Found 9 results
Filters: Author is Dingledine, Roger  [Clear All Filters]
2012
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012. 12-1231-2496.pdf (598.31 KB)
2011
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011. Johnson etal2011.pdf (320.76 KB)
2007
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007. Dingledine etal2007.pdf (71.26 KB)
2004
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004. Dingledine etal2004b.pdf (303.49 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004. Dingledine etal2004.pdf (214.58 KB)
2002
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002. Serjantov etal2002.pdf (222.02 KB)
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002. DingledineSyverson2002.pdf (210 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002. Dingledine etal2002.pdf (25.17 KB)