERSION) diff --git a/i2p2www/anonbib/README b/i2p2www/anonbib/README new file mode 100644 index 00000000..b15ea993 --- /dev/null +++ b/i2p2www/anonbib/README @@ -0,0 +1,52 @@ +anonbib 0.3 -- Code to generate the anonymity bibliography + +Copyright (c) 2003-2008 Nick Mathewson +Based on 'PDOSBib' perl code by Eddie Kohler + +This software is licensed under the GNU GPL, version 2 or later. + +To use this software, you need to understand BibTeX and Python a +little. If it breaks, you get to keep both pieces. You will need +Python 2.2 or later. + +To use this package: + - Get a good BibTeX file. You may want to mark it up with some of the + extra keys used in our "anonbib.bib" file. All of the additional + Bibtex keys we use have the prefix "www_"; check out anonbib.bib + for their usage. + + - Edit anonbib.cfg and _template_.html and _template_bibtex.html so they + refer to your files, authors, topics, and so on. + + - Run 'python updateCache.py anonbib.cfg' to create a local cache of the + papers in your bibliography based on their www_*_url entries. (By + default, the script will ignore any entries you have already cached. To + force a fresh download of a cached file, delete it.) + + - Run 'python rank.py anonbib.cfg' to download Google Scholar rankings of + all the papers. + + - Run 'python writeHTML.py anonbib.cfg'. Fix any errors you care about. + + - Re-run these scripts when you change the bibliography. + + - If you want to merge in big BibTeX files, try using the reconcile.py + script. See the comment at the start of the file for usage info. + + +New in 0.3: + - Support for Google Scholar rankings to denote hot/rising papers. + Implemented by George Danezis. + - Make reconcile script generate more useful output. + - Add support for multiple bibliographies generated from a single bibtex + source. This is done via 'tags' on bibtex entries. If an entry is + tagged, it appears in the corresponding bibliographies. This is good + for generating a master bibliography and one or more selected readings + lists from the same source. + - Handle more errors when downloading files. + - When fetching a paper with a .ps url, generate the .ps.gz file + automatically. + - Note an error when a crossref overrides an existing field in an entry. + - Handle the Proceedings type correctly. + - Enforce proper encoding on pages: it must be number--number. + - diff --git a/i2p2www/anonbib/TODO b/i2p2www/anonbib/TODO new file mode 100644 index 00000000..c208fc2e --- /dev/null +++ b/i2p2www/anonbib/TODO @@ -0,0 +1,33 @@ + + +- More general tasks + . Know about @book + . Write unit tests for everything + . Make name parsing vaguely sane + - Maybe uncrossref in tmp.bib + - Maybe pull important papers to the start of their sections? + . Clean \{}~ when going from note to url; add \{}~ when making + note from url. + . Also clean \_ to _ and back + - Look for urls in wherepublished. + . Forgive newlines in wherepublished, note. + - When sorting by date, entries with unknown months go into a magic + "month zero" before January. Is this right? + - Strip unused features. + o Take a configuration file on the command line instead of just + importing config.py. + +- Cache tasks + - Generate a list of broken links + - Re-download all cached items if requested + - Clear dead items from cache + - Use HTTP HEAD requests to decide whetherto update stale + elements in cache. + - Add ability to honor a "www_no_cache={1}" option for entries + if the authors ask us not to cache them. + - Maybe, add ability to cache images from an HTML page. + +- Reconcile tasks + - Document it. + - Notice when there is new or different information of certain kinds + (pages, dates, etc) in the new information. diff --git a/i2p2www/anonbib/_template_.html b/i2p2www/anonbib/_template_.html new file mode 100644 index 00000000..b0eb5619 --- /dev/null +++ b/i2p2www/anonbib/_template_.html @@ -0,0 +1,74 @@ + + + + + + + + + + +%(title)s + + + + + + + +

    %(short_title)s

    +

    %(otherbibs)s

    +

    %(choices)s

    + + + + + + + + + + + +
    + + + + + + + + +

    Publications by %(field)s

    + +
      +%(entries)s +
    + +

    + + +

    Please send new or corrected entries to + +. +
    +If you can, please format them as BibTeX; see our +BibTeX source page for examples.
    +Remember to include URLs if possible: +offline papers are +less useful. +

    +

    The source code to anonbib is now in Git. See the anonbib gitweb page for more information. +

    + + + diff --git a/i2p2www/anonbib/_template_bibtex.html b/i2p2www/anonbib/_template_bibtex.html new file mode 100644 index 00000000..88f6f94b --- /dev/null +++ b/i2p2www/anonbib/_template_bibtex.html @@ -0,0 +1,28 @@ + + + + + + + + + +%(title)s: BibTeX + + + + + + + + +%(entries)s +
    + + diff --git a/i2p2www/anonbib/anonbib.bib b/i2p2www/anonbib/anonbib.bib new file mode 100644 index 00000000..67ca41e6 --- /dev/null +++ b/i2p2www/anonbib/anonbib.bib @@ -0,0 +1,6293 @@ +% +% +% Magic fields: +% +% www_tags -- used to control which page groups the paper appears in. +% This is a space-separated list. +% www_section -- the topic used under 'topics.html' +% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of +% an entry. +% www_important -- set for important entries +% www_remarks -- annotation for an entry + +%% List of sections +@string{comm = "Anonymous communication"} +@string{traffic = "Traffic analysis"} +@string{pub = "Anonymous publication"} +@string{proofs = "Provable shuffles"} +@string{methods = "Formal methods"} +@string{nym = "Pseudonymity"} +@string{pir = "Private Information Retrieval"} +@string{economics = "Economics"} +@string{censorship = "Communications Censorship"} +@string{credentials = "E-Cash / Anonymous Credentials"} +@string{misc = "Misc"} + +# +# Proposed new sections: application privacy, data anonymization, ... +# + +@string{lncs = "Lecture Notes in Computer Science"} + +%% Section: Mix Networks: Design + +@Article{chaum-mix, + author = {David Chaum}, + title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, + journal = {Communications of the ACM}, + year = {1981}, + volume = {24}, + number = {2}, + month = {February}, + www_section = comm, + www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt}, + www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html}, + www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf}, + www_important = {1}, + www_tags={selected}, +} +% www_remarks = {Chaum's paper that has all the big ideas.}, + +@ARTICLE{chaum-dc, + author = {David Chaum}, + title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability}, + journal = {Journal of Cryptology}, + year = {1988}, + volume = {1}, + pages = {65--75}, + www_section = comm, + www_tags={selected}, + www_pdf_url={http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf}, +} + +@InProceedings{ISDN-mixes, + author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, + title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, + booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems}, + year = 1991, + month = {February}, + pages = {451--463}, + www_section = comm, + www_ps_gz_url = "http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz", + www_tags={selected}, +} + +@InProceedings{BM:mixencrypt, + author = {Bodo M{\"o}ller}, + title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, + booktitle = {Proceedings of {CT-RSA} 2003}, + publisher = {Springer-Verlag, LNCS 2612}, + year = 2003, + month = {April}, + www_section = comm, + www_pdf_url = "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", + www_tags={selected}, +} + +@Misc{mixmaster-spec, + author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman}, + title = {Mixmaster {P}rotocol --- {V}ersion 2}, + howpublished = {IETF Internet Draft}, + year = 2003, + month = {July}, + www_section = comm, + www_txt_url = "http://www.abditum.com/mixmaster-spec.txt", + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{abe, + author = {Masayuki Abe}, + title = {Universally Verifiable mix-net With Verification Work Independent of + The Number of mix Servers}, + booktitle = {Proceedings of {EUROCRYPT} 1998}, + year = {1998}, + publisher = {Springer-Verlag, LNCS 1403}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{disco, + author = {Michael Waidner and Birgit Pfitzmann}, + title = {The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability}, + booktitle = {Proceedings of {EUROCRYPT} 1989}, + year = {1990}, + publisher = {Springer-Verlag, LNCS 434}, + www_section = comm, + www_ps_gz_url = "http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz", + www_tags={selected}, +} + + +@InProceedings{desmedt, + author = {Yvo Desmedt and Kaoru Kurosawa}, + title = {How To Break a Practical {MIX} and Design a New One}, + booktitle = {Proceedings of {EUROCRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1803}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/447709.html", + www_tags={selected}, +} + +@InProceedings{hybrid-mix, + author = {Miyako Ohkubo and Masayuki Abe}, + title = {A {L}ength-{I}nvariant {H}ybrid {MIX}}, + booktitle = {Proceedings of {ASIACRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1976}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{jakobsson-optimally, + author = "Markus Jakobsson and Ari Juels", + title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)", + booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01}, + year = "2001", + publisher = {ACM Press}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/492015.html", + www_tags={selected}, +} + +@InProceedings{stop-and-go, + author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes}, + title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open + System}, + booktitle = {Proceedings of Information Hiding Workshop (IH 1998)}, + year = {1998}, + publisher = {Springer-Verlag, LNCS 1525}, + www_section = comm, + www_pdf_url = "http://www.uow.edu.au/~ldn01/infohide98.pdf", + www_tags={selected}, +} +% www_important = {1}, + +@InProceedings{flash-mix, + author = {Markus Jakobsson}, + title = {Flash {M}ixing}, + booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99}, + year = {1999}, + publisher = {ACM Press}, + www_section = proofs, + www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{babel, + author = {Ceki G\"ulc\"u and Gene Tsudik}, + title = {Mixing {E}-mail With {B}abel}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96}, + year = {1996}, + month = {February}, + publisher = {IEEE}, + pages = {2--16}, + www_section = comm, + www_html_url = "http://citeseer.nj.nec.com/2254.html", + www_ps_url = "http://www.isoc.org/conferences/ndss96/gulcu.ps", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{wright02, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + title = {An Analysis of the Degradation of Anonymous Protocols}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02}, + year = {2002}, + month = {February}, + publisher = {IEEE}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf", + www_tags={selected}, +} + +@InProceedings{minion-design, + author = {George Danezis and Roger Dingledine and Nick Mathewson}, + title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {2--15}, + www_important = {1}, + www_section = comm, + www_pdf_url = "http://mixminion.net/minion-design.pdf", + www_tags={selected}, +} + +@InProceedings{agrawal03, + author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz}, + title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {16--27}, + www_pdf_url = "http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf", + www_section = traffic, + www_tags={selected}, +} + +@InProceedings{wright03, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + title = {Defending Anonymous Communication Against Passive Logging Attacks}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {28--43}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf", + www_tags={selected}, +} + +@inproceedings{sherwood-protocol, + author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan}, + title = {P5: A Protocol for Scalable Anonymous Communication}, + booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, + year = 2002, + month = {May}, + www_section = comm, + www_pdf_url = "http://www.cs.umd.edu/projects/p5/p5.pdf", + www_ps_url = "http://www.cs.umd.edu/projects/p5/p5.ps", + www_tags={selected}, +} + +@Article{remailer-history, + author = {Sameer Parekh}, + title = {Prospects for Remailers}, + journal = {First Monday}, + volume = {1}, + number = {2}, + month = {August}, + year = {1996}, + www_section = comm, + www_html_url = "http://www.firstmonday.dk/issues/issue2/remailers/", + www_tags={selected}, +} + +@InProceedings{pfitzmann85, + author = {Andreas Pfitzmann and Michael Waidner}, + title = {Networks Without User Observability -- Design Options}, + booktitle = {Proceedings of {EUROCRYPT} 1985}, + month = {April}, + year = {1985}, + publisher = {Springer-Verlag, LNCS 219}, + www_section = comm, + www_html_url = "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html", + www_tags={selected}, +} + +@Article{chaum85, + author = {David Chaum}, + title = {Security without Identification: Transaction Systems to Make Big Brother Obsolete}, + journal = CACM, + year = 1985, + volume = 28, + number = 10, + month = {October}, + www_section = misc, + www_tags={selected}, +} + +@Article{rewebber, + author = {Ian Goldberg and David Wagner}, + title = {{TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web}}, + journal = {First Monday}, + volume = {3}, + number = {4}, + month = {August}, + year = {1998}, + www_section = pub, + www_html_url = "http://www.firstmonday.dk/issues/issue3_4/goldberg/", + www_ps_url = "http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps", + www_tags={selected}, +} + +@InProceedings{mix-acc, + author = {Roger Dingledine and Michael J. Freedman and David + Hopwood and David Molnar}, + title = {{A Reputation System to Increase MIX-net + Reliability}}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {126--141}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = comm, + www_ps_url = "http://freehaven.net/doc/mix-acc/mix-acc.ps", + www_pdf_url = "http://freehaven.net/doc/mix-acc/mix-acc.pdf", + www_tags={selected}, +} + +@InProceedings{patterns-failure, + author = {Richard Clayton and George Danezis and Markus G. Kuhn}, + title = {Real World Patterns of Failure in Anonymity Systems}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {230--244}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = misc, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf", + www_tags={selected}, +} + +@InProceedings{casc-rep, + author = {Roger Dingledine and Paul Syverson}, + title = {{Reliable MIX Cascade Networks through Reputation}}, + booktitle = {Proceedings of Financial Cryptography (FC '02)}, + year = 2002, + month = {March}, + editor = {Matt Blaze}, + publisher = {Springer-Verlag, LNCS 2357}, + www_section = comm, + www_ps_url = "http://freehaven.net/doc/casc-rep/casc-rep.ps", + www_pdf_url = "http://freehaven.net/doc/casc-rep/casc-rep.pdf", + www_tags={selected}, +} + +%% Section: Mix Networks: Attacks + +@InProceedings{pfitzmann90how, + author = "Birgit Pfitzmann and Andreas Pfitzmann", + title = "How to Break the Direct {RSA}-Implementation of {MIXes}", + booktitle = {Proceedings of {EUROCRYPT} 1989}, + publisher = {Springer-Verlag, LNCS 434}, + year = {1990}, + www_section = traffic, + www_ps_gz_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90" +} + +@InProceedings{back01, + author = {Adam Back and Ulf M\"oller and Anton Stiglic}, + title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {245--257}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = traffic, + www_important = 1, + www_pdf_url = "http://www.cypherspace.org/adam/pubs/traffic.pdf", + www_tags={selected}, +} + +@Misc{terminology, + author = {Andreas Pfitzmann and Marit Hansen}, + title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology}, + www_section = misc, + www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml}, + howpublished = "Draft", + year = 2000, + month = {July}, + OPTnote = {For date of the latest version, see the document itself}, + www_tags={selected}, +} +% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf}, + + +@inproceedings{goldberg97privacyenhancing, + author = "Ian Goldberg and David Wagner and Eric Brewer", + title = "Privacy-enhancing Technologies for the Internet", + booktitle = "Proceedings of the 42nd IEEE Spring COMPCON", + year = "1997", + month = {February}, + publisher = {IEEE Computer Society Press}, + isbn = { 0-8186-7804-6 }, + www_section = misc, + www_ps_url = "http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps", + www_tags={selected}, +} + +@InProceedings{fiveyearslater, + author = {Ian Goldberg}, + title = {{Privacy-enhancing technologies for the Internet, II: Five years later}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = misc, + www_pdf_url = "http://freehaven.net/anonbib/papers/petfive.pdf", + www_ps_url = "http://freehaven.net/anonbib/papers/petfive.ps", + www_tags={selected}, +} + +@InProceedings{hintz02, + author = {Andrew Hintz}, + title = {Fingerprinting Websites Using Traffic Analysis}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_html_url = "http://guh.nu/projects/ta/safeweb/safeweb.html", + www_pdf_url = "http://guh.nu/projects/ta/safeweb/safeweb.pdf", + www_ps_url = "http://guh.nu/projects/ta/safeweb/safeweb.ps", + www_tags={selected}, +} + +@InProceedings{mitkuro, + author = {Masashi Mitomo and Kaoru Kurosawa}, + title = {{Attack for Flash MIX}}, + booktitle = {Proceedings of {ASIACRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1976}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/450148.html", + www_tags={selected}, +} + +%% Section : nymservers + +@InProceedings{nym-alias-net, + author = {David Mazi\`eres and M. Frans Kaashoek}, + title = {{The Design, Implementation and Operation of an Email + Pseudonym Server}}, + booktitle = {{Proceedings of the 5th ACM Conference on Computer and + Communications Security (CCS 1998)}}, + year = 1998, + month = {November}, + publisher = {ACM Press}, + www_section = nym, + www_ps_gz_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", + www_pdf_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", + www_tags={selected}, +} + +%techreport{freedom-nyms, +% author = {Russell Samuels}, +% title = {Untraceable Nym Creation on the {F}reedom {N}etwork}, +% year = {1999}, +% month = {November}, +% day = {21}, +% type = {White Paper}, +% institution = {Zero Knowledge}, +% number = {11}, +% www_section = nym, +% www_html_url = "http://www.freedom.net/products/whitepapers/white11.html", +%} + +%% Section: Traffic analysis + +@InProceedings{rackoff93cryptographic, + author = {Charles Rackoff and Daniel R. Simon}, + title = {Cryptographic Defense Against Traffic Analysis}, + booktitle = {Proceedings of {ACM} Symposium on Theory of Computing}, + pages = {672--681}, + year = {1993}, + www_section = traffic, + www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps}, + www_tags={selected}, +} +% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", +% www_important = {1}, + + +@InProceedings{raymond00, + author = {Jean-Fran\c{c}ois Raymond}, + title = {{Traffic Analysis: Protocols, Attacks, Design Issues, + and Open Problems}}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = 2000, + month = {July}, + pages = {10--29}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = traffic, + www_important = {1}, + www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps}, + www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf}, + www_tags={selected}, +} + +@InProceedings{trickle02, + author = {Andrei Serjantov and Roger Dingledine and Paul Syverson}, + title = {From a Trickle to a Flood: Active Attacks on Several + Mix Types}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = traffic, + www_ps_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.ps", + www_pdf_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{limits-open, + author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, + title = {Limits of Anonymity in Open Environments}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = traffic, + www_pdf_url = "http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf", + www_tags={selected}, +} + +@InProceedings{chaffinch, + author = {Richard Clayton and George Danezis}, + title = {Chaffinch: Confidentiality in the Face of Legal Threats}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = misc, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf", + www_html_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html", + www_tags={selected}, +} + +@InProceedings{langos02, + author = {Oliver Berthold and Heinrich Langos}, + title = {Dummy Traffic Against Long Term Intersection Attacks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_pdf_url = "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf", + www_tags={selected}, +} + +@InProceedings{disad-free-routes, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + title = {The disadvantages of free {MIX} routes and how to overcome + them}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + pages = {30--45}, + month = {July}, + year = 2000, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = traffic, + www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", + www_tags={selected}, +} +% www_important = {1}, + +%% Section: Anonymous publication + +@InProceedings{freehaven-berk, + author = {Roger Dingledine and Michael J. Freedman and David Molnar}, + title = {The Free Haven Project: Distributed Anonymous Storage Service}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = pub, + www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong}, + title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval + System}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + pages = {46--66}, + year = {2000}, + month = "July", + www_section = pub, + www_html_url = "http://citeseer.nj.nec.com/clarke00freenet.html", + www_tags={selected}, +} + +@InProceedings{publius, + author = {Marc Waldman and Aviel Rubin and Lorrie Cranor}, + title = {Publius: {A} robust, tamper-evident, censorship-resistant and + source-anonymous web publishing system}, + booktitle = {Proceedings of the 9th USENIX Security Symposium}, + pages = {59--72}, + year = {2000}, + month = {August}, + www_section = pub, + www_pdf_url = "http://www.cs.nyu.edu/~waldman/publius/publius.pdf", + www_tags={selected}, +} + +@InProceedings{randomized-checking, + author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, + title = {Making mix nets robust for electronic voting by randomized partial checking}, + booktitle = {Proceedings of the 11th USENIX Security Symposium}, + year = {2002}, + month = {August}, + www_important = {1}, + www_section = proofs, + www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf", + www_tags={selected}, +} + +@InProceedings{infranet, + author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, + title = {Infranet: Circumventing Web Censorship and Surveillance}, + booktitle = {Proceedings of the 11th USENIX Security Symposium}, + year = {2002}, + month = {August}, + www_section = censorship, + www_pdf_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf", + www_ps_gz_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz", + www_tags={selected}, +} + +%% Section: Stream-based anonymity + +@InProceedings{onion-discex00, + author = {Paul Syverson and Michael Reed and David Goldschlag}, + title = {{O}nion {R}outing Access Configurations}, + booktitle = {Proceedings of the DARPA Information Survivability Conference and + Exposition (DISCEX 2000)}, + year = {2000}, + publisher = {IEEE CS Press}, + pages = {34--40}, + volume = {1}, + www_section = comm, + www_abstract_url = "http://www.onion-router.net/Publications.html", + www_ps_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps", + www_ps_gz_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", + www_pdf_url = "http://www.onion-router.net/Publications/DISCEX-2000.pdf", + www_tags={selected}, +} + +@inproceedings{onion-routing:ih96, + title = {{Hiding Routing Information}}, + author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson}, + booktitle = {Proceedings of Information Hiding: First International Workshop}, + year = {1996}, + month = {May}, + pages = {137--150}, + editor = {R. Anderson}, + publisher = {Springer-Verlag, LNCS 1174}, + www_section = comm, + www_ps_gz_url = {http://www.onion-router.net/Publications/IH-1996.ps.gz}, + www_pdf_url = {http://www.onion-router.net/Publications/IH-1996.pdf}, + www_tags={selected}, +} + +@InProceedings{onion-routing:pet2000, + author = {Paul Syverson and Gene Tsudik and Michael Reed + and Carl Landwehr}, + title = {{Towards an Analysis of Onion Routing Security}}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = 2000, + month = {July}, + pages = {96--114}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = comm, + www_ps_gz_url = "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{web-mix:pet2000, + author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, + title = {Web {MIX}es: A system for anonymous and unobservable + {I}nternet access}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + pages = {115--129}, + year = 2000, + month = {July}, + www_section = comm, + www_pdf_url = "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf", + www_tags={selected}, +} + +@Article{crowds:tissec, + author = {Michael Reiter and Aviel Rubin}, + title = {Crowds: Anonymity for Web Transactions}, + journal = {ACM Transactions on Information and System Security}, + volume = {1}, + number = {1}, + month = {June}, + year = {1998}, + www_section = comm, + www_ps_gz_url = "http://avirubin.com/crowds.ps.gz", + www_pdf_url = "http://avirubin.com/crowds.pdf", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{tarzan:ccs02, + title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Robert Morris", + booktitle = {{Proceedings of the 9th ACM Conference on Computer and + Communications Security (CCS 2002)}}, + location = "Washington, DC", + month = "November", + year = "2002", + www_section = comm, + www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", + www_important = {1}, + www_tags={selected}, +} + +@inproceedings{BonehGolle:psp2002, + title = {Almost Entirely Correct Mixing With Application to Voting}, + author = {Dan Boneh and Philippe Golle}, + booktitle = {{Proceedings of the 9th ACM Conference on Computer and + Communications Security (CCS 2002)}}, + year = {2002}, + month = {November}, + location = {Washington, DC}, + pages = {68--77}, + editor = {Vijay Atluri}, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.pdf}, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps}, + www_section = proofs, + www_tags={selected}, +} + +@techreport{freedom2-arch, + author = {Philippe Boucher and Adam Shostack and Ian Goldberg}, + title = {Freedom Systems 2.0 Architecture}, + year = {2000}, + month = {December}, + day = {18}, + type = {White Paper}, + institution = {Zero Knowledge Systems, {Inc.}}, + www_section = comm, + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf}, + www_tags={selected}, +} + +@techreport{freedom21-security, + author = {Adam Back and Ian Goldberg and Adam Shostack}, + title = {Freedom Systems 2.1 Security Issues and Analysis}, + year = {2001}, + month = {May}, + day = {3}, + type = {White Paper}, + institution = {Zero Knowledge Systems, {Inc.}}, + www_section = comm, + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf}, + www_tags={selected}, +} + +@Article{realtime-mix, + author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and + Birgit Pfitzmann and Michael Waidner}, + title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, + journal = {IEEE Journal on Selected Areas in Communications}, + year = 1998, + volume = {16}, + number = {4}, + www_section = comm, + www_html_url = "http://www.zurich.ibm.com/security/publications/1998.html", + www_tags={selected}, +} + +%% Section: Misc + +@inproceedings{rao-pseudonymity, + author = "Josyula R. Rao and Pankaj Rohatgi", + title = "Can Pseudonymity Really Guarantee Privacy?", + booktitle = "Proceedings of the 9th USENIX Security Symposium", + year = {2000}, + month = {August}, + publisher = {USENIX}, + pages = "85--96", + www_section = nym, + www_pdf_url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", + www_tags={selected}, +} + +@InProceedings{SK, + author = {Joe Kilian and Kazue Sako}, + title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to + the Implementation of a Voting Booth}, + booktitle = {Proceedings of {EUROCRYPT} 1995}, + www_section = proofs, + month = {May}, + year = {1995}, + publisher = {Springer-Verlag}, + www_tags={selected}, +} + +%Misc{rprocess, +% author = {RProcess}, +% title = {Selective Denial of Service Attacks}, +% www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html", +% www_section = traffic, +% month = {September}, +% year = 1999, +% howpublished = "Usenet post", +% www_tags={selected}, +%} + +@Misc{pipenet10, + author = {Wei Dai}, + title = {PipeNet 1.0}, + howpublished = "Post to Cypherpunks mailing list", + year = 1998, + month = {January}, + day = 19, + www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html", + www_section = comm, + www_remarks = "First written in 1996 based on cypherpunks posts in 1995.", + www_tags={selected}, +} + +@Misc{pipenet, + author = {Wei Dai}, + title = {PipeNet 1.1}, + howpublished = "Post to Cypherpunks mailing list", + year = 1998, + month = {November}, + day = 26, + www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt", + www_section = comm, + www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}, + www_tags={selected}, +} + +@InProceedings{PIK, + author = {C. Park and K. Itoh and K. Kurosawa}, + title = {Efficient anonymous channel and all/nothing election scheme}, + booktitle = {Proceedings of {EUROCRYPT} 1993}, + month = {May}, + year = {1993}, + pages = {248--259}, + publisher = {Springer-Verlag, LNCS 765}, + www_section = proofs, + www_tags={selected}, +} + +% PhdThesis{malkin-thesis, +% author = {Tal Malkin}, +% school = {{MIT}}, +% title = {Private {I}nformation {R}etrieval}, +% year = {2000}, +% www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html", +% www_tags={selected}, +%} + +@PhdThesis{ian-thesis, + author = {Ian Goldberg}, + title = {A Pseudonymous Communications Infrastructure for the Internet}, + school = {UC Berkeley}, + year = 2000, + month = {December}, + www_section = comm, + www_pdf_url = "http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf", + www_tags={selected}, +} + +@PhdThesis{george-thesis, + author = {George Danezis}, + title = {Better Anonymous Communications}, + school = {University of Cambridge}, + year = {2004}, + month = {July}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/thesis.pdf", + www_tags={selected}, +} + +@PhdThesis{andrei-thesis, + author = {Andrei Serjantov}, + title = {On the Anonymity of Anonymity Systems}, + school = {University of Cambridge}, + year = {2004}, + month = {June}, + www_section = comm, + www_ps_url = "http://home.arachsys.com/~aas/Thesis/2.ps", + www_tags={selected}, +} + +@InProceedings{shuffle:ccs01, + author = {C. Andrew Neff}, + title = {A Verifiable Secret Shuffle and its Application to E-Voting}, + booktitle = {{Proceedings of the 8th ACM Conference on Computer and + Communications Security (CCS 2001)}}, + pages = {116--125}, + year = 2001, + editor = {P. Samarati}, + month = {November}, + publisher = {ACM Press}, + www_section = proofs, + www_pdf_url = {http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf}, + www_tags={selected}, +} + +@InProceedings{PShuffle, + author = {Jun Furukawa and Kazue Sako}, + title = {An Efficient Scheme for Proving a Shuffle}, + editor = {Joe Kilian}, + booktitle = {Proceedings of {CRYPTO} 2001}, + year = {2001}, + publisher = {Springer-Verlag, LNCS 2139}, + www_pdf_url = {http://www.iacr.org/archive/crypto2001/21390366.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{econymics, + author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}, + title = {{On the Economics of Anonymity}}, + booktitle = {Proceedings of Financial Cryptography (FC '03)}, + year = 2003, + month = "January", + editor = {Rebecca N. Wright}, + publisher = {Springer-Verlag, LNCS 2742}, + www_section = economics, + www_pdf_url = "http://freehaven.net/doc/fc03/econymics.pdf", + www_important = {1}, + www_tags={selected}, +} + +@article{cheap-pseudonyms, + author = {Eric Friedman and Paul Resnick}, + title = {The social cost of cheap pseudonyms}, + journal = {Journal of Economics and Management Strategy}, + year = "2001", + volume = "10", + number = "2", + pages = "173--199", + www_section = economics, + www_pdf_url = "http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf", + www_tags={selected}, +} + +@InProceedings{Diaz02, + author = {Claudia Diaz and Stefaan Seys and Joris Claessens + and Bart Preneel}, + title = {Towards measuring anonymity}, + booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, + year = 2002, + month = "April", + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_important = {1}, + www_ps_gz_url = "http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz", + www_tags={selected}, +} + +@InProceedings{Serj02, + author = {Andrei Serjantov and George Danezis}, + title = {Towards an Information Theoretic Metric for Anonymity}, + booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, + year = 2002, + month = "April", + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_important = {1}, + www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps", + www_tags={selected}, +} + +@InProceedings{sybil, + author = "John Douceur", + title = {{The Sybil Attack}}, + booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", + month = {March}, + year = 2002, + www_section = traffic, + www_important = {1}, + www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf", + www_tags={selected}, +} + +@InProceedings{Serj02-iptps, + author = {Andrei Serjantov}, + title = {Anonymizing censorship resistant systems}, + booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", + month = {March}, + year = 2002, + www_ps_url= {http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps}, + www_section = pub, + www_tags={selected}, +} + +%InProceedings{Freedman-iptps, +% author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris}, +% title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, +% booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", +% month = {March}, +% year = 2002, +% www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf", +% www_section = comm, +% www_tags={selected}, +%} + +@InProceedings{gup, + author = {Stuart Stubblebine and Paul Syverson}, + title = {Authentic Attributes with Fine-Grained Anonymity Protection}, + booktitle = {Proceedings of Financial Cryptography (FC 2000)}, + pages = {276--294}, + year = 2001, + editor = {Yair Frankel}, + publisher = {Springer-Verlag, LNCS 1962}, + www_section = nym, + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps", + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf", + www_tags={selected}, +} + +@InProceedings{syverson99, + author = "Paul F. Syverson and Stuart G. Stubblebine", + title = "Group Principals and the Formalization of Anonymity", + booktitle = "Proceedings of the World Congress on Formal Methods (1)", + pages = "814--833", + year = "1999", + www_section = methods, + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps", + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf", + www_tags={selected}, +} + +@Article{crowds-model, + author = {Vitaly Shmatikov}, + title = {Probabilistic Model Checking of an Anonymity System}, + journal = {Journal of Computer Security}, + volume = {12}, + number = {3-4}, + pages = {355--377}, + year = {2004}, + www_section = methods, + www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_crowds.ps", + www_remarks = +{Uses formal methods to analyze probabilistic anonymity systems like + Crowds. Confirms that anonymity degrades + with a larger crowd: as N grows, the fact that the request came from + you becomes more suspicious.}, + www_tags={selected}, +} + +@Article{modular-approach, + author = {Dominic Hughes and Vitaly Shmatikov}, + title = {Information Hiding, Anonymity and Privacy: A Modular Approach}, + journal = {Journal of Computer Security}, + volume = {12}, + number = {1}, + pages = {3--36}, + year = {2004}, + www_section = methods, + www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_anon.ps", + www_tags={selected}, +} + +@InProceedings{kesdogan:pet2002, + author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, + title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = comm, + www_pdf_url = "http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf", + www_tags={selected}, +} + +@InProceedings{danezis:pet2003, + author = {George Danezis}, + title = {Mix-networks with Restricted Routes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {1--17}, + www_section = traffic, + www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf", + www_important = 1, + www_tags={selected}, +} + +@InProceedings{diaz:pet2003, + author = {Claudia Diaz and Andrei Serjantov}, + title = {Generalising Mixes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {18--31}, + www_section = comm, + www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{steinbrecher:pet2003, + author = {Sandra Steinbrecher and Stefan K\"opsell}, + title = {Modelling Unlinkability}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {32--47}, + www_section = traffic, + www_pdf_url = "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf", + www_tags={selected}, +} + +@InProceedings{newman:pet2003, + author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov}, + title = {Metrics for Traffic Analysis Prevention}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {48--65}, + www_section = traffic, + www_ps_url = "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps", + www_tags={selected}, +} + +@InProceedings{nguyen:pet2003, + author = {Lan Nguyen and Rei Safavi-Naini}, + title = {Breaking and Mending Resilient Mix-nets}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {66--80}, + www_section = proofs, + www_pdf_url = "http://www.petworkshop.org/2003/preproc/05-preproc.pdf", + www_tags={selected}, +} + +@InProceedings{clayton:pet2003, + author = {Richard Clayton}, + title = {Improving Onion Notation}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {81--87}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/onions.pdf", + www_tags={selected}, +} + +@InProceedings{bennett:pet2003, + author = {Krista Bennett and Christian Grothoff}, + title = {{GAP} -- Practical anonymous networking}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {141--160}, + www_section = pub, + www_ps_url = "http://www.ovmj.org/GNUnet/download/aff.ps", + www_tags={selected}, +} + +@article{ebe2003, + author = {Christian Grothoff}, + title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}}, + journal = "Wirtschaftsinformatik", + publisher = "Springer-Verlag", + year = "2003", + month = "June", + www_section = economics, + www_ps_url = "http://www.ovmj.org/GNUnet/download/ebe.ps", + www_tags={selected}, +} + +@inproceedings{gnunetencoding, + author = "Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu", + title = "{Efficient Sharing of Encrypted Data}", + booktitle = {{Proceedings of ASCIP 2002}}, + publisher = "Springer-Verlag", + pages = "107--120", + www_ps_url = "http://www.ovmj.org/GNUnet/download/esed.ps", + www_section = pub, + year = "2002", + month = {July}, + www_tags={selected}, +} + +@InProceedings{kugler:pet2003, + author = {Dennis K\"ugler}, + title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {161--176}, + www_section = pub, + www_pdf_url = "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf", + www_tags={selected}, +} + +@InProceedings{feamster:pet2003, + author = {Nick Feamster and Magdalena Balazinska and Winston Wang and + Hari Balakrishnan and David Karger}, + title = {{Thwarting Web Censorship with Untrusted Messenger Delivery}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {125--140}, + www_section = censorship, + www_pdf_url = "http://nms.lcs.mit.edu/papers/disc-pet2003.pdf", + www_tags={selected}, +} + +@InProceedings{waldman01tangler, + author = "Marc Waldman and David Mazi\`eres", + title = "Tangler: a censorship-resistant publishing system based on document entanglements", + booktitle = {{Proceedings of the 8th ACM Conference on Computer and + Communications Security (CCS 2001)}}, + pages = "126--135", + year = "2001", + month = "November", + www_section = pub, + www_important = {1}, + www_ps_url = "http://www.cs.nyu.edu/~waldman/tangler.ps", + www_tags={selected}, +} + +@InProceedings{anderson96eternity, + author = "Ross Anderson", + title = "The Eternity Service", + booktitle = {Proceedings of Pragocrypt '96}, + year = "1996", + www_section = pub, + www_important = {1}, + www_ps_url = "http://www.ovmj.org/GNUnet/papers/eternity.ps", + www_html_url = "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html", + www_tags={selected}, +} + +@InProceedings{strong-eternity, + author = {Tonda Benes}, + title = {The Strong Eternity Service}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + year = {2001}, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = pub, + www_pdf_url = "http://freehaven.net/anonbib/papers/strong-eternity.pdf", + www_tags={selected}, +} + +@inproceedings{RRMPH02-1, + author={Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison}, + title={{Analysis of an Anonymity Network for Web Browsing}}, + booktitle={{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}}, + location={Pittsburgh, USA}, + pages={49--54}, + month={June}, + year={2002}, + www_section = comm, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz", + www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", + www_tags={selected}, +} +% month={June 10--12}, + +@inproceedings{morphmix:wpes2002, + author={Marc Rennhard and Bernhard Plattner}, + title={{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}}, + location={Washington, DC, USA}, + month={November}, + year={2002}, + www_important = {1}, + www_section = comm, + www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf}, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", + www_tags={selected}, +} +% month={November 21}, + +@inproceedings{RP03-1, + author={Marc Rennhard and Bernhard Plattner}, + title={{Practical Anonymity for the Masses with Mix-Networks}}, + booktitle={{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}}, + location={Linz, Austria}, + month={June}, + year={2003}, + www_section = comm, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz", + www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", + www_tags={selected}, +} +% month={June 9--11}, + +@inproceedings{rep-anon, + author={Roger Dingledine and Nick Mathewson and Paul Syverson}, + title={{Reputation in P2P Anonymity Systems}}, + booktitle={Proceedings of Workshop on Economics of Peer-to-Peer Systems}, + month={June}, + year={2003}, + www_section = economics, + www_pdf_url = "http://freehaven.net/doc/econp2p03/econp2p03.pdf", + www_tags={selected}, +} + +@InProceedings{statistical-disclosure, + author = {George Danezis}, + title = {Statistical Disclosure Attacks: Traffic Confirmation in Open Environments}, + booktitle = {Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})}, + pages = {421--426}, + year = {2003}, + editor = {Gritzalis and Vimercati and Samarati and Katsikas}, + location= {Athens}, + month = {May}, + organization = {{IFIP TC11}}, + publisher = {Kluwer}, + www_section = traffic, + www_pdf_url={http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf}, + www_tags={selected}, +} + +@InProceedings{TrafHTTP, + author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu}, + title = {Statistical Identification of Encrypted Web Browsing Traffic}, + booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, + year = {2002}, + location= {Berkeley, California}, + month = {May}, + www_section = traffic, + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}, + www_tags={selected}, +} + +@InProceedings{Dan:SFMix03, + author = {George Danezis}, + title = {Forward Secure Mixes}, + booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems}, + pages = {195--207}, + year = {2002}, + editor = {Fisher-Hubner, Jonsson}, + location= {Karlstad, Sweden}, + month = {November}, + day = {7}, + www_section = comm, + www_pdf_url="http://www.cl.cam.ac.uk/~gd216/fsmix.pdf", + www_tags={selected}, +} + +@InProceedings{SN03, + author = {Andrei Serjantov and Richard E. Newman}, + title = {On the Anonymity of Timed Pool Mixes}, + booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems}, + pages = {427--434}, + year = {2003}, + location= {Athens, Greece}, + month = {May}, + publisher = {Kluwer}, + www_section=traffic, + www_ps_url="http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", + www_tags={selected}, +} +% booktitle = {Security and Privacy in the Age of Uncertainty}, + +@techreport{herbivore:tr, + author = "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", + title = "{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}", + number = "2003-1890", + institution = "Cornell University", + address = "Ithaca, NY", + month = "February", + year = "2003", + www_section = comm, + www_pdf_url = "http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf", + www_tags={selected}, +} + +@inproceedings{reusable-channels:wpes2003, + author={Philippe Golle and Markus Jakobsson}, + title={Reusable Anonymous Return Channels}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf}, + www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/return.ps}, + www_remarks = +{Reencryption mix-nets can allow users to use a single reply channel + even when they maintain multiple separate nyms (think of it like a reply + block but it looks different each time you give it to somebody).}, + www_tags={selected}, +} + +@inproceedings{danezis:wpes2003, + author={George Danezis and Len Sassaman}, + title={Heartbeat Traffic to Counter (n-1) Attacks}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf}, + www_remarks = +{Mix nodes should send out "heartbeat" messages (dummies that start and + end at that node). By measuring how many return in a given time, they + can detect whether the adversary is dropping or delaying traffic coming + into them (possibly so he can launch an active blending attack).}, + www_tags={selected}, +} + +@inproceedings{bauer:wpes2003, + author={Matthias Bauer}, + title={{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_ps_url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps}, + www_important = 1, + www_remarks = +{Anonymity sets in deployed systems are small because few people think + it's worthwhile to use them. But we can take advantage of ordinary web + users to transfer messages (that is, mix them) from one webserver to + another via cookies and http redirect tricks. Senders and receivers + should also look like ordinary web users, so anonymity sets are large.}, + www_tags={selected}, +} + +@inproceedings{GolleJakobssonJuelsSyverson:universal04, + title = {Universal Re-Encryption for Mixnets}, + author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson}, + booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track}, + year = {2004}, + month = {February}, + location= {San Francisco, USA}, + www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf}, + www_section = comm, + www_tags={selected}, +} + %editor = {}, + + +@InProceedings{cebolla, + author={Zach Brown}, + title={{Cebolla: Pragmatic IP Anonymity}}, + booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, + year = {2002}, + month = {June}, + www_section = comm, + www_pdf_url = "http://cypherspace.org/cebolla/cebolla.pdf", + www_remarks = +{Written by a former Freedom developer, Cebolla has a UDP-based design + similar to second-generation Freedom. The initiator incrementally builds + her circuit, giving her end-to-end forward-secrecy and also better + recovery from broken nodes.}, + www_tags={selected}, +} + +@InProceedings{SS03, + author = {Andrei Serjantov and Peter Sewell}, + title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, + booktitle = {Proceedings of ESORICS 2003}, + year = {2003}, + month = {October}, + www_section = traffic, + www_ps_url = "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps", + www_remarks = +{An investigation of packet counting attacks (which work best on lightly + loaded networks) and connection-start timing attacks.}, + www_tags={selected}, +} + +@InProceedings{GKK03, + author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, + title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting}, + booktitle = {Proceedings of ESORICS 2003}, + year = {2003}, + month = {October}, + www_section = proofs, + www_pdf_url = "http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf", + www_tags={selected}, +} + +@Article{shsm03, + author = {Anna Shubina and Sean Smith}, + title = {Using Caching for Browsing Anonymity}, + journal = {ACM SIGEcom Exchanges}, + year = {2003}, + volume = {4}, + number = {2}, + month = {September}, + www_section = comm, + www_pdf_url = "http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf", + www_tags={selected}, +} + +@InProceedings{incomparable-pkeys, + author = {Brent Waters and Ed Felten and Amit Sahai}, + title = {Receiver Anonymity via Incomparable Public Keys}, + booktitle = {{Proceedings of the 10th ACM Conference on Computer and + Communications Security (CCS 2003)}}, + pages = {112--121}, + year = 2003, + editor = {Vijay Atluri and Peng Liu}, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf", + www_ps_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.ps", + www_tags={selected}, +} + +@InProceedings{k-anonymous:ccs2003, + author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper}, + title = {k-Anonymous Message Transmission}, + booktitle = {{Proceedings of the 10th ACM Conference on Computer and + Communications Security (CCS 2003)}}, + pages = {122--130}, + year = 2003, + editor = {Vijay Atluri and Peng Liu}, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf}, + www_tags={selected}, +} + +@Article{halpern-oneill-2003, + author = {Joseph Y. Halpern and Kevin R. O'Neill}, + title = {Anonymity and Information Hiding in Multiagent Systems}, + journal = {Journal of Computer Security}, + volume = {}, + number = {}, + year = {2004}, + www_section = methods, + www_pdf_url = "http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf", + www_tags={selected}, +} + +@InProceedings{berman-fc2004, + author = {Ron Berman and Amos Fiat and Amnon Ta-Shma}, + title = {Provable Unlinkability Against Traffic Analysis}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {266--280}, + www_section = comm, + www_pdf_url = "http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf", + www_tags={selected}, +} + +@InProceedings{timing-fc2004, + author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, + title = {Timing Attacks in Low-Latency Mix-Based Systems}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {251--265}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf", + www_tags={selected}, +} + +@InProceedings{morphmix-fc2004, + author = {Marc Rennhard and Bernhard Plattner}, + title = {Practical Anonymity for the Masses with MorphMix}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {233--250}, + www_section = comm, + www_pdf_url = "http://home.zhwin.ch/~rer/publications/FC2004.pdf", + www_tags={selected}, +} + +@InProceedings{mixminion-fc2004, + author = {Nick Mathewson and Roger Dingledine}, + title = {Mixminion: Strong Anonymity for Financial cryptography}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {227--232}, + www_section = comm, + www_pdf_url = "http://freehaven.net/doc/fc04/minion-systems.pdf" +} +% Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM + + +@InProceedings{credentials-fc2004, + author = {Guiseppe Persiano and Ivan Visconti}, + title = {An Efficient and Usable Multi-show Non-transferable Anonymous Credential System}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {196--211}, + www_section = credentials +} + +@InProceedings{tor-design, + author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, + title = {{Tor}: The Second-Generation Onion Router}, + booktitle = {Proceedings of the 13th USENIX Security Symposium}, + year = {2004}, + month = {August}, + www_section = comm, + www_important = 1, + www_pdf_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf", + www_html_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.html", + www_tags={selected}, +} + +@InProceedings{redblue, + author = {George Danezis and Ross Anderson}, + title = {The Economics of Censorship Resistance}, + booktitle = {Proceedings of Workshop on Economics and Information Security (WEIS04)}, + year = {2004}, + month = {May}, + www_section = economics, + www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", + www_tags={selected}, +} + +@InProceedings{DanSer04, + author = {George Danezis and Andrei Serjantov}, + title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = traffic, + www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps", + www_tags={selected}, +} + +@InProceedings{pool-dummy04, + author = {Claudia Diaz and Bart Preneel}, + title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = comm, + www_pdf_url = "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", + www_tags={selected}, +} +% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz", + + +@InProceedings{hitting-set04, + author = {Dogan Kesdogan and Lexi Pimenidis}, + title = {The Hitting Set Attack on Anonymity Protocols}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf", + www_tags={selected}, +} + +@InProceedings{taxonomy-dummy, + author = {Claudia Diaz and Bart Preneel}, + title = {Taxonomy of Mixes and Dummy Traffic}, + booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems}, + year = {2004}, + location= {Toulouse, France}, + month = {August}, + www_section = comm, + www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf", + www_tags={selected}, +} + +@InProceedings{newman:pet2004, + author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz}, + title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {1--16}, + www_section = traffic, + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf", + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps", + www_remarks = +{If we think about leaked anonymity as a covert channel between the sender + Alice and the adversary Eve, then by measuring covert channel capacity + we can get an upper bound on the amount of information Alice could leak.}, + www_tags={selected}, +} + +@InProceedings{e2e-traffic, + author = {Nick Mathewson and Roger Dingledine}, + title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {17--34}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf", + www_important = 1, + www_tags={selected}, +} + +@InProceedings{danezis:pet2004, + author = {George Danezis}, + title = {The Traffic Analysis of Continuous-Time Mixes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {35--50}, + www_section = traffic, + www_important = {1}, + www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf", + www_tags={selected}, +} + +@InProceedings{golle:pet2004, + author = {Philippe Golle}, + title = {Reputable Mix Networks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {51--63}, + www_section = proofs, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/reputable.pdf", + www_tags={selected}, +} + +@InProceedings{fairbrother:pet2004, + author = {Peter Fairbrother}, + title = {An Improved Construction for Universal Re-encryption}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {79--87}, + www_section = comm, + www_pdf_url = "http://www.m-o-o-t.org/ICUR.pdf", + www_tags={selected}, +} + +@InProceedings{kugler:pet2004, + author = {Dennis K{\"u}gler}, + title = {On the Anonymity of Banknotes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {108--120}, + www_section = misc +} + +@InProceedings{zugenmaier:pet2004, + author = {Alf Zugenmaier}, + title = {{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {121--141}, + www_section = comm +} + +@InProceedings{sync-batching, + author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}, + title = {Synchronous Batching: From Cascades to Free Routes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {186--206}, + www_section = comm, + www_pdf_url = "http://freehaven.net/doc/sync-batching/sync-batching.pdf", + www_ps_url = "http://freehaven.net/doc/sync-batching/sync-batching.ps", + www_tags={selected}, +} + +@InProceedings{flow-correlation04, + author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {207--225}, + www_section = traffic, + www_pdf_url = "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf", + www_tags={selected}, +} + +@InProceedings{TH04, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + title = {Measuring Anonymity in a Non-adaptive, Real-time System}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + series = {Springer-Verlag, LNCS}, + volume = {3424}, + pages = {226--241}, + www_section = traffic, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}, + www_tags={selected}, +} + +@InProceedings{cascades-vs-p2p:pet2004, + author = {Rainer B\"ohme and George Danezis and Claudia Diaz + and Stefan K\"opsell and Andreas Pfitzmann}, + title = {On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: + Is One Concept Superior?''}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + series = {Springer-Verlag, LNCS}, + volume = {3424}, + pages = {226--241}, + www_section = comm, + www_pdf_url ={http://www.cosic.esat.kuleuven.be/publications/article-523.pdf}, +} + +@InProceedings{mixmaster-reliable, + author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte}, + title = {Comparison between two practical mix designs}, + booktitle = {Proceedings of ESORICS 2004}, + year = {2004}, + series = {LNCS}, + location= {France}, + month = {September}, + www_section = traffic, + www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz", + www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-98.pdf", + www_tags={selected}, + www_important = {1}, +} + +@inproceedings{danezis:wpes2004, + author={George Danezis and Ben Laurie}, + title={Minx: A simple and efficient anonymous packet format}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = comm, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/minx.pdf}, + www_tags={selected}, +} + +@inproceedings{feamster:wpes2004, + author={Nick Feamster and Roger Dingledine}, + title={Location Diversity in Anonymity Networks}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = comm, + www_ps_url = {http://freehaven.net/doc/routing-zones/routing-zones.ps}, + www_tags={selected}, +} + +@inproceedings{koepsell:wpes2004, + author={Stefan K\"opsell and Ulf Hilling}, + title={How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = censorship, + www_pdf_url = {http://freehaven.net/anonbib/papers/p103-koepsell.pdf}, + www_tags={selected}, +} + +@InProceedings{reiter:ccs2004, + author = {Michael Reiter and XiaoFeng Wang}, + title = {Fragile Mixing}, + booktitle = {{Proceedings of the 11th ACM Conference on Computer and + Communications Security (CCS 2004)}}, + year = 2004, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf}, + www_tags={selected}, +} + +@InProceedings{golle:ccs2004, + author = {Philippe Golle and Ari Juels}, + title = {Parallel Mixing}, + booktitle = {{Proceedings of the 11th ACM Conference on Computer and + Communications Security (CCS 2004)}}, + year = 2004, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.pdf", + www_ps_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.ps", + www_tags={selected}, +} + +@InProceedings{golle:eurocrypt2004, + author = {Philippe Golle and Ari Juels}, + title = {Dining Cryptographers Revisited}, + booktitle = "Proceedings of Eurocrypt 2004", + year = 2004, + month = {May}, + www_section = comm, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/nim.pdf", + www_tags={selected}, +} + +@InProceedings{THV04, + author = {Gergely T\'oth and Zolt\'an Horn\'ak and Ferenc Vajda}, + title = {Measuring Anonymity Revisited}, + booktitle = {Proceedings of the Ninth Nordic Workshop on Secure IT Systems}, + pages = {85--90}, + year = {2004}, + location= {Espoo, Finland}, + month = {November}, + editor = {Sanna Liimatainen and Teemupekka Virtanen}, + www_section = traffic, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf}, + www_tags={selected}, +} + +@inproceedings{torta05, + title = {Low-Cost Traffic Analysis of {Tor}}, + author = {Steven J. Murdoch and George Danezis}, + booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy}, + year = {2005}, + month = {May}, + publisher = {IEEE CS}, + www_section = traffic, + www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf}, + www_important = 1, + www_tags={selected}, +} + +@inproceedings{pet05-bissias, + author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine}, + title = {Privacy Vulnerabilities in Encrypted HTTP Streams}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {1--11}, + www_section = traffic, + www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", + www_tags={selected}, +} + +@inproceedings{pet05-borisov, + author = {Nikita Borisov}, + title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {12--25}, + www_section = traffic, + www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf", + www_tags={selected}, +} + +@inproceedings{pet05-serjantov, + title = {Message Splitting Against the Partial Adversary}, + author = {Andrei Serjantov and Steven J. Murdoch}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + year = {2005}, + month = {May}, + pages = {26--39}, + www_section = comm, + www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf}, + www_tags={selected}, +} + +@inproceedings{pet05-zhu, + author = {Ye Zhu and Riccardo Bettati}, + title = {Unmixing Mix Traffic}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {110--127}, + www_section = traffic, + www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf}, + www_tags={selected}, +} + +@inproceedings{pet05-camenisch, + author = {Jan Camenisch and Anton Mityagin}, + title = {Mix-network with Stronger Security}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {128--147}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{ih05-danezisclulow, + title = {Compulsion Resistant Anonymous Communications}, + author = {George Danezis and Jolyon Clulow}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {11--25}, + www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{ih05-Klonowski, + title = {Provable Anonymity for Networks of Mixes}, + author = {Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {26--38}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{ih05-Luke, + title = {On Blending Attacks For Mixes with Memory}, + author = {Luke O'Connor}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {39--52}, + www_section = traffic, + www_tags={selected}, + www_pdf_url={http://lukejamesoconnor.googlepages.com/blending-attacks.pdf}, +} + +@inproceedings{ih05-csispir, + title = {Censorship Resistance Revisited}, + author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {62--76}, + www_section = pub, + www_pdf_url = "http://gnunet.org/papers/IHW-CR.pdf", + www_tags={selected}, +} + +@inproceedings{esorics05-Klonowski, + title = {Local View Attack on Anonymous Communication}, + author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of ESORICS 2005}, + year = {2005}, + month = {September}, + www_ps_url = {http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps}, + www_section = traffic, + www_tags={selected}, +} + +@inproceedings{warta04-Klonowski, + title = {Universal Re-encryption of Signatures and Controlling Anonymous Information Flow}, + author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski}, + booktitle = {Proceedings of WARTACRYPT '04}, + year = {2004}, + month = {July}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, + www_section = misc, + www_tags={selected}, +} + +@inproceedings{sofem05-Klonowski, + title = {Anonymous Communication with On-line and Off-line Onion Encoding}, + author = { Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski}, + booktitle = {Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005)}, + year = {2005}, + month = {January}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{wisa04-Klonowski, + title = {Anonymous Communication with On-line and Off-line Onion Encoding}, + author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)}, + year = {2004}, + month = {August}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{mmsec04-Klonowski, + title = {DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion Protocols}, + author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004}, + year = {2004}, + month = {September}, + www_section = comm, + www_tags={selected}, +} + +@InProceedings{camlys05, + author = "Jan Camenisch and Anna Lysyanskaya", + title = "A Formal Treatment of Onion Routing", + booktitle = {Proceedings of {CRYPTO} 2005}, + year = {2005}, + month = {August}, + editor = {Victor Shoup}, + publisher = {Springer-Verlag, LNCS 3621}, + pages = "169--187", + www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{sassaman:wpes2005, + title = {The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval}, + author = {Len Sassaman and Bram Cohen and Nick Mathewson}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005)}}, + year = {2005}, + month = {November}, + location= {Arlington, VA, USA}, + www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf}, + www_section = nym, + www_important = {1}, + www_tags={selected}, +} + +@INPROCEEDINGS{GHPvR05, + AUTHOR = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum}, + TITLE = {Provable Anonymity}, + BOOKTITLE = {{Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)}}, + YEAR = "2005", + location= "Alexandria, VA, USA", + month = "November", + www_pdf_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf}, + www_ps_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.ps}, + www_section = methods, + www_tags={selected}, +} + +@article{xor-trees, + author = {Shlomi Dolev and Rafail Ostrobsky}, + title = {Xor-trees for efficient anonymous multicast and reception}, + journal = {ACM Trans. Inf. Syst. Secur}, + volume = {3}, + number = {2}, + year = {2000}, + pages = {63--84}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = comm, + www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps", + www_tags={selected}, +} + +@article{buses03, + author = {Amos Beimel and Shlomi Dolev}, + title = {Buses for Anonymous Message Delivery}, + journal = {Journal of Cryptology}, + pages = {25--39}, + volume = {16}, + year = {2003}, + number = {1}, + www_section = comm, + www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", + www_tags={selected}, +} + +@inproceedings{usability:weis2006, + title = {Anonymity Loves Company: Usability and the Network Effect}, + author = {Roger Dingledine and Nick Mathewson}, + crossref = {weis2006}, + www_section = economics, + www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf}, + www_tags={selected}, +} + +@misc{cryptoeprint:2005:394, + author = {Ben Adida and Douglas Wikstr\"om}, + title = {Obfuscated Ciphertext Mixing}, + howpublished = {Cryptology ePrint Archive, Report 2005/394}, + year = {2005}, + month = {November}, + www_section = proofs, + www_html_url = {http://eprint.iacr.org/2005/394}, + www_pdf_url = {http://eprint.iacr.org/2005/394.pdf}, + www_tags={selected}, +} + +@PhDThesis{DiazThesis05, + AUTHOR = {Claudia Diaz}, + YEAR = {2005}, + TITLE = {Anonymity and Privacy in Electronic Services}, + SCHOOL = {Katholieke Universiteit Leuven}, + address = {Leuven, Belgium}, + month = {December}, + www_section = comm, + www_pdf_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf}, + www_tags={selected}, +} + +@inproceedings{HanLLHP05, + author = {Jinsong Han and + Yunhao Liu and + Li Lu and + Lei Hu and + Abhishek Patil}, + title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {143--152}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{XuFZBCZ05, + author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao}, + title = {SAS: A Scalar Anonymous Communication System}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {452--461}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{LuFSG05, + author = {Tianbo Lu and + Binxing Fang and + Yuzhong Sun and + Li Guo}, + title = {Some Remarks on Universal Re-encryption and A Novel Practical + Anonymous Tunnel}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {853--862}, + www_section = comm, + www_tags = {selected}, + www_abstract_url = {http://www.springerlink.com/content/b3x4na87xbmcextx/}, +} + +@inproceedings{WangCJ05, + author = {Xinyuan Wang and + Shiping Chen and + Sushil Jajodia}, + title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, + booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, + month = {November}, + year = {2005}, + pages = {81--91}, + www_section = comm, + www_pdf_url = "http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf", + www_tags={selected}, +} + +@InProceedings{hs-attack06, + title = {Locating Hidden Servers}, + author = {Lasse {\O}verlier and Paul Syverson}, + booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, + year = {2006}, + month = {May}, + publisher = {IEEE CS}, + www_pdf_url = "http://www.onion-router.net/Publications/locating-hidden-servers.pdf", + www_section = traffic, + www_important = {1}, + www_remarks = {Motivates and describes Tor's entry guard design.}, + www_tags={selected}, +} + +@InProceedings{esorics04-mauw, + title = {A formalization of anonymity and onion routing}, + author = {S. Mauw and J. Verschuren and E.P. de Vink}, + publisher = {LNCS 3193}, + www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, + booktitle = {Proceedings of ESORICS 2004}, + editor = {P. Samarati, P. Ryan, D. Gollmann, and R. Molva}, + location = {Sophia Antipolis}, + year = {2004}, + pages = {109--124}, + www_section = methods, + www_tags={selected}, +} + +@inproceedings{UREbreak06, + title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption}, + author = {George Danezis}, + booktitle = {Proceedings of Information Security Conference 2006}, + year = {2006}, + month = {September}, + publisher = {Springer-Verlag}, + www_pdf_url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{Golle:sp2006, + title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks}, + author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow}, + booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, + year = {2006}, + month = {May}, + location = {Oakland, CA}, + pages = {121--131}, + publisher = {IEEE CS}, + www_section = comm, + www_pdf_url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf}, + www_tags={selected}, +} + +@inproceedings{icdcs2006:m2, + title = {M2: Multicasting Mixes for Efficient and Anonymous Communication}, + author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, + booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems}, + year = {2006}, + month = {July}, + day = {4--7}, + www_section = comm, + www_pdf_url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf}, + www_tags={selected}, +} + +@inproceedings{danezis:weis2006, + title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications}, + author = {George Danezis and Bettina Wittneben}, + crossref = {weis2006}, + www_section = traffic, + www_important = 1, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-788.pdf}, + www_tags={selected}, +} + +@inproceedings{heydt-benjamin:pet2006, + title = {Privacy for Public Transportation}, + author = {Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + www_section = credentials, + pages = {1--19}, + www_pdf_url = {http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf}, + www_tags={selected}, +} + +@inproceedings{ciaccio:pet2006, + author = {Giuseppe Ciaccio}, + title = {Improving Sender Anonymity in a Structured Overlay with Imprecise Routing}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {190--207}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_11.pdf}, + www_tags={selected}, +} + +@inproceedings{valet:pet2006, + author = {Lasse {\O}verlier and Paul Syverson}, + title = {Valet Services: Improving Hidden Servers with a Personal Touch}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {223--244}, + www_section = nym, + www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf}, + www_tags={selected}, +} + +@inproceedings{alpha-mixing:pet2006, + author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, + title = {Blending Different Latency Traffic with Alpha-Mixing}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {245--257}, + www_section = comm, + www_pdf_url = {http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf}, + www_tags={selected}, +} + +@inproceedings{tap:pet2006, + author = {Ian Goldberg}, + title = {On the Security of the {Tor} Authentication Protocol}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {316--331}, + www_section = methods, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}, + www_tags={selected}, +} + +@inproceedings{morphmix:pet2006, + author = {Parisa Tabriz and Nikita Borisov}, + title = {Breaking the Collusion Detection Mechanism of MorphMix}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {368--384}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_21.pdf}, + www_tags={selected}, +} + +@inproceedings{clayton:pet2006, + author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, + title = {{Ignoring the Great Firewall of China}}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {20--35}, + www_section = censorship, + www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, + www_tags={selected}, +} + +@inproceedings{cview:pet2006, + author = {Andreas Pashalidis and Bernd Meyer}, + title = {Linking Anonymous Transactions: The Consistent View Attack}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {384--392}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_22.pdf}, + www_tags={selected}, +} + +@techreport{karger77, + Author="Paul A. Karger", + Title="Non-Discretionary Access Control for Decentralized Computing Systems", + Institution="Laboratory for Computer Science, Massachusetts Institute of Technology", + Address="Cambridge, MA", + Number="MIT/LCS/TR-179", + Type="S. M. & E. E. thesis", + Month="May", + Year=1977, + + www_section = traffic, + www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf}, + www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.}, + www_tags={selected}, +} + +@techreport{padlipky78, + Author={Michael A. Padlipsky and David W. Snow and Paul A. Karger}, + Title="Limitations of End-to-End Encryption in Secure Computer Networks", + Institution="The MITRE Corporation: Bedford MA, HQ Electronic Systems Division", + Address="Hanscom AFB, MA", + Number="ESD-TR-78-158", + Month="August", + Year=1978, + www_section = traffic, + www_pdf_url = {http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf}, + www_tags={selected}, +} + +@InProceedings{stepping-stones, + author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu}, + title = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones}, + Booktitle = {Proceedings of ESORICS 2002}, + Year = {2002}, + month = {October}, + pages = {244--263}, + www_section = traffic, + www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf}, + www_tags={selected}, +} + +@InProceedings{fu-active, + author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {Active Traffic Analysis Attacks and Countermeasures}, + booktitle = {Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing}, + year = {2003}, + pages = {31--39}, + www_section = traffic, + www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf}, + www_tags={selected}, +} + +@InProceedings{fu-analytical, + author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks}, + Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}, + year = {2003}, + pages={483--492}, + www_section = traffic, + www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf}, + www_tags={selected}, +} + +@inproceedings{Fu::FlowMarking::2005, + author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {On Flow Marking Attacks in Wireless Anonymous Communication Networks}, + booktitle = {Proceedings of the IEEE International Conference on +Distributed Computing Systems (ICDCS)}, + year = {2005}, + month = {April}, + www_section = traffic, + www_pdf_url = {http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf}, + www_tags={selected}, +} + +@inproceedings{ShWa-Timing06, + title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses}, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + booktitle = {Proceedings of ESORICS 2006}, + year = {2006}, + month = {September}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf}, + www_section = traffic, + www_tags = {selected}, + www_important = 1, +} + +@inproceedings{ShWa-Relationship, + title = {Measuring Relationship Anonymity in Mix Networks}, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, + year = {2006}, + month = {October}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf}, + www_section = traffic, + www_tags = {selected}, +} + +@inproceedings{Salsa, + title = {Salsa: A Structured Approach to Large-Scale Anonymity}, + author = {Arjun Nambiar and Matthew Wright}, + booktitle = {Proceedings of CCS 2006}, + year = {2006}, + month = {November}, + www_pdf_url = {http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf}, + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{HotOrNot, + title = {Hot or Not: Revealing Hidden Services by their Clock Skew}, + author = {Steven J. Murdoch}, + booktitle = {Proceedings of CCS 2006}, + year = {2006}, + month = {November}, + www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf}, + www_section = traffic, + www_tags = {selected}, +} + +@inproceedings{goldberg-2007, + title = {{Improving the Robustness of Private Information Retrieval}}, + author = {Ian Goldberg}, + booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, + year = {2007}, + month = {May}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{beimel-robust, + author = {A. Beimel and Y. Stahl}, + title = {Robust information-theoretic private information retrieval}, + booktitle = {Proceedings of the 3rd Conference on Security in Communication Networks}, + editor = {S. Cimato C. Galdi G. Persiano }, + publisher = {Springer-Verlag}, + series = {Lecture Notes in Computer Science}, + pages = {326--341}, + volume = {2576}, + year = {2002}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf}, + www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@techreport{cosic-2007-001, + author = {Len Sassaman and Bart Preneel}, + title = {{The Byzantine Postman Problem: A Trivial Attack Against + PIR-based Nym Servers}}, + year = {2007}, + month = {February}, + institution = {Katholieke Universiteit Leuven}, + number = {ESAT-COSIC 2007-001}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@article{beimel01informationtheoretic, + author = {Amos Beimel and Yuval Ishai}, + title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, + journal = {Lecture Notes in Computer Science}, + volume = {2076}, + pages = {89--98}, + year = {2001}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{CPIR, + author = {Benny Chor and Niv Gilboa}, + title = {Computationally private information retrieval (extended abstract)}, + booktitle = {Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97)}, + month = {May}, + year = {1997}, + isbn = {0-89791-888-6}, + pages = {304--313}, + location = {El Paso, Texas, United States}, + doi = {http://doi.acm.org/10.1145/258533.258609}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf}, + www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{pir, + title = {Private Information Retrieval}, + author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu +Sudan}, + booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science}, + pages = {41--50}, + year = {1995}, + www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{beimel-barrier, + title = {{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private Information Retrieval}}, + author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\c{c}ois Raymond}, + booktitle = {Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02)}, + month = {November}, + year = {2002}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{tau-indy, + author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, + title = {A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication}, + booktitle = {Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98)}, + year = {1998}, + isbn = {3-540-65142-X}, + pages = {200--217}, + publisher = {Springer-Verlag}, + location = {London, UK}, + www_ps_url = {http://eprint.iacr.org/1998/013.ps.gz}, + www_section = pir, + www_tags = {selected}, +} + +@article{kissner04private, + author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang}, + title = {Private keyword-based push and pull with applications to anonymous communication}, + journal = {Applied Cryptography and Network Security}, + year = {2004}, + www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{wpes06:heydt-benjamin, + author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend}, + title = {Nonesuch: a mix network with sender unobservability}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, + month = {October}, + year = {2006}, + isbn = {1-59593-556-8}, + pages = {1--8}, + location = {Alexandria, Virginia, USA}, + doi = {http://doi.acm.org/10.1145/1179601.1179603}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = "http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf", + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{clonewars, + author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich}, + title = {How to win the clonewars: efficient periodic n-times anonymous authentication}, + booktitle = {Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006)}, + month = {November}, + year = {2006}, + isbn = {1-59593-518-5}, + pages = {201--210}, + location = {Alexandria, Virginia, USA}, + doi = {http://doi.acm.org/10.1145/1180405.1180431}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-812.pdf", + www_section = credentials, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{idemix, + author = {Jan Camenisch and Els Van Herreweghen}, + title = {Design and implementation of the idemix anonymous credential system}, + booktitle = {Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002)}, + year = {2002}, + isbn = {1-58113-612-9}, + pages = {21--30}, + location = {Washington, DC, USA}, + doi = {http://doi.acm.org/10.1145/586110.586114}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = credentials, + www_pdf_url = "http://www.zurich.ibm.com/~jca/papers/camvan02.pdf", + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{cl01a, + author = {Jan Camenisch and Anna Lysyanskaya}, + title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, + booktitle = {Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01)}, + year = {2001}, + isbn = {3-540-42070-3}, + pages = {93--118}, + publisher = {Springer-Verlag}, + location = {London, UK}, + www_section = credentials, + www_pdf_url = "http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf", + www_tags = {selected}, +} + +@inproceedings{chl05-full:eurocrypt2005, + author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, + title = {Compact E-Cash}, + pages = {302--321}, + ee = {http://dx.doi.org/10.1007/11426639_18}, + crossref = {eurocrypt2005}, + www_section = credentials, + www_pdf_url = "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", + www_important = {1}, + www_tags = {selected}, +} +% booktitle = {Proceedings of EUROCRYPT 2005}, +% year = {2005}, +% bibsource = {DBLP, http://dblp.uni-trier.de} + + +@article{adams06, + title = {A Classification for Privacy Techniques}, + author = {Carlisle Adams}, + journal = {University of Ottawa Law & Technology Journal}, + volume = {3}, + issue = {1}, + year = {2006}, + pages = {35--52}, + www_pdf_url = +{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf}, + www_section = {Misc}, + www_tags = {selected}, +} + +@article{brands06, + title = {Secure User Identification Without Privacy Erosion}, + author = {Stefan Brands}, + journal = {University of Ottawa Law & Technology Journal}, + volume = {3}, + issue = {1}, + year = {2006}, + pages = {205--223}, + www_pdf_url = +{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf}, + www_section = {Misc}, + www_tags = {selected}, +} + +@inproceedings{adida07, + author = {Ben Adida and Douglas Wikstr\"om}, + title = {How to Shuffle in Public}, + booktitle = {Proceedings of the Theory of Cryptography 2007}, + year = {2007}, + month = {February}, + www_section = proofs, + www_pdf_url = {http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf}, + www_tags = {selected}, +} + +@InProceedings{slicing07, + author = {Sachin Katti and Jeffery Cohen and Dina Katabi}, + title = {Information Slicing: Anonymity Using Unreliable Overlays}, + booktitle = {Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI)}, + year = {2007}, + month = {April}, + www_section = comm, + www_pdf_url = "http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf", + www_tags = {selected}, +} + +% +% PET 2007 PAPERS. Links are to pre-procedings versions. +% +@InProceedings{franz-pet2007, + author = {Matthias Franz and Bernd Meyer and Andreas Pashalidis}, + title = {Attacking Unlinkability: The Importance of Context}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = methods, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf}, +} + +@InProceedings{serjantov-pet2007, + author = {Andrei Serjantov}, + title = {A Fresh Look at the Generalized Mix Framework}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf}, +} + +@InProceedings{danezis-pet2007, + author = {George Danezis and Claudia Diaz and Carmela Troncoso}, + title = {Two-Sided Statistical Disclosure Attack}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf}, + www_tags = {selected}, + www_remarks = {Extends the Statistical Disclosure attack to take advantage of reply messages.}, +} + +@InProceedings{tsudik-pet2007, + author = {Gene Tsudik}, + title = {A Family of Dunces}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = misc, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Family_dunces.pdf}, +} + +@InProceedings{zhong-pet2007, + author = {Ge Zhong and Ian Goldberg and Urs Hengartner}, + title = {Louis, Lester, and Pierre: Three Protocols for Location Privacy}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Louis_Lester.pdf}, +} + +@InProceedings{faust-pet2007, + author = {Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and Bart Preneel}, + title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf}, +} + +@InProceedings{kate-pet2007, + author = {Aniket Kate and Greg Zaverucha and Ian Goldberg}, + title = {Pairing-Based Onion Routing}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Pairing_based.pdf}, + www_remarks = {Describes a circuit-establishment protocol for a Tor-like + network. Uses Pairing- and Identity-Based crypto for efficiency, at the + expense of having all private keys generated by a trusted IBE authority.}, +} + +@InProceedings{johnson-pet2007, + title = {Nymble: Anonymous IP-address Blocking}, + author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and + Sean W. Smith}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = misc, + www_pdf_url= {http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf}, + www_remarks = {Superseded by nymble-tdsc.}, +} + +@Inproceedings{overlier-pet2007, + title = {Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden services}, + author = {Lasse {\O}verlier and Paul Syverson}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf}, + www_tags = {selected}, + www_remarks = {Introduces Diffie-Hellman-based handshakes to build + Tor circuits with fewer exponentiations than the original + circuit-establishment protocol.}, +} + +@Inproceedings{guha-pet2007, + author = {Saikat Guha and Paul Francis}, + title = {Identity Trail: Covert Surveillance Using DNS}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf}, +} + +@Inproceedings{murdoch-pet2007, + title={Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries}, + author={Steven J. Murdoch and Piotr Zieli{\'n}ski}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf}, + www_tags = {selected}, + www_important = {1}, + www_remarks = {Examines efficacy of traffic analysis against a + low-latency anonymity network by an adversary who + controls Internet exchanges, and who can only + sample a fraction of traffic.}, +} + +@InProceedings{abbott-pet2007, + title = {Browser-Based Attacks on {Tor}}, + author = {Timothy G and Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf}, +} + +@InProceedings{wendolsky-pet2007, + title={Performance Comparison of low-latency Anonymisation Services from a User Perspective}, + author={Rolf Wendolsky and Dominik Herrmann and Hannes Federrath}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section=comm, + www_pdf_url ={http://petworkshop.org/2007/papers/PET2007_preproc_Performance_comparison.pdf}, +} + +@Inproceedings{nagaraja-pet2007, + title={Anonymity in the wild: Mixes on unstructured networks}, + author={Shishir Nagaraja}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section=comm, + www_pdf_url={http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf}, +} + +@inproceedings{Liberatore:2006, + Author = {Marc Liberatore and Brian Neil Levine}, + Title = {{Inferring the Source of Encrypted HTTP Connections}}, + Booktitle = {Proceedings of the 13th ACM conference on Computer and + Communications Security (CCS 2006)}, + Month = {November}, + year = {2006}, + Pages = {255--263}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf}, +} + +@article{Levine:2002, + Author = {Brian Neil Levine and Clay Shields}, + Journal = {Journal of Computer Security}, + Keywords = {anonymity; routing; security; multicast; Journal Paper}, + Number = 3, + Pages = {213--240}, + Title = {{Hordes --- A Multicast Based Protocol for Anonymity}}, + Volume = 10, + Year = {2002}, + www_section = comm, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf}, + www_tags = {selected}, +} + +@inproceedings{Scarlata:2001, + Author = {Vincent Scarlata and Brian Neil Levine and Clay Shields}, + Title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}}, + Booktitle = {Proceedings of the IEEE International Conference on Network + Protocols (ICNP)}, + Keywords = {security; routing; peer-to-peer; anonymity}, + Month = {November}, + Pages = {272--280}, + Year = {2001}, + www_section = misc, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf}, +} +%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf}, + + +@article{Wright:2004, + Author = {Matthew Wright and Micah Adler and Brian Neil Levine and + Clay Shields}, + Title = {{The Predecessor Attack: An Analysis of a Threat to + Anonymous Communications Systems}}, + Journal = {ACM Transactions on Information and System Security (TISSEC)}, + Keywords = {anonymity; Journal Paper}, + Month = {November}, + Number = 7, + Pages = {489--522}, + Volume = 4, + Year = {2004}, + www_section = traffic, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf}, + www_tags = {selected}, +} + +@inproceedings{Wang-SP2007, + title = {{Network Flow Watermarking Attack on Low-Latency Anonymous + Communication Systems}}, + author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, + booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, + year = {2007}, + month = {May}, + pages = {116--130}, + www_section = traffic, + www_pdf_url = + {http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf}, +} + +@INPROCEEDINGS{HasuoK07a, + AUTHOR = "Ichiro Hasuo and Yoshinobu Kawabe", + TITLE = "Probabilistic Anonymity via Coalgebraic Simulations", + BOOKTITLE = "Proceedings of the European Symposium on Programming (ESOP '07)", + PAGES = "379--394", + PUBLISHER = "Springer, Berlin", + SERIES = lncs, + VOLUME = "4421", + YEAR = 2007, + www_section = methods, + www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf}, +} + +@article{regroup2006, + author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}, + title = {Regroup-And-Go mixes to counter the $(n-1)$ attack}, + journal = {Journal of Internet Research}, + pages = {213--223}, + volume = {16}, + year = {2006}, + doi = {http://dx.doi.org/10.1108/10662240610656528}, + number = {2}, + publisher = {Emerald Group Publishing Limited}, + www_section = comm, + www_tags={selected}, +} + +@INPROCEEDINGS{ringstwice07, + author = {Meredith L. Patterson and Len Sassaman}, + title = {Subliminal Channels in the Private Information Retrieval Protocols}, + year = {2007}, + booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux}, + location = {Enschede, NL}, + publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie}, + www_section = pir, + www_tags={selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf}, +} +%pages = {8}, % This can't be right. -NM + +@article{wagner, + author = {Robyn Wagner}, + title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}}, + journal = {New Mexico Law Review}, + volume = {32}, + number = {Winter}, + pages = {99--142}, + year = {2002}, + www_section = misc, + www_tags = {selected}, +} + +@inproceedings{cooper, + title = {Preserving Privacy in a Network of Mobile Computers}, + author = {David A. Cooper and Kenneth P. Birman}, + booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy}, + year = {1995}, + month = {May}, + www_section = pir, + www_tags = {selected}, + www_pdf_url = {http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf}, +} + +@INPROCEEDINGS{space-efficient, + author = {George Danezis and Claudia Diaz}, + title = {Space-Efficient Private Search}, + month = {February}, + year = {2007}, + booktitle = {Proceedings of Financial Cryptography (FC2007)}, + series = {Lecture Notes in Computer Science}, + location= {Tobago}, + publisher = {Springer-Verlag}, + www_section = pir, + www_tags = {selected}, +} + +% -- Below are additions from gd on 01 July 2007 -- + +@inproceedings{1166488, + author = {Ira S. Moskowitz and Richard E. Newman}, + title = {Timing channels, anonymity, mixes, and spikes}, + booktitle = {Proceedings of the 2nd IASTED international +conference on Advances in computer science and technology (ACST '06)}, + month = {January}, + year = {2006}, + isbn = {0-88986-545-0}, + pages = {251--256}, + location = {Puerto Vallarta, Mexico}, + publisher = {ACTA Press}, + address = {Anaheim, CA, USA}, + www_section = methods +} + +@inproceedings{Huang06, + author = {Dijiang Huang}, + title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems}, + booktitle = {Proceedings of the 5th ACM workshop on Wireless +security (WiSe '06)}, + year = {2006}, + isbn = {1-59593-557-6}, + pages = {65--74}, + location = {Los Angeles, California}, + doi = {http://doi.acm.org/10.1145/1161289.1161303}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = traffic +} + +@article{10.1109/SP.2006.17, +author = {Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter +Rautenbach}, +title = {Fundamental Limits on the Anonymity Provided by the MIX Technique}, +journal = {sp}, +volume = {0}, +year = {2006}, +issn = {1081-6011}, +pages = {86--99}, +doi = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +www_section = traffic, +www_pdf_url = {http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf} +} + +@article{ishai2006ca, + title={{Cryptography from Anonymity}}, + author={Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai}, + journal={Proceedings of the 47th Annual IEEE Symposium on Foundations +of Computer Science (FOCS'06)-Volume 00}, + pages={239--248}, + month = {October}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_tags = {selected}, + www_section = methods, + www_pdf_url={http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf}, +} + + +@misc{wang2006sam, + title={{System and method for protecting privacy and anonymity of parties of network communications}}, + author={Y.M. Wang and Q. Sun and D.R. Simon and W. Russell}, + year={2006}, + howpublished={US Patent 6,986,036}, + publisher={Google Patents}, + note={US Patent 6,986,036}, + www_section = comm +} + +@article{kesdogan2006tcn, + title={{Technical challenges of network anonymity}}, + author={D. Kesdogan and C. Palmer}, + journal={Computer Communications}, + volume={29}, + number={3}, + pages={306--324}, + year={2006}, + publisher={Elsevier}, + www_section = comm +} + +@article{kopsell2006ra, + title={{Revocable Anonymity}}, + author={S. Kopsell and R. Wendolsky and H. Federrath}, + journal={Emerging Trends in Information and Communication +Security-ETRICS, LNCS}, + volume={3995}, + pages={206--220}, + year={2006}, + www_section = comm +} + +@article{huang2006sce, + title={{Silent cascade: Enhancing location privacy without communication qos degradation}}, + author={L. Huang and K. Matsuura and H. Yamane and K. Sezaki}, + journal={Proc. of Security in Pervasive Computing (SPC)}, + pages={165--180}, + year={2006}, + www_section = misc +} + +@article{melchor2006dnp, + title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}}, + author={C.A. Melchor and Y. Deswarte}, + journal={Proceedings of the Fifth IEEE International Symposium on +Network Computing and Applications}, + pages={163--172}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm +} + +@article{clauss2006sam, + title={{Structuring anonymity metrics}}, + author={S. Clau{\ss} and S. Schiffner}, + journal={Proceedings of the second ACM workshop on Digital identity +management}, + pages={55--62}, + year={2006}, + publisher={ACM Press New York, NY, USA}, + www_section = methods +} + +@article{durresi2006tac, + title={{Tokens for Anonymous Communications in the Internet}}, + author={A. Durresi and V. Paruchuri and L. Barolli and R. Jain and +M. Takizawa}, + journal={Proceedings of the 17th International Conference on Database +and Expert Systems Applications}, + pages={83--90}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm, + www_pdf_url={http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf}, +} + +@article{deng2006mar, + title={{Measuring anonymity with relative entropy}}, + author={Y. Deng and J. Pang and P. Wu}, + journal={Proc. of FAST}, + year={2006}, + www_section = methods +} + +@article{tsai2006sas, + title={{A Scalable Anonymous Server Overlay Network}}, + author={H. Tsai and A. Harwood}, + journal={Proceedings of the 20th International Conference on Advanced +Information Networking and Applications-Volume 1 (AINA'06)-Volume 01}, + pages={973--978}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm +} + +% article{toth11aca, +% title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}}, +% author={G. Toth and Z. Hornak}, +% journal={Security and Privacy in Dynamic Environments--Proceedings of +%the IFIP TC-11 21st International Information Security Conference (SEC +%2006)}, +% year = {2006}, +% volume={201}, +% www_section = stream, +%} + +@inproceedings{TH06a, + title = {{The APROB Channel: adaptive semi-real-time anonymous communication}}, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + booktitle = {Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and Distributed, Karlstad, Sweden}, + year = {2006}, + www_section = {stream}, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf}, +} + +@inproceedings{TH06b, + title = {{The Chances of Successful Attacks against Continuous-time Mixes}}, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + booktitle = {Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\:oping, Sweden}, + year = {2006}, + www_section = {Traffic analysis}, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf}, +} + + + +@article{10.1109/IWNAS.2006.40, +author = {Yingwu Zhu}, +title = {Resilient P2P Anonymous Routing by Using Redundancy}, +journal = {iwnas}, +volume = {0}, +year = {2006}, +isbn = {0-7695-2651-9}, +pages = {103--110}, +doi = {http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +www_section = comm +} + +@article{chatzikokolakis2006apn, + title={{Anonymity Protocols as Noisy Channels?}}, + author={K. Chatzikokolakis and C. Palamidessi and P. Panangaden}, + journal={Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. +Springer}, + year={2006}, +www_section = methods, +www_tags = {selected} +} + +@article{boukerche2005esd, + title={{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}}, + author={A. Boukerche and K. El-Khatib and L. Xu and L. Korba}, + journal={Computer Communications}, + volume={28}, + number={10}, + pages={1193--1203}, + year={2005}, + publisher={Elsevier}, + www_section = comm, + www_pdf_url={http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf}, +} + +@article{danezis2006rfa, + title={{Route Fingerprinting in Anonymous Communications}}, + author={George Danezis and Richard Clayton}, + journal={Proceedings of the Sixth IEEE International Conference on +Peer-to-Peer Computing}, + pages={69--72}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = mixattacks, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf" +} + +@article{singh2006ama, + title={{Agyaat: mutual anonymity over structured P2P networks}}, + author={A. Singh and B. Gedik and L. Liu}, + journal={Internet Research}, + volume={16}, + number={2}, + pages={189--212}, + year={2006}, + www_section = comm +} + +@article{gupta2006uns, + title={{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}}, + author={R. Gupta and S. Ray and A.K. Somani and Z. Zhang}, + journal={Multiagent and Grid Systems}, + volume={2}, + number={1}, + pages={11--27}, + year={2006}, + publisher={IOS Press}, + www_section = economics, + www_pdf_url={http://www.public.iastate.edu/~rsouvik/Article531.pdf}, +} + +@article{nguyen2006vsf, + title={{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}}, + author={L. Nguyen and R. Safavi-Naini and K. Kurosawa}, + journal={International Journal of Information Security}, + volume={5}, + number={4}, + pages={241--255}, + year={2006}, + publisher={Springer}, + www_section = proofs, + www_tags = {selected}, +} + +% -- end of additions from gd on 01 July 2007 -- +% -- start of additions from tshb on 16 July 2007 --- +% my thanks to Markulf Kohlweiss for his recommendations +@inproceedings{camenisch2003pve, + title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms}, + author = {Jan Camenisch and Victor Shoup}, + booktitle = {Proceedings of {CRYPTO} 2003}, + year = {2003}, + pages = {126--144}, + publisher = {Springer Verlag, LNCS 2729}, + www_section = credentials, + www_important = {0}, + www_tags = {selected}, + www_pdf_url = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2729{\&}spage=126}, +} + +@inproceedings{camenisch2002da, + title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials}, + author = {Jan Camenisch and Anna Lysyanskaya}, + booktitle = {Proceedings of {CRYPTO} 2002}, + year = {2002}, + pages = {61--76}, + publisher = {Springer Verlag, LNCS 2442}, + www_section = credentials, + www_important = {0}, + www_tags = {selected}, + www_pdf_url = {http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm}, +} + +@inproceedings{camenisch2002ssep, + title = {A Signature Scheme with Efficient Protocols}, + author = {Jan Camenisch and Anna Lysyanskaya}, + booktitle = {Proceedings of {SCN '02}, Third Conference on Security in Communication Networks}, + year = {2002}, + pages = {268--289}, + publisher = {Springer Verlag, LNCS 2576}, + www_section = credentials, + www_important = {1}, + www_tags = {selected}, + www_pdf_url = {http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf}, +} + +@inproceedings{ccs07-latency-leak, + title = {How Much Anonymity does Network Latency Leak?}, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf}, + www_section = traffic +} + +@article{tissec-latency-leak, + title = {How Much Anonymity does Network Latency Leak?}, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + journal = {ACM Transactions on Information and System Security}, + year = {2010}, + month = {February}, + volume={13}, + number={2}, + www_important = {1}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf}, + www_section = traffic +} + +@inproceedings{ccs07-doa, + title = {Denial of Service or Denial of Security? {H}ow Attacks on Reliability can Compromise Anonymity}, + author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf}, + www_tags = {selected}, + www_important = {1}, + www_section = traffic +} + +@inproceedings{ccs07-blac, + title = {Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs}, + author = {Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf}, + www_section = nym, + www_remarks = {Superseded by blac-tissec}, +} + +@inproceedings{wiangsripanawan-acsw07, + author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini}, + title = {Design principles for low latency anonymous network systems secure against timing attacks}, + booktitle = {Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07)}, + year = {2007}, + isbn = {1-920-68285-X}, + pages = {183--191}, + location = {Ballarat, Australia}, + publisher = {Australian Computer Society, Inc}, + address = {Darlinghurst, Australia, Australia}, + www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=}, + www_tags = {selected}, + www_section = traffic, +} + +@inproceedings{ChatziPP07, + author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, + title = {Probability of Error in Information-Hiding Protocols}, + booktitle = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)}, + year = {2007}, + location = {S. Servolo island, Venice - Italy}, + www_pdf_url = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}, + www_tags = {selected}, + www_section = comm +} + +@article{WrightMM06, + author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson}, + title = {On Inferring Application Protocol Behaviors in Encrypted Network Traffic}, + journal = {Journal of Machine Learning Research }, + volume = {7}, + year = {2006}, + issn = {1533-7928}, + pages = {2745--2769}, + publisher = {MIT Press}, + address = {Cambridge, MA, USA}, + www_pdf_url = {http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf}, + www_tags = {selected}, + www_section = traffic +} + +@inproceedings{AthanRAM07, + author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos}, + title = {GAS: Overloading a File Sharing Network as an Anonymizing System}, + booktitle = {Proceedings of Second International Workshop on Security, (IWSEC 2007)}, + year = {2007}, + location = {Nara, Japan}, + www_pdf_url = {http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{bauer:wpes2007, + author={Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, + title={Low-Resource Routing Attacks Against {Tor}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = traffic, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf}, + www_tags={selected}, + www_important = 1, +} + +@inproceedings{feigenbaum:wpes2007, + author={Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title={A Probabilistic Analysis of Onion Routing in a Black-box Model}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = proofs, + www_pdf_url = {http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf}, +} + +@inproceedings{erway:wpes2007, + author={Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna Lysyanskaya and Mira Meyerovich and Eric Rachlin}, + title={Making P2P Accountable without Losing Privacy}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = economics, + www_pdf_url = {http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf}, +} + +@misc{CDFS07, +author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati}, +editor = {T. Yu and S. Jajodia}, +booktitle = {Security in Decentralized Data Management}, +title = {k-Anonymity}, +publisher = {Springer}, +year = {2007}, +address = {Berlin Heidelberg}, +howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer}, +www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf}, +www_section = pub, +www_remarks = {Discusses the original k-anonymity proposal and research results on k-anonymity. Introduces also a taxonomy of k-anonymity solutions.} +} + +@misc{VenHeTon07, +author = { Parvathinathan Venkitasubramaniam and Ting He and Lang Tong}, +title = {Anonymous Networking amidst Eavesdroppers}, +howpublished = {Pre-print available as arXiv:0710.4903v1 at arxiv.org}, +month = {October}, +year = {2007}, + www_pdf_url = {http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{tor-soups07, + author = {Jeremy Clark and P. C. van Oorschot and Carlisle Adams}, + title = {{Usability of anonymous web browsing: an examination of Tor interfaces and deployability}}, + booktitle = {{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)}}, + year = {2007}, + month = {July}, + isbn = {978-1-59593-801-5}, + pages = {41--51}, + location = {Pittsburgh, Pennsylvania}, + doi = {http://doi.acm.org/10.1145/1280680.1280687}, + publisher = {ACM}, + address = {New York, NY, USA}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf}, +} + +@PhdThesis{steven-thesis, + author = {Steven J. Murdoch}, + title = {Covert channel vulnerabilities in anonymity systems}, + school = {University of Cambridge}, + year = 2007, + month = {December}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf", + www_tags={selected}, +} + +@PhdThesis{kostas-thesis, + author = {Konstantinos Chatzikokolakis}, + title = {Probabilistic and Information-Theoretic Approaches to Anonymity}, + school = {Laboratoire d'Informatique (LIX), {\'E}cole Polytechnique, Paris}, + year = 2007, + month = {October}, + www_section = comm, + www_pdf_url = "http://www.lix.polytechnique.fr/~kostas/thesis.pdf", + www_tags={selected}, +} + +@InProceedings{clog-the-queue, + author = {Jon McLachlan and Nicholas Hopper}, + title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes}, + booktitle = {Proceedings of Financial Cryptography (FC '08)}, + year = 2008, + month = {January}, + www_section = comm, + www_pdf_url = "http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf", + www_tags={selected}, +} + +@InProceedings{conf/acsac/ADC07, + title = {{Closed-Circuit Unobservable Voice Over IP}}, + author = {Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny}, + booktitle = {Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA}, + publisher = {{IEEE} Computer Society Press}, + year = {2007}, + www_section = comm, + www_pdf_url = "http://www.acsac.org/2007/papers/110.pdf", + www_tags={selected}, +} + +@article{KongHG07, + author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla}, + title = {An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks}, + journal = {IEEE Transactions on Mobile Computing}, + volume = {6}, + number = {8}, + year = {2007}, + issn = {1536-1233}, + pages = {888--902}, + publisher = {IEEE Computer Society}, + address = {Los Alamitos, CA, USA}, + www_section = comm, + www_pdf_url = "http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf", + www_tags={selected}, +} + +@inproceedings{InfDisclosureIDM07, + title = {Information Disclosure in Identity Management}, + author = {Dogan Kesdogan and Vinh Pham and Lexi Pimenidis}, + booktitle = {Proceedings of 12th Nordic Workshop on IT-Security, NordSec}, + year = {2007}, + month = {October}, + location = {Reykjavik, Iceland}, + pages = {141--152}, + editor = {Ulfar Erlingsson and Andrei Sabelfeld}, + www_section = credentials, + www_pdf_url = "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf" +} + +@ARTICLE{EdmanSY07, +title={A Combinatorial Approach to Measuring Anonymity}, +author={M. Edman and F. Sivrikaya and B. Yener}, +journal={Intelligence and Security Informatics, 2007 IEEE}, +year={2007}, +month={May}, +volume={}, +number={}, +pages={356--363}, + www_section = traffic, +www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", + www_tags={selected}, +} + +@InProceedings{snader08, + author = {Robin Snader and Nikita Borisov}, + title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08}, + year = {2008}, + month = {February}, + publisher = {Internet Society}, + www_section = comm , + www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf", + www_tags = {selected}, +} + +@TechReport{DD08Survey, + author = {George Danezis and Claudia Diaz}, + title = {A Survey of Anonymous Communication Channels}, + institution = {Microsoft Research}, + year = {2008}, + number = {MSR-TR-2008-35}, + month = {January}, + www_tags = {selected}, + www_section = {Anonymous communication}, + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf}, +} + +@InProceedings {MarPi08, + title = {A Concept of an Anonymous Direct P2P Distribution Overlay System}, + year = {2008}, + booktitle = {Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA)}, + month = {March}, + pages = {590--597}, + publisher = {IEEE Computer Society Press}, + location = {Gino-wan, Okinawa, Japan}, + ISBN = {978-0-7695-3095-6}, + www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf}, + www_tags = {selected}, + www_section = comm, + author = {Igor Margasinski and Michal Pioro}, +} + +@inproceedings{loesing2008performance, + author={Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz}, + title={{Performance Measurements and Statistics of Tor Hidden Services}}, + booktitle={Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)}, + month={July}, + year={2008}, + location={Turku, Finland}, + publisher={IEEE CS Press}, + www_tags = {selected}, + www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{PanchenkoPR08, + author = {Andriy Panchenko and + Lexi Pimenidis and + Johannes Renner}, + title = {Performance Analysis of Anonymous Communication Channels + Provided by {Tor}}, + year = {2008}, + month = {March}, + pages = {221--228}, + booktitle = {Proceedings of the The Third International Conference on + Availability, Reliability and Security (ARES 2008)}, + location = {Barcelona, Spain}, + publisher = {IEEE Computer Society}, + www_tags = {}, + www_ps_url = {http://www.pimenidis.org/research/papers/PaPiRe08.ps}, + www_section = {Anonymous communication}, +} + +@inproceedings{PanchenkoP06, + author = {Andriy Panchenko and Lexi Pimenidis}, + title = {Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication}, + booktitle = {Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006)}, + year = {2006}, + month = {October}, + pages = {240--251}, + series = {Lecture Notes in Computer Science}, + volume = {4237}, + location = {Heraklion, Crete, Greece}, + www_section = {Anonymous communication}, +} + +@inproceedings{KesdoganPK06, + author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"o}lsch}, + title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis}, + booktitle = {Proceedings of First Workshop on Quality of Protection}, + year = {2005}, + month = {September}, + pages = {159--171}, + series = {Advances in Information Security}, + volume = {23}, + locations = {Milan, Italy}, + www_tags = {}, + www_pdf_url = {http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf}, + www_section = {Anonymous communication}, +} + +@InProceedings{improved-clockskew, + author = {Sebastian Zander and Steven J. Murdoch}, + title = {An Improved Clock-skew Measurement Technique for Revealing Hidden Services}, + booktitle = {Proceedings of the 17th USENIX Security Symposium}, + year = {2008}, + month = {July}, + location = {San Jose, CA, US}, + www_section = traffic, + www_pdf_url = "http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf", + www_tags={selected}, +} + +@InProceedings{quant-adhoc, + author = {Marie Elisabeth Gaup Moe}, + title = {Quantification of Anonymity for Mobile Ad Hoc Networks}, + booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management (STM 08)}, + year = {2008}, + pages = {25--36}, + month = {June}, + location = {Trondheim, Norway}, + www_section = traffic, + www_pdf_url = "http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf", + www_tags={selected}, +} + +@inproceedings{Shao-infocom07, + title = {{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}}, + author = { Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao }, + booktitle = {Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07)}, + year = {2007}, + month = {May}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/pDCS.pdf", + www_section = {Anonymous communication}, +} + +@inproceedings{Shao-infocom08, + title = {{ Towards Statistically Strong Source Anonymity for Sensor Networks }}, + author = { Min Shao and Yi Yang and Sencun Zhu and Guohong Cao }, + booktitle = {Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08)}, + year = {2008}, + month = {May}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf", + www_section = {Anonymous communication}, +} + +@inproceedings{Yang-wisec08, + title = {{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks }}, + author = { Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao }, + booktitle = { Proceedings of The ACM Conference on Wireless Network Security (WiSec)}, + year = {2008}, + month = {March}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf", + www_section = {Anonymous communication}, +} + +@INPROCEEDINGS{troncoso-ih2007, + author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel}, + title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, + year = {2007}, + month = {June}, + pages = {220--236}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2007)}, + editor = {T. Furon et al}, + volume = {4567}, + number = {}, + series = {Lecture Notes in Computer Science}, + location = {Saint-Malo,FR}, + publisher = {Springer-Verlag}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-890.pdf}, + www_tags = {selected}, + www_section = {misc}, +} + +@InProceedings{diaz-esorics2008, + author = {Claudia Diaz and Carmela Troncoso and Bart Preneel}, + title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, + year = {2008}, + month = {October}, + booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)}, + editor = {Sushil Jajodia and J. Lopez }, + volume = {LNCS (in print)}, + number = {}, + series = {Lecture Notes in Computer Science}, + location = {Malaga,ES}, + publisher = {Springer-Verlag}, + www_section = {misc}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf}, +} + %% pages = {18}, + +@INPROCEEDINGS{diaz-wpes2007, + author = {Claudia Diaz and Carmela Troncoso and George Danezis}, + title = {Does additional information always reduce anonymity?}, + year = {2007}, + month = {October}, + pages = {72--75}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society 2007}, + editor = {Ting Yu}, + volume = {}, + number = {}, + series = {}, + location= {Alexandria,VA,USA}, + publisher = {ACM}, + + www_tags = {selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-925.pdf}, + www_section = {traffic}, +} + +@inproceedings{torspinISC08, + title = {Compromising Anonymity Using Packet Spinning}, + author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos + P. Markatos}, + booktitle = {Proceedings of the 11th Information Security Conference (ISC 2008)}, + year = {2008}, + month = {September}, + location = {Taipei, Taiwan}, + www_tags = {selected}, + www_pdf_url = {http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{troncoso-pet2008, + title = {Perfect Matching Statistical Disclosure Attacks}, + author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, + pages = {2--23}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section=traffic, + www_tags={selected}, + www_pdf_url={http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf}, +} + +@inproceedings{hevia-pet2008, + title = {An Indistinguishability-Based Characterization of Anonymous Channels}, + author = {Alejandro Hevia and Daniele Micciancio}, + pages = {24--43}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = misc +} + %NEED URL. + +@inproceedings{diaz-pet2008, + title = {On the Impact of Social Network Profiling on Anonymity}, + author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov}, + pages = {44--62}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = traffic, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf}, + www_tags = {selected}, +} + +@inproceedings{mccoy-pet2008, + title = {Shining Light in Dark Places: Understanding the {Tor} Network}, + author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, + pages = {63--76}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = misc, + www_tags = {selected}, + www_pdf_url = {http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf}, +} + +@inproceedings{coble-pet2008, + title = {Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover}, + author = {Aaron H. Coble}, + pages = {77--98}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = methods +} + +@inproceedings{shimshock-pet2008, + title = {Breaking and Provably Fixing Minx}, + author = {Eric Shimshock and Matt Staats and Nicholas Hopper}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {99--114}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf}, +} + +@inproceedings{murdoch-pet2008, + title = {Metrics for Security and Performance in Low-Latency Anonymity Networks}, + author = {Steven J. Murdoch and Robert N. M. Watson }, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {115--132}, + www_section = {traffic}, + www_tags = {selected}, + www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf}, +} + +@inproceedings{danezis-pet2008, + title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection}, + author = {George Danezis and Paul Syverson}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {133--150}, + www_section = {traffic}, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/bridge.pdf}, + www_important = 1, +} + +@inproceedings{sassaman-pet2008, + title = {How to Bypass Two Anonymity Revocation Systems}, + author = {George Danezis and Len Sassaman}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {187--201}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/KWF.pdf}, +} + +@inproceedings{androulaki-pet2008, + title = {Reputation Systems for Anonymous Networks}, + author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages={202--218}, + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{raykova-pet2008, + title = {PAR: Payment for Anonymous Routing}, + author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, + pages = {219--236}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf}, +} + +@inproceedings{DBLP:conf/esorics/MalleshW07, + author = {Nayantara Mallesh and + Matthew Wright}, + title = {Countering Statistical Disclosure with Receiver-Bound Cover + Traffic}, + pages = {547--562}, + www_section = comm, + www_tags = {selected}, + crossref = {esorics2007}, + www_pdf_url = {http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf}, +} + +@techreport{LOCEntropy2008, + title = {Entropy Bounds for Traffic Confirmation}, + author = {Luke O'Connor}, + institution = {IACR}, + number = {2008/365}, + year = {2008}, + month = {October}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://eprint.iacr.org/2008/365.pdf}, +} + +@inproceedings{bauer:alpaca2008, + title = { {BitBlender}: {L}ight-Weight Anonymity for BitTorrent}, + author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker}, + booktitle = {{Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008)}}, + year = {2008}, + month = {September}, + location = {Istanbul, Turkey}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/acns/KlonowskiKL08, + author = {Marek Klonowski and + Miroslaw Kutylowski and + Anna Lauks}, + title = {Repelling Detour Attack Against Onions with Re-encryption}, + pages = {296--308}, + ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18}, + crossref = {DBLP:conf/acns/2008}, + www_section = comm, + www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/}, +} + +@inproceedings{DBLP:conf/pervasive/CichonKK08, + author = {Jacek Cichon and + Marek Klonowski and + Miroslaw Kutylowski}, + title = {Privacy Protection for RFID with Hidden Subset Identifiers}, + pages = {298--314}, + ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18}, + crossref = {DBLP:conf/pervasive/2008}, + www_section = misc, + www_publisher_url={http://www.springerlink.com/content/r754w32x71176057/}, +} + +@inproceedings{GTDPV-WPES08, + title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity}, + author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)}, + year = {2008}, + month = {October}, + location = {Alexandria, VA, USA}, + publisher = {ACM}, + www_tags = {}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf}, + www_section = traffic +} + +@inproceedings{FNP04, + title = "Efficient Private Matching and Set Intersection", + author = "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", + booktitle = "Proceedings of {EUROCRYPT} 2004", + location = "Interlaken, Switzerland", + month = {May}, + year = 2004, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf}, + www_section = misc +} + +@inproceedings{FIPR05, + title = "Keyword Search and Oblivious Pseudorandom Functions", + author = "Michael J. Freedman and Yuval Ishai and Benny Pinkas and +Omer Reingold", + booktitle = "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", + location = "Cambridge, MA", + month = {February}, + year = 2005, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf}, + www_section = misc +} + +@inproceedings{fof:iptps07, + title = "Efficient Private Techniques for Verifying Social Proximity", + author = "Michael J. Freedman and Antonio Nicolosi", + booktitle = "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", + location = "Bellevue, WA", + month = {February}, + year = "2007", + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf}, + www_section = misc +} + + +@inproceedings{ccs2008:wang, + title={Dependent Link Padding Algorithms for Low Latency Anonymity Systems}, + author={Wei Wang and Mehul Motani and Vikram Srinivasan}, + crossref={ccs2008}, + pages={323--332}, + www_tags={selected}, + www_section=traffic +} + +@inproceedings{ccs2008:tsang, + title={PEREA: Towards Practical TTP-Free Revocation in Anonymous + Authentication}, + author={Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, + crossref={ccs2008}, + pages={333--345}, + www_section=misc, + www_tags={selected}, +} + +@inproceedings{ccs2008:camenisch, + title={Efficient Attributes for Anonymous Credentials}, + author={Jan Camenisch and Thomas Gross}, + crossref={ccs2008}, + pages={345--356}, + www_section=credentials, + www_pdf_url={http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf}, +} + +@inproceedings{ccs2008:mittal, + title={Information Leaks in Structured Peer-to-peer Anonymous Communication Systems}, + author={Prateek Mittal and Nikita Borisov}, + crossref={ccs2008}, + pages={267--278}, + www_pdf_url={http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf}, + www_tags={selected}, + www_section=comm, + www_remarks={Describes attacks against the SALSA and AP3 peer-to-peer + anonymity network architectures.}, +} + +@proceedings{ccs2008, + editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}, + booktitle = {{Proceedings of the 15th ACM Conference on Computer and + Communications Security (CCS 2008)}}, + location = {Alexandria, Virginia, USA}, + publisher = {ACM Press}, + day = {27--31}, + month = {October}, + year = 2008 +} + +@inproceedings{MORE, + author = {Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko ++Niedermayer and Georg Carle}, + title = {{More: A Peer-To-Peer Based Connectionless Onion Router}}, + year = {2007}, + booktitle = {Proceedings of IEEE GLOBECOM, Globalcommunications Conference}, + location= {Washington DC, USA}, + month = {November}, + day = {26}, + www_pdf_url = {http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf}, + www_section = {Anonymous communication}, +} + +@mastersthesis{reardon-thesis, + author = {Reardon, Joel}, + title = {Improving {Tor} using a {TCP}-over-{DTLS} Tunnel}, + school = {University of Waterloo}, + year = {2008}, + month = {September}, + www_abstract_url = {http://hdl.handle.net/10012/4011}, + www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf}, + www_section = comm, + www_tags = {selected}, +} + +@InProceedings{morphing09, + author = {Charles Wright and Scott Coull and Fabian Monrose}, + title = {Traffic Morphing: An efficient defense against statistical traffic analysis}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '09}, + year = {2009}, + month = {February}, + publisher = {IEEE}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/morphing09.pdf", + www_tags={selected}, +} + +@phdthesis{joss-thesis, + title = {Characterising Anonymity Systems}, + author = {Joss Wright}, + school = {Department of Computer Science, University of York, York}, + year = {2007}, + month = {November}, + www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf}, + www_section = methods +} + +@PhdThesis{Douglas-thesis, + author = {Douglas Kelly}, + title = {A taxonomy for and analysis of anonymous communications networks}, + school = {Air Force Institute of Technology}, + year = 2009, + month = {March}, + www_section = comm, + www_pdf_url = "http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf", + www_tags={selected}, +} + +@InProceedings{congestion-longpaths, + author = {Nathan Evans and Roger Dingledine and Christian Grothoff}, + title = {A Practical Congestion Attack on {T}or Using Long Paths}, + booktitle = {Proceedings of the 18th USENIX Security Symposium}, + year = {2009}, + month = {August}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/congestion-longpaths.pdf", + www_tags={selected}, +} + +@inproceedings{wpes09-dht-attack, + title = {{Hashing it out in public: Common failure modes of DHT-based anonymity schemes}}, + author = {Andrew Tran and Nicholas Hopper and Yongdae Kim}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf}, + www_section = traffic +} + +@inproceedings{wpes09-bridge-attack, + title = {{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design}}, + author = {Jon McLachlan and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf}, + www_section = traffic +} + +@inproceedings{wpes09-xpay, + title = {{XPay: Practical anonymous payments for Tor routing and other networked services}}, + author = {Yao Chen and Radu Sion and Bogdan Carbunar}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf}, + www_section = comm +} + +@inproceedings{ccsw09-fingerprinting, + title = {Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\"{\i}ve-bayes classifier}, + author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}, + booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)}, + month = {October}, + year = {2009}, + isbn = {978-1-60558-784-4}, + pages = {31--42}, + location = {Chicago, Illinois, USA}, + doi = {http://doi.acm.org/10.1145/1655008.1655013}, + publisher = {ACM}, + address = {New York, NY, USA}, + + www_tags = {selected}, + www_pdf_url = {http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf}, + www_section = traffic +} + +@Article{nymble-tdsc, + author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith}, + title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks}, + journal ={IEEE Transactions on Dependable and Secure Computing}, + volume = {8}, + number = {2}, + year = {2011}, + month = {March--April}, + pages = {256--269}, + doi = {10.1109/TDSC.2009.38}, + www_tags = {selected}, + www_important = {1}, + www_section = misc, + www_remarks = {Describes Nymble, a system that allows services to block + anonymous users that misbehave, without making their transactions + linkable.}, +} + +@InProceedings{incentives-fc10, + author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach}, + title = {{Building Incentives into Tor}}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm, + www_pdf_url = "http://freehaven.net/anonbib/papers/incentives-fc10.pdf", + www_tags={selected}, +} + +@InProceedings{sphinx-onion-fc10, + author = {Aniket Kate and Ian Goldberg}, + title = {Using Sphinx to Improve Onion Routing Circuit Construction}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm, + www_pdf_url = "http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf", + www_tags={selected}, +} + +@InProceedings{anon-fc10, + author = {Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan}, + title = {Cryptographic Protocol Analysis of {AN.ON}}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm, + www_pdf_url = "http://freehaven.net/anonbib/papers/wwpk2010.pdf", + www_tags={selected}, +} + +@INPROCEEDINGS{shalon-anon, + author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson}, + title = {{SHALON}: Lightweight Anonymization based on Open Standards}, + booktitle = {Proceedings of 18th International Conference on Computer Communications and Networks}, + year = {2009}, + location = {San Francisco, CA, USA}, + month = {August}, + www_section = comm, + www_pdf_url = "http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf", + www_tags={selected}, +} + +@INPROCEEDINGS{w09, + author = {Benedikt Westermann}, + title = {Security Analysis of {AN.ON}'s Payment Scheme}, + booktitle = {Proceedings of NordSec 2009}, + year = {2009}, + editor = {Audun J\osang and Torleiv Maseng and Svein Johan Knapskog}, + volume = {5838/2009}, + series = {Lecture Notes in Computer Science}, + pages = {255--270}, + month = {October}, + publisher = {Springer}, + www_section = comm, +} + +@inproceedings{Rybczynska-incos2009, + author = {Rybczy\'{n}ska, Marta}, + title = {{A Round--based Cover Traffic Algorithm for Anonymity Systems}}, + booktitle = {{Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems}}, + year = {2009}, + pages = {93--99}, + location = {Barcelona, Spain}, + month = {November}, + publisher = {IEEE Computer Society Press}, + www_pdf_url = {http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/pet/DanezisT09, + author = {George Danezis and + Carmela Troncoso}, + title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent + Communications}, + pages = {56--72}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf}, + www_section = traffic, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/SherrBL09, + author = {Micah Sherr and + Matt Blaze and + Boon Thau Loo}, + title = {Scalable Link-Based Relay Selection for Anonymous Routing}, + pages = {73--93}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://micah.cis.upenn.edu/papers/pets09.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/SchiffnerC09, + author = {Stefan Schiffner and + Sebastian Clau{\ss}}, + title = {Using Linkability Information to Attack Mix-Based Anonymity + Services}, + pages = {94--107}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/pet/BauerMGGS09, + author = {Kevin S. Bauer and + Damon McCoy and + Ben Greenstein and + Dirk Grunwald and + Douglas C. Sicker}, + title = {Physical Layer Attacks on Unlinkability in Wireless LANs}, + pages = {108--127}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/pet/RaghavanKSW09, + author = {Barath Raghavan and + Tadayoshi Kohno and + Alex C. Snoeren and + David Wetherall}, + title = {Enlisting ISPs to Improve Online Privacy: IP Address Mixing + by Default}, + pages = {143--163}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/AndroulakiB09, + author = {Elli Androulaki and + Steven M. Bellovin}, + title = {APOD: Anonymous Physical Object Delivery}, + pages = {202--215}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/pet/2009, + editor = {Ian Goldberg and + Mikhail J. Atallah}, + booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5672}, + month = {August}, + year = {2009}, + isbn = {978-3-642-03167-0}, +} + +@inproceedings{DBLP:conf/esorics/DanezisDKT09, + author = {George Danezis and + Claudia D\'{\i}az and + Emilia K{\"a}sper and + Carmela Troncoso}, + title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, + pages = {406--423}, + www_tags = {selected}, + crossref = {DBLP:conf/esorics/2009}, + www_pdf_url = {http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/esorics/ModersheimV09, + author = {Sebastian M{\"o}dersheim and + Luca Vigan{\`o}}, + title = {Secure Pseudonymous Channels}, + pages = {337--354}, + crossref = {DBLP:conf/esorics/2009}, + www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/esorics/2009, + editor = {Michael Backes and Peng Ning}, + booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5789}, + month = {September}, + year = {2009}, + isbn = {978-3-642-04443-4}, +} + +@inproceedings{DBLP:conf/sp/NarayananS09, + author = {Arvind Narayanan and + Vitaly Shmatikov}, + title = {De-anonymizing Social Networks}, + pages = {173--187}, + www_tags = {selected}, + crossref = {DBLP:conf/sp/2009}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf}, + www_section = misc, + www_important = 1, +} + +@inproceedings{DBLP:conf/sp/DanezisG09, + author = {George Danezis and + Ian Goldberg}, + title = {Sphinx: A Compact and Provably Secure Mix Format}, + pages = {269--282}, + ee = {http://dx.doi.org/10.1109/SP.2009.15}, + crossref = {DBLP:conf/sp/2009}, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/sp/2009, + editor = {}, + booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P 2009)}, + location = {Oakland, California, USA}, + publisher = {IEEE Computer Society}, + month = {May}, + year = {2009}, + isbn = {978-0-7695-3633-0}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@inproceedings{DBLP:conf/ccs/TroncosoD09, + author = {Carmela Troncoso and + George Danezis}, + title = {The bayesian traffic analysis of mix networks}, + pages = {369--379}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/ccs/EdmanS09, + author = {Matthew Edman and + Paul F. Syverson}, + title = {{AS}-awareness in {T}or path selection}, + pages = {380--389}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf}, + www_section = comm +} + +@inproceedings{ccs09-nisan, + author = {Andriy Panchenko and Arne Rache and Stefan Richter}, + title = {{NISAN}: Network Information Service for Anonymization Networks}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-shadowwalker, + author = {Prateek Mittal and Nikita Borisov}, + title = {ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-certificateless, + author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, + title = {Certificateless Onion Routing}, + crossref = {DBLP:conf/ccs/2009}, + www_pdf_url = {http://www.ippari.unict.it/~catalano/CaGeFi09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-torsk, + author = {Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim}, + title = {{Scalable onion routing with Torsk}}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/ccs/VassermanJTHK09, + author = {Eugene Y. Vasserman and + Rob Jansen and + James Tyra and + Nicholas Hopper and + Yongdae Kim}, + title = {Membership-concealing overlay networks}, + pages = {390--399}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/ccs/LingLYFXJ09, + author = {Zhen Ling and + Junzhou Luo and + Wei Yu and + Xinwen Fu and + Dong Xuan and + Weijia Jia}, + title = {A new cell counter based attack against tor}, + pages = {578--589}, + crossref = {DBLP:conf/ccs/2009}, + www_section = traffic +} + +@proceedings{DBLP:conf/ccs/2009, + editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}, + booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009}, + publisher = {ACM}, + location = {Chicago, Illinois, USA}, + month = {November}, + year = {2009}, + isbn = {978-1-60558-894-0}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@inproceedings{ccs10-lookup, + author = {Qiyan Wang and Prateek Mittal and Nikita Borisov}, + title = {In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf}, + www_section = traffic +} + +@inproceedings{ccs10-braids, + author = {Rob Jansen and Nicholas Hopper and Yongdae Kim}, + title = {Recruiting New {T}or Relays with {BRAIDS}}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf}, + www_section = comm +} + +@inproceedings{ccs10-scheduling, + author = {Can Tang and Ian Goldberg}, + title = {An Improved Algorithm for {T}or Circuit Scheduling}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf}, + www_section = comm +} + +@inproceedings{ccs10-dissent, + author = {Henry Corrigan-Gibbs and Bryan Ford}, + title = {Dissent: Accountable Anonymous Group Messaging}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf}, + www_section = censorship +} + +@proceedings{DBLP:conf/ccs/2010, + editor = {Angelos D. Keromytis and Vitaly Shmatikov}, + booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)}, + publisher = {ACM}, + location = {Chicago, Illinois, USA}, + month = {October}, + year = {2010}, +} + +@inproceedings{wpes10-shadows, + title = {Balancing the Shadows}, + author = {Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf}, + www_section = comm +} + +@inproceedings{wpes10-jack, + title = {Jack: Scalable Accumulator-based Nymble System}, + author = {Zi Lin and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf}, + www_section = misc +} + +@inproceedings{wpes10-unraveling, + title = {Unraveling an Old Cloak: k-anonymity for Location Privacy}, + author = {Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and Jean-Pierre Hubaux}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2}, + www_section = comm +} + +@article{edman2009survey, + author = {Matthew Edman and B\"{u}lent Yener}, + title = {On anonymity in an electronic society: A survey of anonymous + communication systems}, + journal = {ACM Computing Surveys}, + volume = {42}, + number = {1}, + year = {2009}, + issn = {0360-0300}, + pages = {1--35}, + doi = {http://doi.acm.org/10.1145/1592451.1592456}, + publisher = {ACM}, + address = {New York, NY, USA}, + www_section = misc, + www_tags = {selected}, + www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf}, +} + +@phdthesis{loesing2009thesis, + title = {Privacy-enhancing Technologies for Private Services}, + author = {Karsten Loesing}, + school = {University of Bamberg}, + year = {2009}, + month = {May}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf}, +} + +@inproceedings{lenhard2009hidserv-lowbw, + author = {J{\"o}rg Lenhard and Karsten Loesing and Guido Wirtz}, + title = {Performance Measurements of Tor Hidden Services in + Low-Bandwidth Access Networks}, + booktitle = {Proceedings of the 7th International Conference on Applied + Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, + France, June 2-5, 2009}, + year = {2009}, + month = {June}, + editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque + and Damien Vergnaud}, + volume = {5536}, + series = {Lecture Notes in Computer Science}, + isbn = {978-3-642-01956-2}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf}, +} + +@inproceedings{nymbler, + title = {{Making a Nymbler Nymble using VERBS (Extended Version)}}, + author = {Ryan Henry and Kevin Henry and Ian Goldberg}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf}, + www_section = {Misc}, +} + +@inproceedings{topology-pet2010, + title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks}, + author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf}, + www_section = traffic +} + +@inproceedings{active-pet2010, + title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication}, + author = {Aaron Johnson and Joan Feigenbaum and Paul Syverson}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf}, + www_section = traffic +} + +@inproceedings{drac-pet2010, + title = {Drac: An Architecture for Anonymous Low-Volume Communications}, + author = {George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf}, + www_section = comm +} + +@inproceedings{wecsr10measuring-tor, + title = {A Case Study on Measuring Statistical Data in the {T}or Anonymity Network}, + author = {Karsten Loesing and Steven J. Murdoch and Roger Dingledine}, + booktitle = {Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)}, + year = {2010}, + month = {January}, + location = {Tenerife, Canary Islands, Spain}, + publisher = {Springer}, + series = {LNCS}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = "http://metrics.torproject.org/papers/wecsr10.pdf" +} + +@inproceedings{huber2010tor, + title = {{Tor HTTP Usage and Information Leakage}}, + author = {Markus Huber and Martin Mulazzani and Edgar Weippl}, + booktitle = {Proceedings of the 11th IFIP TC 6/TC 11 International + Conference on Communications and Multimedia Security (CMS 2010)}, + year = {2010}, + month = {May}, + location = {Linz, Austria}, + publisher = {Springer}, + series = {LNCS}, + volume = {6109}, + pages = {245--255}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf}, +} + +@techreport{tor-blocking, + title = {Design of a blocking-resistant anonymity system}, + author = {Roger Dingledine and Nick Mathewson}, + institution = {The Tor Project}, + number = {2006-1}, + year = {2006}, + month = {November}, + www_tags = {selected}, + www_section = comm, + www_important = {1}, + www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, +} + +@inproceedings{wk11-malice-vs-anon, + author = {Benedikt Westermann and Dogan Kesdogan}, + title = {Malice versus AN.ON: Possible Risks of Missing Replay and +Integrity Protection}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf}, +} + +@inproceedings{bnymble11, + author = {Peter Lofgren and Nicholas Hopper}, + title = {BNymble: More anonymous blacklisting at almost no cost}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = misc, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/bnymble.pdf}, +} + +@inproceedings{proximax11, + author = {Kirill Levchenko and Damon McCoy}, + title = {Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf}, +} + +@article{blac-tissec, + author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W. }, + title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs}, + journal = {ACM Transactions on Information and System Security}, + issue_date = {December 2010}, + volume = {13}, + issue = {4}, + month = {December}, + year = {2010}, + issn = {1094-9224}, + pages = {39:1--39:33}, + articleno = {39}, + numpages = {33}, + url = {http://doi.acm.org/10.1145/1880022.1880033}, + doi = {http://doi.acm.org/10.1145/1880022.1880033}, + acmid = {1880033}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf} +} + +@inproceedings{dsn-09-jing, +Title = {On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks}, +Address = {Lisbon}, +Author = {Jing Jin and Xinyuan Wang}, +Pages = {429--438}, +Booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, +Year = {2009}, +month = {July}, +www_section = {Anonymous communication}, +www_tags = {selected}, +www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf}, +} + +@inproceedings{LZCLCP_NDSS11, + title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, + year = {2011}, + month = {February}, + publisher = {Internet Society}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf}, + www_section = {Traffic analysis}, +} + +@inproceedings{ndss09-rainbow, + title = {RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows}, + author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'09}, + year = {2009}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf}, + www_section = traffic, +} + +@inproceedings{ndss11-swirl, + title = {SWIRL: A Scalable Watermark to Detect Correlated Network Flows}, + author = {Amir Houmansadr and Nikita Borisov}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, + year = {2011}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf}, + www_section = traffic, +} + +@inproceedings{LZPL_ESORICS10, + title = {On the Secrecy of Spread-Spectrum Flow Watermarks}, + author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, + year = {2010}, + month = {September}, + publisher = {Springer}, + www_section = traffic, +} + +@inproceedings{LZCCL_DSN11, + title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11}, + year = {2011}, + month = {June}, + publisher = {IEEE}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_ICC09, + title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the International Conference on Communications - {ICC}'09}, + year = {2009}, + month = {June}, + publisher = {IEEE}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_DSN08, + title = {{TCP} Covert Timing Channels: Design and Detection}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08}, + year = {2008}, + month = {June}, + publisher = {IEEE}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_ESORICS07, + title = {Cloak: A Ten-fold Way for Reliable Covert Communications}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07}, + year = {2007}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_IFIPSEC07, + title = {Crafting Web Counters into Covert Channels}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07}, + year = {2007}, + month = {May}, + publisher = {Springer}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf}, + www_section = {Anonymous communication}, +} + +@INPROCEEDINGS{ReedPierce10, + title = {Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy}, + author = {Jason Reed and Benjamin C. Pierce}, + booktitle = {Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on {F}unctional {P}rogramming ({ICFP})}, + year = {2010}, + month = {September}, + location = {Baltimore, Maryland}, + publisher = {ACM Press}, + www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf}, + www_section = {Formal methods}, +} + +@INPROCEEDINGS{DPCS2010, + title = {Differential Privacy for Collaborative Security}, + author = {Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith}, + booktitle = {Proceedings of the European Workshop on System Security (EUROSEC)}, + year = {2010}, + month = {April}, + publisher = {ACM Press}, + www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf}, + www_section = {Misc} +} + +@InProceedings{pro-pro:pet2000, + author = {Kai Rannenberg and Giovanni Iachello}, + title = {Protection Profiles for Remailer Mixes}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + year = 2000, + month = {July}, + www_section = comm, + www_pdf_url = "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", +} + + +@InProceedings{demuth:pet2002, + author = {Thomas Demuth}, + title = {A Passive Attack on the Privacy of Web Users Using Standard Log Information}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = comm, + www_pdf_url = "http://demuth.biz/veroeffentlichungen/pet02.pdf", + www_tags={selected}, +} + +@InProceedings{asonov:pet2002, + author = {Dmitri Asonov and Johann-Christoph Freytag}, + title = {Almost Optimal Private Information Retrieval}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = pir, + www_pdf_url = "http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf", +} + + +%%%%%%%%%%%%%%%%%% + +@inproceedings{pets2011:TorUsernames, + title={How Unique and Traceable are Usernames?}, + author={Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils}, + booktitle={Proceedings of the 11th Privacy Enhancing Technologies Symposium}, + year={2011}, + month={July}, + www_section = nym, + www_pdf_url = {http://arxiv.org/pdf/1101.5578}, +} + +@inproceedings{pets2010:eckersley2010unique, + title={How unique is your web browser?}, + author={Peter Eckersley}, + booktitle={Proceedings of the 10th Privacy Enhancing Technologies Symposium}, + pages={1--18}, + year={2010}, + month={July}, + location={Berlin, Germany}, + www_section = misc, + www_tags={selected}, + www_pdf_url = {http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf}, +} + +@inproceedings{raid2011:chakravartydetecting, + title={Detecting Traffic Snooping in Tor Using Decoys}, + author={Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis}, + booktitle = {Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection}, + series = {RAID'11}, + month = {September}, + year = {2011}, + location = {Menlo Park, CA}, + pages = {222--241}, + publisher = {Springer-Verlag}, + address = {Berlin, Heidelberg}, + publisher={Springer-Verlag}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf} +} + +@inproceedings{usenix2010:aggarwal2010analysis, + title={An Analysis of Private Browsing Modes in Modern Browsers}, + author={Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh}, + booktitle={Proceedings of the 19th Usenix Security Symposium}, + month={August}, + year={2010}, + www_section = misc, + www_tags={selected}, + www_pdf_url = {http://www.collinjackson.com/research/private-browsing.pdf}, +} + +@inproceedings{leet2011:TorBunchApple, + title = {One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users}, + author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, + booktitle = {Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats}, + series = {LEET'11}, + year = {2011}, + publisher = {USENIX Association}, + www_section = traffic, + www_pdf_url = {http://arxiv.org/pdf/1103.1518}, +} + +@inproceedings{wpes11-panchenko, + title = {Website Fingerprinting in Onion Routing Based Anonymization Networks}, + author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf}, + www_section = traffic +} + +@inproceedings{wpes11-bridgespa, + title = {{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization}, + author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf}, + www_section = comm +} + +@inproceedings{wpes11-faust, + title = {FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting}, + author = {Peter Lofgren and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf}, + www_section = comm +} + +@inproceedings{ccs2011-trust, + Author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson}, + Title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf}, +} + +@inproceedings{ccs2011-cirripede, + Author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov}, + Title = {Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, +} + +@inproceedings{ccs2011-oneswarm, + Author = {Swagatika Prusty and Marc Liberatore and Brian N. Levine}, + Title = {Forensic Investigation of the OneSwarm Anonymous Filesharing System}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf}, +} + +@inproceedings{ccs2011-stealthy, + Author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita Borisov}, + Title = {Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf}, +} + +@InProceedings{foci11-decoy, + author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, + title = {Decoy Routing: Toward Unblockable Internet Communication}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, + year = {2011}, + month = {August}, + www_section = censorship, + www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf}, + www_tags={selected}, +} + +@InProceedings{foci11-clouds, + author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman}, + title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, + year = {2011}, + month = {August}, + www_section = comm, + www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf}, +} + +@InProceedings{cset11-experimentor, + author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald}, + title = {ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation}, + booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011)}, + year = {2011}, + month = {August}, + www_section = comm, + www_pdf_url = {http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf}, + www_tags={selected}, +} + +@InProceedings{usenix11-telex, + author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, + title = {Telex: Anticensorship in the Network Infrastructure}, + booktitle = {Proceedings of the 20th USENIX Security Symposium}, + year = {2011}, + month = {August}, + www_section = censorship, + www_pdf_url = {http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf}, + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{usenix11-pirtor, + author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and Ian Goldberg}, + title = {PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval}, + booktitle = {Proceedings of the 20th USENIX Security Symposium}, + year = {2011}, + month = {August}, + www_section = comm, + www_pdf_url = {http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf}, + www_tags={selected}, +} + +@inproceedings{pets2011-bagai, + title = {An Accurate System-Wide Anonymity Metric for Probabilistic Attacks}, + author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf}, + www_section = traffic +} + +@inproceedings{pets2011-defenestrator, + title = {DefenestraTor: Throwing out Windows in Tor}, + author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey Voelker}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf}, + www_section = comm +} + +@inproceedings{pets2011-i2p, + title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P}, + author = {Michael Herrmann and Christian Grothoff}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf}, + www_section = traffic +} + +@InProceedings{oakland11-formalizing, + author = {Ryan Henry and Ian Goldberg}, + title = {Formalizing Anonymous Blacklisting Systems}, + booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + year = 2011, + month = {May}, + www_section = misc, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf}, + www_tags={selected}, +} + +@InProceedings{oakland11-extending, + author = {Ryan Henry and Ian Goldberg}, + title = {Extending Nymble-like Systems}, + booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + year = 2011, + month = {May}, + www_section = misc, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf}, +} + +@InProceedings{acsac11-tortoise, + title = {Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise}, + author = {W. Brad Moore and Chris Wacek and Micah Sherr}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_section = comm, + www_pdf_url = {https://security.cs.georgetown.edu/papers/tortoise.pdf}, + www_tags={selected}, +} + +@InProceedings{acsac11-supernodes, + title = {"Super Nodes" in Tor: Existence and Security Implication}, + author = {Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_section = comm, + www_pdf_url = {http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf}, +} + +@InProceedings{acsac11-backlit, + title = {Exposing Invisible Timing-based Traffic Watermarks with BACKLIT}, + author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_tags={selected}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/backlit-acsac11.pdf", +} + +@PhdThesis{kevin-thesis, + author = {Kevin Bauer}, + title = {Improving Security and Performance in Low Latency Anonymity Networks}, + school = {University of Colorado}, + year = 2011, + month = {May}, + www_section = comm, + www_pdf_url = "http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf", + www_tags={selected}, +} + +@article{perea-tissec11, + author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia}, + title = {{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous users}, + journal = {ACM Transactions on Information and System Security ({ACM TISSEC})}, + issue_date = {December 2011}, + volume = {14}, + issue = {4}, + month = {December}, + year = {2011}, + issn = {1094-9224}, + pages = {29:1--29:34}, + articleno = {29}, + numpages = {34}, + url = {http://doi.acm.org/10.1145/2043628.2043630}, + doi = {http://doi.acm.org/10.1145/2043628.2043630}, + acmid = {204363}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf}, + www_section=misc, + www_tags={selected}, +} + +@phdthesis{Weber11, + author = {Stefan G. Weber}, + title = {Multilaterally Secure Pervasive Cooperation}, + school = {TU Darmstadt, Germany}, + year = {2011}, + month = {December}, + www_section = {comm}, + www_pdf_url = {http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf} +} + +@inproceedings{Shokri11QLP1, + title={Quantifying location privacy}, + author={Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux}, + booktitle={Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + pages={247--262}, + year={2011}, + organization={IEEE}, + www_section={misc}, + www_pdf_url={http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf} +} + +@inproceedings{Shokri11QLP2, + title={Quantifying Location Privacy: The Case of Sporadic Location Exposure}, + author={Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux, Jean-Pierre and Jean-Yves Le Boudec}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + pages={57--76}, + year={2011}, + publisher={Springer}, + www_section={misc}, + www_pdf_url={http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf} +} + +@inproceedings{oakland2012-peekaboo, + title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}, + author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://kpdyer.com/publications/oakland2012.pdf}, +} + +@inproceedings{oakland2012-lastor, + title = {{LASTor: A Low-Latency AS-Aware Tor Client}}, + author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf}, +} + +@inproceedings{oakland2012-lap, + title = {{LAP}: Lightweight Anonymity and Privacy}, + author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://freehaven.net/anonbib/papers/LAP.pdf}, +} + +@inproceedings{congestion-tor12, + author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg}, + title = {{Congestion-aware Path Selection for Tor}}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'12)}, + year = {2012}, + month = {February}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf}, +} + +@InProceedings{blacr-ndss, + author = {Man Ho Au and Apu Kapadia and Willy Susilo}, + title = {{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation}, + booktitle = {Proceedings of the 19th Annual Network and Distributed System Security Symposium ({NDSS})}, + year = {2012}, + month = feb, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf} +} + +@InCollection{systems-anon-communication, + author = {George Danezis and Claudia Diaz and Paul F. Syverson}, + title = {{Systems for Anonymous Communication}}, + month = {August}, + year = {2010}, + pages = {341--390}, + editor = {B. Rosenberg and + D. Stinson}, + booktitle = {CRC Handbook of Financial Cryptography and Security}, + publisher = {Chapman \& Hall }, + series = {CRC Cryptography and Network Security Series}, + volume = {}, + www_tags = {selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf}, + www_section = comm +} + +@inproceedings{shadow-ndss12, + title = {{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}}, + author = {Rob Jansen and Nicholas Hopper}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'12}, + year = {2012}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.internetsociety.org/sites/default/files/09_3.pdf}, + www_section = comm +} + +@inproceedings{flashproxy-pets12, + title={Evading Censorship with Browser-Based Proxies}, + author={David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= censorship, + www_pdf_url= {https://crypto.stanford.edu/flashproxy/flashproxy.pdf} +} + +@inproceedings{leastsquares-pets12, + title={Understanding Statistical Disclosure: A Least Squares approach}, + author={Fernando Perez-Gonzalez and Carmela Troncoso}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf}, +} + +@inproceedings{tcp-tor-pets12, + title={{Spying in the Dark: TCP and Tor Traffic Analysis}}, + author={Yossi Gilad and Amir Herzberg}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf}, +} + +@inproceedings{traffic-padding-pets12, + title={k-Indistinguishable Traffic Padding in Web Applications}, + author={Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf}, +} + +@inproceedings{remote-traffic-pets12, + title={Website Detection Using Remote Traffic Analysis}, + author={Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf}, +} + +@InProceedings{cset12-modeling, + author = {Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine}, + title = {Methodically Modeling the Tor Network}, + booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)}, + year = {2012}, + month = {August}, + www_section = comm, + www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/tormodel-cset2012.pdf}, + www_tags={selected}, +} + +@inproceedings{tschorsch:translayeranon, + author = {Florian Tschorsch and , Bj{\"{o}}rn Scheurmann}, + title = {How (not) to build a transport layer for anonymity overlays}, + month = {June}, + year = {2012}, + booktitle = {Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy}, + www_tags = {selected}, + www_pdf_url = {http://pade12.mytestbed.net/pade12-final6.pdf}, + www_section = comm +} + +@phdthesis{koot2012, + author = {Matthijs R. Koot}, + year = {2012}, + month = {June}, + school = {University of Amsterdam}, + address = {Amsterdam, The Netherlands}, + title = {Measuring and Predicting Anonymity}, + www_pdf_url={http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf}, + www_section = traffic +} + +@inproceedings{esorics10-bandwidth, + title = {Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation}, + author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, + year = {2010}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf}, + www_tags = {selected}, + www_section = traffic +} + +@InProceedings{foci12-winter, + author = {Philipp Winter and Stefan Lindskog}, + title = {{How the Great Firewall of China is blocking Tor}}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, + year = {2012}, + month = {August}, + www_section = censorship, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf}, + www_tags={selected}, +} + +@InProceedings{foci12-defiance, + author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh}, + title = {Bootstrapping Communications into an Anti-Censorship System}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, + year = {2012}, + month = {August}, + www_section = censorship, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf}, + www_tags={selected}, +} + +@inproceedings{throttling-sec12, + title = {{Throttling Tor Bandwidth Parasites}}, + author = {Rob Jansen and Paul Syverson and Nicholas Hopper}, + booktitle = {Proceedings of the 21st USENIX Security Symposium}, + year = {2012}, + month = {August}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/throttling-sec2012.pdf}, + www_section = traffic +} + +@inproceedings{wpes12-cogs, + title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor}, + author = {Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, + year = {2012}, + month = {October}, + location = {Raleigh, NC, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/~arma/cogs-wpes.pdf}, + www_section = traffic +} + +@inproceedings{wpes12-torchestra, + title = {Torchestra: Reducing interactive traffic delays over Tor}, + author = {Deepika Gopal and Nadia Heninger}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, + year = {2012}, + month = {October}, + location = {Raleigh, NC, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/torchestra-wpes.pdf}, + www_section = comm +} + +@inproceedings{ccs2012-classification, + Author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg}, + Title = {Enhancing Tor's Performance using Real-time Traffic Classification}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf}, +} + +@inproceedings{ccs2012-decoys, + Author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, + Title = {Routing Around Decoys}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf}, +} + +@inproceedings{ccs2012-skypemorph, + Author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, + Title = {SkypeMorph: Protocol Obfuscation for {T}or Bridges}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf}, +} + +@inproceedings{ccs2012-stegotorus, + Author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, + Title = {{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://www.owlfolio.org/media/2010/05/stegotorus.pdf}, +} + +@inproceedings{ccs2012-censorspoofer, + Author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, + Title = {CensorSpoofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf}, +} + +@inproceedings{ccs2012-fingerprinting, + Author = {Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson}, + Title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cs.sunysb.edu/~xcai/fp.pdf}, +} + +@inproceedings{acns11-certificateless, + author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, + title = {Fully Non-Interactive Onion Routing with Forward-Secrecy}, + crossref = {DBLP:conf/acns/2011}, + www_pdf_url = {http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf}, + www_tags = {selected}, + www_section = comm +} + +@proceedings{DBLP:conf/acns/2011, + editor = {Javier Lopez and Gene Tsudik}, + booktitle = {Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011)}, + series = {Lecture Notes in Computer Science}, + location = {Malaga, Spain}, + volume = {6715}, + month = {June}, + year = {2011}, +} + +@inproceedings{ipccc12-performance, + Author = {Andriy Panchenko and Fabian Lanze and Thomas Engel}, + Title = {Improving Performance and Anonymity in the Tor Network}, + Booktitle = {Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012)}, + Month = {December}, + year = {2012}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf}, +} + +@inproceedings{perm-ccs12, + author = {Man Ho Au and Apu Kapadia}, + title = {{PERM}: Practical Reputation-Based Blacklisting without {TTPs}}, + booktitle = {Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS)}, + pages = {929--940}, + month = oct, + year = {2012}, + doi = {10.1145/2382196.2382294}, + publisher = {ACM}, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf} +} + +@inproceedings{ndss13-lira, + title = {{LIRA: Lightweight Incentivized Routing for Anonymity}}, + author = {Rob Jansen and Aaron Johnson and Paul Syverson}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~jansen/papers/lira-ndss2013.pdf}, + www_section = comm +} + +@inproceedings{ndss13-rbridge, + title = {{rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation}}, + author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf}, + www_section = comm +} + +@inproceedings{ndss13-relay-selection, + title = {{An Empirical Evaluation of Relay Selection in Tor}}, + author = {Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf}, + www_section = comm +} + +@inproceedings{ndss13-website-fingerprinting, + title = {{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}}, + author = {Michael Backes and Goran Doychev and Boris K\"opf}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://software.imdea.org/~bkoepf/papers/ndss13.pdf}, + www_section = comm +} + +@inproceedings{ndss13-freewave, + title = {{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}}, + author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf}, + www_section = censorship +} + +@techreport{wileydust, + title={Dust: A Blocking-Resistant Internet Transport Protocol}, + author={Brandon Wiley}, + institution={School of Information, University of Texas at Austin}, + year={2011}, + www_tags={selected}, + www_pdf_url = {http://blanu.net/Dust.pdf}, + www_section = censorship +} + +@inproceedings{esorics12-torscan, + title = {{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks}, + author = {Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'12}, + year = {2012}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf}, + www_tags = {selected}, + www_section = traffic +} + +%%%%%%% Journals and proceedings: used by reference + +@Proceedings{eurocrypt-02, + editor = {Lars R. Knudsen}, + booktitle = "Proceedings of Eurocrypt 2002", + month = {May}, + year = {2002}, + bookurl = {http://www.ec2002.tue.nl/}, + www_tags={selected}, +} + +@Proceedings{weis2006, + editor = {Ross Anderson}, + booktitle = "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", + month = {June}, + year = {2006}, + location = {Cambridge, UK}, + bookurl = {http://weis2006.econinfosec.org/}, +} + +% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International +% Conference on the Theory and Applications of Cryptographic +% Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, +@Proceedings{eurocrypt2005, + editor = {Ronald Cramer}, + booktitle = {Proceedings of EUROCRYPT 2005}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {3494}, + month = {May}, + year = {2005}, + isbn = {3-540-25910-4}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@proceedings{esorics2007, + editor = {Joachim Biskup and + Javier Lopez}, + booktitle = {Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {4734}, + month = {September}, + year = {2007}, + location = {Dresden, Germany}, + isbn = {978-3-540-74834-2}, +} + +@proceedings{DBLP:conf/acns/2008, + editor = {Steven M. Bellovin and + Rosario Gennaro and + Angelos D. Keromytis and + Moti Yung}, + booktitle = {Proceedings of the 6th International Conference on + Applied Cryptography and Network Security + (ACNS 2008)}, + series = {Lecture Notes in Computer Science}, + volume = {5037}, + location = {New York, NY, USA}, + month = {June}, + year = {2008}, + isbn = {978-3-540-68913-3}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@proceedings{DBLP:conf/pervasive/2008, + editor = {Jadwiga Indulska and + Donald J. Patterson and + Tom Rodden and + Max Ott}, + booktitle = {Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5013}, + location = {Sydney, Australia}, + month = {May}, + year = {2008}, + isbn = {978-3-540-79575-9}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@article{Ruiz-Martinez_2012, + title={A survey on solutions and main free tools for privacy enhancing Web communications}, + volume={35}, + ISSN={1084-8045}, + DOI={10.1016/j.jnca.2012.02.011}, + number={5}, + journal={Journal of Network and Computer Applications}, + author={Ruiz-Mart{\'i}nez, A.}, + year={2012}, + month={September}, + pages={1473--1492}, + www_pdf_url={http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf}, + www_section=comm, +} + +@inproceedings{oakland2013-parrot, + title = {The Parrot is Dead: Observing Unobservable Network Communications}, + author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov}, + booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, + year = {2013}, + month = {May}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/parrot.pdf}, +} + +@inproceedings{oakland2013-trawling, + title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization}, + author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann}, + booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, + year = {2013}, + month = {May}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf}, +} + +@inproceedings{pets13-splitting, + title={The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting}, + author={Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= comm, + www_pdf_url= {http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf}, +} + +@inproceedings{pets13-how-low, + title={How Low Can You Go: Balancing Performance with Anonymity in Tor}, + author={John Geddes and Rob Jansen and Nicholas Hopper}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf}, +} + +@inproceedings{pets13-oss, + title={{OSS}: Using Online Scanning Services for Censorship Circumvention}, + author={David Fifield and Gabi Nakibly and Dan Boneh}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= censorship, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf}, +} + +@inproceedings{pets13-flow-fingerprints, + title={The need for flow fingerprints to link correlated network flows}, + author={Amir Houmansadr and Nikita Borisov}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://www.cs.utexas.edu/~amir/papers/Fancy.pdf}, +} + diff --git a/i2p2www/anonbib/anonbib.cfg b/i2p2www/anonbib/anonbib.cfg new file mode 100644 index 00000000..809eb780 --- /dev/null +++ b/i2p2www/anonbib/anonbib.cfg @@ -0,0 +1,163 @@ +# Copyright 2003-2008, Nick Mathewson. See LICENSE for licensing info. + +# Our input filename. +MASTER_BIB = "./anonbib.bib" + +# Where do we put generated HTML? +OUTPUT_DIR = "." + +# Where do we put cached papers (relative to OUTPUT_DIR) +CACHE_DIR = "cache" + +# Where do we cache citations papers (relative to OUTPUT_DIR) +CITE_CACHE_DIR = "cite_cache" + +# Are there subsections for cached papers? This is useful for putting +# different Apache permission on different directories. +CACHE_SECTIONS = [ ] + +# Only include entries that have this key. This is one way to +# generate multiple bibliographies from the same source. Currently +# deprecated in favor of tags. +# +#example: REQUIRE_KEY = "www_selected" +# +REQUIRE_KEY = None + +# Timeout when downloading from a server while caching, in seconds. +DOWNLOAD_CONNECT_TIMEOUT = 15 + +# Template files. +TEMPLATE_FILE = "./_template_.html" +BIBTEX_TEMPLATE_FILE = "./_template_bibtex.html" + +# Map from author name regex to author homepage. +AUTHOR_URLS = { + 'Ross.*Anderson' : 'http://www.cl.cam.ac.uk/users/rja14/', + 'Alessandro.*Acquisti' : 'http://www.heinz.cmu.edu/~acquisti/index.html', + 'Agrawal' : 'http://www.research.ibm.com/people/a/agrawal/', + 'Adam.*Back' : 'http://www.cypherspace.org/~adam/', + 'Berthold' : 'http://page.inf.fu-berlin.de/~berthold/', + 'Borisov' : 'http://hatswitch.org/~nikita/', + 'Bettati' : 'http://faculty.cs.tamu.edu/bettati/', + 'Miguel.*Castro' : 'http://research.microsoft.com/users/mcastro/', + 'Chaum' : 'http://www.chaum.com/', + 'J.*Claessens' : 'http://www.esat.kuleuven.be/~joclaess/', + 'R.*Clayton' : 'http://www.cl.cam.ac.uk/~rnc1/', + 'Wei Dai' : 'http://www.eskimo.com/~weidai/', + 'Danezis' : 'http://homes.esat.kuleuven.be/~gdanezis/', + 'Claudia.*az' : 'http://www.esat.kuleuven.be/~cdiaz/', + 'Dingledine' : 'http://www.freehaven.net/~arma/cv.html', + 'Desmedt' : 'http://www.cs.fsu.edu/~desmedt/', + 'Douceur' : 'http://research.microsoft.com/~johndo/', + 'N.*Hopper' : 'http://www-users.cs.umn.edu/~hopper/', + 'Michael.*Freedman' : 'http://www.scs.cs.nyu.edu/~mfreed/', + 'Gergely' : 'http://www.planeforge.com/home/tgm', + 'Ian.*Goldberg' : 'http://www.cs.uwaterloo.ca/~iang/', + 'Christian.*Grothoff' : 'http://grothoff.org/christian/', + 'D.*Hopwood' : 'http://www.users.zetnet.co.uk/hopwood/', + 'Jakobsson' : 'http://www2.parc.com/csl/members/mjakobss/markus-jakobsson.htm', + 'Juels' : 'http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/', + 'Kaashoek' : 'http://pdos.csail.mit.edu/~kaashoek/', + 'K.*Kurosawa' : 'http://kuro.cis.ibaraki.ac.jp/~kurosawa/', + 'H.*Langos' : 'http://www.wh9.tu-dresden.de/~heinrich/', + 'B.*Liskov' : 'http://www.pmg.lcs.mit.edu/barbara_liskov.html', + 'Mathewson' : 'http://www.wangafu.net/~nickm/', + 'Mazières' : 'http://www.scs.cs.nyu.edu/~dm/', + 'B.*Möller' : ('http://www.informatik.tu-darmstadt.de/TI/' + 'Mitarbeiter/moeller.html'), + 'U.*Möller' : 'http://www.ulfm.de/', + 'D.*Molnar' : 'http://www.cs.berkeley.edu/~dmolnar/', + 'R.*Morris' : 'http://www.pdos.lcs.mit.edu/~rtm/', + 'S.*Murdoch' : 'http://www.cl.cam.ac.uk/users/sjm217/', + 'A.*Pashalidis' : 'http://www.xrtc.com/', + 'A.*Pfitzmann' : 'http://dud.inf.tu-dresden.de/~pfitza/', + 'B.*Pfitzmann' : 'http://www.zurich.ibm.com/~bpf/', + 'B.*Preneel' : 'http://www.esat.kuleuven.be/~preneel/', + 'Daniel.*Simon' : 'http://research.microsoft.com/crypto/dansimon/me.htm', + 'Rackoff' : 'http://www.cs.toronto.edu/DCS/People/Faculty/rackoff.html', + 'Jean F' : 'http://www.geocities.com/j_f_raymond/', + 'M.*Rennhard' : 'http://www.tik.ee.ethz.ch/~rennhard/', + 'M.*Reiter' : 'http://www.ece.cmu.edu/~reiter/', + 'Rivest' : 'http://theory.lcs.mit.edu/~rivest/', + 'Avi.*Rubin' : 'http://avirubin.com/', + 'Sassaman' : 'http://homes.esat.kuleuven.be/~lsassama/', + 'Serjantov' : 'http://home.arachsys.com/~aas/', + 'S.*Seys' : 'http://www.esat.kuleuven.be/~sseys/', + 'Shoup' : 'http://www.shoup.net/', + 'Syverson' : 'http://www.syverson.org/', + 'Tsudik' : 'http://www.ics.uci.edu/~gts/c.html', + 'M.*Waidner' : 'http://www.zurich.ibm.com/~wmi/', + 'David.*Wagner' : 'http://www.cs.berkeley.edu/~daw/', + 'M.*Waldman' : 'http://cs1.cs.nyu.edu/~waldman/', + 'B.*Waters' : 'http://www.cs.utexas.edu/~bwaters/', + 'Chenxi.*Wang' : 'http://www.ece.cmu.edu/~chenxi/', + 'M.*Wright' : 'http://ranger.uta.edu/~mwright/', + 'B.*Levine' : 'http://prisms.cs.umass.edu/brian/', + 'T.*Benjamin' : 'http://www.cs.umass.edu/~tshb/', + 'B.*Defend' : 'http://www.cs.umass.edu/~defend/', + 'K.*Fu' : 'http://www.cs.umass.edu/~kevinfu/', + 'J.*Camenisch' : 'http://www.zurich.ibm.com/~jca/', + 'S.*Hohenberger' : 'http://www.cs.jhu.edu/~susan/', + 'M.*Kohlweiss' : 'http://homes.esat.kuleuven.be/~mkohlwei/', + 'A.*Lysyanskaya' : 'http://www.cs.brown.edu/~anna/', + 'M.*Meyerovich' : 'http://www.cs.brown.edu/~mira/', + 'P.*Zieli.*ski' : 'http://www.cl.cam.ac.uk/~pz215/', + 'S.*Zander' : 'http://caia.swin.edu.au/cv/szander/' + } + +# List of paterns for author names _not_ to do an initial-tolerant +# match on when building section list. E.g., if "J\\. Smith" is in +# this list, he won't be folded into "John Smith". +NO_COLLAPSE_AUTHORS = [ + +] + +# Map from LaTeX-style name of author to collapse to canonical name. +COLLAPSE_AUTHORS = { + "Nicholas Mathewson": "Nick Mathewson", + } + +# Map from author pattern to collation key. +# This keeps 'Zero Knowledge Systems' from getting alphabetized as "Systems, +# Zero Knowledge." +ALPHABETIZE_AUTHOR_AS = { + "Zero.*Knowledge.*Systems": "Zero Knowledge Systems", + "Carlos.*Aguilar.*Melchor": "Aguilar Melchor Carlos", + } + +# Map of strings to initialize BibTeX parsing with. +INITIAL_STRINGS = { + # SECTIONS + 'sec_mix' : "Mix Networks: Design", + 'sec_mixattacks' : "Mix Networks: Attacks", + 'sec_stream' : "Stream-based anonymity", + 'sec_traffic' : "Traffic analysis", + 'sec_pub' : "Anonymous publication", + 'sec_pir' : "Private Information Retrieval", + 'sec_nym' : "Pseudonymity" +} + +# Don't put in any entries of this type. +OMIT_ENTRIES = ("proceedings", "journal") + +# List of all recognized values for www_tags. +ALL_TAGS = ("selected", ) + +# Titles of page, by tag. +TAG_TITLES = { "": "The Free Haven Anonymity Bibliography", + "selected": "Free Haven's Selected Papers in Anonymity" + } + +# As TAG_TITLES, but shorter. +TAG_SHORT_TITLES = { "": "Anonymity Bibliography", + "selected": "Selected Papers in Anonymity", + } + +# Directories where tag pages get generated. +TAG_DIRECTORIES = { '': "full", + "selected": "" } + +# Make cached stuff group-writable. Make sure that your cache directories +# are sticky! +CACHE_UMASK = 002 diff --git a/i2p2www/anonbib/config.py b/i2p2www/anonbib/config.py new file mode 100644 index 00000000..c1b1b6ec --- /dev/null +++ b/i2p2www/anonbib/config.py @@ -0,0 +1,56 @@ +# Copyright 2003-2006, Nick Mathewson. See LICENSE for licensing info. + +import re + +_KEYS = [ "ALL_TAGS", + "ALPHABETIZE_AUTHOR_AS","AUTHOR_URLS","CACHE_DIR","CACHE_SECTIONS", + "CACHE_UMASK", + "CITE_CACHE_DIR", + "COLLAPSE_AUTHORS", + "DOWNLOAD_CONNECT_TIMEOUT","INITIAL_STRINGS", + "MASTER_BIB", "NO_COLLAPSE_AUTHORS", "OMIT_ENTRIES", + "OUTPUT_DIR", "TEMPLATE_FILE", "BIBTEX_TEMPLATE_FILE", + "REQUIRE_KEY", "TAG_TITLES", "TAG_DIRECTORIES", "TAG_SHORT_TITLES", + ] + +for _k in _KEYS: + globals()[_k]=None +del _k + +def load(cfgFile): + mod = {} + execfile(cfgFile, mod) + for _k in _KEYS: + try: + globals()[_k]=mod[_k] + except KeyError: + raise KeyError("Configuration option %s is missing"%_k) + + INITIAL_STRINGS.update(_EXTRA_INITIAL_STRINGS) + AUTHOR_RE_LIST[:] = [ + (re.compile(k, re.I), v,) for k, v in AUTHOR_URLS.items() + ] + + NO_COLLAPSE_AUTHORS_RE_LIST[:] = [ + re.compile(pat, re.I) for pat in NO_COLLAPSE_AUTHORS + ] + + ALPHABETIZE_AUTHOR_AS_RE_LIST[:] = [ + (re.compile(k, re.I), v,) for k,v in ALPHABETIZE_AUTHOR_AS.items() + ] + +_EXTRA_INITIAL_STRINGS = { + # MONTHS + 'jan' : 'January', 'feb' : 'February', + 'mar' : 'March', 'apr' : 'April', + 'may' : 'May', 'jun' : 'June', + 'jul' : 'July', 'aug' : 'August', + 'sep' : 'September', 'oct' : 'October', + 'nov' : 'November', 'dec' : 'December', +} + +AUTHOR_RE_LIST = [] + +NO_COLLAPSE_AUTHORS_RE_LIST = [] + +ALPHABETIZE_AUTHOR_AS_RE_LIST = [] diff --git a/i2p2www/anonbib/css/main.css b/i2p2www/anonbib/css/main.css new file mode 100644 index 00000000..ce589cc9 --- /dev/null +++ b/i2p2www/anonbib/css/main.css @@ -0,0 +1,111 @@ +img { + border: 0px; +} + +BODY { + background-color: #FFF; + color: #000; + margin: 0px; +} + +FORM { + margin-top: 0.5em; + margin-bottom: 0.5em; +} + +P, TD { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; +} + +P.contact { + text-align: center; +} + +P.contact A { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: normal; +} + +SPAN.email { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; + font-weight: bold; +} + +P IMG { + vertical-align: text-bottom; +} + +P.crumbbreadth { + margin-top: 0.25em; +} + +.compact { + margin-top: -0.5em; + text-indent: 0em; +} + +SPAN.biblio { + font-style: italic; +} + +SPAN.biblio A { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: normal; + text-decoration: underline; +} + +SPAN.availability { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; + font-weight: normal; +} + +UL { + list-style: outside; +} + +UL.expand { + margin-bottom: 1em; +} + +UL.sections { + list-style: none; +} + +/* Font-level properties */ + +PRE { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; +} + +STRONG, A { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Rockwell", "Lucida Sans Unicode", monospace; + font-weight: bold; +} + +A:link { + color: #B00; +} + +A:visited { + color: #903; +} + +H1, H2, H3, H4, H5, H6 { + font-family: lucidatypewriter, "Lucida Typewriter", "Lucida Console", Monaco, monospace; +} + +H1 A, H2 A, H3 A, H4 A, H5 A, H6 A { + font-family: lucidatypewriter, "Lucida Typewriter", "Lucida Console", Monaco, monospace; +} + +H1 { + color: #00B; +} + +H2 { + color: #006; +} + +H3 { + color: #006; +} diff --git a/i2p2www/anonbib/css/pubs.css b/i2p2www/anonbib/css/pubs.css new file mode 100644 index 00000000..3bb820f4 --- /dev/null +++ b/i2p2www/anonbib/css/pubs.css @@ -0,0 +1,121 @@ +SPAN.title { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: bold; +} + +SPAN.author { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: normal; +} + +SPAN.availability { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; + font-weight: normal; +} + +SPAN.author A { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-weight: normal; +} + +SPAN.biblio { + font-family: lucida, "Lucida Sans Unicode", Geneva, sans-serif; + font-style: italic; +} + +SPAN.biblio A { + text-decoration: underline; +} + +SPAN.bad { + text-decoration: underline; + color: #000; + background-color: #FDF; +} + +P.remarks { + font-family: serif; + margin-top: 0.3em; + margin-bottom: 0; + margin-left: 5em; + padding-left: 0.5em; + border-width: 0 0 0 5px; + border-color: black; + border-style: solid; +} + +P.remarks A { + text-decoration: underline; +} + +P.l1 { + margin-left: 0.5em; +} + +P.l2 { + margin-left: 1em; + margin-top: 0.3em; + margin-bottom: 0.3em; +} + +P.entry { + margin-top: 0.7em; + margin-bottom: 0; +} + +DIV.impEntry { + border-width: 1px; + border-color: black; + border-style: solid; + background-color: #FFE; + padding: 0.3em; + margin-top: 0.7em; + margin-bottom: 0; +} + +P.impEntry { + background-color: #FFE; + padding: 0; + margin-top: 0; + margin-bottom: 0; +} + +DIV.draftEntry { + /* + border-width: 1px; + border-color: black; + border-style: solid; + padding: 0.3em; + margin-top: 0.7em; + margin-bottom: 0; +*/ +} + +P.draftEntry { + color: #555; + padding: 0; + margin-top: 0; + margin-bottom: 0; +} + +TABLE.sidebar { + border-width: 2px; + border-color: black; + border-style: solid; + background-color: #CFF; +} + +TD.bibtex { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; + border-width: 2px; + font-weight: normal; + border-color: black; + border-style: solid; + background-color: #DFF; +} + +PRE.bibtex { + font-family: lucidatypewriter, "Lucida Typewriter", Monaco, "Lucida Sans Unicode", monospace; + font-size: smaller; +} + diff --git a/i2p2www/anonbib/gold.gif b/i2p2www/anonbib/gold.gif new file mode 100644 index 0000000000000000000000000000000000000000..44505dba25f08d739df9daae98ce0cdb3d5b3264 GIT binary patch literal 540 zcmZ?wbhEHblwgoxIOfRE*xsEsVcq`~bHbxyUk3)>e)aX&?{E3@uRVMIeAbSuH*emY zzb@?mIj;W^4C~LlxVACi?bXR&E^ImUF#YkS_L3Razg})S^7iMycF%X8fBbq?eE9a8 zmltdQKEHhW^yx$M6hEzC{m>}<_4=_n7yteHJmvpOmlwMu|9pD!cC|{z(f|K{UHkI# z^og^Vj;N@}diDOfW`F+Loq5~#U%Ps0`GJ~6kNy?=FkifQ@xg-!@4jD|&A@Q6pW*-9 zg1%Fy);CJMefMt1_O-^w#{d8SXBf&r@t>%3QEFmIYKlU6W=V!ZNJgrHyQgmegAT}7 zph#k1&uDOHYHn$5Ywzgn>h9_7>+k00pU}oHH>HJNSYYxD2YyY>xqXu+sVXb0E?wNo zzkG$}iWRGR>?TR8s7Ok#;F1XeUZ%XJXWg-@6DA$scDegt R%e{FIA3c8Z^l>ADH2}KV#Ag5i literal 0 HcmV?d00001 diff --git a/i2p2www/anonbib/metaphone.py b/i2p2www/anonbib/metaphone.py new file mode 100644 index 00000000..f57135d7 --- /dev/null +++ b/i2p2www/anonbib/metaphone.py @@ -0,0 +1,193 @@ +#!/usr/bin/python2 +# Copyright 2003-2008, Nick Mathewson. See LICENSE for licensing info. + +"""metaphone.py -- Pure-python metaphone implementation. + + (This is not guaranteed to match the real metaphone algorithm; I + haven't tested it thorougly enough. Let me know if you find bugs. + + Based on the original C++ metaphone implementation.) +""" + +TRIPLES = { + 'dge': 'j', + 'dgi': 'j', + 'dgy': 'j', + 'sia': '+x', + 'sio': '+x', + 'tia': '+x', + 'tio': '+x', + 'tch': '', + 'tha': '0', + 'the': '0', + 'thi': '0', + 'tho': '0', + 'thu': '0', + } + +DOUBLES = { + 'ph' : 'f', + 'sh' : 'x' + } + +SINGLETONS = { + 'd': 't', + 'f': 'f', + 'j': 'j', + 'l': 'l', + 'm': 'm', + 'n': 'n', + 'r': 'r', + 'p': 'p', + 'q': 'k', + 'v': 'f', + 'x': 'ks', + 'z': 's', +} + +ALLCHARS = "".join(map(chr, range(256))) +NONLCCHARS = "".join([c for c in ALLCHARS if not c.islower()]) +def metaphone(s): + """Return the metaphone equivalent of a provided string""" + s = s.lower() + s = s.translate(ALLCHARS, NONLCCHARS) + + if not s: return "" + + # If ae, gn, kn, pn, wr then drop the first letter. + if s[:2] in ("ae", "gn", "kn", "pn", "wr"): + s = s[1:] + + # Change "x" to "s" + if s[0] == 'x': + s = "s%s" % s[1:] + + # Get rid of "h" in "wh". + if s[:2] == 'wh': + s = "w%s" % s[1:] + + # Get rid of s from end. + if s[-1] == 's': + s = s[:-1] + + result = [] + prevLtr = ' ' + vowelBefore = 0 + lastChar = len(s)-1 + for idx in range(len(s)): + curLtr = s[idx] + # If first char is a vowel, keep it. + if curLtr in "aeiou": + if idx == 0: + result.append(curLtr) + continue + + # Skip double letters. + if idx < lastChar: + if curLtr == s[idx+1]: + continue + + try: + r = TRIPLES[s[idx:idx+3]] + if r == "+x": + if idx > 1: + result.append("x") + continue + else: + result.append(r) + continue + except KeyError: + pass + try: + r = DOUBLES[s[idx:idx+2]] + result.append(r) + continue + except KeyError: + pass + try: + r = SINGLETONS[s[idx]] + result.append(r) + continue + except KeyError: + pass + + if idx > 0: + prevLtr = s[idx-1] + vowelBefore = prevLtr in "aeiou" + curLtr = s[idx] + + nextLtr2 = ' ' + if idx < lastChar: + nextLtr = s[idx+1] + vowelAfter = nextLtr in "aeiou" + frontvAfter = nextLtr in "eiy" + if idx+1 < lastChar: + nextLtr2 = s[idx+2] + else: + nextLtr = ' ' + vowelAfter = frontvAfter = 0 + + + if curLtr == 'b': + if idx == lastChar and prevLtr == 'm': + pass + else: + result.append(curLtr) + elif curLtr == 'c': + # silent 'sci', 'sce, 'scy', 'sci', etc OK. + if not (prevLtr == 's' and frontvAfter): + if nextLtr in 'ia': + result.append("x") + elif frontvAfter: + result.append("s") + elif prevLtr == 's' and nextLtr == 'h': + result.append('k') + elif nextLtr == 'h': + if idx == 0 and nextLtr2 in "aeiou": + result.append('k') + else: + result.append('x') + elif prevLtr == 'c': + result.append('c') + else: + result.append('k') + elif curLtr == 'g': + if (idx < lastChar-1) and nextLtr == 'h': + pass + elif s[idx:] == 'gned': + pass + elif s[idx:] == 'gn': + pass + elif prevLtr == 'd' and frontvAfter: + pass + else: + hard = (prevLtr == 'g') + if frontvAfter and not hard: + result.append('j') + else: + result.append('k') + elif curLtr == 'h': + if prevLtr in 'csptg': + pass + elif vowelBefore and not vowelAfter: + pass + else: + result.append('h') + elif curLtr == 'k': + if prevLtr != 'c': result.append('k') + elif curLtr in 'wy': + if vowelAfter: + result.append(curLtr) + + return "".join(result) + +def demo(a): + print a, "=>", metaphone(a) + +if __name__ == '__main__': + demo("Nick. Mathewson") + + demo("joe schmidt") + demo("Beethoven") + + demo("Because the world is round") diff --git a/i2p2www/anonbib/rank.py b/i2p2www/anonbib/rank.py new file mode 100644 index 00000000..175a10d6 --- /dev/null +++ b/i2p2www/anonbib/rank.py @@ -0,0 +1,202 @@ +# Make rankings of papers and authors for automatic classification of content hotness + +# Google Scholar address +# http://scholar.google.com/scholar?as_epq= + +# Take care of the caching setup +cache_expire = 60*60*24*30 # 30 days + +# Checks +import config +import os +import sys +from os.path import exists, isdir, join, getmtime +from os import listdir, remove + +def remove_old(): + # Remove all old cached files + filenames = listdir(cache_folder()) + from time import time + now = time() + for f in filenames: + pf = join(cache_folder(), f) + time_mt = getmtime(pf) + if now - time_mt > cache_expire: # 30 days + remove(pf) + +def cache_folder(): + r = join(config.OUTPUT_DIR, config.CITE_CACHE_DIR) + if not exists(r): + os.makedirs(r) + assert isdir(r) + return r + +import re +from urllib2 import urlopen, build_opener +from urllib import quote +from datetime import date +import hashlib + +# A more handy hash +def md5h(s): + m = hashlib.md5() + m.update(s) + return m.hexdigest() + +format_tested = 0 + +def getPageForTitle(title, cache=True, update=True, save=True): + #Returns (citation-count, scholar url) tuple, or (None,None) + global format_tested + if not format_tested and update: + format_tested = 1 + TestScholarFormat() + + # Do not assume that the title is clean + title = re.sub("\s+", " ", title) + title = re.sub("[^'a-zA-Z0-9\. \-\/:]", "", title) + title = re.sub("'\/", " ", title) + + # We rely on google scholar to return the article with this exact title + gurl = "http://scholar.google.com/scholar?as_q=&as_epq=%s&as_occt=title" + + url = gurl % quote(title) + + # Access cache or network + if exists(join(cache_folder(), md5h(url))) and cache: + return url, file(join(cache_folder(), md5h(url)),'r').read() + elif update: + print "Downloading rank for %r."%title + + # Make a custom user agent (so that we are not filtered by Google)! + opener = build_opener() + opener.addheaders = [('User-agent', 'Anon.Bib.0.1')] + + print "connecting..." + connection = opener.open(url) + print "reading" + page = connection.read() + print "done" + if save: + file(join(cache_folder(), md5h(url)),'w').write(page) + return url, page + else: + return url, None + +def getCite(title, cache=True, update=True, save=True): + url, page = getPageForTitle(title, cache=cache, update=update, save=save) + if not page: + return None,None + + # Check if it finds any articles + if len(re.findall("did not match any articles", page)) > 0: + return (None, None) + + # Kill all tags! + cpage = re.sub("<[^>]*>", "", page) + + # Add up all citations + s = sum([int(x) for x in re.findall("Cited by ([0-9]*)", cpage)]) + return (s, url) + +def getPaperURLs(title, cache=True, update=True, save=True): + url, page = getPageForTitle(title, cache=cache, update=update, save=save) + if not page: + return [] + pages = re.findall(r'\&\#x25ba\;.*class=fl href="([^"]*)"', page) + return pages + +def get_rank_html(title, years=None, base_url=".", update=True, + velocity=False): + s,url = getCite(title, update=update) + + # Paper cannot be found + if s is None: + return '' + + html = '' + + url = url.replace("&","&") + + # Hotness + H,h = 50,5 + if s >= H: + html += 'More than %s citations on Google Scholar' % (url,base_url,H,H) + elif s >= h: + html += 'More than %s citations on Google Scholar' % (url,base_url,h,h) + + # Only include the velocity if asked. + if velocity: + # Velocity + d = date.today().year - int(years) + if d >= 0: + if 2 < s / (d +1) < 10: + html += '' % base_url + if 10 <= s / (d +1): + html += '' % base_url + + return html + +def TestScholarFormat(): + # We need to ensure that Google Scholar does not change its page format under our feet + # Use some cases to check if all is good + print "Checking google scholar formats..." + stopAndGoCites = getCite("Stop-and-Go MIXes: Providing Probabilistic Anonymity in an Open System", False)[0] + dragonCites = getCite("Mixes protected by Dragons and Pixies: an empirical study", False, save=False)[0] + + if stopAndGoCites in (0, None): + print """OOPS.\n +It looks like Google Scholar changed their URL format or their output format. +I went to count the cites for the Stop-and-Go MIXes paper, and got nothing.""" + sys.exit(1) + + if dragonCites != None: + print """OOPS.\n +It looks like Google Scholar changed their URL format or their output format. +I went to count the cites for a fictitious paper, and found some.""" + sys.exit(1) + +def urlIsUseless(u): + if u.find("freehaven.net/anonbib/") >= 0: + # Our own cache is not the primary citation for anything. + return True + elif u.find("owens.mit.edu") >= 0: + # These citations only work for 'members of the MIT community'. + return True + else: + return False + +URLTYPES=[ "pdf", "ps", "txt", "ps_gz", "html" ] + +if __name__ == '__main__': + # First download the bibliography file. + import BibTeX + suggest = False + if sys.argv[1] == 'suggest': + suggest = True + del sys.argv[1] + + config.load(sys.argv[1]) + if config.CACHE_UMASK != None: + os.umask(config.CACHE_UMASK) + bib = BibTeX.parseFile(config.MASTER_BIB) + remove_old() + + print "Downloading missing ranks." + for ent in bib.entries: + getCite(ent['title'], cache=True, update=True) + + if suggest: + for ent in bib.entries: + haveOne = False + for utype in URLTYPES: + if ent.has_key("www_%s_url"%utype): + haveOne = True + break + if haveOne: + continue + print ent.key, "has no URLs given." + urls = [ u for u in getPaperURLs(ent['title']) if not urlIsUseless(u) ] + for u in urls: + print "\t", u + diff --git a/i2p2www/anonbib/reconcile.py b/i2p2www/anonbib/reconcile.py new file mode 100644 index 00000000..e601af48 --- /dev/null +++ b/i2p2www/anonbib/reconcile.py @@ -0,0 +1,292 @@ +#!/usr/bin/python2 +# Copyright 2003-2008, Nick Mathewson. See LICENSE for licensing info. + +"""Code to determine which entries are new and which are old. + + To scan a new file, run "python reconcile.py anonbib.cfg new-file.bib". This + will generate a new bibtex file called 'tmp.bib', with all the new entries + cleaned up a little, and all the duplicate entries commented out. +""" + +import sys +import re + +assert sys.version_info[:3] >= (2,2,0) + +import BibTeX +import config +import metaphone + +_MPCACHE = {} +def soundsLike(s1, s2): + c = _MPCACHE + s1 = clean(s1) + s2 = clean(s2) + try: + m1 = c[s1] + except KeyError: + m1 = c[s1] = metaphone.metaphone(s1) + try: + m2 = c[s2] + except KeyError: + m2 = c[s2] = metaphone.metaphone(s2) + + return m1 == m2 + +def mphone(s): + c = _MPCACHE + s = clean(s) + try: + return c[s] + except: + m = c[s] = metaphone.metaphone(s) + return m + +def clean(s): + s = re.sub(r'\s+', ' ', s) + s = s.strip() + return s + +class MasterBibTeX(BibTeX.BibTeX): + def __init__(self): + BibTeX.BibTeX.__init__(self) + + def buildIndex(self): + self.byTitle = {} + for ent in self.entries: + for t in self._titleForms(ent['title']): + self.byTitle.setdefault(t, []).append(ent) + + def _titleForms(self, title): + title = title.lower() + title = re.sub(r'\b(an|a|the|of)\b', "", title) + title = clean(title) + res = [ mphone(title) ] + if ':' in title: + for t in title.split(":"): + res.append(mphone(t.strip())) + #print "%r\n => %s" % (title,res) + return res + + def _titlesAlike(self, t1, t2): + t1 = clean(t1) + t2 = clean(t2) + if t1 == t2: + return 2 + tf1 = self._titleForms(t1) + tf2 = self._titleForms(t2) + for t in tf1: + if t in tf2: return 1 + return 0 + + def _authorsAlike(self, a1, a2): + if not soundsLike(" ".join(a1.last)," ".join(a2.last)): + return 0 + + if (a1.first == a2.first and a1.von == a2.von + and a1.jr == a2.jr): + return 2 + + + if soundsLike(" ".join(a1.first), " ".join(a2.first)): + return 1 + + if not a1.first or not a2.first: + return 1 + + if self._initialize(a1.first) == self._initialize(a2.first): + return 1 + + return 0 + + def _initialize(self, name): + name = " ".join(name).lower() + name = re.sub(r'([a-z])[a-z\.]*', r'\1', name) + name = clean(name) + return name + + def _authorListsAlike(self, a1, a2): + if len(a1) != len(a2): + return 0 + a1 = [ (a.last, a) for a in a1 ] + a2 = [ (a.last, a) for a in a2 ] + a1.sort() + a2.sort() + if len(a1) != len(a2): + return 0 + r = 2 + for (_, a1), (_, a2) in zip(a1,a2): + x = self._authorsAlike(a1,a2) + if not x: + return 0 + elif x == 1: + r = 1 + return r + + def _entryDatesAlike(self, e1, e2): + try: + if clean(e1['year']) == clean(e2['year']): + return 2 + else: + return 0 + except KeyError: + return 1 + + def includes(self, ent, all=0): + title = ent['title'] + candidates = [] + for form in self._titleForms(title): + try: + candidates.extend(self.byTitle[form]) + except KeyError: + pass + goodness = [] + for knownEnt in candidates: + match = (self._entryDatesAlike(ent, knownEnt) * + self._titlesAlike(ent['title'], knownEnt['title']) * + self._authorListsAlike(ent.parsedAuthor, + knownEnt.parsedAuthor) ) + if match: + goodness.append((match, knownEnt)) + goodness.sort() + if all: + return goodness + if goodness: + return goodness[-1] + else: + return None, None + + def demo(self): + for e in self.entries: + matches = self.includes(e, 1) + m2 = [] + mids = [] + for g,m in matches: + if id(m) not in mids: + mids.append(id(m)) + m2.append((g,m)) + matches = m2 + + if not matches: + print "No match for %s"%e.key + if matches[-1][1] is e: + print "%s matches for %s: OK."%(len(matches), e.key) + else: + print "%s matches for %s: %s is best!" %(len(matches), e.key, + matches[-1][1].key) + if len(matches) > 1: + for g, m in matches: + print "%%%% goodness", g + print m + + +def noteToURL(note): + " returns tp, url " + note = note.replace("\n", " ") + m = re.match(r'\s*(?:\\newline\s*)*\s*\\url{(.*)}\s*(?:\\newline\s*)*', + note) + if not m: + return None + url = m.group(1) + for suffix, tp in ((".html", "html"), + (".ps", "ps"), + (".ps.gz", "ps_gz"), + (".pdf", "pdf"), + (".txt", "txt")): + if url.endswith(suffix): + return tp,url + return "???", url + +all_ok = 1 +def emit(f,ent): + global all_ok + + errs = ent._check() + if master.byKey.has_key(ent.key.strip().lower()): + errs.append("ERROR: Key collision with master file") + + if errs: + all_ok = 0 + + note = ent.get("note") + if ent.getURL() and not note: + ent['note'] = "\url{%s}"%ent.getURL() + elif note: + m = re.match(r'\\url{(.*)}', note) + if m: + url = m.group(0) + tp = None + if url.endswith(".txt"): + tp = "txt" + elif url.endswith(".ps.gz"): + tp = "ps_gz" + elif url.endswith(".ps"): + tp = "ps_gz" + elif url.endswith(".pdf"): + tp = "pdf" + elif url.endswith(".html"): + tp = "html" + if tp: + ent['www_%s_url'%tp] = url + + if errs: + all_ok = 0 + for e in errs: + print >>f, "%%%%", e + + print >>f, ent.format(77, 4, v=1, invStrings=invStrings) + +def emitKnown(f, ent, matches): + print >>f, "%% Candidates are:", ", ".join([e.key for g,e in matches]) + print >>f, "%%" + print >>f, "%"+(ent.format(77,4,1,invStrings).replace("\n", "\n%")) + +if __name__ == '__main__': + if len(sys.argv) != 3: + print "reconcile.py expects 2 arguments" + sys.exit(1) + + config.load(sys.argv[1]) + + print "========= Scanning master ==========" + master = MasterBibTeX() + master = BibTeX.parseFile(config.MASTER_BIB, result=master) + master.buildIndex() + + print "========= Scanning new file ========" + try: + fn = sys.argv[2] + input = BibTeX.parseFile(fn) + except BibTeX.ParseError, e: + print "Error parsing %s: %s"%(fn,e) + sys.exit(1) + + f = open('tmp.bib', 'w') + keys = input.newStrings.keys() + keys.sort() + for k in keys: + v = input.newStrings[k] + print >>f, "@string{%s = {%s}}"%(k,v) + + invStrings = input.invStrings + + for e in input.entries: + if not (e.get('title') and e.get('author')): + print >>f, "%%\n%%%% Not enough information to search for a match: need title and author.\n%%" + emit(f, e) + continue + + matches = master.includes(e, all=1) + if not matches: + print >>f, "%%\n%%%% This entry is probably new: No match found.\n%%" + emit(f, e) + else: + print >>f, "%%" + print >>f, "%%%% Possible match found for this entry; max goodness",\ + matches[-1][0], "\n%%" + emitKnown(f, e, matches) + + if not all_ok: + print >>f, "\n\n\nErrors remain; not finished.\n" + + f.close() diff --git a/i2p2www/anonbib/silver.gif b/i2p2www/anonbib/silver.gif new file mode 100644 index 0000000000000000000000000000000000000000..8a4ff2911f57f8e8082136c14b7d47052e346163 GIT binary patch literal 539 zcmZ?wbhEHblwgoxIOf36*xsEsVcq`~bHbxyUk3)>e)aX&?{E3@uRVMIeAbSuH*emY zzb@?mIj;W^4C~LlxVACi?bXR&E^ImUF#YkS_L3Razg})S^7iMycF%X8fBbq?eE9a8 zmltdQKEHhW^yx$M6hEzC{m>}<_4=_n7yteHJmvpOmlwMu|9pD!cC|{z(f|K{UHkI# z^og^Vj;N@}diDOfW`F+Loq5~#U%Ps0`GJ~6kNy?=FkifQ@xg-!@4jD|&A@Q6pW*-9 zg1%Fy);CJMefMt1_O-^w#{Y*nQ2ZzAT$GwvlA5AWo>`Ki5R#Fq;O^-gz@Wnb1fWP_ zU{7ywXlib0ZENr7?CS36?d$JmXP?kEX-W&bEZ^km4(x1fbNVJt;&Wh|y`+boa{-&g zx)qE)c1tC;OK?uI>$Tg;cVPCues+U{e7h#FpO|!PQ7_}JeMir)X5Ztm^=kLw=DTwr NJbd){$-_nlYXD9OfCvBp literal 0 HcmV?d00001 diff --git a/i2p2www/anonbib/testbib/pdos.bib b/i2p2www/anonbib/testbib/pdos.bib new file mode 100644 index 00000000..65b24b72 --- /dev/null +++ b/i2p2www/anonbib/testbib/pdos.bib @@ -0,0 +1,1742 @@ +%% *** +%% *** ASK YOURSELF: +%% *** +%% *** Did I put it in the right section? +%% *** Did I include a `www_section' tag? +%% *** Did I include the page numbers? +%% *** Did I include the location of the conference (in the `address' tag)? +%% *** +%% *** When you are done editing this file, run this command: +%% *** ./mkpdospubs.pl pdos.bib ../pubs.html +%% *** + +@string{MIT = "Massachusetts Institute of Technology"} +@string{MIT-LCS = "{MIT} Laboratory for Computer Science"} +@string{ACMabbr = "{ACM}"} +@string{SOSP = ACMabbr # " {S}ymposium on {O}perating {S}ystems {P}rinciples"} +@string{IEEEabbr = "{IEEE}"} +@string{IEEECompSoc = IEEEabbr # " {C}omputer {S}ociety"} +@string{OSDI = "{USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation"} + +@string{PDOSWWW = "http://www.pdos.lcs.mit.edu"} + +%% P2P PAPERS + +@string{p2p = "Peer-to-peer Computing"} + +@inproceedings{ivy:osdi02, + title = "Ivy: A Read/Write Peer-to-peer File System", + author = "Athicha Muthitacharoen and Robert Morris and Thomer Gil and Benjie Chen", + crossref = osdi5, + www_section = p2p, + www_abstract_url = PDOSWWW # "/ivy/osdi02.html", + www_ps_url = PDOSWWW # "/ivy/osdi02.ps", + www_ps_gz_url = PDOSWWW # "/ivy/osdi02.ps.gz", + www_pdf_url = PDOSWWW # "/ivy/osdi02.pdf" +} + +@inproceedings{trie:iptps02, + title = "Efficient Peer-To-Peer Lookup Based on a Distributed Trie", + author = "Michael J. Freedman and Radek Vingralek", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/trie:iptps02/index.html", + www_ps_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.ps", + www_ps_gz_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.pdf" +} + +@inproceedings{chord:dns02, + title = "Serving DNS using Chord", + author = "Russ Cox and Athicha Muthitacharoen and Robert Morris", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:dns02/index.html", + www_ps_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.pdf" +} + +@inproceedings{chord:security02, + title = "Security Considerations for Peer-to-Peer Distributed Hash Tables", + author = "Emil Sit and Robert Morris", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:security02/index.html", + www_ps_url = PDOSWWW # "/papers/chord:security02/chord:security02.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:security02/chord:security02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:security02/chord:security02.pdf" +} + +@inproceedings{cfs:sosp01, + title = "Wide-area cooperative storage with {CFS}", + author = "Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica", + crossref = "sosp18", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/cfs:sosp01/", + www_ps_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.ps", + www_ps_gz_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.ps.gz", + www_pdf_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.pdf", +} + +@inproceedings{chord:sigcomm01, + title = "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications", + author = "Ion Stoica and Robert Morris and David Karger and M. Frans Kaashoek and Hari Balakrishnan", + crossref = "sigcomm01", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:sigcomm01/", + www_ps_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.pdf", +} + +@inproceedings{chord:hotos, + title = "Building Peer-to-Peer Systems With Chord, a Distributed Lookup Service", + author = "Frank Dabek and Emma Brunskill and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica and Hari Balakrishnan", + crossref = "hotos8", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:hotos01/", + www_ps_url = PDOSWWW # "/papers/chord:hotos01/hotos8.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:hotos01/hotos8.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:hotos01/hotos8.pdf", +} + + +%% NETWORKING PAPERS + +@string{networking = "Networking and Communication"} + +@inproceedings{click:asplos02, + title = "Programming Language Optimizations for Modular Router Configurations", + author = "Eddie Kohler and Robert Morris and Benjie Chen", + booktitle = "Proceedings of the 10th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)", + location = "San Jose, CA", + month = oct, + year = 2002, + www_section = networking, + www_pdf_url = PDOSWWW # "/papers/click:asplos02.pdf" +} + +@inproceedings{grid:hotnets02, + title = "Performance of Multihop Wireless Networks: Shortest Path is Not Enough", + author = "Douglas S. J. {De Couto} and Daniel Aguayo and Benjamin A. Chambers and Robert Morris", + crossref = "hotnets1", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:hotnets02/", + www_ps_url = PDOSWWW # "/papers/grid:hotnets02/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:hotnets02/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:hotnets02/paper.pdf" +} + +@techreport{grid:losstr01, + title = "Effects of Loss Rate on Ad Hoc Wireless Routing", + author = "Douglas S. J. {De Couto} and Daniel Aguayo and Benjamin A. Chambers and Robert Morris", + institution = MIT-LCS, + year = 2002, month = mar, + number = "MIT-LCS-TR-836", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:losstr02/", + www_ps_url = PDOSWWW # "/papers/grid:losstr02/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:losstr02/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:losstr02/paper.pdf" +} + + +@article{span:wireless01, + title = "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks", + author = "Benjie Chen and Kyle Jamieson and Hari Balakrishnan and Robert Morris", + crossref = "journal:winet", + volume = 8, + number = "5", + year = 2002, + month = sep, + pages = "", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/span:wireless01/", + www_ps_url = PDOSWWW # "/papers/span:wireless01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/span:wireless01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/span:wireless01/paper.pdf" +} + +@inproceedings{dnscache:sigcommimw01, + title = "DNS Performance and the Effectiveness of Caching", + author = "Jaeyeon Jung, Emil Sit, Hari Balakrishnan and Robert Morris", + crossref = "sigcommimw01", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.pdf" +} + +@inproceedings{ron:sosp01, + title = "Resilient Overlay Networks", + author = "David Andersen and Hari Balakrishnan and M. Frans Kaashoek and Robert Morris", + crossref = "sosp18", + pages = "", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.pdf", +} + +@techreport{grid:proxytr01, + title = "Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding", + author = "Douglas S. J. {De Couto} and Robert Morris", + institution = MIT-LCS, + year = 2001, month = jun, + number = "MIT-LCS-TR-824", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:proxytr01/", + www_ps_url = PDOSWWW # "/papers/grid:proxytr01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:proxytr01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:proxytr01/paper.pdf", +} + +@inproceedings{span:mobicom01, + title = "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks", + author = "Benjie Chen and Kyle Jamieson and Hari Balakrishnan and Robert Morris", + crossref = "mobicom01", + pages = "85--96", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/span:mobicom01/", + www_ps_url = PDOSWWW # "/papers/span:mobicom01/span.ps", + www_ps_gz_url = PDOSWWW # "/papers/span:mobicom01/span.ps.gz", + www_pdf_url = PDOSWWW # "/papers/span:mobicom01/span.pdf" +} + +@inproceedings{grid:mobicom01, + title = "Capacity of Ad Hoc Wireless Networks", + author = "Jinyang Li and Charles Blake and Douglas S. J. {De Couto} and Hu Imm Lee and Robert Morris", + crossref = "mobicom01", + pages = "61--69", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:mobicom01/", + www_ps_url = PDOSWWW # "/papers/grid:mobicom01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:mobicom01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:mobicom01/paper.pdf" +} + +@inproceedings{click:usenix01, + title = "Flexible Control of Parallelism in a Multiprocessor PC Router", + author = "Benjie Chen and Robert Morris", + crossref = "usenix01", + pages = "333--346", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:usenix01/", + www_ps_url = PDOSWWW # "/papers/click:usenix01/usenix01.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:usenix01/usenix01.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:usenix01/usenix01.pdf", +} + +@inproceedings{ron:hotos8, + title = "Resilient Overlay Networks", + author = "David Andersen and Hari Balakrishnan and M. Frans Kaashoek and Robert Morris", + crossref = "hotos8", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.pdf", +} + +@techreport{click:rewritertr, + title = "Modular components for network address translation", + author = "Eddie Kohler and Robert Morris and Massimiliano Poletto", + institution = "MIT LCS Click Project", + year = 2000, month = dec, + note = "http://www.pdos.lcs.mit.edu/papers/click-rewriter/", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click-rewriter/", + www_ps_url = PDOSWWW # "/papers/click-rewriter/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click-rewriter/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click-rewriter/paper.pdf", +} + +@inproceedings{grid:sigops-euro9, + title = "{C}ar{N}et: A Scalable Ad Hoc Wireless Network System", + author = "Robert Morris and John Jannotti and Frans Kaashoek and Jinyang Li and Douglas S. J. {De Couto}", + crossref = "sigops-euro9", + pages = "", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:sigops-euro9/", + www_ps_gz_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.ps.gz", + www_ps_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.ps", + www_pdf_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.pdf", + note = "The published version incorrectly lists Douglas De Couto's name" +} + +@inproceedings{grid:mobicom00, + title = "A Scalable Location Service for Geographic Ad Hoc Routing", + author = "Jinyang Li and John Jannotti and Douglas S. J. {De Couto} and David R. Karger and Robert Morris", + crossref = "mobicom00", + pages = "120--130", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:mobicom00/", + www_ps_url = PDOSWWW # "/papers/grid:mobicom00/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:mobicom00/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:mobicom00/paper.pdf" +} + +@techreport{click:lcstr00, + title = "Programming language techniques for modular router configurations", + author = "Eddie Kohler and Benjie Chen and M. Frans Kaashoek and Robert Morris and Massimiliano Poletto", + institution = MIT-LCS, + year = 2000, month = aug, + number = "MIT-LCS-TR-812", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:lcstr00/", + www_ps_url = PDOSWWW # "/papers/click:lcstr00/tr.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:lcstr00/tr.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:lcstr00/tr.pdf", +} + +@article{click:tocs00, + title = "The Click modular router", + author = "Eddie Kohler and Robert Morris and Benjie Chen and John Jannotti and M. Frans Kaashoek", + crossref = "journal:tocs", + volume = 18, number = 3, + year = 2000, month = aug, + pages = "263--297", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:tocs00/", + www_ps_url = PDOSWWW # "/papers/click:tocs00/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:tocs00/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:tocs00/paper.pdf" +} + +@inproceedings{click:sosp99, + title = "The {C}lick modular router", + author = "Robert Morris and Eddie Kohler and John Jannotti and M. Frans Kaashoek", + crossref = "sosp17", + pages = "217--231", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:sosp99/", + www_ps_url = PDOSWWW # "/papers/click:sosp99/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:sosp99/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:sosp99/paper.pdf" +} + +@inproceedings{prolac:sigcomm99, + title = "A readable {TCP} in the {Prolac} protocol language", + author = "Eddie Kohler and M. Frans Kaashoek and David R. Montgomery", + crossref = "sigcomm99", + pages = "3--13", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/prolac:sigcomm99/", + www_ps_url = PDOSWWW # "/papers/prolac:sigcomm99/paper.ps", + www_pdf_url = PDOSWWW # "/papers/prolac:sigcomm99/paper.pdf" +} + +@inproceedings{ash:sigcomm96, + title = "{ASHs}: application-specific handlers for high-performance messaging", + author = "Deborah A. Wallach and Dawson R. Engler and M. Frans Kaashoek", + crossref = "sigcomm96", + pages = "40--52", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/ash-sigcomm96.ps" +} + +@inproceedings{dpf:sigcomm96, + title = "{DPF}: fast, flexible message demultiplexing using dynamic code generation", + author = "Dawson R. Engler and M. Frans Kaashoek", + crossref = "sigcomm96", + pages = "53--59", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/dpf.ps" +} + +@inproceedings{oam:ppopp95, + title = "Optimistic active messages: a mechanism for scheduling communication with computation", + author = "Deborah A. Wallach and Wilson C. Hsieh and Kirk Johnson and M. Frans Kaashoek and William E. Weihl", + crossref = "ppopp95", + pages = "217--226", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/oam.ps" +} + +@techreport{user-level-comm:tr, + title = "Efficient implementation of high-level languages on user-level communication architectures", + author = "Wilson C. Hsieh and Kirk L. Johnson and M. Frans Kaashoek and Deborah A. Wallach and William E. Weihl", + institution = MIT-LCS, + year = 1994, month = may, + number = "MIT-LCS-TR-616", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/UserLevelCommunication.ps", +} + +@inproceedings{ipc-persistent-relevance:wwos4, + title = "The persistent relevance of IPC performance", + author = "Wilson C. Hsieh and M. Frans Kaashoek and William E. Weihl", + crossref = "wwos4", + pages = "186--190", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/RelevanceOfIPC.ps", +} + +@inproceedings{pan:openarch99, + title = "{PAN}: a high-performance active network node supporting multiple mobile code systems", + author = "Erik L. Nygren and Stephen J. Garland and M. Frans Kaashoek", + crossref = "openarch99", + pages = "78--89", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/pan-openarch99/", + www_ps_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.ps", + www_ps_gz_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.ps.gz", + www_pdf_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.pdf", +} + +%% DISTRIBUTED COMPUTING + +@string{distribcomp = "Distributed Computing"} + +@inproceedings{lbfs:sosp01, + title = "A Low-bandwidth Network File System", + author = "Athicha Muthitacharoen and Benjie Chen and David Mazi{\`e}res", + crossref = "sosp18", + pages = "174--187", + www_section = distribcomp, + www_abstract_url = PDOSWWW # "/papers/lbfs:sosp01/", + www_ps_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.ps", + www_ps_gz_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.ps.gz", + www_pdf_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.pdf", +} + +@inproceedings{server-os:sigops-euro, + title = "Server operating systems", + author = "M. Frans Kaashoek and Dawson R. Engler and Gregory R. Ganger and Deborah A. Wallach", + crossref = "sigops-euro7", + pages = "141--148", + www_section = distribcomp, + www_html_url = PDOSWWW # "/papers/serverOS.html" +} + +@inproceedings{amoeba-eval:dcs16, + title = "An evaluation of the {Amoeba} group communication system", + author = "M. Frans Kaashoek and Andrew S. Tanenbaum", + crossref = "dcs16", + pages = "436--448", + www_section = distribcomp, + www_ps_url = PDOSWWW # "/papers/group-dcs16.ps" +} + + +%% SECURITY AND PRIVACY + +@string{security = "Security and Privacy"} + +@techreport{sfs:rex, + title = "REX: Secure, modular remote execution through file descriptor passing", + author = "Michael Kaminsky and Eric Peterson and Kevin Fu and David Mazi{\`e}res and M. Frans Kaashoek", + institution = "MIT-LCS", + year = 2003, month = jan, + number = "MIT-LCS-TR-884", + note = "http://www.pdos.lcs.mit.edu/papers/sfs:rex/", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/sfs:rex/", + www_ps_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.pdf", +} + +@inproceedings{tarzan:ccs9, + title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Robert Morris", + crossref = "ccs9", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/tarzan:ccs9/index.html", + www_ps_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.pdf" +} + +@inproceedings{tarzan:iptps02, + title = "Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris", + crossref = "iptps02", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/tarzan:iptps02/index.html", + www_ps_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.pdf" +} + +@article{sfsro:tocs2002, + title = "{F}ast and secure distributed read-only file system", + author = "Kevin Fu and M. Frans Kaashoek and David Mazi{\`e}res", + crossref = "journal:tocs", + volume = 20, number = 1, + year = 2002, month = feb, + pages = "1--24", + www_section = security, + www_abstract_url = "http://portal.acm.org/citation.cfm?doid=505452.505453" +} + + +@inproceedings{webauth:sec10, + title = "{D}os and Don'ts of Client Authentication on the Web", + author = "Kevin Fu and Emil Sit and Kendra Smith and Nick Feamster", + crossref = "sec10", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/webauth.html", + www_ps_url = PDOSWWW # "/papers/webauth:sec10.ps", + www_pdf_url = PDOSWWW # "/papers/webauth:sec10.pdf", + www_ps_gz_url = PDOSWWW # "/papers/webauth:sec10.ps.gz", + note = "An extended version is available as MIT-LCS-TR-818", +} + +@techreport{webauth:tr, + title = "{D}os and Don'ts of Client Authentication on the Web", + author = "Kevin Fu and Emil Sit and Kendra Smith and Nick Feamster", + institution = MIT-LCS, + year = 2001, month = may, + number = "MIT-LCS-TR-818", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/webauth.html", + www_ps_url = PDOSWWW # "/papers/webauth:tr.ps", + www_pdf_url = PDOSWWW # "/papers/webauth:tr.pdf", + www_ps_gz_url = PDOSWWW # "/papers/webauth:tr.ps.gz", +} + +@inproceedings{sfsro:osdi2000, + title = "{F}ast and secure distributed read-only file system", + author = "Kevin Fu and M. Frans Kaashoek and David Mazi{\`e}res", + crossref = "osdi4", + pages = "181-196", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/sfsro.html", + www_ps_url = PDOSWWW # "/papers/sfsro:osdi2000.ps", + www_pdf_url = PDOSWWW # "/papers/sfsro:osdi2000.pdf", + www_ps_gz_url = PDOSWWW # "/papers/sfsro:osdi2000.ps.gz", +} + +@inproceedings{sfs:sosp99, + title = "{S}eparating key management from file system security", + author = "David Mazi{\`e}res and Michael Kaminsky and M. Frans Kaashoek and Emmett Witchel", + crossref = "sosp17", + pages = "", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/sfs:sosp99.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:sosp99.pdf", +} + +@inproceedings{nymserver:ccs5, + title = "The design, implementation and operation of an email pseudonym server", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + crossref = "ccs5", + pages = "27--36", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/nymserver:ccs5.ps.gz", + www_pdf_url = PDOSWWW # "/papers/nymserver:ccs5.pdf", +} + +@inproceedings{sfs:sigops-euro8, + title = "Escaping the evils of centralized control with self-certifying pathnames", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + crossref = "sigops-euro8", + pages = "", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/sfs:sigops-euro8.ps.gz" +} + +@inproceedings{secure-apps:hotos6, + title = "Secure applications need flexible operating systems", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + pages = "56--61", + crossref = "hotos6", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/mazieres:hotos6.ps.gz", +} + + +%% MOBILE COMPUTING + +@string{mobilecomp = "Mobile Computing"} + +@inproceedings{migrate:hotos8, + title = "Reconsidering Internet Mobility", + author = "Alex C. Snoeren and Hari Balakrishnan and M. Frans Kaashoek", + crossref = "hotos8", + www_section = mobilecomp, + www_abstract_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.ps", + www_pdf_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.pdf", +} + +@misc{rover:rfs-wip, + title = "{RFS}: a mobile-transparent file system for the {Rover} toolkit", + author = "Anthony D. Joseph and George M. Candea and M. Frans Kaashoek", + howpublished = "Works-in-progress poster, the 16th " # SOSP, + crossref = "sosp16", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/RFS_SOSP_WIP.ps" + www_show = no, +} + +@article{rover:winet, + title = "Building reliable mobile-aware applications using the {Rover} toolkit", + author = "Anthony D. Joseph and M. Frans Kaashoek", + crossref = "journal:winet", + volume = 3, number = 5, + year = 1997, + pages = "405--419", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/winet.ps" + www_ps_gz_url = PDOSWWW # "/papers/winet.ps.gz" +} + +@article{rover:ieee-toc, + title = "Mobile computing with the {Rover} toolkit", + author = "Anthony D. Joseph and Joshua A. Tauber and M. Frans Kaashoek", + crossref = "journal:ieee-toc", + volume = 46, number = 3, + year = 1997, month = mar, + pages = "337--352", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/toc.ps" + www_ps_gz_url = PDOSWWW # "/papers/toc.ps.gz" +} + +@inproceedings{rover:mobicom, + title = "Building reliable mobile-aware applications using the {Rover} toolkit", + author = "Anthony D. Joseph and Joshua A. Tauber and M. Frans Kaashoek", + crossref = "mobicom96", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/mobicom96.ps", + www_ps_gz_url = PDOSWWW # "/papers/mobicom96.ps.gz", +} + +@inproceedings{rover:sosp95, + title = "{Rover}: a toolkit for mobile information access", + author = "Anthony D. Joseph and {deLespinasse}, Alan F. and Joshua A. Tauber and David K. Gifford and M. Frans Kaashoek", + crossref = "sosp15", + pages = "156--171", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/rover-sosp95.ps", + www_ps_gz_url = PDOSWWW # "/papers/rover-sosp95.ps.gz", +} + +@inproceedings{dynamic-documents:wmcsa, + title = "Dynamic documents: mobile wireless access to the {WWW}", + author = "M. Frans Kaashoek and Tom Pinckney and Joshua A. Tauber", + crossref = "wmcsa94", + pages = "179--184", + www_section = mobilecomp, + www_abstract_url = PDOSWWW # "/papers/wmcsa94.abstract.html", + www_ps_url = PDOSWWW # "/papers/wmcsa94.ps", + www_ps_gz_url = PDOSWWW # "/papers/wmcsa94.ps.gz", +} + +@inproceedings{mobile-storage-alt:osdi1, + title = "Storage alternatives for mobile computers", + author = "Fred Douglis and Ramón Cáceres and M. Frans Kaashoek and Kai Li and Brian Marsh and Joshua A. Tauber", + crossref = "osdi1", + pages = "25--37", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/storage-alternatives.ps" +} + +@inproceedings{dynamic-documents:www94, + title = "Dynamic documents: extensibility and adaptability in the {WWW}", + author = "M. Frans Kaashoek and Tom Pinckney and Joshua A. Tauber", + crossref = "www94", + edition = "developers' day track", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/www94.ps", + www_ps_gz_url = PDOSWWW # "/papers/www94.ps.gz", + www_html_url = PDOSWWW # "/papers/www94.html", +} + + +%% STORAGE MANAGEMENT + +@string{storage = "Storage Management"} + +@inproceedings{cffs:usenix97, + title = "Embedded inodes and explicit grouping: exploiting disk bandwidth for small files", + author = "Gregory R. Ganger and M. Frans Kaashoek", + crossref = "usenix97", + pages = "1--17", + www_section = storage, + www_abstract_url = PDOSWWW # "/papers/cffs.html", + www_ps_url = PDOSWWW # "/papers/cffs-usenix97.ps", + www_ps_gz_url = PDOSWWW # "/papers/cffs-usenix97.ps.gz", +} + +@inproceedings{arus:dcs16, + title = "Atomic recovery units: failure atomicity for logical disks", + author = "Robert Grimm and Wilson C. Hsieh and Wiebren de Jonge and M. Frans Kaashoek", + crossref = "dcs16", + pages = "26--37", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/arus.ps", +} + +@inproceedings{logicaldisk:sosp14, + title = "The logical disk: a new approach to improving file systems", + author = "Wiebren de Jonge and M. Frans Kaashoek and Wilson C. Hsieh", + crossref = "sosp14", + pages = "15--28", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/LogicalDisk.ps" +} + + +%% EXOKERNEL PAPERS + +@string{exokernels = "Exokernels"} + +@article{exo:tocs2002, + title = "{F}ast and flexible Application-Level Networking on Exokernel Systems", + author = "Gregory R. Ganger and Dawson R. Engler and M. Frans Kaashoek and Hector M. Briceno and Russell Hunt and Thomas Pinckney", + crossref = "journal:tocs", + volume = 20, + number = 1, + year = 2002, + month = feb, + pages = "49--83", + www_section = exokernels, + www_abstract_url = PDOSWWW # "papers/exo:tocs.html", + www_pdf_url = PDOSWWW # "papers/exo:tocs.pdf", + www_ps_url = PDOSWWW # "papers/exo:tocs.ps", + www_ps_gz_url = PDOSWWW # "papers/exo:tocs.ps.gz" +} + +@inproceedings{exo:sosp97, + title = "Application performance and flexibility on exokernel systems", + author = "M. Frans Kaashoek and Dawson R. Engler and Gregory R. Ganger and H{\'e}ctor M. Brice{\~n}o and Russell Hunt and David Mazi{\`e}res and Thomas Pinckney and Robert Grimm and John Jannotti and Kenneth Mackenzie", + pages = "52--65", + crossref = "sosp16", + www_section = exokernels, + www_abstract_url = PDOSWWW # "/papers/exo-sosp97.html", + www_html_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.html", + www_ps_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.ps", + www_ps_gz_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.ps.gz", +} + +@inproceedings{exo:sosp95, + title = "{E}xokernel: an operating system architecture for application-level resource management", + author = "Dawson R. Engler and M. Frans Kaashoek and James {O'Toole Jr.}", + pages = "251--266", + crossref = "sosp15", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/exokernel-sosp95.ps", +} + +@inproceedings{exo:osdi1, + title = "The exokernel approach to extensibility (panel statement)", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + pages = "198", + crossref = "osdi1", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/exo-abstract.ps", +} + +@inproceedings{exo:hotos5, + title = "Exterminate all operating system abstractions", + author = "Dawson R. Engler and M. Frans Kaashoek", + pages = "78--83", + crossref = "hotos5", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/hotos-jeremiad.ps", +} + +@article{exo:osr, + title = "The operating system kernel as a secure programmable machine", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + crossref = "journal:osr", + year = 1995, month = jan, + volume = 29, number = 1, + pages = "78--82", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/osr-exo.ps", +} + +@inproceedings{exo:sigops-euro, + title = "The operating system kernel as a secure programmable machine", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + crossref = "sigops-euro6", + pages = "62--67", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/xsigops.ps", +} + + +%% DYNAMIC CODE GENERATION + +@string{dcg = "Dynamic Code Generation"} + +@article{tickc:toplas, + title = "{`C} and {tcc}: A language and compiler for dynamic code generation" + author = "Massimiliano Poletto and Wilson C. Hsieh and Dawson R. Engler and M. Frans Kaashoek", + crossref = "journal:toplas", + volume = 21, number = 2, + year = 1999, month = mar, + pages = "324--369", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tickc-toplas.ps", +} + +@article{linearscan, + title = "Linear scan register allocation", + author = "Massimiliano Poletto and Vivek Sarkar", + crossref = "journal:toplas", + volume = 21, number = 5, + year = 1999, month = sep, + pages = "895--913", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/toplas-linearscan.ps", +} + +@inproceedings{tickc:pldi97, + title = "tcc: a system for fast, flexible, and high-level dynamic code generation", + author = "Massimiliano Poletto and Dawson R. Engler and M. Frans Kaashoek", + crossref = "pldi97", + pages = "109--121", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tcc-pldi97.ps", +} + +@inproceedings{tickc:popl96, + title = "{`C}: A language for efficient, machine-independent dynamic code generation", + author = "Dawson R. Engler and Wilson C. Hsieh and M. Frans Kaashoek", + crossref = "popl96", + pages = "131--144", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/popl96.ps", + note = "An earlier version is available as MIT-LCS-TM-526", +} + +@inproceedings{tickc:wcsss96, + title = "tcc: a template-based compiler for {`C}", + author = "Massimiliano Poletto and Dawson R. Engler and M. Frans Kaashoek", + crossref = "wcsss96", + pages = "1--7", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tcc-wcsss96.ps" +} + +@inproceedings{vcode:pldi96, + title = "{VCODE}: a retargetable, extensible, very fast dynamic code generation system", + author = "Dawson R. Engler", + crossref = "pldi96", + pages = "160--170", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/vcode-pldi96.ps", +} + +@inproceedings{dcg:asplos6, + title = "{DCG}: an efficient, retargetable dynamic code generation system", + author = "Dawson R. Engler and Todd A. Proebsting", + crossref = "asplos6", + pages = "263--272", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/dcg.ps", +} + + +%% PROGRAMMING LANGUAGES + +@string{proglang = "Programming Languages"} + +@inproceedings{pct:usenix02, + title = "Simple and General Statistical Profiling with PCT", + author = "Charles Blake and Steve Bauer", + crossref = "usenix02", + pages = "333--346" + www_section = proglang, + www_abstract_url = PDOSWWW # "/papers/pct:usenix02/", + www_ps_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.ps", + www_ps_gz_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.ps.gz", + www_pdf_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.pdf", +} + +@inproceedings{evolving-software:wcsss99, + title = "Evolving software with an application-specific language", + author = "Eddie Kohler and Massimiliano Poletto and David R. Montgomery", + crossref = "wcsss99", + pages = "94--102", + www_section = proglang, + www_abstract_url = PDOSWWW # "/papers/evolving-software:wcsss99/", + www_ps_url = PDOSWWW # "/papers/evolving-software:wcsss99/paper.ps", + www_pdf_url = PDOSWWW # "/papers/evolving-software:wcsss99/paper.pdf", +} + + +%% STORAGE MANAGEMENT + +@string{storage = "Storage Management"} + +@inproceedings{cffs:usenix97, + title = "Embedded inodes and explicit grouping: exploiting disk bandwidth for small files", + author = "Gregory R. Ganger and M. Frans Kaashoek", + crossref = "usenix97", + pages = "1--17", + www_section = storage, + www_abstract_url = PDOSWWW # "/papers/cffs.html", + www_ps_url = PDOSWWW # "/papers/cffs-usenix97.ps", + www_ps_gz_url = PDOSWWW # "/papers/cffs-usenix97.ps.gz", +} + +@inproceedings{arus:dcs16, + title = "Atomic recovery units: failure atomicity for logical disks", + author = "Robert Grimm and Wilson C. Hsieh and Wiebren de Jonge and M. Frans Kaashoek", + crossref = "dcs16", + pages = "26--37", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/arus.ps", +} + +@inproceedings{logicaldisk:sosp14, + title = "The logical disk: a new approach to improving file systems", + author = "Wiebren de Jonge and M. Frans Kaashoek and Wilson C. Hsieh", + crossref = "sosp14", + pages = "15--28", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/LogicalDisk.ps" +} + + +%% VIRTUAL MEMORY + +@string{vm = "Virtual Memory"} + +@inproceedings{avm:hotos5, + title = "{AVM}: application-level virtual memory", + author = "Dawson R. Engler and Sandeep K. Gupta and M. Frans Kaashoek", + crossref = "hotos5", + pages = "72--77", + www_section = vm, + www_ps_url = PDOSWWW # "/papers/hotos-uvm.ps", +} + +@inproceedings{software-tlb-prefetch:osdi1, + title = "Software prefetching and caching for translation lookaside buffers", + author = "Kavita Bala and M. Frans Kaashoek and William Weihl", + crossref = "osdi1", + pages = "243--253", + www_section = vm, + www_ps_url = PDOSWWW # "/papers/tlb.ps", +} + + + + +%% DISTRIBUTED SHARED MEMORY AND PARALLEL COMPUTING + +@string{dsm/parallel = "Distributed Shared Memory and Parallel Computing"} + +@inproceedings{dynamic-migration:supercomp96, + title = "Dynamic computation migration in distributed +shared memory systems", + author = "Wilson C. Hsieh and M. Frans Kaashoek and William E. Weihl", + crossref = "supercomp96", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/mcrl.ps" +} + +@inproceedings{crl:sosp95, + title = "{CRL}: high-performance all-software distributed shared memory", + author = "Kirk L. Johnson and M. Frans Kaashoek and Deborah A. Wallach", + crossref = "sosp15", + pages = "213--226", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/crl-sosp95.ps" + note = "An earlier version of this work appeared as Technical Report MIT-LCS-TM-517, MIT Laboratory for Computer Science, March 1995", +} + +@inproceedings{formal-sequential-consistent:dcs15, + title = "Implementing sequentially consistent shared objects using broadcast and point-to-point communication", + author = "Alan Fekete and M. Frans Kaashoek and Nancy Lynch", + crossref = "dcs15", + pages = "439--449", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/formal.ps" +} + +@techreport{formal-sequential-consistent:tr, + title = "Implementing sequentially consistent shared objects using broadcast and point-to-point communication", + author = "Alan Fekete and M. Frans Kaashoek and Nancy Lynch", + institution = MIT-LCS, + year = 1995, month = jun, + number = "MIT-LCS-TR-518", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/formaltr.ps" +} + +%@inproceedings{triangle-puzzle:dimacs94, +% title = "A case study of shared-memory and +%message-passing implementations of parallel breadth-first search: The +%triangle puzzle", +% author = "Kevin Lew and Kirk Johnson and M. Frans Kaashoek", +% crossref = "dimacs94", +% www_section = dsm/parallel, +% www_ps_url = PDOSWWW # "/papers/dimacs94.ps" +%} + + +%% PHD THESES + +@string{phdtheses = "Ph.D. Theses"} + +@phdthesis{snoeren-phd, + title = "A Session-Based Architecture for Internet Mobility", + author = "Alex C. Snoeren", + school = MIT, + year = 2002, month = dec, + www_section = phdtheses, + www_ps_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.ps.gz" + www_pdf_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.pdf", +} + +@phdthesis{jannotti-phd, + title = "Network Layer Support for Overlay Networks", + author = "John Jannotti", + school = MIT, + year = 2002, month = aug, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/papers/jannotti-phd.ps", + www_ps_gz_url = PDOSWWW # "/papers/jannotti-phd.ps.gz", + www_pdf_url = PDOSWWW # "/papers/jannotti-phd.pdf" +} + +@phdthesis{click:kohler-phd, + title = "The Click modular router", + author = "Eddie Kohler", + school = MIT, + year = 2000, month = nov, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/click:kohler-phd/thesis.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:kohler-phd/thesis.pdf" +} + +@phdthesis{sfs:mazieres-phd, + title = "Self-certifying File System", + author = "David Mazieres", + school = MIT, + year = 2000, month = may, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:mazieres-phd.ps.gz" +} + +@phdthesis{tickc:poletto-phd, + title = "Language and compiler support for dynamic code generation", + author = "Massimiliano Poletto", + school = MIT, + year = 1999, month = jun, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/papers/tickc-poletto-phd.ps", + www_ps_gz_url = PDOSWWW # "/papers/tickc-poletto-phd.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tickc-poletto-phd.pdf" +} + +@phdthesis{exo:engler-phd, + title = "The exokernel operating system architecture", + author = "Dawson R. Engler", + school = MIT, + year = 1998, month = oct, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/exo/theses/engler/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/engler/thesis.ps.gz", +} + +@phdthesis{fugu:mackenzie-phd, + title = "An efficient virtual network interface in the {FUGU} scalable workstation", + author = "Kenneth M. Mackenzie", + school = MIT, + year = 1998, month = feb, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/exo/theses/kenmac/thesis.ps.gz", +} + +@phdthesis{app-specific-networking:wallach-phd, + title = "High-performance application-specific networking", + author = "Deborah Anne Wallach", + school = MIT, + year = 1997, month = jan, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/exo/theses/kerr/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/kerr/thesis.ps.gz", +} + +@phdthesis{crl:johnson-phd, + title = "High-performance all-software distributed shared memory", + author = "Kirk L. Johnson", + school = MIT, + year = 1995, month = dec, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/crl:johnson-phd.ps.gz", + www_abstract_url = "http://www.cag.lcs.mit.edu/~tuna/papers/thesis.html", +} + +@phdthesis{dyn-comp-migration:hsieh-phd, + title = "Dynamic computation migration in distributed shared memory systems", + author = "Wilson C. Hsieh", + school = MIT, + year = 1995, month = sep, + www_section = phdtheses, + www_pdf_url = PDOSWWW # "/papers/dyn-comp-migration:hsieh-phd.pdf", + note = "Also available as MIT LCS tech report MIT-LCS-TR-665." +} + + +%% MASTERS THESES + +@string{masterstheses = "Master's Theses"} + +@mastersthesis{sfs:savvides-meng, + title = "Access Control Lists for the Self-Certifying Filesystem" + author = "George Savvides", + school = MIT, + year = 2002, month = Aug, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:savvides-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:savvides-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:savvides-meng.ps.gz", +} + +@mastersthesis{sfs:euresti-meng, + title = "Self-Certifying Filesystem Implementation for Windows" + author = "David Euresti", + school = MIT, + year = 2002, month = Aug, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:euresti-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:euresti-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:euresti-meng.ps.gz", +} + +@mastersthesis{sfs:zeldovich-meng, + title = "Concurrency Control for Multi-Processor Event-Driven Systems" + author = "Nickolai Zeldovich", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:zeldovich-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:zeldovich-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:zeldovich-meng.ps.gz", +} + +@mastersthesis{chord:om_p-meng, + title = "A Keyword Set Search System for Peer-to-Peer Networks" + author = "Omprakash D Gnawali", + school = MIT, + year = 2002, month = Jun, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:om_p-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:om_p-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:om_p-meng.ps.gz", +} + +@mastersthesis{grid:bac-meng, + title = "The Grid Roofnet: a Rooftop Ad Hoc Wireless Network" + author = "Benjamin A. Chambers", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/grid:bac-meng.pdf", + www_ps_url = PDOSWWW # "/papers/grid:bac-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:bac-meng.ps.gz", +} + +@mastersthesis{tarzan:freedman-meng, + title = "A Peer-to-Peer Anonymizing Network Layer" + author = "Michael J. Freedman", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/tarzan:freedman-meng/index.html", + www_pdf_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.pdf", + www_ps_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.ps.gz", +} + + +@mastersthesis{chord:tburkard-meng, + title = "Herodotus: A Peer-to-Peer Web Archival System" + author = "Timo Burkard", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:tburkard-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:tburkard-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:tburkard-meng.ps.gz", +} + +@mastersthesis{cfs:dabek-meng, + title = "A Cooperative File System" + author = "Frank Dabek", + school = MIT, + year = 2001, month = September, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:dabek_thesis/dabek.pdf", + www_ps_url = PDOSWWW # "/papers/chord:dabek_thesis/dabek.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:dabek_thesis/tyan-meng.ps.gz", +} + +@mastersthesis{chord:tyan-meng, + title = "A Case Study of Server Selection", + author = "Tina Tyan", + school = MIT, + year = 2001, month = September, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:tyan-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:tyan-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:tyan-meng.ps.gz", +} + +@mastersthesis{click:gil-ms, + title = "MULTOPS: a data structure for denial-of-service attack detection", + author = "Thomer M. Gil", + school = "Vrije Universiteit", + year = 2000, month = August, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/click:gil-ms.ps.gz", +} + +@mastersthesis{click:sit-ms, + title = "A Study of Caching in the Internet Domain Name System", + author = "Emil Sit", + school = MIT, + year = 2000, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/click:sit-ms.ps.gz", +} + + +@mastersthesis{sfs:kaminsky-ms, + title = "Flexible Key Management with SFS Agents", + author = "Michael Kaminsky", + school = MIT, + year = 2000, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:kaminsky-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:kaminsky-ms.pdf", +} + +@mastersthesis{sfs:almeida-ms, + title = "Framework for Implementing File Systems in Windows NT", + author = "Danilo Almeida", + school = MIT, + year = 1998, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:almeida-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:almeida-ms.pdf", +} + +@mastersthesis{sfs:rimer-ms, + title = "The Secure File System under Windows NT", + author = "Matthew Rimer", + school = MIT, + year = 1999, month = June, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:rimer-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:rimer-ms.pdf", +} + +@mastersthesis{prolac:montgomery-meng, + title = "A fast {Prolac} {TCP} for the real world", + author = "Montgomery, Jr., David Rogers", + school = MIT, + year = 1999, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/prolac:montgomery-meng.ps.gz", +} + +@mastersthesis{exo:coffing-meng, + title = "An x86 Protected Mode Virtual Machine Monitor for the MIT Exokernel", + author = "Charles L. Coffing", + school = MIT, + year = 1999, month = May, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/exo:coffing-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/exo:coffing-meng.ps.gz", +} + +@mastersthesis{exo:chen-meng, + title = "Multiprocessing with the Exokernel Operating System", + author = "Benjie Chen", + school = MIT, + year = 2000, month = February, + www_section = masterstheses, + www_html_url = PDOSWWW # "/papers/exo:chen-meng.html", + www_ps_url = PDOSWWW # "/papers/exo:chen-meng.ps", + www_pdf_url = PDOSWWW # "/papers/exo:chen-meng.pdf", + www_ps_gz_url = PDOSWWW # "/papers/exo:chen-meng.ps.gz", +} + +@mastersthesis{exo:candea-meng, + title = "Flexible and efficient sharing of protected abstractions", + author = "George M. Candea", + school = MIT, + year = 1998, month = may, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/candea-meng.html", + www_ps_url = PDOSWWW # "/papers/ProtAbs.ps", + www_ps_gz_url = PDOSWWW # "/papers/ProtAbs.ps.gz", + www_pdf_url = PDOSWWW # "/papers/ProtAbs.pdf", +} + +@mastersthesis{exo-os:jj-meng, + title = "Applying Exokernel Principles to Conventional Operating Systems", + author = "John Jannotti", + school = MIT, + year = 1998, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/jj-meng-exo-feb98.ps", + www_ps_gz_url = PDOSWWW # "/papers/jj-meng-exo-feb98.ps.gz", + www_pdf_url = PDOSWWW # "/papers/jj-meng-exo-feb98.pdf", +} + +@mastersthesis{pan:nygren-meng, + title = "The design and implementation of a high-performance active network node", + author = "Erik L. Nygren", + school = MIT, + year = 1998, month = feb, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.html", + www_ps_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.ps", + www_ps_gz_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.ps.gz", + www_pdf_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.pdf", +} + +@mastersthesis{exo:wyatt-meng, + title = "Shared libraries in an exokernel operating system", + author = "Douglas Karl Wyatt", + school = MIT, + year = 1997, month = sep, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/dwyatt/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/dwyatt/thesis.ps.gz", +} + +@mastersthesis{prolac:kohler-ms, + title = "Prolac: a language for protocol compilation", + author = "Eddie Kohler", + school = MIT, + year = 1997, month = sep, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/prolac:kohler-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/prolac:kohler-ms.pdf", +} + +@mastersthesis{sfs:mazieres-ms, + title = "Security and decentralized control in the {SFS} global file system", + author = "David Mazi{\`e}res", + school = MIT, + year = 1997, month = aug, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:mazieres-ms.ps.gz" +} + +@mastersthesis{exo:pinckney-meng, + title = "Operating system extensibility through event capture", + author = "Thomas {Pinckney III}", + school = MIT, + year = 1997, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/pinckney/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/pinckney/thesis.ps.gz", +} + +@mastersthesis{exo:briceno-meng, + title = "Decentralizing {UNIX} abstractions in the exokernel architecture", + author = "H{\'e}ctor Manuel {Brice{\~n}o Pulido}", + school = MIT, + year = 1997, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/hbriceno/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/hbriceno/thesis.ps.gz", +} + +@mastersthesis{rover:nntp, + title = "The {Rover} {NNTP} proxy", + author = "Constantine Cristakos", + school = MIT, + year = 1996, month = jun, + type = "Advanced Undergraduate Project", + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/DeanAUP.ps", + www_ps_gz_url = PDOSWWW # "/papers/DeanAUP.ps.gz", +} + +@mastersthesis{exo:grimm-ms, + title = "Exodisk: maximizing application control over storage management", + author = "Robert Grimm", + school = MIT, + year = 1996, month = may, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/rgrimm/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/rgrimm/thesis.ps.gz", +} + +@mastersthesis{rover:tauber-ms, + title = "Issues in building mobile-aware applications with the {Rover} toolkit", + author = "Joshua A. Tauber", + school = MIT, + year = 1996, month = may, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/JoshThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/JoshThesis.ps.gz", +} + +@mastersthesis{rover-mosaic:delespinasse-thesis, + title = "{Rover} {Mosaic}: e-mail communication for a full-function {Web} browser", + author = "Alan F. {deLespinasse}", + school = MIT, + year = 1995, month = jun, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/RoverMosaicThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/RoverMosaicThesis.ps.gz", +} + +@mastersthesis{r2over-mosaic:delespinasse-thesis, + title = {{Rover} {Mosaic}: e-mail communication for a full-function {Web} browser}, + author = "Alan F. {deLespinasse}", + school = MIT, + year = 1995, month = jun, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/RoverMosaicThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/RoverMosaicThesis.ps.gz", +} + + +%% PROCEEDINGS + +@proceedings{asplos6, + booktitle = "Proceedings of the 6th International Conference on Architectural Support for Programming Languages and Operating Systems ({ASPLOS-VI})", + year = 1994, month = oct, + address = "San Jose, California" +} + +@proceedings{ccs5, + booktitle = "Proceedings of the 5th {ACM} Conference on Computer and Communications Security ({CCS-5})", + year = 1998, month = nov, + address = "San Francisco, California", + bookurl = "http://www.bell-labs.com/user/reiter/ccs5/" +} + +@proceedings{ccs9, + booktitle = "Proceedings of the 9th {ACM} Conference on Computer and Communications Security ({CCS-9})", + year = 2002, month = nov, + address = "Washington, D.C.", + bookurl = "http://www.acm.org/sigs/sigsac/ccs/" +} + +@proceedings{dcs16, + booktitle = "Proceedings of the 16th International Conference on Distributed Computing Systems", + organization = IEEECompSoc, + year = 1996, month = may, + address = "Hong Kong", +} + +@proceedings{dcs15, + booktitle = "Proceedings of the 15th International Conference on Distributed Computing Systems", + organization = IEEECompSoc, + year = 1995, month = jun, + address = "Vancouver, British Columbia", +} + +@proceedings{hotnets1, + booktitle = "Proceedings of the First {W}orkshop on {H}ot {T}opics in {N}etworks ({HotNets-I})", + year = 2002, month = oct, + organization = "{ACM SIGCOMM}", + address = "Princeton, New Jersey", + bookurl = "http://www.cs.washington.edu/hotnets/", +} + +@proceedings{hotos8, + booktitle = "Proceedings of the 8th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-VIII})", + year = 2001, month = may, + organization = IEEECompSoc, + address = "Schloss Elmau, Germany", + bookurl = "http://i30www.ira.uka.de/conferences/HotOS/", +} + +@proceedings{hotos6, + booktitle = "Proceedings of the 6th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-VI})", + year = 1997, month = may, + organization = IEEECompSoc, + address = "Chatham, Cape Cod, Massachusetts", + bookurl = "http://www.eecs.harvard.edu/hotos", +} + +@proceedings{hotos5, + booktitle = "Proceedings of the 5th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-V})", + year = 1995, month = may, + organization = IEEECompSoc, + address = "Orcas Island, Washington", + bookurl = "http://www.research.microsoft.com/research/os/HotOs/", +} + +@proceedings{mobicom96, + booktitle = "Proceedings of the 2nd {ACM} International Conference on Mobile Computing and Networking ({MobiCom} '96)", + year = 1996, month = nov, + address = "Rye, New York", + bookurl = "http://www.acm.org/sigmobile/conf/mobicom96/", +} + +@proceedings{usenix02, + booktitle = "Proceedings of the 2002 USENIX Annual Technical Conference (USENIX '02)", + year = 2002, month = jun, + address = "Monterey, California", + bookurl = "http://www.usenix.org/events/usenix02/", +} + +@proceedings{usenix01, + booktitle = "Proceedings of the 2001 USENIX Annual Technical Conference (USENIX '01)", + year = 2001, month = jun, + address = "Boston, Massachusetts", + bookurl = "http://www.usenix.org/events/usenix01/", +} + +@proceedings{mobicom01, + booktitle = "Proceedings of the 7th {ACM} International Conference on Mobile Computing and Networking", + year = 2001, month = jul, + address = "Rome, Italy", + bookurl = "http://www.research.ibm.com/acm_sigmobile_conf_2001/" +} + +@proceedings{mobicom00, + booktitle = "Proceedings of the 6th {ACM} International Conference on Mobile Computing and Networking ({MobiCom} '00)", + year = 2000, month = aug, + address = "Boston, Massachusetts", + bookurl = "http://www.argreenhouse.com/mobicom2000/", +} + +@proceedings{openarch99, + booktitle = "Proceedings of the 2nd {IEEE} Conference on Open Architectures and Network Programming ({OpenArch} '99)", + year = 1999, month = mar, + address = "New York, New York", + bookurl = "http://www.ctr.columbia.edu/comet/activities/openarch99/", +} + +@proceedings{osdi5, + booktitle = "Proceedings of the 5th {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} '02)", + year = 2002, month = dec, + address = "Boston, Massachusetts", +} + +@proceedings{osdi1, + booktitle = "Proceedings of the 1st {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} '94)", + year = 1994, month = nov, + address = "Monterey, California", + bookurl = "http://www2.cs.utah.edu/~lepreau/osdi94/", +} + +@proceedings{osdi4, + booktitle = "Proceedings of the 4th {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} 2000)", + year = 2000, month = oct, + address = "San Diego, California", + bookurl = "http://www.usenix.org/events/osdi2000/", +} + +@proceedings{pldi97, + booktitle = "Proceedings of the {ACM} {SIGPLAN} '97 Conference on Programming Design and Implementation ({PLDI} '97)", + year = 1997, month = jun, + address = "Las Vegas, Nevada", + bookurl = "http://cs-www.bu.edu/pub/pldi97/", +} + +@proceedings{pldi96, + booktitle = "Proceedings of the {ACM} {SIGPLAN} '96 Conference on Programming Design and Implementation ({PLDI} '96)", + year = 1996, month = may, + address = "Philadelphia, Pennsylvania", +} + +@proceedings{popl96, + booktitle = "Proceedings of the 23rd {ACM} {SIGPLAN}-{SIGACT} Symposium on Principles of Programming Languages ({POPL} '96)", + year = 1996, month = jan, + address = "St. Petersburg Beach, Florida", + bookurl = "ftp://parcftp.xerox.com/pub/popl96/popl96.html" +} + +@proceedings{ppopp95, + booktitle = "Proceedings of the 5th {ACM} {SIGPLAN} Symposium on Principles and Practice of Parallel Programming ({PPoPP} '95)", + year = 1995, month = jul, + address = "Santa Barbara, California", + bookurl = "http://www.cs.ucsb.edu/Conferences/PPOPP95/", +} + +@proceedings{sigcomm99, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication", + year = 1999, month = aug, + address = "Cambridge, Massachusetts", + bookurl = "http://www.acm.org/sigcomm/sigcomm99/", +} + +@proceedings{sigcomm96, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '96 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication", + year = 1996, month = aug, + address = "Stanford, California", + bookurl = "http://www.acm.org/sigcomm/sigcomm96/", +} + +@proceedings{sigcommimw01, + booktitle = "Proceedings of the {ACM} {SIGCOMM} Internet Measurement Workshop '01", + year = 2001, month = nov, + address = "San Francisco, California", + bookurl = "http://www.acm.org/sigcomm/measworkshop2001.html" +} + +@proceedings{sigcomm01, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '01 Conference", + year = 2001, month = aug, + address = "San Diego, California", + bookurl = "http://www.acm.org/sigcomm/sigcomm2001/", +} + +@proceedings{iptps02, + booktitle = "Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS)", + year = 2002, month = mar, + address = "Cambridge, MA", + bookurl = "http://www.cs.rice.edu/Conferences/IPTPS02/" +} + +@proceedings{sigops-euro9, + booktitle = "Proceedings of the 9th {ACM} {SIGOPS} {E}uropean workshop: Beyond the {PC}: New Challenges for the Operating System", + year = 2000, month = sep, + address = "Kolding, Denmark", + bookurl = "http://www.diku.dk/ew2000/", +} + +@proceedings{sigops-euro8, + booktitle = "Proceedings of the 8th {ACM} {SIGOPS} {E}uropean workshop: Support for composing distributed applications", + year = 1998, month = sep, + address = "Sintra, Portugal", + bookurl = "http://www.dsg.cs.tcd.ie/~vjcahill/sigops98/", +} + +@proceedings{sigops-euro7, + booktitle = "Proceedings of the 7th {ACM} {SIGOPS} {E}uropean workshop: Systems support for worldwide applications", + year = 1996, month = sep, + address = "Connemara, Ireland", + bookurl = "http://mosquitonet.stanford.edu/sigops96/", +} + +@proceedings{sigops-euro6, + booktitle = "Proceedings of the 6th {ACM} {SIGOPS} {E}uropean workshop: Matching operating systems to application needs", + year = 1994, month = sep, + address = "Dagstuhl Castle, Wadern, Germany", +} + +@proceedings{sosp18, + booktitle = "Proceedings of the 18th " # SOSP # " ({SOSP} '01)", + year = 2001, month = oct, + address = "Chateau Lake Louise, Banff, Canada", + bookurl = "http://www.cs.ucsd.edu/sosp01/", +} + +@proceedings{sosp17, + booktitle = "Proceedings of the 17th " # SOSP # " ({SOSP} '99)", + year = 1999, month = dec, + address = "Kiawah Island, South Carolina", + bookurl = "http://www.diku.dk/sosp99/", +} + +@proceedings{sosp16, + booktitle = "Proceedings of the 16th " # SOSP # " ({SOSP} '97)", + year = 1997, month = oct, + address = "Saint-Mal{\^o}, France", + bookurl = "http://www.cs.washington.edu/sosp16", +} + +@proceedings{sosp15, + booktitle = "Proceedings of the 15th " # SOSP # " ({SOSP} '95)", + year = 1995, month = dec, + address = "Copper Mountain Resort, Colorado", +} + +@proceedings{sosp14, + booktitle = "Proceedings of the 14th " # SOSP # " ({SOSP} '93)", + year = 1993, month = dec, + address = "Asheville, North Carolina", +} + +@proceedings{supercomp96, + booktitle = "Supercomputing '96 Conference Proceedings: The international conference on high performance computing and communications", + organization = ACMabbr, + year = 1996, month = nov, + address = "Pittsburgh, Pennsylvania", + bookurl = "http://www.supercomp.org/sc96/", +} + +@proceedings{usenix97, + booktitle = "Proceedings of the {USENIX} 1997 Annual Technical Conference", + year = 1997, month = jan, + address = "Anaheim, California", + bookurl = "http://www.usenix.org/ana97/", +} + +@proceedings{wcsss96, + booktitle = "Workshop Record of {WCSSS} '96: The Inaugural Workshop on Compiler Support for Systems Software", + organization = "{ACM} {SIGPLAN}", + year = 1996, month = feb, + address = "Tuscon, Arizona", + bookurl = "http://www.cs.arizona.edu/wcsss96/" +} + +@proceedings{wcsss99, + booktitle = "Workshop Record of {WCSSS} '99: The 2nd {ACM} {SIGPLAN} Workshop on Compiler Support for Systems Software", + year = 1999, month = may, + address = "Atlanta, Georgia", + bookurl = "http://www.irisa.fr/compose/wcsss99/" +} + +@proceedings{wmcsa94, + booktitle = "Proceedings of the Workshop on Mobile Computing Systems and Applications ({WMCSA} '94)", + organization = IEEECompSoc, + year = 1994, month = dec, + address = "Santa Cruz, California", +} + +@proceedings{wwos4, + booktitle = "Proceedings of the 4th Workshop on Workstation Operating Systems", + organization = IEEECompSoc, + year = 1993, month = oct, + address = "Napa, California" +} + +@proceedings{www94, + booktitle = "Proceedings of the 2nd International {WWW} Conference: Mosaic and the Web", + year = 1994, month = oct, + address = "Chicago, Illinois", + bookurl = "http://www.ncsa.uiuc.edu/SDG/IT94/IT94Info-old.html", +} + +@proceedings{sec10, + booktitle = "Proceedings of the 10th {USENIX} {S}ecurity {S}ymposium", + year = 2001, month = aug, + address = "Washington, D.C.", + bookurl = "http://www.usenix.org/events/sec01/", +} + + +%% JOURNALS + +@journal{journal:ieee-toc, + journal = IEEEabbr # " Transactions on Computers", +} + +@journal{journal:osr, + journal = "Operating Systems Review", + organization = ACM, +} + +@journal{journal:toplas, + journal = ACMabbr # " Transactions on Programming Languages and Systems", +} + +@journal{journal:tocs, + journal = ACMabbr # " Transactions on Computer Systems", +} + +@journal{journal:winet, + journal = ACMabbr # " Wireless Networks", +} + diff --git a/i2p2www/anonbib/tests.py b/i2p2www/anonbib/tests.py new file mode 100644 index 00000000..3caa1674 --- /dev/null +++ b/i2p2www/anonbib/tests.py @@ -0,0 +1,86 @@ +#!/usr/bin/python2 +# Copyright 2004-2008, Nick Mathewson. See LICENSE for licensing info. + +"""Unit tests for anonbib.""" + +import BibTeX +import metaphone +#import reconcile +#import writeHTML +#import updateCache + +import unittest + +class MetaphoneTests(unittest.TestCase): + def testMetaphone(self): + pass + +class BibTeXTests(unittest.TestCase): + def testTranslation(self): + ut = BibTeX.url_untranslate + self.assertEquals(ut("Fred"),"Fred") + self.assertEquals(ut("Hello, World."), "Hello_2c_20World.") + + te = BibTeX.TeXescapeURL + ute = BibTeX.unTeXescapeURL + self.assertEquals(te("http://example/~me/my_file"), + r"http://example/\{}~me/my\_file") + self.assertEquals(ute(r"http:{}//example/\{}~me/my\_file"), + "http://example/~me/my_file") + + h = BibTeX.htmlize + self.assertEquals(h("Hello, world"), "Hello, world") + self.assertEquals(h(r"\'a\`e\'{i}(\'\i)\"o&\^u"), + "áèí(í)ö&" + "û") + self.assertEquals(h(r"\~n and \c{c}"), "ñ and ç") + self.assertEquals(h(r"\AE---a ligature"), "Æ—a ligature") + self.assertEquals(h(r"{\it 33}"), " 33") + self.assertEquals(h(r"Pages 33--99 or vice--versa?"), + "Pages 33-99 or vice–versa?") + + t = BibTeX.txtize + self.assertEquals(t("Hello, world"), "Hello, world") + self.assertEquals(t(r"\'a\`e\'{i}(\'\i)\"o&\^u"), + "aei(i)o&u") + self.assertEquals(t(r"\~n and \c{c}"), "n and c") + self.assertEquals(t(r"\AE---a ligature"), "AE---a ligature") + self.assertEquals(t(r"{\it 33}"), " 33") + self.assertEquals(t(r"Pages 33--99 or vice--versa?"), + "Pages 33--99 or vice--versa?") + + def authorsParseTo(self,authors,result): + pa = BibTeX.parseAuthor(authors) + self.assertEquals(["|".join(["+".join(item) for item in + [a.first,a.von,a.last,a.jr]]) + for a in pa], + result) + + def testAuthorParsing(self): + pa = BibTeX.parseAuthor + PA = BibTeX.ParsedAuthor + apt = self.authorsParseTo + + apt("Nick A. Mathewson and Roger Dingledine", + ["Nick+A.||Mathewson|", "Roger||Dingledine|"]) + apt("John van Neumann", ["John|van|Neumann|"]) + apt("P. Q. Z. de la Paz", ["P.+Q.+Z.|de+la|Paz|"]) + apt("Cher", ["||Cher|"]) + apt("Smith, Bob", ["Bob||Smith|"]) + apt("de Smith, Bob", ["Bob|de|Smith|"]) + apt("de Smith, Bob Z", ["Bob+Z|de|Smith|"]) + #XXXX Fix this. + #apt("Roberts Smith Wilkins, Bob Z", ["Bob+Z||Smith+Wilkins|"]) + apt("Smith, Jr, Bob", ["Bob||Smith|Jr"]) + + #XXXX Fix this. + #apt("R Jones, Jr.", ["R||Jones|Jr."]) + apt("Smith, Bob and John Smith and Last,First", + ["Bob||Smith|", "John||Smith|", "First||Last|"]) + apt("Bob Smith and John Smith and John Doe", + ["Bob||Smith|", "John||Smith|", "John||Doe|"]) + + +if __name__ == '__main__': + unittest.main() + diff --git a/i2p2www/anonbib/upb.gif b/i2p2www/anonbib/upb.gif new file mode 100644 index 0000000000000000000000000000000000000000..58528283c574e42aea9d54dcd1f82c320fb052bc GIT binary patch literal 555 zcmZ?wbhEHblwgoxIOf36*xsEsVcq`~bHbxyUk3)>e)aX&?{E3@uRVMIeAbSuH*emY zzb@?mIj;W^4C~LlxVACi?bXR&E^ImUF#YkS_L3Razg})S^7iMycF%X8fBbq?eE9a8 zmltdQKEHhW^yx$M6hEzC{m>}<_4=_n7yteHJmvpOmlwMu|9pD!cC|{z(f|K{UHkI# z^og^Vj;N@}diDOfW`F+Loq5~#U%Ps0`GJ~6kNy?=FkifQ@xg-!@4jD|&A@Q6pW*-9 zg1%Fy);CJMefMt1_O-^w#{Y*nQ2ZzAT$GwvlA5AWo>`Ki5R#Fq;O^-gz@Wnb1fWP_ zU@vcQXlib0ZENr7?CS1mWn}E_VC3YSFtKH_gv8Y8O*5sWW>4##&&RiLPS4V1%NKR8 zUbA*(`-Y917WZ+^nkBVt;qJ|?cK!XFtnBQpQ;*nn+MPdq{3PRrvr8_q?wH7UP gH|Nf~`^e$WgL|u3Uq5_w>urlfile, time.strftime("%Y-%m-%d %H:%M:%S", time.localtime()) + if "\n" in url: url = url.replace("\n", " ") + print >>urlfile, url + urlfile.close() + + os.rename(fnameTmp, fname) + +def getURLs(entry): + r = {} + for ftype in FILE_TYPES: + ftype2 = ftype.replace(".", "_") + url = entry.get("www_%s_url"%ftype2) + if url: + r[ftype] = url.strip().replace("\n", " ") + return r + +def getCachedURL(key, ftype, section): + fname = getCacheFname(key, ftype, section) + urlFname = fname+".url" + if not os.path.exists(fname) or not os.path.exists(urlFname): + return None + f = open(urlFname, 'r') + lines = f.readlines() + f.close() + if len(lines) != 2: + print >>sys.stderr, "ERROR: unexpected number of lines in", urlFname + return lines[1].strip() + +def downloadAll(bibtex, missingOnly=0): + """returns list of tuples of key, ftype, url, error""" + errors = [] + for e in bibtex.entries: + urls = getURLs(e) + key = e.key + section = e.get("www_cache_section", ".") + for ftype, url in urls.items(): + if missingOnly: + cachedURL = getCachedURL(key, ftype, section) + if cachedURL == url: + print >>sys.stderr,"Skipping",url + continue + elif cachedURL is not None: + print >>sys.stderr,"URL for %s.%s has changed"%(key,ftype) + else: + print >>sys.stderr,"I have no copy of %s.%s"%(key,ftype) + try: + downloadFile(key, ftype, section, url) + print "Downloaded",url + except UIError, e: + print >>sys.stderr, str(e) + errors.append((key,ftype,url,str(e))) + except (IOError, socket.error), e: + msg = "Error downloading %s: %s"%(url,str(e)) + print >>sys.stderr, msg + errors.append((key,ftype,url,msg)) + if urls.has_key("ps") and not urls.has_key("ps.gz"): + # Say, this is something we'd like to have gzipped locally. + psFname = getCacheFname(key, "ps", section) + psGzFname = getCacheFname(key, "ps.gz", section) + if os.path.exists(psFname) and not os.path.exists(psGzFname): + # This is something we haven't gzipped yet. + print "Compressing a copy of",psFname + outf = gzip.GzipFile(psGzFname, "wb") + inf = open(psFname, "rb") + while 1: + s = inf.read(4096) + if not s: + break + outf.write(s) + outf.close() + inf.close() + + return errors + +if __name__ == '__main__': + if len(sys.argv) == 2: + print "Loading from %s"%sys.argv[1] + else: + print >>sys.stderr, "Expected a single configuration file as an argument" + sys.exit(1) + config.load(sys.argv[1]) + + if config.CACHE_UMASK != None: + os.umask(config.CACHE_UMASK) + + bib = BibTeX.parseFile(config.MASTER_BIB) + downloadAll(bib,missingOnly=1) diff --git a/i2p2www/anonbib/ups.gif b/i2p2www/anonbib/ups.gif new file mode 100644 index 0000000000000000000000000000000000000000..36f01245aaaf9ac98bb89270f4d9a915ef7a0fba GIT binary patch literal 536 zcmZ?wbhEHblwgoxIOfRE*xsEsVcq`~bHbxyUk3)>e)aX&?{E3@uRVMIeAbSuH*emY zzb@?mIj;W^4C~LlxVACi?bXR&E^ImUF#YkS_L3Razg})S^7iMycF%X8fBbq?eE9a8 zmltdQKEHhW^yx$M6hEzC{m>}<_4=_n7yteHJmvpOmlwMu|9pD!cC|{z(f|K{UHkI# z^og^Vj;N@}diDOfW`F+Loq5~#U%Ps0`GJ~6kNy?=FkifQ@xg-!@4jD|&A@Q6pW*-9 zg1%Fy);CJMefMt1_O-^w#{d8SXBf&r@t>%3QEFmIYKlU6W=V!ZNJgrHyQgmegAT}7 zph#k1Pib&yYHn$5Ywzgn>h9_7>+fb{oY2b1$vJt7!!!wr8B^v+NzI$tyO57>@%*0U zD^@O9!@7x+ot<+N>(b6i(^$8%&Y09=cZ6{t`_3bF{m1t2>N|Vl{IVT8XYJWD>(r@P OckkVQ@UX3s!5RQH3dI)y literal 0 HcmV?d00001 diff --git a/i2p2www/anonbib/venue-checklist.txt b/i2p2www/anonbib/venue-checklist.txt new file mode 100644 index 00000000..139a223a --- /dev/null +++ b/i2p2www/anonbib/venue-checklist.txt @@ -0,0 +1,41 @@ +This file is to keep track of which volumes of which publications have +been combed for anonymity papers and which we still have to add. + +=== DONE: + +ExampleConference (through 2008) + +PETS 2000-2003 + +=== CLAIMED: + +PETS 2000-2010 -- Nick (claimed 6/16) +ESORICS 1990-2010 -- Nick (claimed 6/16) +CCS -- George (claimed 6/17) +USENIX Security ("Oakland") -- George (claimed 6/17) + +=== SHOULD DO: + +Infohiding +IEEE Security and privacy +NDSS +WPES +WEIS +Financial Crypto +Eurocrypt +Asiacrypt + +Search: Papers that cite Chaum's paper +Search: Papers that cite the Tor paper +Search: Papers that cite the original onion routing papers +Search: Papers mentioning "anonymity" or "anonymous" +Search: Papers mentioning "mixnet" or "mix-net" + +=== UNDERSERVED CONTENT; PLEASE SUGGEST SEARCHES AND VENUES + +Private information retrieval; PIR +Anti-censorship; censorship +Location privacy +Anonymous credentials +Anonymizing data +Secure multiparty computation diff --git a/i2p2www/anonbib/writeHTML.py b/i2p2www/anonbib/writeHTML.py new file mode 100755 index 00000000..19a7c146 --- /dev/null +++ b/i2p2www/anonbib/writeHTML.py @@ -0,0 +1,246 @@ +#!/usr/bin/python +# Copyright 2003-2008, Nick Mathewson. See LICENSE for licensing info. + +"""Generate indices by author, topic, date, and BibTeX key.""" + +import sys +import re +import os +import json + +assert sys.version_info[:3] >= (2,2,0) +os.umask(022) + +import BibTeX +import config + +def getTemplate(name): + f = open(name) + template = f.read() + f.close() + template_s, template_e = template.split("%(entries)s") + return template_s, template_e + +def pathLength(s): + n = 0 + while s: + parent, leaf = os.path.split(s) + if leaf != '' and leaf != '.': + n += 1 + s = parent + return n + +def writeBody(f, sections, section_urls, cache_path, base_url): + '''f: an open file + sections: list of (sectionname, [list of BibTeXEntry]) + section_urls: map from sectionname to external url''' + for s, entries in sections: + u = section_urls.get(s) + sDisp = re.sub(r'\s+', ' ', s.strip()) + sDisp = sDisp.replace(" ", " ") + if u: + print >>f, ('
  • %s

    '%( + (BibTeX.url_untranslate(s), u, sDisp))) + else: + print >>f, ('
  • %s

    '%( + BibTeX.url_untranslate(s),sDisp)) + print >>f, "
      " + for e in entries: + print >>f, e.to_html(cache_path=cache_path, base_url=base_url) + print >>f, "
  • " + +def writeHTML(f, sections, sectionType, fieldName, choices, + tag, config, cache_url_path, section_urls={}): + """sections: list of (sectionname, [list of BibTeXEntry])''' + sectionType: str + fieldName: str + choices: list of (choice, url)""" + + title = config.TAG_TITLES[tag] + short_title = config.TAG_SHORT_TITLES[tag] + # + secStr = [] + for s, _ in sections: + hts = re.sub(r'\s+', ' ', s.strip()) + hts = s.replace(" ", " ") + secStr.append("

    %s

    \n"% + ((BibTeX.url_untranslate(s),hts))) + secStr = "".join(secStr) + + # + tagListStr = [] + st = config.TAG_SHORT_TITLES.keys() + st.sort() + root = "../"*pathLength(config.TAG_DIRECTORIES[tag]) + if root == "": root = "." + for t in st: + name = config.TAG_SHORT_TITLES[t] + if t == tag: + tagListStr.append(name) + else: + url = BibTeX.smartJoin(root, config.TAG_DIRECTORIES[t], "date.html") + tagListStr.append("%s"%(url, name)) + tagListStr = " | ".join(tagListStr) + + # + choiceStr = [] + for choice, url in choices: + if url: + choiceStr.append("%s"%(url, choice)) + else: + choiceStr.append(choice) + + choiceStr = (" | ".join(choiceStr)) + + fields = { 'command_line' : "", + 'sectiontypes' : sectionType, + 'choices' : choiceStr, + 'field': fieldName, + 'sections' : secStr, + 'otherbibs' : tagListStr, + 'title': title, + 'short_title': short_title, + "root" : root, + } + + header, footer = getTemplate(config.TEMPLATE_FILE) + print >>f, header%fields + writeBody(f, sections, section_urls, cache_path=cache_url_path, + base_url=root) + print >>f, footer%fields + +def jsonDumper(obj): + if isinstance(obj, BibTeX.BibTeXEntry): + e = obj.entries.copy() + e['key'] = obj.key + return e + else: + raise TypeError("Do not know how to serialize %s"%(obj.__class,)) + +def writePageSet(config, bib, tag): + if tag: + bib_entries = [ b for b in bib.entries + if tag in b.get('www_tags', "").split() ] + else: + bib_entries = bib.entries[:] + + if not bib_entries: + print >>sys.stderr, "No entries with tag %r; skipping"%tag + return + + tagdir = config.TAG_DIRECTORIES[tag] + outdir = os.path.join(config.OUTPUT_DIR, tagdir) + cache_url_path = BibTeX.smartJoin("../"*pathLength(tagdir), + config.CACHE_DIR) + if not os.path.exists(outdir): + os.makedirs(outdir, 0755) + ##### Sorted views: + + ## By topic. + + entries = BibTeX.sortEntriesBy(bib_entries, "www_section", "ZZZZZZZZZZZZZZ") + entries = BibTeX.splitSortedEntriesBy(entries, "www_section") + if entries[-1][0].startswith(""): + entries[-1] = ("Miscellaneous", entries[-1][1]) + + entries = [ (s, BibTeX.sortEntriesByDate(ents)) + for s, ents in entries + ] + + f = open(os.path.join(outdir,"topic.html"), 'w') + writeHTML(f, entries, "Topics", "topic", + (("By topic", None), + ("By date", "./date.html"), + ("By author", "./author.html") + ), + tag=tag, config=config, + cache_url_path=cache_url_path) + f.close() + + ## By date. + + entries = BibTeX.sortEntriesByDate(bib_entries) + entries = BibTeX.splitSortedEntriesBy(entries, 'year') + for idx in -1, -2: + if entries[idx][0].startswith(""): + entries[idx] = ("Unknown", entries[idx][1]) + elif entries[idx][0].startswith("forthcoming"): + entries[idx] = ("Forthcoming", entries[idx][1]) + sections = [ ent[0] for ent in entries ] + + first_year = int(entries[0][1][0]['year']) + try: + last_year = int(entries[-1][1][0].get('year')) + except ValueError: + last_year = int(entries[-2][1][0].get('year')) + + years = map(str, range(first_year, last_year+1)) + if entries[-1][0] == 'Unknown': + years.append("Unknown") + + f = open(os.path.join(outdir,"date.html"), 'w') + writeHTML(f, entries, "Years", "date", + (("By topic", "./topic.html"), + ("By date", None), + ("By author", "./author.html") + ), + tag=tag, config=config, + cache_url_path=cache_url_path) + f.close() + + ## By author + entries, url_map = BibTeX.splitEntriesByAuthor(bib_entries) + + f = open(os.path.join(outdir,"author.html"), 'w') + writeHTML(f, entries, "Authors", "author", + (("By topic", "./topic.html"), + ("By date", "./date.html"), + ("By author", None), + ), + tag=tag, config=config, + cache_url_path=cache_url_path, + section_urls=url_map) + f.close() + + ## The big BibTeX file + + entries = bib_entries[:] + entries = [ (ent.key, ent) for ent in entries ] + entries.sort() + entries = [ ent[1] for ent in entries ] + + ## Finding the root directory is done by writeHTML(), but + ## the BibTeX file doesn't use that, so repeat the code here + root = "../"*pathLength(config.TAG_DIRECTORIES[tag]) + if root == "": root = "." + + header,footer = getTemplate(config.BIBTEX_TEMPLATE_FILE) + f = open(os.path.join(outdir,"bibtex.html"), 'w') + print >>f, header % { 'command_line' : "", + 'title': config.TAG_TITLES[tag], + 'root': root } + for ent in entries: + print >>f, ( + ("%s" + "
    %s
    ") + %(BibTeX.url_untranslate(ent.key), ent.key, ent.format(90,8,1))) + print >>f, footer + f.close() + + f = open(os.path.join(outdir,"bibtex.json"), 'w') + json.dump(entries, f, default=jsonDumper) + f.close() + + +if __name__ == '__main__': + if len(sys.argv) == 2: + print "Loading from %s"%sys.argv[1] + else: + print >>sys.stderr, "Expected a single configuration file as an argument" + sys.exit(1) + config.load(sys.argv[1]) + + bib = BibTeX.parseFile(config.MASTER_BIB) + + for tag in config.TAG_DIRECTORIES.keys(): + writePageSet(config, bib, tag)