diff options
author | Roger Dingledine <arma@torproject.org> | 2006-10-23 03:21:54 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-10-23 03:21:54 +0000 |
commit | 63a1811cdac19255faf37e5386fde867e9a20616 (patch) | |
tree | 4463f74efd58c95808f419f83586e48a7348d254 /doc/design-paper/tor-design.bib | |
parent | 7bda254bdae6f1c01354e1bbd1949792197bb31f (diff) | |
download | tor-63a1811cdac19255faf37e5386fde867e9a20616.tar.gz tor-63a1811cdac19255faf37e5386fde867e9a20616.zip |
Explain why tor is well-suited for the relay component of a
blocking-resistant anonymity system.
Talk through how other proxy designs work and what we can reuse
from their ideas.
Still much work remaining.
svn:r8792
Diffstat (limited to 'doc/design-paper/tor-design.bib')
-rw-r--r-- | doc/design-paper/tor-design.bib | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/doc/design-paper/tor-design.bib b/doc/design-paper/tor-design.bib index c8dad072cc..1c9064bbb2 100644 --- a/doc/design-paper/tor-design.bib +++ b/doc/design-paper/tor-design.bib @@ -1212,6 +1212,19 @@ publisher = {O'Reilly Media}, } +@inproceedings{usability:weis2006, + title = {Anonymity Loves Company: Usability and the Network Effect}, + author = {Roger Dingledine and Nick Mathewson}, + booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security + (WEIS 2006)}, + year = {2006}, + month = {June}, + address = {Cambridge, UK}, + www_section = {Economics}, + bookurl = {http://weis2006.econinfosec.org/}, + www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf}, +} + @Misc{six-four, key = {six-four}, title = {{The Six/Four System}}, @@ -1237,6 +1250,45 @@ note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}} } +@Misc{cgiproxy, + key = {cgiproxy}, + title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}}, + author = {James Marshall}, + note = {\url{http://www.jmarshall.com/tools/cgiproxy/}} +} + +@Misc{circumventor, + key = {circumventor}, + title = {{How to install the Circumventor program}}, + author = {Bennett Haselton}, + note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}} +} + +@InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis}, + title = {Embedding Covert Channels into {TCP/IP}}, + booktitle = {Information Hiding: 7th International Workshop}, + pages = {247--261}, + year = {2005}, + editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and +Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez}, + volume = {3727}, + series = {LNCS}, + address = {Barcelona, Catalonia (Spain)}, + month = {June}, + publisher = {Springer-Verlag}, + url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf} +} + +@phdthesis{blossom-thesis, + title = {Perspective Access Networks}, + author = {Geoffrey Goodell}, + school = {Harvard University}, + year = {2006}, + month = {July}, + www_pdf_url = {http://afs.eecs.harvard.edu/~goodell/thesis.pdf}, +} + + %%% Local Variables: %%% mode: latex %%% TeX-master: "tor-design" |