aboutsummaryrefslogtreecommitdiff
path: root/doc/tor-design.bib
diff options
context:
space:
mode:
authorPaul Syverson <syverson@itd.nrl.navy.mil>2003-11-01 22:34:23 +0000
committerPaul Syverson <syverson@itd.nrl.navy.mil>2003-11-01 22:34:23 +0000
commit2b39ec4f2ee88d63ee77f4a776822e779c43c663 (patch)
treea969b3fbe89c494a7a3b26a745991941467fc7da /doc/tor-design.bib
parent272cf1b3fbb18fe93f722fd28a864d7625ff6c9d (diff)
downloadtor-2b39ec4f2ee88d63ee77f4a776822e779c43c663.tar
tor-2b39ec4f2ee88d63ee77f4a776822e779c43c663.tar.gz
Hack. Hack. Mostly on analysis and attacks. Third commit try's a charm?
svn:r707
Diffstat (limited to 'doc/tor-design.bib')
-rw-r--r--doc/tor-design.bib21
1 files changed, 20 insertions, 1 deletions
diff --git a/doc/tor-design.bib b/doc/tor-design.bib
index cd6e51b5b..2fea27baa 100644
--- a/doc/tor-design.bib
+++ b/doc/tor-design.bib
@@ -1,4 +1,12 @@
-
+@article{ meadows96,
+ author = "Catherine Meadows",
+ title = "The {NRL} Protocol Analyzer: An Overview",
+ journal = "Journal of Logic Programming",
+ volume = "26",
+ number = "2",
+ pages = "113--131",
+ year = "1996",
+}
@inproceedings{kesdogan:pet2002,
title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an
alternative to the MIX based Approach?},
@@ -260,6 +268,17 @@
publisher = {Springer-Verlag, LNCS 2482}
}
+
+@InProceedings{hintz-pet02,
+ author = {Andrew Hintz},
+ title = {Fingerprinting Websites Using Traffic Analysis},
+ booktitle = {Privacy Enhancing Technologies (PET 2002)},
+ pages = {171--178},
+ year = 2002,
+ editor = {Roger Dingledine and Paul Syverson},
+ publisher = {Springer-Verlag, LNCS 2482}
+}
+
@InProceedings{or-discex00,
author = {Paul Syverson and Michael Reed and David Goldschlag},
title = {{O}nion {R}outing Access Configurations},