HomeSchedule Papers List

Feel free to suggest other worthwhile and related papers not on this page.

Anonymity via Dining Cryptographers

Clay Shields , Brian Neil Levine, A protocol for anonymous communication over the Internet, Proc. of CCS, November, 2000, Athens, Greece [PDF]

D Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability  - Journal of Cryptology, (1988) 1:65-75 [PDF]

P. Golle and A. Juels. Dining Cryptographers Revisited. Eurocrypt 2004, pp. 456-473. Springer-Verlag, 2004. [PDF]

Anonymity via Mixes

Roger Dingledine, Nick Mathewson, and Paul Syverson, Tor: The Second-Generation Onion Router. In the Proceedings of the 13th USENIX Security Symposium, August 2004. [PDF]

Michael J. Freedman and Robert Morris, Tarzan: A Peer-to-Peer Anonymizing Network Layer. ACM CCS, November 2002. [PDF]

Roger Dingledine, Nick Mathewson, and Paul Syverson. Reputation in P2P Anonymity Systems, P2PEcon, June 2003. [PDF

Li Zhuang, Feng Zhou, Ben Y. Zhao and Antony Rowstron, Cashmere: Resilient Anonymous Routing, NSDI, May 2005. [PDF]

Xinyuan Wang, Shiping Chen, and Sushil Jajodia. Tracking anonymous peer-to-peer VoIP calls on the internet, ACM CCS, November 2005. [PDF]

Ginger Perng, Michael K. Reiter, and Chenxi Wang. M2: Multicasting Mixes for Efficient and Anonymous Communication, ICDCS, July 2006. [PDF]

Jinsong Han and Yunhao Liu. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems, ICNP, November 2006. [PDF]

Steganographic Communication and Storage

Steven Hand, Timothy Roscoe, Mnemosyne: Peer-to-Peer Steganographic Storage. IPTPS, 2002. [PDF]

Niels Provos, Peter Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security and Privacy, 2003. [PDF]

Ross Anderson, Roger Needham and Adi Shamir, The steganographic file system. International Workshop on Information Hiding 1998.

HweeHwa pang, Kian-Lee Tan and Xuan Zhou, StegFS: A Steganographic File System. ICDE 2003.

Quantifying Anonymity

Claudia Diaz, Stefaan Seys, Joris Claessens and Bart Preneel, Towards measuring anonymity, Proc. of Privacy-Enhancing Technologies (PET), 2002. [PDF}

Andrei Serjantov and George Danezis, Towards an Information Theoretic Metric for Anonymity, Proc. of Privacy-Enhancing Technologies (PET), 2002. [PDF]

Censor-resistant Publications

Marc Waldman and David Mazières, Tangler: A Censorship Resistant Publishing System Based On Document Entanglements, Proc. of CCS 2001. [PDF]

Marc Waldman, Aviel D. Rubin and Lorrie Faith Cranor, Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System, Usenix Security, 2000. [PDF]

Privacy-Preserving Storage Systems

Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, and Anthony Tomasic, Simultaneous Scalability and Security for Data-Intensive Web Applications, SIGMOD, 2006.  [PDF]

Amit Manjhi, Phillip B. Gibbons, Anastassia Ailamaki, Charles Garrod, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic, and Haifeng Yu, Invalidation Clues for Database Scalability Services, ICDE, 2007.  [PDF]

Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy, VLDB 2006. [PDF]

Chi-Yin Chow, Mohamed Mokbel. Enabling Private Continuous Queries For Revealed User Locations, SSTD, July 2007. [PDF]

Lea Kissner and Dawn Song. Privacy Preserving Set Operations, CRYPTO, Aug 2005. [PDF]