aboutsummaryrefslogtreecommitdiff
path: root/doc/design-paper/tor-design.bib
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-10-23 03:21:54 +0000
committerRoger Dingledine <arma@torproject.org>2006-10-23 03:21:54 +0000
commit63a1811cdac19255faf37e5386fde867e9a20616 (patch)
tree4463f74efd58c95808f419f83586e48a7348d254 /doc/design-paper/tor-design.bib
parent7bda254bdae6f1c01354e1bbd1949792197bb31f (diff)
downloadtor-63a1811cdac19255faf37e5386fde867e9a20616.tar.gz
tor-63a1811cdac19255faf37e5386fde867e9a20616.zip
Explain why tor is well-suited for the relay component of a
blocking-resistant anonymity system. Talk through how other proxy designs work and what we can reuse from their ideas. Still much work remaining. svn:r8792
Diffstat (limited to 'doc/design-paper/tor-design.bib')
-rw-r--r--doc/design-paper/tor-design.bib52
1 files changed, 52 insertions, 0 deletions
diff --git a/doc/design-paper/tor-design.bib b/doc/design-paper/tor-design.bib
index c8dad072cc..1c9064bbb2 100644
--- a/doc/design-paper/tor-design.bib
+++ b/doc/design-paper/tor-design.bib
@@ -1212,6 +1212,19 @@
publisher = {O'Reilly Media},
}
+@inproceedings{usability:weis2006,
+ title = {Anonymity Loves Company: Usability and the Network Effect},
+ author = {Roger Dingledine and Nick Mathewson},
+ booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
+ (WEIS 2006)},
+ year = {2006},
+ month = {June},
+ address = {Cambridge, UK},
+ www_section = {Economics},
+ bookurl = {http://weis2006.econinfosec.org/},
+ www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf},
+}
+
@Misc{six-four,
key = {six-four},
title = {{The Six/Four System}},
@@ -1237,6 +1250,45 @@
note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
}
+@Misc{cgiproxy,
+ key = {cgiproxy},
+ title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
+ author = {James Marshall},
+ note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
+}
+
+@Misc{circumventor,
+ key = {circumventor},
+ title = {{How to install the Circumventor program}},
+ author = {Bennett Haselton},
+ note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
+}
+
+@InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
+ title = {Embedding Covert Channels into {TCP/IP}},
+ booktitle = {Information Hiding: 7th International Workshop},
+ pages = {247--261},
+ year = {2005},
+ editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
+Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
+ volume = {3727},
+ series = {LNCS},
+ address = {Barcelona, Catalonia (Spain)},
+ month = {June},
+ publisher = {Springer-Verlag},
+ url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
+}
+
+@phdthesis{blossom-thesis,
+ title = {Perspective Access Networks},
+ author = {Geoffrey Goodell},
+ school = {Harvard University},
+ year = {2006},
+ month = {July},
+ www_pdf_url = {http://afs.eecs.harvard.edu/~goodell/thesis.pdf},
+}
+
+
%%% Local Variables:
%%% mode: latex
%%% TeX-master: "tor-design"