datenschleuder98/artikel/torbridges.bib

119 lines
3.4 KiB
BibTeX
Raw Normal View History

2017-02-20 20:47:33 +01:00
@online{enemies,
author = {Radack, Jesselyn {and} Drake, Thomas {and} Binney, William},
title = {Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime.},
url = {https://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html},
date = {2012-12-27}
}
@inproceedings{wright2008spot,
title={Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations},
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on},
pages={35--49},
year={2008},
organization={IEEE}
}
@article{wright2010uncovering,
title={Uncovering spoken phrases in encrypted voice over IP conversations},
author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M},
journal={ACM Transactions on Information and System Security (TISSEC)},
volume={13},
number={4},
pages={35},
year={2010},
publisher={ACM}
}
@online{herman2010contemporary,
author={Herrmann, D.},
title={Contemporary Profiling of Web Users},
subtitle={On Using Anonymizers and Still Get Fucked},
url={https://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html},
date={2012-12-27}
}
@article{chaum1981untraceable,
title={Untraceable electronic mail, return addresses, and digital pseudonyms},
author={Chaum, David L},
journal={Communications of the ACM},
volume={24},
number={2},
pages={84--90},
year={1981},
publisher={ACM}
}
@online{ritter2913remailer,
title={What is a Remailer?},
author={Tom Ritter},
date={2013-01},
url={https://crypto.is/blog/}
}
@inproceedings{goldschlag1996hiding,
title={Hiding routing information},
author={Goldschlag, David M and Reed, Michael G and Syverson, Paul F},
booktitle={Information Hiding},
pages={137--150},
year={1996},
organization={Springer}
}
@article{fu2009one,
title={One cell is enough to break tors anonymity},
author={Fu, Xinwen and Ling, Zhen and Luo, J and Yu, W and Jia, W and Zhao, W},
journal={Proc. Black Hat DC},
year={2009}
}
@inproceedings{dingledine2006anonymity,
title={Anonymity Loves Company: Usability and the Network Effect.},
author={Dingledine, Roger and Mathewson, Nick},
booktitle={WEIS},
year={2006}
}
@inproceedings{dingledine2006blending,
title={Blending different latency traffic with alpha-mixing},
author={Dingledine, Roger and Serjantov, Andrei and Syverson, Paul},
booktitle={Privacy Enhancing Technologies},
pages={245--257},
year={2006},
organization={Springer}
}
@online{Matthewson2012changes,
title={Top changes in Tor since the 2004 design paper (Part 1)},
author={Matthewson, N},
date={2012-10},
url={https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-1}
}
@online{unknown,
title={Tor: Volunteer},
author={unknown},
date={},
url={https://www.torproject.org/getinvolved/volunteer.html.en}
}
@misc{applebaum2012Tor,
title={The Tor Software Ecosystem},
author={Applebaum, Jacob and Dingledine, Roger},
addendum={29c3, Chaos Communication Congress},
date={2012-12-28},
url={https://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html}
}
@online{Wilde2012Knockin,
title={Knock Knock Knockin' on Bridges' Doors},
author={Wilde, T.},
date={2012-01},
url={https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors}
}