2 September 2013
Tor Naval Research Laboratory Publications
Links go to the NRL web site.
http://www.nrl.navy.mil/itd/chacs/publications
Selections on Onion Routing, Tor, Online Privacy and a few others.
2013
Jansen, R.,
A. Johnson, and
P. Syverson,
"LIRA:
Lightweight Incentivized Routing for Anonymity", 20th Annual
Network & Distributed System Security Symposium (NDSS '13), 2013.
Syta, E.,
A. Johnson,
H. Corrigan-Gibbs,
S-C. Weng,
D. Wolinsky, and
B. Ford,
"Security
Analysis of Accountable Anonymous Group Communication in Dissent",
Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013.
2012
Jansen, R.,
K. Bauer,
N. Hopper, and
R. Dingledine,
"Methodically
Modeling the Tor Network", Workshop on Cyber Security
Experimentation and Test (CSET), 2012.
Feigenbaum, J.,
A. Johnson, and
P. Syverson,
"Probabilistic
Analysis of Onion Routing in a Black-box Model", ACM Transactions
on Information and System Security (TISSEC), vol. 15, issue 3, 2012.
Wolinsky, D. Isaac,
H. Corrigan-Gibbs,
B. Ford, and
A. Johnson,
"Strong,
Scalable Anonymity in Dissent", Tenth USENIX Symposium on
Operating Systems Design and Implementation (OSDI '12), 2012.
Feigenbaum, J.,
A. Johnson, and
P. Syverson,
"A
Model of Onion Routing with Provable Anonymity", Financial
Cryptography and Data Security, 11th International Conference, FC 2007,
2007.
Feigenbaum, J.,
A. Johnson, and
P. Syverson,
"Probabilistic
Analysis of Onion Routing in a Black-box Model [Extended Abstract]",
WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic
Society: ACM Press, pp. 1-10, 2007.
2006
Overlier, L., and
P. Syverson,
"Locating
Hidden Servers", IEEE Symposium on Security and Privacy,
Oakland, California, IEEE Computer Society Press, 2006.
Overlier, L., and
P. Syverson,
"Valet
Services: Improving Hidden Servers with a Personal Touch",
Privacy Enhancing Technologies Workshop, 2006.
Moskowitz, I. S., and
R. Newman,
"Multiple
Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona,
2005.
Kang, M.,
I. S. Moskowitz, and
S. Chincheck,
"The
Pump: A Decade of Covert Fun", 21st Annual Computer Security
Applications Conference, 2005.
2004
Newman, R.,
V. R. Nalla, and
I. S. Moskowitz,
"Anonymity
and Covert Channels in Simple Timed Mix-firewalls",
PET2004, Toronto, Canada, 2004.
"Covert
Channels and Simple Timed Mix-firewalls", NRL Memorandum
Report, 2004.
Dingledine, R.,
V. Shmatikov, and
P. Syverson,
"Synchronous
Batching: From Cascades to Free Routes", Privacy Enhancing
Technologies workshop (PET 2004), 2004.
Dingledine, R.,
N. Mathewson, and
P. Syverson,
"Tor:
The Second-Generation Onion Router", 13th USENIX Security
Symposium, 2004.
Shostack, A., and
P. Syverson,
"What
Price Privacy? (and why identity theft is about neither identity nor
theft)", Economics of Information Security: Kluwer Academic
Publishers, pp. 129-142, 2004.
2003
Moskowitz, I. S.,
R. Newman,
A. R. Miller, and
D. P. Crepeau,
"Covert
Channels and Anonymizing Networks", WPES'03, Washington,
D.C., 2003.
"A
Detailed Mathematical Analysis of a Class of Covert Channels Arising in Certain
Anonymizing Networks", NRL Memorandum Report, no.
NRL/MR/5540--03-8691, 2003.
Newman, R.,
I. S. Moskowitz,
P. Syverson, and
A. Serjantov,
"Metrics
for Traffic Analysis Prevention", PET 2003 Workshop on Privacy
Enhancing Technologies, Dresden, Germany, 2003.
Syverson, P.,
"The
Paradoxical Value of Privacy", 2nd Annual Workshop on Economics
and Information Security (WEIS 2003), College Park, Maryland, 2003.
"Privacy-preserving
Collaborative Data Mining", ICDM Foundation and New Directions
of Data Mining workshop, pp. 228-235, 2003.
Moskowitz, I. S.,
R. Newman, and
P. Syverson,
"Quasi-Anonymous
Channels", CNIS 2003, New York City, New York, 2003.
2002
Serjantov, A.,
R. Dingledine, and
P. Syverson,
"From
a Trickle to a Flood: Active Attacks on Several Mix Types",
Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002.
"Issues
in Information Hiding Transform Techniques", NRL Memorandum
Report, no. 5540-02-8621, 2002.
Dingledine, R., and
P. Syverson,
"Reliable
MIX Cascade Networks through Reputation", Financial Cryptography
2002, 2002.
Dingledine, R.,
N. Mathewson, and
P. Syverson,
"Reputation
in Privacy Enhancing Technologies", Computer, Freedom, and
Privacy, 2002.
2001
2000
Stubblebine, S., and
P. Syverson,
"Authentic
Attributes with Fine-Grained Anonymity Protection", Financial
Cryptography, 2000.
"Network
Pump (NP) Security Target", NRL Memorandum Report, no.
5540-00-8459, 2000.
Syverson, P.,
M. Reed, and
D. Goldschlag,
"Onion
Routing Access Configurations", DISCEX 2000: Proceedings of
the DARPA Information Survivability Conference and Exposition, vol. 1,
Hilton Head, South Carolina, IEEE Computer Society Press, pp. 34-40, 2000.
Syverson, P.,
G. Tsudik,
M. Reed, and
C. Landwehr,
"Towards
an Analysis of Onion Routing Security", Workshop on Design
Issues in Anonymity and Unobservability, Berkeley, California, 2000.
1993-1999
|