Androulaki, E., Raykova, M., Srivatsan, S., Stavrou, A., Bellovin, S.M.: PAR: payment for anonymous routing. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 219–236. Springer, Heidelberg (2008)
CrossRef
Google Scholar
Arnold, C., Jansen, R., Lin, Z., Parker, J.: On par for attack. Technical report, May 2009
Google Scholar
Biryukov, A., Pustogarov, I., Weinmann, R.: Trawling for tor hidden services: Detection, measurement, deanonymization. In: 2013 IEEE Symposium on Security and Privacy, SP 2013. pp. 80–94. IEEE Computer Society (2013)
Google Scholar
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007. pp. 92–102. ACM (2007)
Google Scholar
Carbunar, B., Chen, Y., Sion, R.: Tipping pennies? privately practical anonymous micropayments. IEEE Trans. Inf. Forensics Secur. 7(5), 1628–1637 (2012)
CrossRef
Google Scholar
Chen, Y., Sion, R., Carbunar, B.: Xpay: practical anonymous payments for tor routing and other networked services. In: Al-Shaer, E., Paraboschi, S. (eds.) WPES, pp. 41–50. ACM, London (2009)
CrossRef
Google Scholar
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)
CrossRef
Google Scholar
Dingledine, R., Kadianakis, N.H.A.G., Mathewson, N.: One fast guard for life (or 9 months). In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014) (2014)
Google Scholar
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303–320. USENIX (2004)
Google Scholar
Elahi, T., Bauer, K.S., AlSabah, M., Dingledine, R., Goldberg, I.: Changing of the guards: a framework for understanding and improving entry guard selection in Tor. In: Yu, T., Borisov, N. (eds.) Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, WPES 2012, pp. 43–54. ACM (2012)
Google Scholar
Franz, E., Jerichow, A.: A mix-mediated anonymity service and its payment. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 313–327. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Franz, E., Jerichow, A., Wicke, G.: A payment scheme for mixes providing anonymity. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 94–108. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing tarzan, a peer-to-peer anonymizing network layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 121–129. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Humbert, M., Manshaei, H., Hubaux, J.P.: One-to-n scrip systems for cooperative privacy-enhancing technologies. In: 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 682–692 (2011)
Google Scholar
Johnson, A., Jansen, R., Syverson, P.: Onions for sale: putting privacy on the market. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 399–400. Springer, Heidelberg (2013)
CrossRef
Google Scholar
Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.F.: Users get routed: traffic correlation on tor by realistic adversaries. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 337–348. ACM, New York (2013)
CrossRef
Google Scholar
Nielson, S.J., Wallach, D.S.: The bittorrent anonymity marketplace. CoRR abs/1108.2718
Palmieri, P., Pouwelse, J.: Key management for onion routing in a true peer to peer setting. In: Yoshida, M., Mouri, K. (eds.) IWSEC 2014. LNCS, vol. 8639, pp. 62–71. Springer, Heidelberg (2014)
Google Scholar
Wendolsky, R.: A volume-based accounting system for fixed-route mix cascade systems. In: Second Privacy Enhancing Technologies Convention (PET-CON). pp. 26–33 (2008)
Google Scholar
Westermann, B.: Security analysis of AN.ON’s payment scheme. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 255–270. Springer, Heidelberg (2009)
CrossRef
Google Scholar
Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489–522 (2004)
CrossRef
Google Scholar