Found 9 results
Filters: Author is Dingledine, Roger  [Clear All Filters]
2012
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012.
2011
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011.
2007
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007.
2004
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004.
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004.
2002
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002.
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002.
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002.