119 lines
3.4 KiB
BibTeX
119 lines
3.4 KiB
BibTeX
@online{enemies,
|
||
author = {Radack, Jesselyn {and} Drake, Thomas {and} Binney, William},
|
||
title = {Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime.},
|
||
url = {https://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html},
|
||
date = {2012-12-27}
|
||
}
|
||
|
||
@inproceedings{wright2008spot,
|
||
title={Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations},
|
||
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
|
||
booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on},
|
||
pages={35--49},
|
||
year={2008},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@article{wright2010uncovering,
|
||
title={Uncovering spoken phrases in encrypted voice over IP conversations},
|
||
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
|
||
journal={ACM Transactions on Information and System Security (TISSEC)},
|
||
volume={13},
|
||
number={4},
|
||
pages={35},
|
||
year={2010},
|
||
publisher={ACM}
|
||
}
|
||
|
||
@online{herman2010contemporary,
|
||
author={Herrmann, D.},
|
||
title={Contemporary Profiling of Web Users},
|
||
subtitle={On Using Anonymizers and Still Get Fucked},
|
||
url={https://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html},
|
||
date={2012-12-27}
|
||
}
|
||
|
||
@article{chaum1981untraceable,
|
||
title={Untraceable electronic mail, return addresses, and digital pseudonyms},
|
||
author={Chaum, David L},
|
||
journal={Communications of the ACM},
|
||
volume={24},
|
||
number={2},
|
||
pages={84--90},
|
||
year={1981},
|
||
publisher={ACM}
|
||
}
|
||
|
||
@online{ritter2913remailer,
|
||
title={What is a Remailer?},
|
||
author={Tom Ritter},
|
||
date={2013-01},
|
||
url={https://crypto.is/blog/}
|
||
}
|
||
|
||
@inproceedings{goldschlag1996hiding,
|
||
title={Hiding routing information},
|
||
author={Goldschlag, David M and Reed, Michael G and Syverson, Paul F},
|
||
booktitle={Information Hiding},
|
||
pages={137--150},
|
||
year={1996},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{fu2009one,
|
||
title={One cell is enough to break tor’s anonymity},
|
||
author={Fu, Xinwen and Ling, Zhen and Luo, J and Yu, W and Jia, W and Zhao, W},
|
||
journal={Proc. Black Hat DC},
|
||
year={2009}
|
||
}
|
||
|
||
@inproceedings{dingledine2006anonymity,
|
||
title={Anonymity Loves Company: Usability and the Network Effect.},
|
||
author={Dingledine, Roger and Mathewson, Nick},
|
||
booktitle={WEIS},
|
||
year={2006}
|
||
}
|
||
|
||
|
||
@inproceedings{dingledine2006blending,
|
||
title={Blending different latency traffic with alpha-mixing},
|
||
author={Dingledine, Roger and Serjantov, Andrei and Syverson, Paul},
|
||
booktitle={Privacy Enhancing Technologies},
|
||
pages={245--257},
|
||
year={2006},
|
||
organization={Springer}
|
||
}
|
||
|
||
@online{Matthewson2012changes,
|
||
title={Top changes in Tor since the 2004 design paper (Part 1)},
|
||
author={Matthewson, N},
|
||
date={2012-10},
|
||
url={https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-1}
|
||
}
|
||
|
||
@online{unknown,
|
||
title={Tor: Volunteer},
|
||
author={unknown},
|
||
date={},
|
||
url={https://www.torproject.org/getinvolved/volunteer.html.en}
|
||
}
|
||
|
||
@misc{applebaum2012Tor,
|
||
title={The Tor Software Ecosystem},
|
||
author={Applebaum, Jacob and Dingledine, Roger},
|
||
addendum={29c3, Chaos Communication Congress},
|
||
date={2012-12-28},
|
||
url={https://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html}
|
||
}
|
||
|
||
@online{Wilde2012Knockin,
|
||
title={Knock Knock Knockin' on Bridges' Doors},
|
||
author={Wilde, T.},
|
||
date={2012-01},
|
||
url={https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors}
|
||
}
|
||
|
||
|
||
|
||
|