diff options
author | Paul Syverson <syverson@itd.nrl.navy.mil> | 2003-11-01 22:34:23 +0000 |
---|---|---|
committer | Paul Syverson <syverson@itd.nrl.navy.mil> | 2003-11-01 22:34:23 +0000 |
commit | 2b39ec4f2ee88d63ee77f4a776822e779c43c663 (patch) | |
tree | a969b3fbe89c494a7a3b26a745991941467fc7da /doc/tor-design.bib | |
parent | 272cf1b3fbb18fe93f722fd28a864d7625ff6c9d (diff) | |
download | tor-2b39ec4f2ee88d63ee77f4a776822e779c43c663.tar tor-2b39ec4f2ee88d63ee77f4a776822e779c43c663.tar.gz |
Hack. Hack. Mostly on analysis and attacks. Third commit try's a charm?
svn:r707
Diffstat (limited to 'doc/tor-design.bib')
-rw-r--r-- | doc/tor-design.bib | 21 |
1 files changed, 20 insertions, 1 deletions
diff --git a/doc/tor-design.bib b/doc/tor-design.bib index cd6e51b5b..2fea27baa 100644 --- a/doc/tor-design.bib +++ b/doc/tor-design.bib @@ -1,4 +1,12 @@ - +@article{ meadows96, + author = "Catherine Meadows", + title = "The {NRL} Protocol Analyzer: An Overview", + journal = "Journal of Logic Programming", + volume = "26", + number = "2", + pages = "113--131", + year = "1996", +} @inproceedings{kesdogan:pet2002, title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?}, @@ -260,6 +268,17 @@ publisher = {Springer-Verlag, LNCS 2482} } + +@InProceedings{hintz-pet02, + author = {Andrew Hintz}, + title = {Fingerprinting Websites Using Traffic Analysis}, + booktitle = {Privacy Enhancing Technologies (PET 2002)}, + pages = {171--178}, + year = 2002, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482} +} + @InProceedings{or-discex00, author = {Paul Syverson and Michael Reed and David Goldschlag}, title = {{O}nion {R}outing Access Configurations}, |