PDF ) (Cached: PDF ) by Luke O'Connor. ( BibTeX entry ) GAS: Overloading a File Sharing Network as an Anonymizing System ( PDF ) (Cached: PDF ) by Elias Athanasopoulos, Mema Roussopoulos, Kostas. ( BibTeX entry ) A Passive Attack on the Privacy of Web Users Using Standard Log Information ( PDF ) (Cached: PDF ) by Thomas Demuth. ( BibTeX entry ) Synchronous Batching: From Cascades to Free Routes ( PDF, PS ) (Cached: PDF, PS, gzipped PS ) by Roger Dingledine, Vitaly Shmatikov, and Paul Syverson. Freedman, David Hopwood, and David Molnar. White Paper, December 2000. ( BibTeX entry ) Hot world hunger essay thesis or Not: Revealing Hidden Services by their Clock Skew ( PDF ) (Cached: PDF ) by Steven. ( BibTeX entry ) Drac: An Architecture for Anonymous Low-Volume Communications ( PDF ) (Cached: PDF ) by George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. Krishnamurthy, and Lisa. In the Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003 October 2003, pages 122-130.
Laboratory for Computer Science, Massachusetts Institute of Technology. Thesis, mIT/LCS/TR-179, May 1977. Port Manteaux churns out silly new words when you feed it an idea or two.
Contents of a thesis defense presentation, Reflective thesis generator, Thesis on customer satisfaction in banking sector,
( BibTeX entry ) Does additional information always reduce anonymity? Jaggard, Joan Feigenbaum, and Paul Syverson. In the Proceedings of Information Hiding Workshop (IH 2005 June 2005, pages 39-52. Reiter, Chenxi Wang, and Matthew. ( BibTeX entry ) Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology ( html ) (Cached: html, PDF ) by Andreas Pfitzmann and Marit Hansen. ( BibTeX entry ) Herbivore: A Scalable and Efficient Protocol for Anonymous Communication ( PDF ) (Cached: PDF ) by Sharad Goel, Mark Robson, Milo Polte, and Emin Gun Sirer. ( BibTeX entry ) HisTor: Differentially Private and Robust Statistics Collection for Tor ( PDF ) (Cached: PDF ) by Akshaya Mani and Micah Sherr. In the Proceedings of the 2002 ieee Symposium on Security and Privacy, May 2002. ( BibTeX entry ) Countering Statistical Disclosure with Receiver-Bound Cover Traffic ( PDF ) (Cached: PDF ) by Nayantara Mallesh and Matthew Wright. In the Proceedings of esorics 2002, October 2002, pages 244-263.