datenschleuder97/artikel/torbridges.bib
2013-07-23 01:25:07 +02:00

119 lines
3.4 KiB
BibTeX
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@online{enemies,
author = {Radack, Jesselyn {and} Drake, Thomas {and} Binney, William},
title = {Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime.},
url = {https://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html},
date = {2012-12-27}
}
@inproceedings{wright2008spot,
title={Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations},
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on},
pages={35--49},
year={2008},
organization={IEEE}
}
@article{wright2010uncovering,
title={Uncovering spoken phrases in encrypted voice over IP conversations},
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
journal={ACM Transactions on Information and System Security (TISSEC)},
volume={13},
number={4},
pages={35},
year={2010},
publisher={ACM}
}
@online{herman2010contemporary,
author={Herrmann, D.},
title={Contemporary Profiling of Web Users},
subtitle={On Using Anonymizers and Still Get Fucked},
url={https://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html},
date={2012-12-27}
}
@article{chaum1981untraceable,
title={Untraceable electronic mail, return addresses, and digital pseudonyms},
author={Chaum, David L},
journal={Communications of the ACM},
volume={24},
number={2},
pages={84--90},
year={1981},
publisher={ACM}
}
@online{ritter2913remailer,
title={What is a Remailer?},
author={Tom Ritter},
date={2013-01},
url={https://crypto.is/blog/}
}
@inproceedings{goldschlag1996hiding,
title={Hiding routing information},
author={Goldschlag, David M and Reed, Michael G and Syverson, Paul F},
booktitle={Information Hiding},
pages={137--150},
year={1996},
organization={Springer}
}
@article{fu2009one,
title={One cell is enough to break tors anonymity},
author={Fu, Xinwen and Ling, Zhen and Luo, J and Yu, W and Jia, W and Zhao, W},
journal={Proc. Black Hat DC},
year={2009}
}
@inproceedings{dingledine2006anonymity,
title={Anonymity Loves Company: Usability and the Network Effect.},
author={Dingledine, Roger and Mathewson, Nick},
booktitle={WEIS},
year={2006}
}
@inproceedings{dingledine2006blending,
title={Blending different latency traffic with alpha-mixing},
author={Dingledine, Roger and Serjantov, Andrei and Syverson, Paul},
booktitle={Privacy Enhancing Technologies},
pages={245--257},
year={2006},
organization={Springer}
}
@online{Matthewson2012changes,
title={Top changes in Tor since the 2004 design paper (Part 1)},
author={Matthewson, N},
date={2012-10},
url={https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-1}
}
@online{unknown,
title={Tor: Volunteer},
author={unknown},
date={},
url={https://www.torproject.org/getinvolved/volunteer.html.en}
}
@misc{applebaum2012Tor,
title={The Tor Software Ecosystem},
author={Applebaum, Jacob and Dingledine, Roger},
addendum={29c3, Chaos Communication Congress},
date={2012-12-28},
url={https://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html}
}
@online{Wilde2012Knockin,
title={Knock Knock Knockin' on Bridges' Doors},
author={Wilde, T.},
date={2012-01},
url={https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors}
}