diff options
Diffstat (limited to 'testdata')
| -rw-r--r-- | testdata/anonbib.bib | 7621 | ||||
| -rw-r--r-- | testdata/author.bib | 87 | ||||
| -rw-r--r-- | testdata/btxdoc.bib | 93 | ||||
| -rw-r--r-- | testdata/econcs.bib | 5043 | ||||
| -rw-r--r-- | testdata/names.bst | 38 | ||||
| -rw-r--r-- | testdata/parsing.bib | 53 | ||||
| -rw-r--r-- | testdata/pdos.bib | 1742 | ||||
| -rw-r--r-- | testdata/xampl.bib | 361 |
8 files changed, 15038 insertions, 0 deletions
diff --git a/testdata/anonbib.bib b/testdata/anonbib.bib new file mode 100644 index 0000000..d3bcd63 --- /dev/null +++ b/testdata/anonbib.bib @@ -0,0 +1,7621 @@ +% +% +% Magic fields: +% +% www_tags -- used to control which page groups the paper appears in. +% This is a space-separated list. +% www_section -- the topic used under 'topics.html' +% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of +% an entry. +% www_important -- set for important entries +% www_remarks -- annotation for an entry + +%% List of sections +@string{comm = "Anonymous communication"} +@string{traffic = "Traffic analysis"} +@string{pub = "Anonymous publication"} +@string{proofs = "Provable shuffles"} +@string{methods = "Formal methods"} +@string{nym = "Pseudonymity"} +@string{pir = "Private Information Retrieval"} +@string{economics = "Economics"} +@string{censorship = "Communications Censorship"} +@string{credentials = "E-Cash / Anonymous Credentials"} +@string{misc = "Misc"} +@string{torperf = "Tor Performance"} +@string{and = ", "} +# +# Proposed new sections: application privacy, data anonymization, ... +# + +@string{lncs = "Lecture Notes in Computer Science"} + +%% Section: Mix Networks: Design + +@Article{chaum-mix, + author = {David Chaum}, + title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, + journal = {Communications of the ACM}, + year = {1981}, + volume = {24}, + number = {2}, + month = {February}, + www_section = comm, + www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt}, + www_html_url = {http://world.std.com/~franl/crypto/chaum-acm-1981.html}, + www_pdf_url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf}, + www_important = {1}, + www_tags={selected}, +} +% www_remarks = {Chaum's paper that has all the big ideas.}, + +@ARTICLE{chaum-dc, + author = {David Chaum}, + title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability}, + journal = {Journal of Cryptology}, + year = {1988}, + volume = {1}, + pages = {65--75}, + www_section = comm, + www_tags={selected}, + www_pdf_url={http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf}, +} + +@InProceedings{ISDN-mixes, + author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, + title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, + booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems}, + year = 1991, + month = {February}, + pages = {451--463}, + www_section = comm, + www_ps_gz_url = "http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz", + www_tags={selected}, +} + +@InProceedings{BM:mixencrypt, + author = {Bodo M{\"o}ller}, + title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, + booktitle = {Proceedings of {CT-RSA} 2003}, + publisher = {Springer-Verlag, LNCS 2612}, + year = 2003, + month = {April}, + www_section = comm, + www_pdf_url = "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", + www_tags={selected}, +} + +@Misc{mixmaster-spec, + author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman}, + title = {Mixmaster {P}rotocol --- {V}ersion 2}, + howpublished = {IETF Internet Draft}, + year = 2003, + month = {July}, + www_section = comm, + www_txt_url = "http://www.abditum.com/mixmaster-spec.txt", + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{abe, + author = {Masayuki Abe}, + title = {Universally Verifiable mix-net With Verification Work Independent of + The Number of mix Servers}, + booktitle = {Proceedings of {EUROCRYPT} 1998}, + year = {1998}, + publisher = {Springer-Verlag, LNCS 1403}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{disco, + author = {Michael Waidner and Birgit Pfitzmann}, + title = {The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability}, + booktitle = {Proceedings of {EUROCRYPT} 1989}, + year = {1990}, + publisher = {Springer-Verlag, LNCS 434}, + www_section = comm, + www_ps_gz_url = "http://www.semper.org/sirene/publ/WaPf1_89DiscoEngl.ps.gz", + www_tags={selected}, +} + + +@InProceedings{desmedt, + author = {Yvo Desmedt and Kaoru Kurosawa}, + title = {How To Break a Practical {MIX} and Design a New One}, + booktitle = {Proceedings of {EUROCRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1803}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/447709.html", + www_tags={selected}, +} + +@InProceedings{hybrid-mix, + author = {Miyako Ohkubo and Masayuki Abe}, + title = {A {L}ength-{I}nvariant {H}ybrid {MIX}}, + booktitle = {Proceedings of {ASIACRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1976}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{jakobsson-optimally, + author = "Markus Jakobsson and Ari Juels", + title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)", + booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01}, + year = "2001", + publisher = {ACM Press}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/492015.html", + www_tags={selected}, +} + +@InProceedings{stop-and-go, + author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes}, + title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open + System}, + booktitle = {Proceedings of Information Hiding Workshop (IH 1998)}, + year = {1998}, + publisher = {Springer-Verlag, LNCS 1525}, + www_section = comm, + www_pdf_url = "http://www.uow.edu.au/~ldn01/infohide98.pdf", + www_tags={selected}, +} +% www_important = {1}, + +@InProceedings{flash-mix, + author = {Markus Jakobsson}, + title = {Flash {M}ixing}, + booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99}, + year = {1999}, + publisher = {ACM Press}, + www_section = proofs, + www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{babel, + author = {Ceki G\"ulc\"u and Gene Tsudik}, + title = {Mixing {E}-mail With {B}abel}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96}, + year = {1996}, + month = {February}, + publisher = {IEEE}, + pages = {2--16}, + www_section = comm, + www_html_url = "http://citeseer.nj.nec.com/2254.html", + www_ps_url = "http://www.isoc.org/conferences/ndss96/gulcu.ps", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{wright02, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + title = {An Analysis of the Degradation of Anonymous Protocols}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02}, + year = {2002}, + month = {February}, + publisher = {IEEE}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf", + www_tags={selected}, +} + +@InProceedings{minion-design, + author = {George Danezis and Roger Dingledine and Nick Mathewson}, + title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {2--15}, + www_important = {1}, + www_section = comm, + www_pdf_url = "http://mixminion.net/minion-design.pdf", + www_tags={selected}, +} + +@InProceedings{agrawal03, + author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz}, + title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {16--27}, + www_pdf_url = "http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf", + www_section = traffic, + www_tags={selected}, +} + +@InProceedings{wright03, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + title = {Defending Anonymous Communication Against Passive Logging Attacks}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + year = 2003, + month = {May}, + pages = {28--43}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf", + www_tags={selected}, +} + +@inproceedings{sherwood-protocol, + author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan}, + title = {P5: A Protocol for Scalable Anonymous Communication}, + booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, + year = 2002, + month = {May}, + www_section = comm, + www_pdf_url = "http://www.cs.umd.edu/projects/p5/p5.pdf", + www_ps_url = "http://www.cs.umd.edu/projects/p5/p5.ps", + www_tags={selected}, +} + +@Article{remailer-history, + author = {Sameer Parekh}, + title = {Prospects for Remailers}, + journal = {First Monday}, + volume = {1}, + number = {2}, + month = {August}, + year = {1996}, + www_section = comm, + www_html_url = "http://www.firstmonday.dk/issues/issue2/remailers/", + www_tags={selected}, +} + +@InProceedings{pfitzmann85, + author = {Andreas Pfitzmann and Michael Waidner}, + title = {Networks Without User Observability -- Design Options}, + booktitle = {Proceedings of {EUROCRYPT} 1985}, + month = {April}, + year = {1985}, + publisher = {Springer-Verlag, LNCS 219}, + www_section = comm, + www_html_url = "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html", + www_tags={selected}, +} + +@Article{chaum85, + author = {David Chaum}, + title = {Security without Identification: Transaction Systems to Make Big Brother Obsolete}, + journal = CACM, + year = 1985, + volume = 28, + number = 10, + month = {October}, + www_section = misc, + www_tags={selected}, +} + +@Article{rewebber, + author = {Ian Goldberg and David Wagner}, + title = {{TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web}}, + journal = {First Monday}, + volume = {3}, + number = {4}, + month = {August}, + year = {1998}, + www_section = pub, + www_html_url = "http://www.firstmonday.dk/issues/issue3_4/goldberg/", + www_ps_url = "http://www.ovmj.org/GNUnet/papers/goldberg97taz.ps", + www_tags={selected}, +} + +@InProceedings{mix-acc, + author = {Roger Dingledine and Michael J. Freedman and David + Hopwood and David Molnar}, + title = {{A Reputation System to Increase MIX-net + Reliability}}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {126--141}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = comm, + www_ps_url = "http://freehaven.net/doc/mix-acc/mix-acc.ps", + www_pdf_url = "http://freehaven.net/doc/mix-acc/mix-acc.pdf", + www_tags={selected}, +} + +@InProceedings{patterns-failure, + author = {Richard Clayton and George Danezis and Markus G. Kuhn}, + title = {Real World Patterns of Failure in Anonymity Systems}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {230--244}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = misc, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Patterns_of_Failure.pdf", + www_tags={selected}, +} + +@InProceedings{casc-rep, + author = {Roger Dingledine and Paul Syverson}, + title = {{Reliable MIX Cascade Networks through Reputation}}, + booktitle = {Proceedings of Financial Cryptography (FC '02)}, + year = 2002, + month = {March}, + editor = {Matt Blaze}, + publisher = {Springer-Verlag, LNCS 2357}, + www_section = comm, + www_ps_url = "http://freehaven.net/doc/casc-rep/casc-rep.ps", + www_pdf_url = "http://freehaven.net/doc/casc-rep/casc-rep.pdf", + www_tags={selected}, +} + +%% Section: Mix Networks: Attacks + +@InProceedings{pfitzmann90how, + author = "Birgit Pfitzmann and Andreas Pfitzmann", + title = "How to Break the Direct {RSA}-Implementation of {MIXes}", + booktitle = {Proceedings of {EUROCRYPT} 1989}, + publisher = {Springer-Verlag, LNCS 434}, + year = {1990}, + www_section = traffic, + www_ps_gz_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90" +} + +@InProceedings{back01, + author = {Adam Back and Ulf M\"oller and Anton Stiglic}, + title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + pages = {245--257}, + year = 2001, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = traffic, + www_important = 1, + www_pdf_url = "http://www.cypherspace.org/adam/pubs/traffic.pdf", + www_tags={selected}, +} + +@Misc{terminology, + author = {Andreas Pfitzmann and Marit Hansen}, + title = {Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology}, + www_section = misc, + www_html_url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml}, + howpublished = "Draft", + year = 2000, + month = {July}, + OPTnote = {For date of the latest version, see the document itself}, + www_tags={selected}, +} +% www_pdf_url = {http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.25.pdf}, + + +@inproceedings{goldberg97privacyenhancing, + author = "Ian Goldberg and David Wagner and Eric Brewer", + title = "Privacy-enhancing Technologies for the Internet", + booktitle = "Proceedings of the 42nd IEEE Spring COMPCON", + year = "1997", + month = {February}, + publisher = {IEEE Computer Society Press}, + isbn = { 0-8186-7804-6 }, + www_section = misc, + www_ps_url = "http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97.ps", + www_tags={selected}, +} + +@InProceedings{fiveyearslater, + author = {Ian Goldberg}, + title = {{Privacy-enhancing technologies for the Internet, II: Five years later}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = misc, + www_pdf_url = "http://freehaven.net/anonbib/papers/petfive.pdf", + www_ps_url = "http://freehaven.net/anonbib/papers/petfive.ps", + www_tags={selected}, +} + +@InProceedings{hintz02, + author = {Andrew Hintz}, + title = {Fingerprinting Websites Using Traffic Analysis}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_html_url = "http://guh.nu/projects/ta/safeweb/safeweb.html", + www_pdf_url = "http://guh.nu/projects/ta/safeweb/safeweb.pdf", + www_ps_url = "http://guh.nu/projects/ta/safeweb/safeweb.ps", + www_tags={selected}, +} + +@InProceedings{mitkuro, + author = {Masashi Mitomo and Kaoru Kurosawa}, + title = {{Attack for Flash MIX}}, + booktitle = {Proceedings of {ASIACRYPT} 2000}, + year = {2000}, + publisher = {Springer-Verlag, LNCS 1976}, + www_section = proofs, + www_html_url = "http://citeseer.nj.nec.com/450148.html", + www_tags={selected}, +} + +%% Section : nymservers + +@InProceedings{nym-alias-net, + author = {David Mazi\`eres and M. Frans Kaashoek}, + title = {{The Design, Implementation and Operation of an Email + Pseudonym Server}}, + booktitle = {{Proceedings of the 5th ACM Conference on Computer and + Communications Security (CCS 1998)}}, + year = 1998, + month = {November}, + publisher = {ACM Press}, + www_section = nym, + www_ps_gz_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", + www_pdf_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", + www_tags={selected}, +} + +%techreport{freedom-nyms, +% author = {Russell Samuels}, +% title = {Untraceable Nym Creation on the {F}reedom {N}etwork}, +% year = {1999}, +% month = {November}, +% day = {21}, +% type = {White Paper}, +% institution = {Zero Knowledge}, +% number = {11}, +% www_section = nym, +% www_html_url = "http://www.freedom.net/products/whitepapers/white11.html", +%} + +%% Section: Traffic analysis + +@InProceedings{rackoff93cryptographic, + author = {Charles Rackoff and Daniel R. Simon}, + title = {Cryptographic Defense Against Traffic Analysis}, + booktitle = {Proceedings of {ACM} Symposium on Theory of Computing}, + pages = {672--681}, + year = {1993}, + www_section = traffic, + www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps}, + www_tags={selected}, +} +% www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", +% www_important = {1}, + + +@InProceedings{raymond00, + author = {Jean-Fran\c{c}ois Raymond}, + title = {{Traffic Analysis: Protocols, Attacks, Design Issues, + and Open Problems}}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = 2000, + month = {July}, + pages = {10--29}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = traffic, + www_important = {1}, + www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps}, + www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf}, + www_tags={selected}, +} + +@InProceedings{trickle02, + author = {Andrei Serjantov and Roger Dingledine and Paul Syverson}, + title = {From a Trickle to a Flood: Active Attacks on Several + Mix Types}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = traffic, + www_ps_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.ps", + www_pdf_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{limits-open, + author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, + title = {Limits of Anonymity in Open Environments}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = traffic, + www_pdf_url = "http://www-i4.informatik.rwth-aachen.de/sap/publications/15.pdf", + www_tags={selected}, +} + +@InProceedings{chaffinch, + author = {Richard Clayton and George Danezis}, + title = {Chaffinch: Confidentiality in the Face of Legal Threats}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2002)}, + year = {2002}, + month = "October", + editor = {Fabien Petitcolas}, + publisher = {Springer-Verlag, LNCS 2578}, + www_section = misc, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.pdf", + www_html_url = "http://www.cl.cam.ac.uk/~rnc1/Chaffinch.html", + www_tags={selected}, +} + +@InProceedings{langos02, + author = {Oliver Berthold and Heinrich Langos}, + title = {Dummy Traffic Against Long Term Intersection Attacks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_pdf_url = "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf", + www_tags={selected}, +} + +@InProceedings{disad-free-routes, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + title = {The disadvantages of free {MIX} routes and how to overcome + them}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + pages = {30--45}, + month = {July}, + year = 2000, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = traffic, + www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", + www_tags={selected}, +} +% www_important = {1}, + +%% Section: Anonymous publication + +@InProceedings{freehaven-berk, + author = {Roger Dingledine and Michael J. Freedman and David Molnar}, + title = {The Free Haven Project: Distributed Anonymous Storage Service}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = pub, + www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps", + www_important = {1}, + www_tags={selected}, +} + +@incollection{freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong}, + title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval System}, + title = {Freenet: A Distributed Anonymous Information Storage and Retrieval System}, + pages = {46--66}, + year = {2001}, + month = "July", + language = {English}, + publisher = {Springer Berlin Heidelberg}, + url = {http://dx.doi.org/10.1007/3-540-44702-4_4}, + doi = {10.1007/3-540-44702-4_4}, + isbn = {978-3-540-41724-8}, + booktitle = {Designing Privacy Enhancing Technologies}, + volume = {2009}, + series = {Lecture Notes in Computer Science}, + editor = {Federrath, Hannes}, + www_section = pub, + www_pdf_url = "http://www.facweb.iitkgp.ernet.in/~niloy/COURSE/Autumn2010/UC/Resource/freenet1-big.pdf", + www_tags={selected}, +} + +@InProceedings{publius, + author = {Marc Waldman and Aviel Rubin and Lorrie Cranor}, + title = {Publius: {A} robust, tamper-evident, censorship-resistant and + source-anonymous web publishing system}, + booktitle = {Proceedings of the 9th USENIX Security Symposium}, + pages = {59--72}, + year = {2000}, + month = {August}, + www_section = pub, + www_pdf_url = "http://www.cs.nyu.edu/~waldman/publius/publius.pdf", + www_tags={selected}, +} + +@InProceedings{randomized-checking, + author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, + title = {Making mix nets robust for electronic voting by randomized partial checking}, + booktitle = {Proceedings of the 11th USENIX Security Symposium}, + year = {2002}, + month = {August}, + www_important = {1}, + www_section = proofs, + www_pdf_url = "http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf", + www_tags={selected}, +} + +@InProceedings{infranet, + author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, + title = {Infranet: Circumventing Web Censorship and Surveillance}, + booktitle = {Proceedings of the 11th USENIX Security Symposium}, + year = {2002}, + month = {August}, + www_section = censorship, + www_pdf_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf", + www_ps_gz_url = "http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.ps.gz", + www_tags={selected}, +} + +%% Section: Stream-based anonymity + +@InProceedings{onion-discex00, + author = {Paul Syverson and Michael Reed and David Goldschlag}, + title = {{O}nion {R}outing Access Configurations}, + booktitle = {Proceedings of the DARPA Information Survivability Conference and + Exposition (DISCEX 2000)}, + year = {2000}, + publisher = {IEEE CS Press}, + pages = {34--40}, + volume = {1}, + www_section = comm, + www_abstract_url = "http://www.onion-router.net/Publications.html", + www_ps_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps", + www_ps_gz_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", + www_pdf_url = "http://www.onion-router.net/Publications/DISCEX-2000.pdf", + www_tags={selected}, +} + +@inproceedings{onion-routing:ih96, + title = {{Hiding Routing Information}}, + author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson}, + booktitle = {Proceedings of Information Hiding: First International Workshop}, + year = {1996}, + month = {May}, + pages = {137--150}, + editor = {R. Anderson}, + publisher = {Springer-Verlag, LNCS 1174}, + www_section = comm, + www_ps_gz_url = {http://www.onion-router.net/Publications/IH-1996.ps.gz}, + www_pdf_url = {http://www.onion-router.net/Publications/IH-1996.pdf}, + www_tags={selected}, +} + +@InProceedings{onion-routing:pet2000, + author = {Paul Syverson and Gene Tsudik and Michael Reed + and Carl Landwehr}, + title = {{Towards an Analysis of Onion Routing Security}}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + year = 2000, + month = {July}, + pages = {96--114}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + www_section = comm, + www_ps_gz_url = "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{web-mix:pet2000, + author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, + title = {Web {MIX}es: A system for anonymous and unobservable + {I}nternet access}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop + on Design Issues in Anonymity and Unobservability}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + pages = {115--129}, + year = 2000, + month = {July}, + www_section = comm, + www_pdf_url = "http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf", + www_tags={selected}, +} + +@Article{crowds:tissec, + author = {Michael Reiter and Aviel Rubin}, + title = {Crowds: Anonymity for Web Transactions}, + journal = {ACM Transactions on Information and System Security}, + volume = {1}, + number = {1}, + month = {June}, + year = {1998}, + www_section = comm, + www_ps_gz_url = "http://avirubin.com/crowds.ps.gz", + www_pdf_url = "http://avirubin.com/crowds.pdf", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{tarzan:ccs02, + title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Robert Morris", + booktitle = {{Proceedings of the 9th ACM Conference on Computer and + Communications Security (CCS 2002)}}, + location = "Washington, DC", + month = "November", + year = "2002", + www_section = comm, + www_pdf_url = "http://pdos.lcs.mit.edu/tarzan/docs/tarzan-ccs02.pdf", + www_important = {1}, + www_tags={selected}, +} + +@inproceedings{BonehGolle:psp2002, + title = {Almost Entirely Correct Mixing With Application to Voting}, + author = {Dan Boneh and Philippe Golle}, + booktitle = {{Proceedings of the 9th ACM Conference on Computer and + Communications Security (CCS 2002)}}, + year = {2002}, + month = {November}, + location = {Washington, DC}, + pages = {68--77}, + editor = {Vijay Atluri}, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.pdf}, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps}, + www_section = proofs, + www_tags={selected}, +} + +@techreport{freedom2-arch, + author = {Philippe Boucher and Adam Shostack and Ian Goldberg}, + title = {Freedom Systems 2.0 Architecture}, + year = {2000}, + month = {December}, + day = {18}, + type = {White Paper}, + institution = {Zero Knowledge Systems, {Inc.}}, + www_section = comm, + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_System_2_Architecture.pdf}, + www_tags={selected}, +} + +@techreport{freedom21-security, + author = {Adam Back and Ian Goldberg and Adam Shostack}, + title = {Freedom Systems 2.1 Security Issues and Analysis}, + year = {2001}, + month = {May}, + day = {3}, + type = {White Paper}, + institution = {Zero Knowledge Systems, {Inc.}}, + www_section = comm, + www_pdf_url = {http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_Security2-1.pdf}, + www_tags={selected}, +} + +@Article{realtime-mix, + author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and + Birgit Pfitzmann and Michael Waidner}, + title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, + journal = {IEEE Journal on Selected Areas in Communications}, + year = 1998, + volume = {16}, + number = {4}, + www_section = comm, + www_html_url = "http://www.zurich.ibm.com/security/publications/1998.html", + www_tags={selected}, +} + +%% Section: Misc + +@inproceedings{rao-pseudonymity, + author = "Josyula R. Rao and Pankaj Rohatgi", + title = "Can Pseudonymity Really Guarantee Privacy?", + booktitle = "Proceedings of the 9th USENIX Security Symposium", + year = {2000}, + month = {August}, + publisher = {USENIX}, + pages = "85--96", + www_section = nym, + www_pdf_url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", + www_tags={selected}, +} + +@InProceedings{SK, + author = {Joe Kilian and Kazue Sako}, + title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to + the Implementation of a Voting Booth}, + booktitle = {Proceedings of {EUROCRYPT} 1995}, + www_section = proofs, + month = {May}, + year = {1995}, + publisher = {Springer-Verlag}, + www_tags={selected}, +} + +%Misc{rprocess, +% author = {RProcess}, +% title = {Selective Denial of Service Attacks}, +% www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999_09_DoS_remail_vuln.html", +% www_section = traffic, +% month = {September}, +% year = 1999, +% howpublished = "Usenet post", +% www_tags={selected}, +%} + +@Misc{pipenet10, + author = {Wei Dai}, + title = {PipeNet 1.0}, + howpublished = "Post to Cypherpunks mailing list", + year = 1998, + month = {January}, + day = 19, + www_html_url = "http://cypherpunks.venona.com/date/1998/01/msg00878.html", + www_section = comm, + www_remarks = "First written in 1996 based on cypherpunks posts in 1995.", + www_tags={selected}, +} + +@Misc{pipenet, + author = {Wei Dai}, + title = {PipeNet 1.1}, + howpublished = "Post to Cypherpunks mailing list", + year = 1998, + month = {November}, + day = 26, + www_txt_url = "http://www.eskimo.com/~weidai/pipenet.txt", + www_section = comm, + www_remarks = {Cypherpunks post at http://cypherpunks.venona.com/date/1998/11/msg00941.html}, + www_tags={selected}, +} + +@InProceedings{PIK, + author = {C. Park and K. Itoh and K. Kurosawa}, + title = {Efficient anonymous channel and all/nothing election scheme}, + booktitle = {Proceedings of {EUROCRYPT} 1993}, + month = {May}, + year = {1993}, + pages = {248--259}, + publisher = {Springer-Verlag, LNCS 765}, + www_section = proofs, + www_tags={selected}, +} + +% PhdThesis{malkin-thesis, +% author = {Tal Malkin}, +% school = {{MIT}}, +% title = {Private {I}nformation {R}etrieval}, +% year = {2000}, +% www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html", +% www_tags={selected}, +%} + +@PhdThesis{ian-thesis, + author = {Ian Goldberg}, + title = {A Pseudonymous Communications Infrastructure for the Internet}, + school = {UC Berkeley}, + year = 2000, + month = {December}, + www_section = comm, + www_pdf_url = "http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf", + www_tags={selected}, +} + +@PhdThesis{george-thesis, + author = {George Danezis}, + title = {Better Anonymous Communications}, + school = {University of Cambridge}, + year = {2004}, + month = {July}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/thesis.pdf", + www_tags={selected}, +} + +@PhdThesis{andrei-thesis, + author = {Andrei Serjantov}, + title = {On the Anonymity of Anonymity Systems}, + school = {University of Cambridge}, + year = {2004}, + month = {June}, + www_section = comm, + www_ps_url = "http://home.arachsys.com/~aas/Thesis/2.ps", + www_tags={selected}, +} + +@InProceedings{shuffle:ccs01, + author = {C. Andrew Neff}, + title = {A Verifiable Secret Shuffle and its Application to E-Voting}, + booktitle = {{Proceedings of the 8th ACM Conference on Computer and + Communications Security (CCS 2001)}}, + pages = {116--125}, + year = 2001, + editor = {P. Samarati}, + month = {November}, + publisher = {ACM Press}, + www_section = proofs, + www_pdf_url = {http://www.votehere.net/ada_compliant/ourtechnology/technicaldocs/shuffle.pdf}, + www_tags={selected}, +} + +@InProceedings{PShuffle, + author = {Jun Furukawa and Kazue Sako}, + title = {An Efficient Scheme for Proving a Shuffle}, + editor = {Joe Kilian}, + booktitle = {Proceedings of {CRYPTO} 2001}, + year = {2001}, + publisher = {Springer-Verlag, LNCS 2139}, + www_pdf_url = {http://www.iacr.org/archive/crypto2001/21390366.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@InProceedings{econymics, + author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}, + title = {{On the Economics of Anonymity}}, + booktitle = {Proceedings of Financial Cryptography (FC '03)}, + year = 2003, + month = "January", + editor = {Rebecca N. Wright}, + publisher = {Springer-Verlag, LNCS 2742}, + www_section = economics, + www_pdf_url = "http://freehaven.net/doc/fc03/econymics.pdf", + www_important = {1}, + www_tags={selected}, +} + +@article{cheap-pseudonyms, + author = {Eric Friedman and Paul Resnick}, + title = {The social cost of cheap pseudonyms}, + journal = {Journal of Economics and Management Strategy}, + year = "2001", + volume = "10", + number = "2", + pages = "173--199", + www_section = economics, + www_pdf_url = "http://presnick.people.si.umich.edu/papers/identifiers/081199.pdf", + www_tags={selected}, +} + +@InProceedings{Diaz02, + author = {Claudia Diaz and Stefaan Seys and Joris Claessens + and Bart Preneel}, + title = {Towards measuring anonymity}, + booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, + year = 2002, + month = "April", + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_important = {1}, + www_ps_gz_url = "http://homes.esat.kuleuven.be/~cdiaz/papers/tmAnon.ps.gz", + www_tags={selected}, +} + +@InProceedings{Serj02, + author = {Andrei Serjantov and George Danezis}, + title = {Towards an Information Theoretic Metric for Anonymity}, + booktitle = {Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)}, + year = 2002, + month = "April", + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = traffic, + www_important = {1}, + www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps", + www_tags={selected}, +} + +@InProceedings{sybil, + author = "John Douceur", + title = {{The Sybil Attack}}, + booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", + month = {March}, + year = 2002, + www_section = traffic, + www_important = {1}, + www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf", + www_tags={selected}, +} + +@InProceedings{Serj02-iptps, + author = {Andrei Serjantov}, + title = {Anonymizing censorship resistant systems}, + booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", + month = {March}, + year = 2002, + www_ps_url= {http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps}, + www_section = pub, + www_tags={selected}, +} + +%InProceedings{Freedman-iptps, +% author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris}, +% title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, +% booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)", +% month = {March}, +% year = 2002, +% www_pdf_url = "http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf", +% www_section = comm, +% www_tags={selected}, +%} + +@InProceedings{gup, + author = {Stuart Stubblebine and Paul Syverson}, + title = {Authentic Attributes with Fine-Grained Anonymity Protection}, + booktitle = {Proceedings of Financial Cryptography (FC 2000)}, + pages = {276--294}, + year = 2001, + editor = {Yair Frankel}, + publisher = {Springer-Verlag, LNCS 1962}, + www_section = nym, + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.ps", + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2000/2000stubblebine-finegrain.pdf", + www_tags={selected}, +} + +@InProceedings{syverson99, + author = "Paul F. Syverson and Stuart G. Stubblebine", + title = "Group Principals and the Formalization of Anonymity", + booktitle = "Proceedings of the World Congress on Formal Methods (1)", + pages = "814--833", + year = "1999", + www_section = methods, + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.ps", + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/1999/1999syverson-fm99.pdf", + www_tags={selected}, +} + +@Article{crowds-model, + author = {Vitaly Shmatikov}, + title = {Probabilistic Model Checking of an Anonymity System}, + journal = {Journal of Computer Security}, + volume = {12}, + number = {3-4}, + pages = {355--377}, + year = {2004}, + www_section = methods, + www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_crowds.ps", + www_remarks = +{Uses formal methods to analyze probabilistic anonymity systems like + <a href="#crowds:tissec">Crowds</a>. Confirms that anonymity degrades + with a larger crowd: as N grows, the fact that the request came from + you becomes more suspicious.}, + www_tags={selected}, +} + +@Article{modular-approach, + author = {Dominic Hughes and Vitaly Shmatikov}, + title = {Information Hiding, Anonymity and Privacy: A Modular Approach}, + journal = {Journal of Computer Security}, + volume = {12}, + number = {1}, + pages = {3--36}, + year = {2004}, + www_section = methods, + www_ps_url = "http://www.csl.sri.com/users/shmat/shmat_anon.ps", + www_tags={selected}, +} + +@InProceedings{kesdogan:pet2002, + author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, + title = {Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = comm, + www_pdf_url = "http://freehaven.net/anonbib/papers/PIR_Kesdogan.pdf", + www_tags={selected}, +} + +@InProceedings{danezis:pet2003, + author = {George Danezis}, + title = {Mix-networks with Restricted Routes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {1--17}, + www_section = traffic, + www_pdf_url = "http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf", + www_important = 1, + www_tags={selected}, +} + +@InProceedings{diaz:pet2003, + author = {Claudia Diaz and Andrei Serjantov}, + title = {Generalising Mixes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {18--31}, + www_section = comm, + www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz", + www_important = {1}, + www_tags={selected}, +} + +@InProceedings{steinbrecher:pet2003, + author = {Sandra Steinbrecher and Stefan K\"opsell}, + title = {Modelling Unlinkability}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {32--47}, + www_section = traffic, + www_pdf_url = "http://www.inf.tu-dresden.de/~ss64/Papers/PET-Unlinkability.pdf", + www_tags={selected}, +} + +@InProceedings{newman:pet2003, + author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov}, + title = {Metrics for Traffic Analysis Prevention}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {48--65}, + www_section = traffic, + www_ps_url = "http://www.cise.ufl.edu/~nemo/papers/PET2003.ps", + www_tags={selected}, +} + +@InProceedings{nguyen:pet2003, + author = {Lan Nguyen and Rei Safavi-Naini}, + title = {Breaking and Mending Resilient Mix-nets}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {66--80}, + www_section = proofs, + www_pdf_url = "http://www.petworkshop.org/2003/preproc/05-preproc.pdf", + www_tags={selected}, +} + +@InProceedings{clayton:pet2003, + author = {Richard Clayton}, + title = {Improving Onion Notation}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {81--87}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/onions.pdf", + www_tags={selected}, +} + +@InProceedings{bennett:pet2003, + author = {Krista Bennett and Christian Grothoff}, + title = {{GAP} -- Practical anonymous networking}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {141--160}, + www_section = pub, + www_ps_url = "http://www.ovmj.org/GNUnet/download/aff.ps", + www_tags={selected}, +} + +@article{ebe2003, + author = {Christian Grothoff}, + title = {{An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks}}, + journal = "Wirtschaftsinformatik", + publisher = "Springer-Verlag", + year = "2003", + month = "June", + www_section = economics, + www_ps_url = "http://www.ovmj.org/GNUnet/download/ebe.ps", + www_tags={selected}, +} + +@inproceedings{gnunetencoding, + author = "Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu", + title = "{Efficient Sharing of Encrypted Data}", + booktitle = {{Proceedings of ASCIP 2002}}, + publisher = "Springer-Verlag", + pages = "107--120", + www_ps_url = "http://www.ovmj.org/GNUnet/download/esed.ps", + www_section = pub, + year = "2002", + month = {July}, + www_tags={selected}, +} + +@InProceedings{kugler:pet2003, + author = {Dennis K\"ugler}, + title = {{An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {161--176}, + www_section = pub, + www_pdf_url = "http://www.ovmj.org/GNUnet/papers/GNUnet_pet.pdf", + www_tags={selected}, +} + +@InProceedings{feamster:pet2003, + author = {Nick Feamster and Magdalena Balazinska and Winston Wang and + Hari Balakrishnan and David Karger}, + title = {{Thwarting Web Censorship with Untrusted Messenger Delivery}}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)}, + year = {2003}, + month = {March}, + editor = {Roger Dingledine}, + publisher = {Springer-Verlag, LNCS 2760}, + pages = {125--140}, + www_section = censorship, + www_pdf_url = "http://nms.lcs.mit.edu/papers/disc-pet2003.pdf", + www_tags={selected}, +} + +@InProceedings{waldman01tangler, + author = "Marc Waldman and David Mazi\`eres", + title = "Tangler: a censorship-resistant publishing system based on document entanglements", + booktitle = {{Proceedings of the 8th ACM Conference on Computer and + Communications Security (CCS 2001)}}, + pages = "126--135", + year = "2001", + month = "November", + www_section = pub, + www_important = {1}, + www_ps_url = "http://www.cs.nyu.edu/~waldman/tangler.ps", + www_tags={selected}, +} + +@InProceedings{anderson96eternity, + author = "Ross Anderson", + title = "The Eternity Service", + booktitle = {Proceedings of Pragocrypt '96}, + year = "1996", + www_section = pub, + www_important = {1}, + www_ps_url = "http://www.ovmj.org/GNUnet/papers/eternity.ps", + www_html_url = "http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html", + www_tags={selected}, +} + +@InProceedings{strong-eternity, + author = {Tonda Benes}, + title = {The Strong Eternity Service}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, + year = {2001}, + month = "April", + editor = {Ira S. Moskowitz}, + publisher = {Springer-Verlag, LNCS 2137}, + www_section = pub, + www_pdf_url = "http://freehaven.net/anonbib/papers/strong-eternity.pdf", + www_tags={selected}, +} + +@inproceedings{RRMPH02-1, + author={Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison}, + title={{Analysis of an Anonymity Network for Web Browsing}}, + booktitle={{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002)}}, + location={Pittsburgh, USA}, + pages={49--54}, + month={June}, + year={2002}, + www_section = comm, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.ps.gz", + www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2002.pdf", + www_tags={selected}, +} +% month={June 10--12}, + +@inproceedings{morphmix:wpes2002, + author={Marc Rennhard and Bernhard Plattner}, + title={{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}}, + location={Washington, DC, USA}, + month={November}, + year={2002}, + www_important = {1}, + www_section = comm, + www_pdf_url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf}, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz", + www_tags={selected}, +} +% month={November 21}, + +@inproceedings{RP03-1, + author={Marc Rennhard and Bernhard Plattner}, + title={{Practical Anonymity for the Masses with Mix-Networks}}, + booktitle={{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}}, + location={Linz, Austria}, + month={June}, + year={2003}, + www_section = comm, + www_ps_gz_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz", + www_pdf_url = "http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf", + www_tags={selected}, +} +% month={June 9--11}, + +@inproceedings{rep-anon, + author={Roger Dingledine and Nick Mathewson and Paul Syverson}, + title={{Reputation in P2P Anonymity Systems}}, + booktitle={Proceedings of Workshop on Economics of Peer-to-Peer Systems}, + month={June}, + year={2003}, + www_section = economics, + www_pdf_url = "http://freehaven.net/doc/econp2p03/econp2p03.pdf", + www_tags={selected}, +} + +@InProceedings{statistical-disclosure, + author = {George Danezis}, + title = {Statistical Disclosure Attacks: Traffic Confirmation in Open Environments}, + booktitle = {Proceedings of Security and Privacy in the Age of Uncertainty, ({SEC2003})}, + pages = {421--426}, + year = {2003}, + editor = {Gritzalis and Vimercati and Samarati and Katsikas}, + location= {Athens}, + month = {May}, + organization = {{IFIP TC11}}, + publisher = {Kluwer}, + www_section = traffic, + www_pdf_url={http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf}, + www_tags={selected}, +} + +@InProceedings{TrafHTTP, + author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu}, + title = {Statistical Identification of Encrypted Web Browsing Traffic}, + booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy}, + year = {2002}, + location= {Berkeley, California}, + month = {May}, + www_section = traffic, + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}, + www_tags={selected}, +} + +@InProceedings{Dan:SFMix03, + author = {George Danezis}, + title = {Forward Secure Mixes}, + booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems}, + pages = {195--207}, + year = {2002}, + editor = {Fisher-Hubner, Jonsson}, + location= {Karlstad, Sweden}, + month = {November}, + day = {7}, + www_section = comm, + www_pdf_url="http://www.cl.cam.ac.uk/~gd216/fsmix.pdf", + www_tags={selected}, +} + +@InProceedings{SN03, + author = {Andrei Serjantov and Richard E. Newman}, + title = {On the Anonymity of Timed Pool Mixes}, + booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems}, + pages = {427--434}, + year = {2003}, + location= {Athens, Greece}, + month = {May}, + publisher = {Kluwer}, + www_section=traffic, + www_ps_url="http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps", + www_tags={selected}, +} +% booktitle = {Security and Privacy in the Age of Uncertainty}, + +@techreport{herbivore:tr, + author = "Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer", + title = "{Herbivore: A Scalable and Efficient Protocol for Anonymous Communication}", + number = "2003-1890", + institution = "Cornell University", + address = "Ithaca, NY", + month = "February", + year = "2003", + www_section = comm, + www_pdf_url = "http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf", + www_tags={selected}, +} + +@inproceedings{reusable-channels:wpes2003, + author={Philippe Golle and Markus Jakobsson}, + title={Reusable Anonymous Return Channels}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_pdf_url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf}, + www_ps_url = {http://crypto.stanford.edu/~pgolle/papers/return.ps}, + www_remarks = +{Reencryption mix-nets can allow users to use a single reply channel + even when they maintain multiple separate nyms (think of it like a reply + block but it looks different each time you give it to somebody).}, + www_tags={selected}, +} + +@inproceedings{danezis:wpes2003, + author={George Danezis and Len Sassaman}, + title={Heartbeat Traffic to Counter (n-1) Attacks}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf}, + www_remarks = +{Mix nodes should send out "heartbeat" messages (dummies that start and + end at that node). By measuring how many return in a given time, they + can detect whether the adversary is dropping or delaying traffic coming + into them (possibly so he can launch an active blending attack).}, + www_tags={selected}, +} + +@inproceedings{bauer:wpes2003, + author={Matthias Bauer}, + title={{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}}, + location={Washington, DC, USA}, + month={October}, + year={2003}, + www_section = comm, + www_ps_url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps}, + www_important = 1, + www_remarks = +{Anonymity sets in deployed systems are small because few people think + it's worthwhile to use them. But we can take advantage of ordinary web + users to transfer messages (that is, mix them) from one webserver to + another via cookies and http redirect tricks. Senders and receivers + should also look like ordinary web users, so anonymity sets are large.}, + www_tags={selected}, +} + +@inproceedings{GolleJakobssonJuelsSyverson:universal04, + title = {Universal Re-Encryption for Mixnets}, + author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson}, + booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track}, + year = {2004}, + month = {February}, + location= {San Francisco, USA}, + www_pdf_url = {http://www.syverson.org/univrenc-ctrsa.pdf}, + www_section = comm, + www_tags={selected}, +} + %editor = {}, + + +@InProceedings{cebolla, + author={Zach Brown}, + title={{Cebolla: Pragmatic IP Anonymity}}, + booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, + year = {2002}, + month = {June}, + www_section = comm, + www_pdf_url = "http://cypherspace.org/cebolla/cebolla.pdf", + www_remarks = +{Written by a former Freedom developer, Cebolla has a UDP-based design + similar to second-generation Freedom. The initiator incrementally builds + her circuit, giving her end-to-end forward-secrecy and also better + recovery from broken nodes.}, + www_tags={selected}, +} + +@InProceedings{SS03, + author = {Andrei Serjantov and Peter Sewell}, + title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, + booktitle = {Proceedings of ESORICS 2003}, + year = {2003}, + month = {October}, + www_section = traffic, + www_ps_url = "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps", + www_remarks = +{An investigation of packet counting attacks (which work best on lightly + loaded networks) and connection-start timing attacks.}, + www_tags={selected}, +} + +@InProceedings{GKK03, + author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, + title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting}, + booktitle = {Proceedings of ESORICS 2003}, + year = {2003}, + month = {October}, + www_section = proofs, + www_pdf_url = "http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf", + www_tags={selected}, +} + +@Article{shsm03, + author = {Anna Shubina and Sean Smith}, + title = {Using Caching for Browsing Anonymity}, + journal = {ACM SIGEcom Exchanges}, + year = {2003}, + volume = {4}, + number = {2}, + month = {September}, + www_section = comm, + www_pdf_url = "http://www.acm.org/sigs/sigecom/exchanges/volume_4_(03)/4.2-Shubina.pdf", + www_tags={selected}, +} + +@InProceedings{incomparable-pkeys, + author = {Brent Waters and Ed Felten and Amit Sahai}, + title = {Receiver Anonymity via Incomparable Public Keys}, + booktitle = {{Proceedings of the 10th ACM Conference on Computer and + Communications Security (CCS 2003)}}, + pages = {112--121}, + year = 2003, + editor = {Vijay Atluri and Peng Liu}, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.pdf", + www_ps_url = "http://www.cs.princeton.edu/~bwaters/research/incomparable.ps", + www_tags={selected}, +} + +@InProceedings{k-anonymous:ccs2003, + author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper}, + title = {k-Anonymous Message Transmission}, + booktitle = {{Proceedings of the 10th ACM Conference on Computer and + Communications Security (CCS 2003)}}, + pages = {122--130}, + year = 2003, + editor = {Vijay Atluri and Peng Liu}, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948128&type=pdf}, + www_tags={selected}, +} + +@Article{halpern-oneill-2003, + author = {Joseph Y. Halpern and Kevin R. O'Neill}, + title = {Anonymity and Information Hiding in Multiagent Systems}, + journal = {Journal of Computer Security}, + volume = {}, + number = {}, + year = {2004}, + www_section = methods, + www_pdf_url = "http://www.cs.cornell.edu/people/oneill/papers/jcs_halpern_oneill.pdf", + www_tags={selected}, +} + +@InProceedings{berman-fc2004, + author = {Ron Berman and Amos Fiat and Amnon Ta-Shma}, + title = {Provable Unlinkability Against Traffic Analysis}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {266--280}, + www_section = comm, + www_pdf_url = "http://www.math.tau.ac.il/~fiat/newpaps/fc04.pdf", + www_tags={selected}, +} + +@InProceedings{timing-fc2004, + author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, + title = {Timing Attacks in Low-Latency Mix-Based Systems}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {251--265}, + www_section = traffic, + www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf", + www_tags={selected}, +} + +@InProceedings{morphmix-fc2004, + author = {Marc Rennhard and Bernhard Plattner}, + title = {Practical Anonymity for the Masses with MorphMix}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {233--250}, + www_section = comm, + www_pdf_url = "http://home.zhwin.ch/~rer/publications/FC2004.pdf", + www_tags={selected}, +} + +@InProceedings{mixminion-fc2004, + author = {Nick Mathewson and Roger Dingledine}, + title = {Mixminion: Strong Anonymity for Financial cryptography}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {227--232}, + www_section = comm, + www_pdf_url = "http://freehaven.net/doc/fc04/minion-systems.pdf" +} +% Not selected; the Mixminion paper in IEEE S&P 2003 is canonical.-NM + + +@InProceedings{credentials-fc2004, + author = {Guiseppe Persiano and Ivan Visconti}, + title = {An Efficient and Usable Multi-show Non-transferable Anonymous Credential System}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + editor = {Ari Juels}, + publisher = {Springer-Verlag, LNCS 3110}, + pages = {196--211}, + www_section = credentials +} + +@InProceedings{tor-design, + author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, + title = {{Tor}: The Second-Generation Onion Router}, + booktitle = {Proceedings of the 13th USENIX Security Symposium}, + year = {2004}, + month = {August}, + www_section = comm, + www_important = 1, + www_pdf_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf", + www_html_url = "https://svn.torproject.org/svn/projects/design-paper/tor-design.html", + www_tags={selected}, +} + +@InProceedings{redblue, + author = {George Danezis and Ross Anderson}, + title = {The Economics of Censorship Resistance}, + booktitle = {Proceedings of Workshop on Economics and Information Security (WEIS04)}, + year = {2004}, + month = {May}, + www_section = economics, + www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/redblue.pdf", + www_tags={selected}, +} + +@InProceedings{DanSer04, + author = {George Danezis and Andrei Serjantov}, + title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = traffic, + www_ps_url = "http://www.cl.cam.ac.uk/~aas23/papers_aas/PoolSDA2.ps", + www_tags={selected}, +} + +@InProceedings{pool-dummy04, + author = {Claudia Diaz and Bart Preneel}, + title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = comm, + www_pdf_url = "https://www.cosic.esat.kuleuven.be/publications/article-95.pdf", + www_tags={selected}, +} +% www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_ih.pdf.gz", + + +@InProceedings{hitting-set04, + author = {Dogan Kesdogan and Lexi Pimenidis}, + title = {The Hitting Set Attack on Anonymity Protocols}, + booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)}, + year = {2004}, + series = {LNCS}, + location= {Toronto}, + month = {May}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/Hitting_Set_Attack.pdf", + www_tags={selected}, +} + +@InProceedings{taxonomy-dummy, + author = {Claudia Diaz and Bart Preneel}, + title = {Taxonomy of Mixes and Dummy Traffic}, + booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems}, + year = {2004}, + location= {Toulouse, France}, + month = {August}, + www_section = comm, + www_pdf_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf", + www_tags={selected}, +} + +@InProceedings{newman:pet2004, + author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz}, + title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {1--16}, + www_section = traffic, + www_pdf_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf", + www_ps_url = "http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps", + www_remarks = +{If we think about leaked anonymity as a covert channel between the sender + Alice and the adversary Eve, then by measuring covert channel capacity + we can get an upper bound on the amount of information Alice could leak.}, + www_tags={selected}, +} + +@InProceedings{e2e-traffic, + author = {Nick Mathewson and Roger Dingledine}, + title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {17--34}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf", + www_important = 1, + www_tags={selected}, +} + +@InProceedings{danezis:pet2004, + author = {George Danezis}, + title = {The Traffic Analysis of Continuous-Time Mixes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {35--50}, + www_section = traffic, + www_important = {1}, + www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf", + www_tags={selected}, +} + +@InProceedings{golle:pet2004, + author = {Philippe Golle}, + title = {Reputable Mix Networks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {51--63}, + www_section = proofs, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/reputable.pdf", + www_tags={selected}, +} + +@InProceedings{fairbrother:pet2004, + author = {Peter Fairbrother}, + title = {An Improved Construction for Universal Re-encryption}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {79--87}, + www_section = comm, + www_pdf_url = "http://www.m-o-o-t.org/ICUR.pdf", + www_tags={selected}, +} + +@InProceedings{kugler:pet2004, + author = {Dennis K{\"u}gler}, + title = {On the Anonymity of Banknotes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {108--120}, + www_section = misc +} + +@InProceedings{zugenmaier:pet2004, + author = {Alf Zugenmaier}, + title = {{FLASCHE} --- A Mechanism Providing Anonymity for Mobile Users}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {121--141}, + www_section = comm +} + +@InProceedings{sync-batching, + author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}, + title = {Synchronous Batching: From Cascades to Free Routes}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {186--206}, + www_section = comm, + www_pdf_url = "http://freehaven.net/doc/sync-batching/sync-batching.pdf", + www_ps_url = "http://freehaven.net/doc/sync-batching/sync-batching.ps", + www_tags={selected}, +} + +@InProceedings{flow-correlation04, + author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + month = {May}, + series = {LNCS}, + volume = {3424}, + pages = {207--225}, + www_section = traffic, + www_pdf_url = "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf", + www_tags={selected}, +} + +@InProceedings{TH04, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + title = {Measuring Anonymity in a Non-adaptive, Real-time System}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + series = {Springer-Verlag, LNCS}, + volume = {3424}, + pages = {226--241}, + www_section = traffic, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}, + www_tags={selected}, +} + +@InProceedings{cascades-vs-p2p:pet2004, + author = {Rainer B\"ohme and George Danezis and Claudia Diaz + and Stefan K\"opsell and Andreas Pfitzmann}, + title = {On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: + Is One Concept Superior?''}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, + year = {2004}, + series = {Springer-Verlag, LNCS}, + volume = {3424}, + pages = {226--241}, + www_section = comm, + www_pdf_url ={http://www.cosic.esat.kuleuven.be/publications/article-523.pdf}, +} + +@InProceedings{mixmaster-reliable, + author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte}, + title = {Comparison between two practical mix designs}, + booktitle = {Proceedings of ESORICS 2004}, + year = {2004}, + series = {LNCS}, + location= {France}, + month = {September}, + www_section = traffic, + www_ps_gz_url = "http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz", + www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-98.pdf", + www_tags={selected}, + www_important = {1}, +} + +@inproceedings{danezis:wpes2004, + author={George Danezis and Ben Laurie}, + title={Minx: A simple and efficient anonymous packet format}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = comm, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/minx.pdf}, + www_tags={selected}, +} + +@inproceedings{feamster:wpes2004, + author={Nick Feamster and Roger Dingledine}, + title={Location Diversity in Anonymity Networks}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = comm, + www_ps_url = {http://freehaven.net/doc/routing-zones/routing-zones.ps}, + www_tags={selected}, +} + +@inproceedings{koepsell:wpes2004, + author={Stefan K\"opsell and Ulf Hilling}, + title={How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}}, + location={Washington, DC, USA}, + month={October}, + year={2004}, + www_section = censorship, + www_pdf_url = {http://freehaven.net/anonbib/papers/p103-koepsell.pdf}, + www_tags={selected}, +} + +@InProceedings{reiter:ccs2004, + author = {Michael Reiter and XiaoFeng Wang}, + title = {Fragile Mixing}, + booktitle = {{Proceedings of the 11th ACM Conference on Computer and + Communications Security (CCS 2004)}}, + year = 2004, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf}, + www_tags={selected}, +} + +@InProceedings{golle:ccs2004, + author = {Philippe Golle and Ari Juels}, + title = {Parallel Mixing}, + booktitle = {{Proceedings of the 11th ACM Conference on Computer and + Communications Security (CCS 2004)}}, + year = 2004, + month = {October}, + publisher = {ACM Press}, + www_section = comm, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.pdf", + www_ps_url = "http://crypto.stanford.edu/~pgolle/papers/parallel.ps", + www_tags={selected}, +} + +@InProceedings{golle:eurocrypt2004, + author = {Philippe Golle and Ari Juels}, + title = {Dining Cryptographers Revisited}, + booktitle = "Proceedings of Eurocrypt 2004", + year = 2004, + month = {May}, + www_section = comm, + www_pdf_url = "http://crypto.stanford.edu/~pgolle/papers/nim.pdf", + www_tags={selected}, +} + +@InProceedings{THV04, + author = {Gergely T\'oth and Zolt\'an Horn\'ak and Ferenc Vajda}, + title = {Measuring Anonymity Revisited}, + booktitle = {Proceedings of the Ninth Nordic Workshop on Secure IT Systems}, + pages = {85--90}, + year = {2004}, + location= {Espoo, Finland}, + month = {November}, + editor = {Sanna Liimatainen and Teemupekka Virtanen}, + www_section = traffic, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/nordsec04/tg_nordsec2004_proceedings.pdf}, + www_tags={selected}, +} + +@inproceedings{torta05, + title = {Low-Cost Traffic Analysis of {Tor}}, + author = {Steven J. Murdoch and George Danezis}, + booktitle = {Proceedings of the 2005 IEEE Symposium on Security and Privacy}, + year = {2005}, + month = {May}, + publisher = {IEEE CS}, + www_section = traffic, + www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/oakland05torta.pdf}, + www_important = 1, + www_tags={selected}, +} + +@inproceedings{pet05-bissias, + author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine}, + title = {Privacy Vulnerabilities in Encrypted HTTP Streams}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {1--11}, + www_section = traffic, + www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf", + www_tags={selected}, +} + +@inproceedings{pet05-borisov, + author = {Nikita Borisov}, + title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {12--25}, + www_section = traffic, + www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf", + www_tags={selected}, +} + +@inproceedings{pet05-serjantov, + title = {Message Splitting Against the Partial Adversary}, + author = {Andrei Serjantov and Steven J. Murdoch}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + year = {2005}, + month = {May}, + pages = {26--39}, + www_section = comm, + www_pdf_url = {http://www.cl.cam.ac.uk/users/sjm217/papers/pet05msgsplit.pdf}, + www_tags={selected}, +} + +@inproceedings{pet05-zhu, + author = {Ye Zhu and Riccardo Bettati}, + title = {Unmixing Mix Traffic}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {110--127}, + www_section = traffic, + www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf}, + www_tags={selected}, +} + +@inproceedings{pet05-camenisch, + author = {Jan Camenisch and Anton Mityagin}, + title = {Mix-network with Stronger Security}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)}, + month = {May}, + year = {2005}, + pages = {128--147}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{ih05-danezisclulow, + title = {Compulsion Resistant Anonymous Communications}, + author = {George Danezis and Jolyon Clulow}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {11--25}, + www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{ih05-Klonowski, + title = {Provable Anonymity for Networks of Mixes}, + author = {Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {26--38}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{ih05-Luke, + title = {On Blending Attacks For Mixes with Memory}, + author = {Luke O'Connor}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {39--52}, + www_section = traffic, + www_tags={selected}, + www_pdf_url={http://lukejamesoconnor.googlepages.com/blending-attacks.pdf}, +} + +@inproceedings{ih05-csispir, + title = {Censorship Resistance Revisited}, + author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2005)}, + year = {2005}, + month = {June}, + pages = {62--76}, + www_section = pub, + www_pdf_url = "http://gnunet.org/papers/IHW-CR.pdf", + www_tags={selected}, +} + +@inproceedings{esorics05-Klonowski, + title = {Local View Attack on Anonymous Communication}, + author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of ESORICS 2005}, + year = {2005}, + month = {September}, + www_ps_url = {http://www.im.pwr.wroc.pl/~klonowsk/LocalViewAttack.ps}, + www_section = traffic, + www_tags={selected}, +} + +@inproceedings{warta04-Klonowski, + title = {Universal Re-encryption of Signatures and Controlling Anonymous Information Flow}, + author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski}, + booktitle = {Proceedings of WARTACRYPT '04}, + year = {2004}, + month = {July}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf}, + www_section = misc, + www_tags={selected}, +} + +@inproceedings{sofem05-Klonowski, + title = {Anonymous Communication with On-line and Off-line Onion Encoding}, + author = { Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski}, + booktitle = {Proceedings of Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2005)}, + year = {2005}, + month = {January}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/konflikty.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{wisa04-Klonowski, + title = {Anonymous Communication with On-line and Off-line Onion Encoding}, + author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)}, + year = {2004}, + month = {August}, + www_pdf_url = {http://kutylowski.im.pwr.wroc.pl/articles/modonionWISA04.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{mmsec04-Klonowski, + title = {DUO--Onions and Hydra--Onions -- Failure and Adversary Resistant Onion Protocols}, + author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski}, + booktitle = {Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004}, + year = {2004}, + month = {September}, + www_section = comm, + www_tags={selected}, +} + +@InProceedings{camlys05, + author = "Jan Camenisch and Anna Lysyanskaya", + title = "A Formal Treatment of Onion Routing", + booktitle = {Proceedings of {CRYPTO} 2005}, + year = {2005}, + month = {August}, + editor = {Victor Shoup}, + publisher = {Springer-Verlag, LNCS 3621}, + pages = "169--187", + www_pdf_url = {http://freehaven.net/anonbib/papers/onion21.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{sassaman:wpes2005, + title = {The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval}, + author = {Len Sassaman and Bram Cohen and Nick Mathewson}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005)}}, + year = {2005}, + month = {November}, + location= {Arlington, VA, USA}, + www_pdf_url = {http://www.abditum.com/pynchon/sassaman-wpes2005.pdf}, + www_section = nym, + www_important = {1}, + www_tags={selected}, +} + +@INPROCEEDINGS{GHPvR05, + AUTHOR = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum}, + TITLE = {Provable Anonymity}, + BOOKTITLE = {{Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)}}, + YEAR = "2005", + location= "Alexandria, VA, USA", + month = "November", + www_pdf_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.pdf}, + www_ps_url = {http://www.cs.ru.nl/~flaviog/publications/anonymity.ps}, + www_section = methods, + www_tags={selected}, +} + +@article{xor-trees, + author = {Shlomi Dolev and Rafail Ostrobsky}, + title = {Xor-trees for efficient anonymous multicast and reception}, + journal = {ACM Trans. Inf. Syst. Secur}, + volume = {3}, + number = {2}, + year = {2000}, + pages = {63--84}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = comm, + www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/31.ps", + www_tags={selected}, +} + +@article{buses03, + author = {Amos Beimel and Shlomi Dolev}, + title = {Buses for Anonymous Message Delivery}, + journal = {Journal of Cryptology}, + pages = {25--39}, + volume = {16}, + year = {2003}, + number = {1}, + www_section = comm, + www_ps_url = "ftp://ftp.cs.bgu.ac.il/pub/people/dolev/37.ps", + www_tags={selected}, +} + +@inproceedings{usability:weis2006, + title = {Anonymity Loves Company: Usability and the Network Effect}, + author = {Roger Dingledine and Nick Mathewson}, + crossref = {weis2006}, + www_section = economics, + www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf}, + www_tags={selected}, +} + +@misc{cryptoeprint:2005:394, + author = {Ben Adida and Douglas Wikstr\"om}, + title = {Obfuscated Ciphertext Mixing}, + howpublished = {Cryptology ePrint Archive, Report 2005/394}, + year = {2005}, + month = {November}, + www_section = proofs, + www_html_url = {http://eprint.iacr.org/2005/394}, + www_pdf_url = {http://eprint.iacr.org/2005/394.pdf}, + www_tags={selected}, +} + +@PhDThesis{DiazThesis05, + AUTHOR = {Claudia Diaz}, + YEAR = {2005}, + TITLE = {Anonymity and Privacy in Electronic Services}, + SCHOOL = {Katholieke Universiteit Leuven}, + address = {Leuven, Belgium}, + month = {December}, + www_section = comm, + www_pdf_url = {http://homes.esat.kuleuven.be/~cdiaz/papers/Thesis-cdiaz-final.pdf}, + www_tags={selected}, +} + +@inproceedings{HanLLHP05, + author = {Jinsong Han and + Yunhao Liu and + Li Lu and + Lei Hu and + Abhishek Patil}, + title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {143--152}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{XuFZBCZ05, + author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao}, + title = {SAS: A Scalar Anonymous Communication System}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {452--461}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{LuFSG05, + author = {Tianbo Lu and + Binxing Fang and + Yuzhong Sun and + Li Guo}, + title = {Some Remarks on Universal Re-encryption and A Novel Practical + Anonymous Tunnel}, + booktitle = {Proceedings of ICCNMC}, + year = {2005}, + pages = {853--862}, + www_section = comm, + www_tags = {selected}, + www_abstract_url = {http://www.springerlink.com/content/b3x4na87xbmcextx/}, +} + +@inproceedings{WangCJ05, + author = {Xinyuan Wang and + Shiping Chen and + Sushil Jajodia}, + title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, + booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, + month = {November}, + year = {2005}, + pages = {81--91}, + www_section = comm, + www_pdf_url = "http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf", + www_tags={selected}, +} + +@InProceedings{hs-attack06, + title = {Locating Hidden Servers}, + author = {Lasse {\O}verlier and Paul Syverson}, + booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, + year = {2006}, + month = {May}, + publisher = {IEEE CS}, + www_pdf_url = "http://www.onion-router.net/Publications/locating-hidden-servers.pdf", + www_section = traffic, + www_important = {1}, + www_remarks = {Motivates and describes Tor's entry guard design.}, + www_tags={selected}, +} + +@InProceedings{esorics04-mauw, + title = {A formalization of anonymity and onion routing}, + author = {S. Mauw and J. Verschuren and E.P. de Vink}, + publisher = {LNCS 3193}, + www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, + booktitle = {Proceedings of ESORICS 2004}, + editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, + location = {Sophia Antipolis}, + year = {2004}, + pages = {109--124}, + www_section = methods, + www_tags={selected}, +} + +@inproceedings{UREbreak06, + title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption}, + author = {George Danezis}, + booktitle = {Proceedings of Information Security Conference 2006}, + year = {2006}, + month = {September}, + publisher = {Springer-Verlag}, + www_pdf_url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf}, + www_section = proofs, + www_tags={selected}, +} + +@inproceedings{Golle:sp2006, + title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks}, + author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow}, + booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, + year = {2006}, + month = {May}, + location = {Oakland, CA}, + pages = {121--131}, + publisher = {IEEE CS}, + www_section = comm, + www_pdf_url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf}, + www_tags={selected}, +} + +@inproceedings{icdcs2006:m2, + title = {M2: Multicasting Mixes for Efficient and Anonymous Communication}, + author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, + booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems}, + year = {2006}, + month = {July}, + day = {4--7}, + www_section = comm, + www_pdf_url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf}, + www_tags={selected}, +} + +@inproceedings{danezis:weis2006, + title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications}, + author = {George Danezis and Bettina Wittneben}, + crossref = {weis2006}, + www_section = traffic, + www_important = 1, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-788.pdf}, + www_tags={selected}, +} + +@inproceedings{heydt-benjamin:pet2006, + title = {Privacy for Public Transportation}, + author = {Thomas Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + www_section = credentials, + pages = {1--19}, + www_pdf_url = {http://www.cs.umass.edu/~tshb/PET06-heydt-benjamin.pdf}, + www_tags={selected}, +} + +@inproceedings{ciaccio:pet2006, + author = {Giuseppe Ciaccio}, + title = {Improving Sender Anonymity in a Structured Overlay with Imprecise Routing}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {190--207}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_11.pdf}, + www_tags={selected}, +} + +@inproceedings{valet:pet2006, + author = {Lasse {\O}verlier and Paul Syverson}, + title = {Valet Services: Improving Hidden Servers with a Personal Touch}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {223--244}, + www_section = nym, + www_pdf_url = {http://www.onion-router.net/Publications/valet-services.pdf}, + www_tags={selected}, +} + +@inproceedings{alpha-mixing:pet2006, + author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, + title = {Blending Different Latency Traffic with Alpha-Mixing}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {245--257}, + www_section = comm, + www_pdf_url = {http://freehaven.net/doc/alpha-mixing/alpha-mixing.pdf}, + www_tags={selected}, +} + +@inproceedings{tap:pet2006, + author = {Ian Goldberg}, + title = {On the Security of the {Tor} Authentication Protocol}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {316--331}, + www_section = methods, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/torsec.pdf}, + www_tags={selected}, +} + +@inproceedings{morphmix:pet2006, + author = {Parisa Tabriz and Nikita Borisov}, + title = {Breaking the Collusion Detection Mechanism of MorphMix}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {368--384}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_21.pdf}, + www_tags={selected}, +} + +@inproceedings{clayton:pet2006, + author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, + title = {{Ignoring the Great Firewall of China}}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {20--35}, + www_section = censorship, + www_pdf_url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, + www_tags={selected}, +} + +@inproceedings{cview:pet2006, + author = {Andreas Pashalidis and Bernd Meyer}, + title = {Linking Anonymous Transactions: The Consistent View Attack}, + editor = {George Danezis and Philippe Golle}, + booktitle = "Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)", + month = {June}, + year = {2006}, + publisher = {Springer}, + location = {Cambridge, UK}, + bookurl = {http://petworkshop.org/2006/}, + pages = {384--392}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2006/preproc/preproc_22.pdf}, + www_tags={selected}, +} + +@techreport{karger77, + Author="Paul A. Karger", + Title="Non-Discretionary Access Control for Decentralized Computing Systems", + Institution="Laboratory for Computer Science, Massachusetts Institute of Technology", + Address="Cambridge, MA", + Number="MIT/LCS/TR-179", + Type="S. M. \& E. E. thesis", + Month="May", + Year=1977, + + www_section = traffic, + www_pdf_url = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-179.pdf}, + www_remarks = {Chapter 11, "Limitations of End-to-End Encryption," has some early discussion of traffic analysis issues.}, + www_tags={selected}, +} + +@techreport{padlipky78, + Author={Michael A. Padlipsky and David W. Snow and Paul A. Karger}, + Title="Limitations of End-to-End Encryption in Secure Computer Networks", + Institution="The MITRE Corporation: Bedford MA, HQ Electronic Systems Division", + Address="Hanscom AFB, MA", + Number="ESD-TR-78-158", + Month="August", + Year=1978, + www_section = traffic, + www_pdf_url = {http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=3DA059221&Location=3DU2&doc=3D+=GetTRDoc.pdf}, + www_tags={selected}, +} + +@InProceedings{stepping-stones, + author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu}, + title = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones}, + Booktitle = {Proceedings of ESORICS 2002}, + Year = {2002}, + month = {October}, + pages = {244--263}, + www_section = traffic, + www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf}, + www_tags={selected}, +} + +@InProceedings{fu-active, + author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {Active Traffic Analysis Attacks and Countermeasures}, + booktitle = {Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing}, + year = {2003}, + pages = {31--39}, + www_section = traffic, + www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf}, + www_tags={selected}, +} + +@InProceedings{fu-analytical, + author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks}, + Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}, + year = {2003}, + pages={483--492}, + www_section = traffic, + www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf}, + www_tags={selected}, +} + +@inproceedings{Fu::FlowMarking::2005, + author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao}, + title = {On Flow Marking Attacks in Wireless Anonymous Communication Networks}, + booktitle = {Proceedings of the IEEE International Conference on +Distributed Computing Systems (ICDCS)}, + year = {2005}, + month = {April}, + www_section = traffic, + www_pdf_url = {http://www.homepages.dsu.edu/fux/paper/JUCI06_Fu.pdf}, + www_tags={selected}, +} + +@inproceedings{ShWa-Timing06, + title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses}, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + booktitle = {Proceedings of ESORICS 2006}, + year = {2006}, + month = {September}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf}, + www_section = traffic, + www_tags = {selected}, + www_important = 1, +} + +@inproceedings{ShWa-Relationship, + title = {Measuring Relationship Anonymity in Mix Networks}, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, + year = {2006}, + month = {October}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf}, + www_section = traffic, + www_tags = {selected}, +} + +@inproceedings{Salsa, + title = {Salsa: A Structured Approach to Large-Scale Anonymity}, + author = {Arjun Nambiar and Matthew Wright}, + booktitle = {Proceedings of CCS 2006}, + year = {2006}, + month = {November}, + www_pdf_url = {http://ranger.uta.edu/~mwright/papers/salsa-ccs06.pdf}, + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{HotOrNot, + title = {Hot or Not: Revealing Hidden Services by their Clock Skew}, + author = {Steven J. Murdoch}, + booktitle = {Proceedings of CCS 2006}, + year = {2006}, + month = {November}, + www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf}, + www_section = traffic, + www_tags = {selected}, +} + +@inproceedings{goldberg-2007, + title = {{Improving the Robustness of Private Information Retrieval}}, + author = {Ian Goldberg}, + booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, + year = {2007}, + month = {May}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/robustpir.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{beimel-robust, + author = {A. Beimel and Y. Stahl}, + title = {Robust information-theoretic private information retrieval}, + booktitle = {Proceedings of the 3rd Conference on Security in Communication Networks}, + editor = {S. Cimato C. Galdi G. Persiano }, + publisher = {Springer-Verlag}, + series = {Lecture Notes in Computer Science}, + pages = {326--341}, + volume = {2576}, + year = {2002}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.pdf}, + www_ps_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BS.ps}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@techreport{cosic-2007-001, + author = {Len Sassaman and Bart Preneel}, + title = {{The Byzantine Postman Problem: A Trivial Attack Against + PIR-based Nym Servers}}, + year = {2007}, + month = {February}, + institution = {Katholieke Universiteit Leuven}, + number = {ESAT-COSIC 2007-001}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-880.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@article{beimel01informationtheoretic, + author = {Amos Beimel and Yuval Ishai}, + title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, + journal = {Lecture Notes in Computer Science}, + volume = {2076}, + pages = {89--98}, + year = {2001}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BI.pdf}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{CPIR, + author = {Benny Chor and Niv Gilboa}, + title = {Computationally private information retrieval (extended abstract)}, + booktitle = {Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97)}, + month = {May}, + year = {1997}, + isbn = {0-89791-888-6}, + pages = {304--313}, + location = {El Paso, Texas, United States}, + doi = {http://doi.acm.org/10.1145/258533.258609}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = {http://citeseer.ist.psu.edu/cache/papers/cs/4624/http:zSzzSzwww.cs.technion.ac.ilzSz~gilboazSzstoc_final.pdf/chor97computationally.pdf}, + www_ps_url = {http://www.cs.technion.ac.il/~gilboa/stoc_final.ps}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{pir, + title = {Private Information Retrieval}, + author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu +Sudan}, + booktitle = {Proceedings of the {IEEE} Symposium on Foundations of Computer Science}, + pages = {41--50}, + year = {1995}, + www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps}, + www_section = pir, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{beimel-barrier, + title = {{Breaking the $O(n^{1/(2k-1)})$ Barrier for Information-Theoretic Private Information Retrieval}}, + author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran\c{c}ois Raymond}, + booktitle = {Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS'02)}, + month = {November}, + year = {2002}, + www_pdf_url = {http://www.cs.bgu.ac.il/~beimel/Papers/BIKR.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{tau-indy, + author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, + title = {A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication}, + booktitle = {Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98)}, + year = {1998}, + isbn = {3-540-65142-X}, + pages = {200--217}, + publisher = {Springer-Verlag}, + location = {London, UK}, + www_ps_gz_url = {http://eprint.iacr.org/1998/013.ps.gz}, + www_section = pir, + www_tags = {selected}, +} + +@article{kissner04private, + author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang}, + title = {Private keyword-based push and pull with applications to anonymous communication}, + journal = {Applied Cryptography and Network Security}, + year = {2004}, + www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf}, + www_section = pir, + www_tags = {selected}, +} + +@inproceedings{wpes06:heydt-benjamin, + author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend}, + title = {Nonesuch: a mix network with sender unobservability}, + booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}}, + month = {October}, + year = {2006}, + isbn = {1-59593-556-8}, + pages = {1--8}, + location = {Alexandria, Virginia, USA}, + doi = {http://doi.acm.org/10.1145/1179601.1179603}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = "http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf", + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{clonewars, + author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich}, + title = {How to win the clonewars: efficient periodic n-times anonymous authentication}, + booktitle = {Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006)}, + month = {November}, + year = {2006}, + isbn = {1-59593-518-5}, + pages = {201--210}, + location = {Alexandria, Virginia, USA}, + doi = {http://doi.acm.org/10.1145/1180405.1180431}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_pdf_url = "http://www.cosic.esat.kuleuven.be/publications/article-812.pdf", + www_section = credentials, + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{idemix, + author = {Jan Camenisch and Els Van Herreweghen}, + title = {Design and implementation of the idemix anonymous credential system}, + booktitle = {Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002)}, + year = {2002}, + isbn = {1-58113-612-9}, + pages = {21--30}, + location = {Washington, DC, USA}, + doi = {http://doi.acm.org/10.1145/586110.586114}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = credentials, + www_pdf_url = "http://www.zurich.ibm.com/~jca/papers/camvan02.pdf", + www_important = {1}, + www_tags = {selected}, +} + +@inproceedings{cl01a, + author = {Jan Camenisch and Anna Lysyanskaya}, + title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, + booktitle = {Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01)}, + year = {2001}, + isbn = {3-540-42070-3}, + pages = {93--118}, + publisher = {Springer-Verlag}, + location = {London, UK}, + www_section = credentials, + www_pdf_url = "http://theory.lcs.mit.edu/~cis/pubs/lysyanskaya/cl01a.pdf", + www_tags = {selected}, +} + +@inproceedings{chl05-full:eurocrypt2005, + author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, + title = {Compact E-Cash}, + pages = {302--321}, + ee = {http://dx.doi.org/10.1007/11426639_18}, + crossref = {eurocrypt2005}, + www_section = credentials, + www_pdf_url = "http://www.cs.brown.edu/~anna/papers/chl05-full.pdf", + www_important = {1}, + www_tags = {selected}, +} +% booktitle = {Proceedings of EUROCRYPT 2005}, +% year = {2005}, +% bibsource = {DBLP, http://dblp.uni-trier.de} + + +@article{adams06, + title = {A Classification for Privacy Techniques}, + author = {Carlisle Adams}, + journal = {University of Ottawa Law \& Technology Journal}, + volume = {3}, + issue = {1}, + year = {2006}, + pages = {35--52}, + www_pdf_url = +{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf}, + www_section = {Misc}, + www_tags = {selected}, +} + +@article{brands06, + title = {Secure User Identification Without Privacy Erosion}, + author = {Stefan Brands}, + journal = {University of Ottawa Law \& Technology Journal}, + volume = {3}, + issue = {1}, + year = {2006}, + pages = {205--223}, + www_pdf_url = +{http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Brands.205-223.pdf}, + www_section = {Misc}, + www_tags = {selected}, +} + +@inproceedings{adida07, + author = {Ben Adida and Douglas Wikstr\"om}, + title = {How to Shuffle in Public}, + booktitle = {Proceedings of the Theory of Cryptography 2007}, + year = {2007}, + month = {February}, + www_section = proofs, + www_pdf_url = {http://ben.adida.net/research/how-to-shuffle-in-public-tcc-2007.pdf}, + www_tags = {selected}, +} + +@InProceedings{slicing07, + author = {Sachin Katti and Jeffery Cohen and Dina Katabi}, + title = {Information Slicing: Anonymity Using Unreliable Overlays}, + booktitle = {Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI)}, + year = {2007}, + month = {April}, + www_section = comm, + www_pdf_url = "http://nms.lcs.mit.edu/~dina/pub/slicing-nsdi.pdf", + www_tags = {selected}, +} + +% +% PET 2007 PAPERS. Links are to pre-procedings versions. +% +@InProceedings{franz-pet2007, + author = {Matthias Franz and Bernd Meyer and Andreas Pashalidis}, + title = {Attacking Unlinkability: The Importance of Context}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = methods, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Attacking_unlinkability.pdf}, +} + +@InProceedings{serjantov-pet2007, + author = {Andrei Serjantov}, + title = {A Fresh Look at the Generalized Mix Framework}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf}, +} + +@InProceedings{danezis-pet2007, + author = {George Danezis and Claudia Diaz and Carmela Troncoso}, + title = {Two-Sided Statistical Disclosure Attack}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Two_sided_statistical.pdf}, + www_tags = {selected}, + www_remarks = {Extends the Statistical Disclosure attack to take advantage of reply messages.}, +} + +@InProceedings{tsudik-pet2007, + author = {Gene Tsudik}, + title = {A Family of Dunces}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = misc, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Family_dunces.pdf}, +} + +@InProceedings{zhong-pet2007, + author = {Ge Zhong and Ian Goldberg and Urs Hengartner}, + title = {Louis, Lester, and Pierre: Three Protocols for Location Privacy}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Louis_Lester.pdf}, +} + +@InProceedings{faust-pet2007, + author = {Sebastian Faust and Lothar Fritsch and Martek Gedrojc and Markulf Kohlweiss and Bart Preneel}, + title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Efficient_oblivious.pdf}, +} + +@InProceedings{kate-pet2007, + author = {Aniket Kate and Greg Zaverucha and Ian Goldberg}, + title = {Pairing-Based Onion Routing}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Pairing_based.pdf}, + www_remarks = {Describes a circuit-establishment protocol for a Tor-like + network. Uses Pairing- and Identity-Based crypto for efficiency, at the + expense of having all private keys generated by a trusted IBE authority.}, +} + +@InProceedings{johnson-pet2007, + title = {Nymble: Anonymous IP-address Blocking}, + author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and + Sean W. Smith}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = misc, + www_pdf_url= {http://www.cs.dartmouth.edu/~patrick/pub/nymble.pdf}, + www_remarks = {Superseded by nymble-tdsc.}, +} + +@Inproceedings{overlier-pet2007, + title = {Improving Efficiency and Simplicity of {Tor} circuit establishment and hidden services}, + author = {Lasse {\O}verlier and Paul Syverson}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = comm # and # torperf, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Improving_efficiency.pdf}, + www_tags = {selected}, + www_remarks = {Introduces Diffie-Hellman-based handshakes to build + Tor circuits with fewer exponentiations than the original + circuit-establishment protocol.}, +} + +@Inproceedings{guha-pet2007, + author = {Saikat Guha and Paul Francis}, + title = {Identity Trail: Covert Surveillance Using DNS}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Identity_trail.pdf}, +} + +@Inproceedings{murdoch-pet2007, + title={Sampled Traffic Analysis by {I}nternet-Exchange-Level Adversaries}, + author={Steven J. Murdoch and Piotr Zieli{\'n}ski}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf}, + www_tags = {selected}, + www_important = {1}, + www_remarks = {Examines efficacy of traffic analysis against a + low-latency anonymity network by an adversary who + controls Internet exchanges, and who can only + sample a fraction of traffic.}, +} + +@InProceedings{abbott-pet2007, + title = {Browser-Based Attacks on {Tor}}, + author = {Tim Abbott and Katherine J. Lai and Michael R. Lieberman and Eric C. Price}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://petworkshop.org/2007/papers/PET2007_preproc_Browser_based.pdf}, +} + +@InProceedings{wendolsky-pet2007, + title={Performance Comparison of low-latency Anonymisation Services from a User Perspective}, + author={Rolf Wendolsky and Dominik Herrmann and Hannes Federrath}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section=comm, + www_pdf_url ={http://petworkshop.org/2007/papers/PET2007_preproc_Performance_comparison.pdf}, +} + +@Inproceedings{nagaraja-pet2007, + title={Anonymity in the wild: Mixes on unstructured networks}, + author={Shishir Nagaraja}, + editor = {Nikita Borisov and Philippe Golle}, + booktitle = "Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)", + month = {June}, + year = {2007}, + publisher = {Springer}, + location = {Ottawa, Canada}, + bookurl = {http://petworkshop.org/2007/}, + www_section=comm, + www_pdf_url={http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf}, +} + +@inproceedings{Liberatore:2006, + Author = {Marc Liberatore and Brian Neil Levine}, + Title = {{Inferring the Source of Encrypted HTTP Connections}}, + Booktitle = {Proceedings of the 13th ACM conference on Computer and + Communications Security (CCS 2006)}, + Month = {November}, + year = {2006}, + Pages = {255--263}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/liberatore.ccs2006.pdf}, +} + +@article{Levine:2002, + Author = {Brian Neil Levine and Clay Shields}, + Journal = {Journal of Computer Security}, + Keywords = {anonymity; routing; security; multicast; Journal Paper}, + Number = 3, + Pages = {213--240}, + Title = {{Hordes --- A Multicast Based Protocol for Anonymity}}, + Volume = 10, + Year = {2002}, + www_section = comm, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/brian.hordes.jcs01.pdf}, + www_tags = {selected}, +} + +@inproceedings{Scarlata:2001, + Author = {Vincent Scarlata and Brian Neil Levine and Clay Shields}, + Title = {{Responder Anonymity and Anonymous Peer-to-Peer File Sharing}}, + Booktitle = {Proceedings of the IEEE International Conference on Network + Protocols (ICNP)}, + Keywords = {security; routing; peer-to-peer; anonymity}, + Month = {November}, + Pages = {272--280}, + Year = {2001}, + www_section = misc, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/scarlata.apfs.pdf}, +} +%% Presentation_Url = {http://prisms.cs.umass.edu/brian/pubs/slides/scarlata.ICNP_2001.pdf}, + + +@article{Wright:2004, + Author = {Matthew Wright and Micah Adler and Brian Neil Levine and + Clay Shields}, + Title = {{The Predecessor Attack: An Analysis of a Threat to + Anonymous Communications Systems}}, + Journal = {ACM Transactions on Information and System Security (TISSEC)}, + Keywords = {anonymity; Journal Paper}, + Month = {November}, + Number = 7, + Pages = {489--522}, + Volume = 4, + Year = {2004}, + www_section = traffic, + www_pdf_url = {http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf}, + www_tags = {selected}, +} + +@inproceedings{Wang-SP2007, + title = {{Network Flow Watermarking Attack on Low-Latency Anonymous + Communication Systems}}, + author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, + booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, + year = {2007}, + month = {May}, + pages = {116--130}, + www_section = traffic, + www_pdf_url = + {http://ise.gmu.edu/~xwangc/Publications/Wang-FlowWatermarking.pdf}, +} + +@INPROCEEDINGS{HasuoK07a, + AUTHOR = "Ichiro Hasuo and Yoshinobu Kawabe", + TITLE = "Probabilistic Anonymity via Coalgebraic Simulations", + BOOKTITLE = "Proceedings of the European Symposium on Programming (ESOP '07)", + PAGES = "379--394", + PUBLISHER = "Springer, Berlin", + SERIES = lncs, + VOLUME = "4421", + YEAR = 2007, + www_section = methods, + www_pdf_url = {http://www.cs.ru.nl/%7Eichiro/papers/probAnonymSim.pdf}, +} + +@article{regroup2006, + author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}, + title = {Regroup-And-Go mixes to counter the $(n-1)$ attack}, + journal = {Journal of Internet Research}, + pages = {213--223}, + volume = {16}, + year = {2006}, + doi = {http://dx.doi.org/10.1108/10662240610656528}, + number = {2}, + publisher = {Emerald Group Publishing Limited}, + www_section = comm, + www_tags={selected}, +} + +@INPROCEEDINGS{ringstwice07, + author = {Meredith L. Patterson and Len Sassaman}, + title = {Subliminal Channels in the Private Information Retrieval Protocols}, + year = {2007}, + booktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux}, + location = {Enschede, NL}, + publisher = {Werkgemeenschap voor Informatie- en Communicatietheorie}, + www_section = pir, + www_tags={selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-895.pdf}, +} +%pages = {8}, % This can't be right. -NM + +@article{wagner, + author = {Robyn Wagner}, + title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}}, + journal = {New Mexico Law Review}, + volume = {32}, + number = {Winter}, + pages = {99--142}, + year = {2002}, + www_section = misc, + www_tags = {selected}, +} + +@inproceedings{cooper, + title = {Preserving Privacy in a Network of Mobile Computers}, + author = {David A. Cooper and Kenneth P. Birman}, + booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy}, + year = {1995}, + month = {May}, + www_section = pir, + www_tags = {selected}, + www_pdf_url = {http://ecommons.library.cornell.edu/bitstream/1813/7148/1/95-1490.pdf}, +} + +@INPROCEEDINGS{space-efficient, + author = {George Danezis and Claudia Diaz}, + title = {Space-Efficient Private Search}, + month = {February}, + year = {2007}, + booktitle = {Proceedings of Financial Cryptography (FC2007)}, + series = {Lecture Notes in Computer Science}, + location= {Tobago}, + publisher = {Springer-Verlag}, + www_section = pir, + www_tags = {selected}, +} + +% -- Below are additions from gd on 01 July 2007 -- + +@inproceedings{1166488, + author = {Ira S. Moskowitz and Richard E. Newman}, + title = {Timing channels, anonymity, mixes, and spikes}, + booktitle = {Proceedings of the 2nd IASTED international +conference on Advances in computer science and technology (ACST '06)}, + month = {January}, + year = {2006}, + isbn = {0-88986-545-0}, + pages = {251--256}, + location = {Puerto Vallarta, Mexico}, + publisher = {ACTA Press}, + address = {Anaheim, CA, USA}, + www_section = methods +} + +@inproceedings{Huang06, + author = {Dijiang Huang}, + title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems}, + booktitle = {Proceedings of the 5th ACM workshop on Wireless +security (WiSe '06)}, + year = {2006}, + isbn = {1-59593-557-6}, + pages = {65--74}, + location = {Los Angeles, California}, + doi = {http://doi.acm.org/10.1145/1161289.1161303}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + www_section = traffic +} + +@article{10.1109/SP.2006.17, +author = {Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter +Rautenbach}, +title = {Fundamental Limits on the Anonymity Provided by the MIX Technique}, +journal = {sp}, +volume = {0}, +year = {2006}, +issn = {1081-6011}, +pages = {86--99}, +doi = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +www_section = traffic, +www_pdf_url = {http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf} +} + +@article{ishai2006ca, + title={{Cryptography from Anonymity}}, + author={Y. Ishai and E. Kushilevitz and R. Ostrovsky and A. Sahai}, + journal={Proceedings of the 47th Annual IEEE Symposium on Foundations +of Computer Science (FOCS'06)-Volume 00}, + pages={239--248}, + month = {October}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_tags = {selected}, + www_section = methods, + www_pdf_url={http://www.cs.ucla.edu/~rafail/PUBLIC/75.pdf}, +} + + +@misc{wang2006sam, + title={{System and method for protecting privacy and anonymity of parties of network communications}}, + author={Y.M. Wang and Q. Sun and D.R. Simon and W. Russell}, + year={2006}, + howpublished={US Patent 6,986,036}, + publisher={Google Patents}, + note={US Patent 6,986,036}, + www_section = comm +} + +@article{kesdogan2006tcn, + title={{Technical challenges of network anonymity}}, + author={D. Kesdogan and C. Palmer}, + journal={Computer Communications}, + volume={29}, + number={3}, + pages={306--324}, + year={2006}, + publisher={Elsevier}, + www_section = comm +} + +@article{kopsell2006ra, + title={{Revocable Anonymity}}, + author={S. Kopsell and R. Wendolsky and H. Federrath}, + journal={Emerging Trends in Information and Communication +Security-ETRICS, LNCS}, + volume={3995}, + pages={206--220}, + year={2006}, + www_section = comm +} + +@article{huang2006sce, + title={{Silent cascade: Enhancing location privacy without communication qos degradation}}, + author={L. Huang and K. Matsuura and H. Yamane and K. Sezaki}, + journal={Proc. of Security in Pervasive Computing (SPC)}, + pages={165--180}, + year={2006}, + www_section = misc +} + +@article{melchor2006dnp, + title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}}, + author={C.A. Melchor and Y. Deswarte}, + journal={Proceedings of the Fifth IEEE International Symposium on +Network Computing and Applications}, + pages={163--172}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm +} + +@inproceedings{clauss2006sam, + author = {Clau\ss, Sebastian and Schiffner, Stefan}, + title = {Structuring Anonymity Metrics}, + booktitle = {Proceedings of the Second ACM Workshop on Digital Identity Management}, + series = {DIM '06}, + year = {2006}, + isbn = {1-59593-547-9}, + location = {Alexandria, Virginia, USA}, + pages = {55--62}, + numpages = {8}, + url = {http://doi.acm.org/10.1145/1179529.1179539}, + doi = {10.1145/1179529.1179539}, + acmid = {1179539}, + publisher = {ACM Press}, + address = {New York, NY, USA}, + keywords = {anonymity metrics, identity management, privacy metrics}, + www_section = methods +} + +@article{durresi2006tac, + title={{Tokens for Anonymous Communications in the Internet}}, + author={A. Durresi and V. Paruchuri and L. Barolli and R. Jain and +M. Takizawa}, + journal={Proceedings of the 17th International Conference on Database +and Expert Systems Applications}, + pages={83--90}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm, + www_pdf_url={http://www.cs.wustl.edu/~jain/papers/ftp/tokens.pdf}, +} + +@article{deng2006mar, + title={{Measuring anonymity with relative entropy}}, + author={Y. Deng and J. Pang and P. Wu}, + journal={Proc. of FAST}, + year={2006}, + www_section = methods +} + +@article{tsai2006sas, + title={{A Scalable Anonymous Server Overlay Network}}, + author={H. Tsai and A. Harwood}, + journal={Proceedings of the 20th International Conference on Advanced +Information Networking and Applications-Volume 1 (AINA'06)-Volume 01}, + pages={973--978}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = comm +} + +% article{toth11aca, +% title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}}, +% author={G. Toth and Z. Hornak}, +% journal={Security and Privacy in Dynamic Environments--Proceedings of +%the IFIP TC-11 21st International Information Security Conference (SEC +%2006)}, +% year = {2006}, +% volume={201}, +% www_section = stream, +%} + +@inproceedings{TH06a, + title = {{The APROB Channel: adaptive semi-real-time anonymous communication}}, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + booktitle = {Proceedings of I-NetSec'06 Privacy and Anonymity Issues in Networked and Distributed, Karlstad, Sweden}, + year = {2006}, + www_section = {stream}, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2005/inetsec/inetsec-2006-APROB-Channel.pdf}, +} + +@inproceedings{TH06b, + title = {{The Chances of Successful Attacks against Continuous-time Mixes}}, + author = {Gergely T\'oth and Zolt\'an Horn\'ak}, + booktitle = {Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\"oping, Sweden}, + year = {2006}, + www_section = {Traffic analysis}, + www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf}, +} + + + +@article{10.1109/IWNAS.2006.40, +author = {Yingwu Zhu}, +title = {Resilient P2P Anonymous Routing by Using Redundancy}, +journal = {iwnas}, +volume = {0}, +year = {2006}, +isbn = {0-7695-2651-9}, +pages = {103--110}, +doi = {http://doi.ieeecomputersociety.org/10.1109/IWNAS.2006.40}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +www_section = comm +} + +@article{chatzikokolakis2006apn, + title={{Anonymity Protocols as Noisy Channels?}}, + author={K. Chatzikokolakis and C. Palamidessi and P. Panangaden}, + journal={Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. +Springer}, + year={2006}, +www_section = methods, +www_tags = {selected} +} + +@article{boukerche2005esd, + title={{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}}, + author={A. Boukerche and K. El-Khatib and L. Xu and L. Korba}, + journal={Computer Communications}, + volume={28}, + number={10}, + pages={1193--1203}, + year={2005}, + publisher={Elsevier}, + www_section = comm, + www_pdf_url={http://www.scs.carleton.ca/~xlii/publications/COMPCOM05.pdf}, +} + +@article{danezis2006rfa, + title={{Route Fingerprinting in Anonymous Communications}}, + author={George Danezis and Richard Clayton}, + journal={Proceedings of the Sixth IEEE International Conference on +Peer-to-Peer Computing}, + pages={69--72}, + year={2006}, + publisher={IEEE Computer Society Washington, DC, USA}, + www_section = mixattacks, + www_pdf_url = "http://www.cl.cam.ac.uk/~rnc1/anonroute.pdf" +} + +@article{singh2006ama, + title={{Agyaat: mutual anonymity over structured P2P networks}}, + author={A. Singh and B. Gedik and L. Liu}, + journal={Internet Research}, + volume={16}, + number={2}, + pages={189--212}, + year={2006}, + www_section = comm +} + +@article{gupta2006uns, + title={{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}}, + author={R. Gupta and S. Ray and A.K. Somani and Z. Zhang}, + journal={Multiagent and Grid Systems}, + volume={2}, + number={1}, + pages={11--27}, + year={2006}, + publisher={IOS Press}, + www_section = economics, + www_pdf_url={http://www.public.iastate.edu/~rsouvik/Article531.pdf}, +} + +@article{nguyen2006vsf, + title={{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}}, + author={L. Nguyen and R. Safavi-Naini and K. Kurosawa}, + journal={International Journal of Information Security}, + volume={5}, + number={4}, + pages={241--255}, + year={2006}, + publisher={Springer}, + www_section = proofs, + www_tags = {selected}, +} + +% -- end of additions from gd on 01 July 2007 -- +% -- start of additions from tshb on 16 July 2007 --- +% my thanks to Markulf Kohlweiss for his recommendations +@inproceedings{camenisch2003pve, + title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms}, + author = {Jan Camenisch and Victor Shoup}, + booktitle = {Proceedings of {CRYPTO} 2003}, + year = {2003}, + pages = {126--144}, + publisher = {Springer Verlag, LNCS 2729}, + www_section = credentials, + www_important = {0}, + www_tags = {selected}, + www_pdf_url = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2729{\&}spage=126}, +} + +@inproceedings{camenisch2002da, + title = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials}, + author = {Jan Camenisch and Anna Lysyanskaya}, + booktitle = {Proceedings of {CRYPTO} 2002}, + year = {2002}, + pages = {61--76}, + publisher = {Springer Verlag, LNCS 2442}, + www_section = credentials, + www_important = {0}, + www_tags = {selected}, + www_pdf_url = {http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm}, +} + +@inproceedings{camenisch2002ssep, + title = {A Signature Scheme with Efficient Protocols}, + author = {Jan Camenisch and Anna Lysyanskaya}, + booktitle = {Proceedings of {SCN '02}, Third Conference on Security in Communication Networks}, + year = {2002}, + pages = {268--289}, + publisher = {Springer Verlag, LNCS 2576}, + www_section = credentials, + www_important = {1}, + www_tags = {selected}, + www_pdf_url = {http://www.zurich.ibm.com/%7Ejca/papers/camlys02b.pdf}, +} + +@inproceedings{ccs07-latency-leak, + title = {How Much Anonymity does Network Latency Leak?}, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/ccs-latency-leak.pdf}, + www_section = traffic +} + +@article{tissec-latency-leak, + title = {How Much Anonymity does Network Latency Leak?}, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + journal = {ACM Transactions on Information and System Security}, + year = {2010}, + month = {February}, + volume={13}, + number={2}, + www_important = {1}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/tissec-latency-leak.pdf}, + www_section = traffic +} + +@inproceedings{ccs07-doa, + title = {Denial of Service or Denial of Security? {H}ow Attacks on Reliability can Compromise Anonymity}, + author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.crhc.uiuc.edu/~nikita/papers/relmix-ccs07.pdf}, + www_tags = {selected}, + www_important = {1}, + www_section = traffic +} + +@inproceedings{ccs07-blac, + title = {Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs}, + author = {Patrick Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, + booktitle = {Proceedings of CCS 2007}, + year = {2007}, + month = {October}, + www_pdf_url = {http://www.cs.dartmouth.edu/~patrick/pub/blac.pdf}, + www_section = nym, + www_remarks = {Superseded by blac-tissec}, +} + +@inproceedings{wiangsripanawan-acsw07, + author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini}, + title = {Design principles for low latency anonymous network systems secure against timing attacks}, + booktitle = {Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07)}, + year = {2007}, + isbn = {1-920-68285-X}, + pages = {183--191}, + location = {Ballarat, Australia}, + publisher = {Australian Computer Society, Inc}, + address = {Darlinghurst, Australia, Australia}, + www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=1274553&type=pdf&coll=GUIDE&dl=}, + www_tags = {selected}, + www_section = traffic, +} + +@inproceedings{ChatziPP07, + author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, + title = {Probability of Error in Information-Hiding Protocols}, + booktitle = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)}, + year = {2007}, + location = {S. Servolo island, Venice - Italy}, + www_pdf_url = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}, + www_tags = {selected}, + www_section = comm +} + +@article{WrightMM06, + author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson}, + title = {On Inferring Application Protocol Behaviors in Encrypted Network Traffic}, + journal = {Journal of Machine Learning Research }, + volume = {7}, + year = {2006}, + issn = {1533-7928}, + pages = {2745--2769}, + publisher = {MIT Press}, + address = {Cambridge, MA, USA}, + www_pdf_url = {http://jmlr.csail.mit.edu/papers/volume7/wright06a/wright06a.pdf}, + www_tags = {selected}, + www_section = traffic +} + +@inproceedings{AthanRAM07, + author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos}, + title = {GAS: Overloading a File Sharing Network as an Anonymizing System}, + booktitle = {Proceedings of Second International Workshop on Security, (IWSEC 2007)}, + year = {2007}, + location = {Nara, Japan}, + www_pdf_url = {http://dcs.ics.forth.gr/Activities/papers/gas%20iwsec07.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{bauer:wpes2007, + author={Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, + title={Low-Resource Routing Attacks Against {Tor}}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = traffic, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/wpes25-bauer.pdf}, + www_tags={selected}, + www_important = 1, +} + +@inproceedings{feigenbaum:wpes2007, + author={Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title={A Probabilistic Analysis of Onion Routing in a Black-box Model}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = proofs, + www_pdf_url = {http://www.cs.yale.edu/homes/jf/WPES07-Aaron.pdf}, +} + +@inproceedings{erway:wpes2007, + author={Chris Erway and Melissa Chase and John Jannotti and Alptekin Kupcu and Anna Lysyanskaya and Mira Meyerovich and Eric Rachlin}, + title={Making P2P Accountable without Losing Privacy}, + booktitle={{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)}}, + location={Washington, DC, USA}, + month={October}, + year={2007}, + www_section = economics, + www_pdf_url = {http://www.cs.brown.edu/~mchase/papers/bittorrent.pdf}, +} + +@misc{CDFS07, +author = {Valentina Ciriani and Sabrina {De Capitani di Vimercati} and Sara Foresti and Pierangela Samarati}, +editor = {T. Yu and S. Jajodia}, +booktitle = {Security in Decentralized Data Management}, +title = {k-Anonymity}, +publisher = {Springer}, +year = {2007}, +address = {Berlin Heidelberg}, +howpublished = {Chapter in Security in Decentralized Data Management, (T. Yu and S. Jajodia editors), Springer}, +www_pdf_url = {http://seclab.dti.unimi.it/Papers/kanonymity.pdf}, +www_section = pub, +www_remarks = {Discusses the original k-anonymity proposal and research results on k-anonymity. Introduces also a taxonomy of k-anonymity solutions.} +} + +@misc{VenHeTon07, +author = { Parvathinathan Venkitasubramaniam and Ting He and Lang Tong}, +title = {Anonymous Networking amidst Eavesdroppers}, +howpublished = {Pre-print available as arXiv:0710.4903v1 at arxiv.org}, +month = {October}, +year = {2007}, + www_pdf_url = {http://export.arxiv.org/PS_cache/arxiv/pdf/0710/0710.4903v1.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{tor-soups07, + author = {Jeremy Clark and P. C. van Oorschot and Carlisle Adams}, + title = {{Usability of anonymous web browsing: an examination of Tor interfaces and deployability}}, + booktitle = {{Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)}}, + year = {2007}, + month = {July}, + isbn = {978-1-59593-801-5}, + pages = {41--51}, + location = {Pittsburgh, Pennsylvania}, + doi = {http://doi.acm.org/10.1145/1280680.1280687}, + publisher = {ACM}, + address = {New York, NY, USA}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.cs.uwaterloo.ca/~j5clark/papers/TorUsability.pdf}, +} + +@PhdThesis{steven-thesis, + author = {Steven J. Murdoch}, + title = {Covert channel vulnerabilities in anonymity systems}, + school = {University of Cambridge}, + year = 2007, + month = {December}, + www_section = comm, + www_pdf_url = "http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf", + www_tags={selected}, +} + +@PhdThesis{kostas-thesis, + author = {Konstantinos Chatzikokolakis}, + title = {Probabilistic and Information-Theoretic Approaches to Anonymity}, + school = {Laboratoire d'Informatique (LIX), {\'E}cole Polytechnique, Paris}, + year = 2007, + month = {October}, + www_section = comm, + www_pdf_url = "http://www.lix.polytechnique.fr/~kostas/thesis.pdf", + www_tags={selected}, +} + +@InProceedings{clog-the-queue, + author = {Jon McLachlan and Nicholas Hopper}, + title = {Don't Clog the Queue: Circuit Clogging and Mitigation in {P2P} anonymity schemes}, + booktitle = {Proceedings of Financial Cryptography (FC '08)}, + year = 2008, + month = {January}, + www_section = comm, + www_pdf_url = "http://www-users.cs.umn.edu/~hopper/circuit_clogging_fc08.pdf", + www_tags={selected}, +} + +@InProceedings{conf/acsac/ADC07, + title = {{Closed-Circuit Unobservable Voice Over IP}}, + author = {Carlos {Aguilar Melchor} and Yves Deswarte and Julien Iguchi-Cartigny}, + booktitle = {Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA}, + publisher = {{IEEE} Computer Society Press}, + year = {2007}, + www_section = comm, + www_pdf_url = "http://www.acsac.org/2007/papers/110.pdf", + www_tags={selected}, +} + +@article{KongHG07, + author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla}, + title = {An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks}, + journal = {IEEE Transactions on Mobile Computing}, + volume = {6}, + number = {8}, + year = {2007}, + issn = {1536-1233}, + pages = {888--902}, + publisher = {IEEE Computer Society}, + address = {Los Alamitos, CA, USA}, + www_section = comm, + www_pdf_url = "http://netlab.cs.ucla.edu/wiki/files/TMC07-anodr.pdf", + www_tags={selected}, +} + +@inproceedings{InfDisclosureIDM07, + title = {Information Disclosure in Identity Management}, + author = {Dogan Kesdogan and Vinh Pham and Lexi Pimenidis}, + booktitle = {Proceedings of 12th Nordic Workshop on IT-Security, NordSec}, + year = {2007}, + month = {October}, + location = {Reykjavik, Iceland}, + pages = {141--152}, + editor = {Ulfar Erlingsson and Andrei Sabelfeld}, + www_section = credentials, + www_pdf_url = "http://www.umic.rwth-aachen.de/fileadmin/doc/DIMSn-nordsec%20-2-.pdf" +} + +@ARTICLE{EdmanSY07, +title={A Combinatorial Approach to Measuring Anonymity}, +author={M. Edman and F. Sivrikaya and B. Yener}, +journal={Intelligence and Security Informatics, 2007 IEEE}, +year={2007}, +month={May}, +volume={}, +number={}, +pages={356--363}, + www_section = traffic, +www_pdf_url = "http://pasiphae.cs.rpi.edu/~edmanm/isi07.pdf", + www_tags={selected}, +} + +@InProceedings{snader08, + author = {Robin Snader and Nikita Borisov}, + title = {A Tune-up for {Tor}: Improving Security and Performance in the {Tor} Network}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '08}, + year = {2008}, + month = {February}, + publisher = {Internet Society}, + www_section = comm # and # torperf, + www_pdf_url = "http://www.crhc.uiuc.edu/~nikita/papers/tuneup-cr.pdf", + www_tags = {selected}, +} + +@inproceedings{eigenspeed, + title = "EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation", + author = "Robin Snader and Nikita Borisov", + booktitle = "Proceedings of the 8th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS09})", + location = "Boston, MA", + month = {April}, + year = "2009", + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf}, + www_section = comm, + www_tags = {selected}, +} + +@TechReport{DD08Survey, + author = {George Danezis and Claudia Diaz}, + title = {A Survey of Anonymous Communication Channels}, + institution = {Microsoft Research}, + year = {2008}, + number = {MSR-TR-2008-35}, + month = {January}, + www_tags = {selected}, + www_section = {Anonymous communication}, + www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-35.pdf}, +} + +@InProceedings {MarPi08, + title = {A Concept of an Anonymous Direct P2P Distribution Overlay System}, + year = {2008}, + booktitle = {Proceedings of IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA)}, + month = {March}, + pages = {590--597}, + publisher = {IEEE Computer Society Press}, + location = {Gino-wan, Okinawa, Japan}, + ISBN = {978-0-7695-3095-6}, + www_pdf_url = {http://p2priv.org/pub/p2priv-aina2008.pdf}, + www_tags = {selected}, + www_section = comm, + author = {Igor Margasinski and Michal Pioro}, +} + +@inproceedings{loesing2008performance, + author={Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz}, + title={{Performance Measurements and Statistics of Tor Hidden Services}}, + booktitle={Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)}, + month={July}, + year={2008}, + location={Turku, Finland}, + publisher={IEEE CS Press}, + www_tags = {selected}, + www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/loesing2008performance.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{PanchenkoPR08, + author = {Andriy Panchenko and + Lexi Pimenidis and + Johannes Renner}, + title = {Performance Analysis of Anonymous Communication Channels + Provided by {Tor}}, + year = {2008}, + month = {March}, + pages = {221--228}, + booktitle = {Proceedings of the The Third International Conference on + Availability, Reliability and Security (ARES 2008)}, + location = {Barcelona, Spain}, + publisher = {IEEE Computer Society}, + www_tags = {}, + www_ps_url = {http://www.pimenidis.org/research/papers/PaPiRe08.ps}, + www_section = comm # and # torperf, +} + +@inproceedings{PanchenkoP06, + author = {Andriy Panchenko and Lexi Pimenidis}, + title = {Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication}, + booktitle = {Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference (CMS 2006)}, + year = {2006}, + month = {October}, + pages = {240--251}, + series = {Lecture Notes in Computer Science}, + volume = {4237}, + location = {Heraklion, Crete, Greece}, + www_section = {Anonymous communication}, +} + +@inproceedings{KesdoganPK06, + author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"o}lsch}, + title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis}, + booktitle = {Proceedings of First Workshop on Quality of Protection}, + year = {2005}, + month = {September}, + pages = {159--171}, + series = {Advances in Information Security}, + volume = {23}, + locations = {Milan, Italy}, + www_tags = {}, + www_pdf_url = {http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf}, + www_section = {Anonymous communication}, +} + +@InProceedings{improved-clockskew, + author = {Sebastian Zander and Steven J. Murdoch}, + title = {An Improved Clock-skew Measurement Technique for Revealing Hidden Services}, + booktitle = {Proceedings of the 17th USENIX Security Symposium}, + year = {2008}, + month = {July}, + location = {San Jose, CA, US}, + www_section = traffic, + www_pdf_url = "http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf", + www_tags={selected}, +} + +@InProceedings{quant-adhoc, + author = {Marie Elisabeth Gaup Moe}, + title = {Quantification of Anonymity for Mobile Ad Hoc Networks}, + booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management (STM 08)}, + year = {2008}, + pages = {25--36}, + month = {June}, + location = {Trondheim, Norway}, + www_section = traffic, + www_pdf_url = "http://www.q2s.ntnu.no/publications/open/2008/Paper_rev/stm2008.pdf", + www_tags={selected}, +} + +@inproceedings{Shao-infocom07, + title = {{pDCS: Security and Privacy Support for Data-Centric Sensor Networks}}, + author = { Min Shao and Sencun Zhu and Wensheng Zhang and Guohong Cao }, + booktitle = {Proceedings of 26th Annual IEEE Conference on. Computer Communications (Infocom'07)}, + year = {2007}, + month = {May}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/pDCS.pdf", + www_section = {Anonymous communication}, +} + +@inproceedings{Shao-infocom08, + title = {{ Towards Statistically Strong Source Anonymity for Sensor Networks }}, + author = { Min Shao and Yi Yang and Sencun Zhu and Guohong Cao }, + booktitle = {Proceedings of 27th Annual IEEE Conference on. Computer Communications (Infocom'08)}, + year = {2008}, + month = {May}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/sourceanonymity.pdf", + www_section = {Anonymous communication}, +} + +@inproceedings{Yang-wisec08, + title = {{ Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks }}, + author = { Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao }, + booktitle = { Proceedings of The ACM Conference on Wireless Network Security (WiSec)}, + year = {2008}, + month = {March}, + www_pdf_url = "http://www.cse.psu.edu/~szhu/papers/proxyfilter.pdf", + www_section = {Anonymous communication}, +} + +@INPROCEEDINGS{troncoso-ih2007, + author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel}, + title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, + year = {2007}, + month = {June}, + pages = {220--236}, + booktitle = {Proceedings of Information Hiding Workshop (IH 2007)}, + editor = {T. Furon et al}, + volume = {4567}, + number = {}, + series = {Lecture Notes in Computer Science}, + location = {Saint-Malo,FR}, + publisher = {Springer-Verlag}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-890.pdf}, + www_tags = {selected}, + www_section = misc, +} + +@InProceedings{diaz-esorics2008, + author = {Claudia Diaz and Carmela Troncoso and Bart Preneel}, + title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, + year = {2008}, + month = {October}, + booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)}, + editor = {Sushil Jajodia and J. Lopez }, + volume = {LNCS (in print)}, + number = {}, + series = {Lecture Notes in Computer Science}, + location = {Malaga,ES}, + publisher = {Springer-Verlag}, + www_section = misc, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf}, +} + %% pages = {18}, + +@INPROCEEDINGS{diaz-wpes2007, + author = {Claudia Diaz and Carmela Troncoso and George Danezis}, + title = {Does additional information always reduce anonymity?}, + year = {2007}, + month = {October}, + pages = {72--75}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society 2007}, + editor = {Ting Yu}, + volume = {}, + number = {}, + series = {}, + location= {Alexandria,VA,USA}, + publisher = {ACM}, + + www_tags = {selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-925.pdf}, + www_section = traffic, +} + +@inproceedings{torspinISC08, + title = {Compromising Anonymity Using Packet Spinning}, + author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos + P. Markatos}, + booktitle = {Proceedings of the 11th Information Security Conference (ISC 2008)}, + year = {2008}, + month = {September}, + location = {Taipei, Taiwan}, + www_tags = {selected}, + www_pdf_url = {http://www.ics.forth.gr/dcs/Activities/papers/torspin.isc08.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{troncoso-pet2008, + title = {Perfect Matching Statistical Disclosure Attacks}, + author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, + pages = {2--23}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section=traffic, + www_tags={selected}, + www_pdf_url={http://www.cosic.esat.kuleuven.be/publications/article-1041.pdf}, +} + +@inproceedings{hevia-pet2008, + title = {An Indistinguishability-Based Characterization of Anonymous Channels}, + author = {Alejandro Hevia and Daniele Micciancio}, + pages = {24--43}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = misc +} + %NEED URL. + +@inproceedings{diaz-pet2008, + title = {On the Impact of Social Network Profiling on Anonymity}, + author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov}, + pages = {44--62}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = traffic, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1036.pdf}, + www_tags = {selected}, +} + +@inproceedings{mccoy-pet2008, + title = {Shining Light in Dark Places: Understanding the {Tor} Network}, + author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, + pages = {63--76}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = misc, + www_tags = {selected}, + www_pdf_url = {http://www.cs.washington.edu/homes/yoshi/papers/Tor/PETS2008_37.pdf}, +} + +@inproceedings{coble-pet2008, + title = {Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem Prover}, + author = {Aaron H. Coble}, + pages = {77--98}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = methods +} + +@inproceedings{shimshock-pet2008, + title = {Breaking and Provably Fixing Minx}, + author = {Eric Shimshock and Matt Staats and Nicholas Hopper}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {99--114}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf}, +} + +@inproceedings{murdoch-pet2008, + title = {Metrics for Security and Performance in Low-Latency Anonymity Networks}, + author = {Steven J. Murdoch and Robert N. M. Watson }, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {115--132}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cl.cam.ac.uk/~sjm217/papers/pets08metrics.pdf}, +} + +@inproceedings{danezis-pet2008, + title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection}, + author = {George Danezis and Paul Syverson}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {133--150}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/bridge.pdf}, + www_important = 1, +} + +@inproceedings{sassaman-pet2008, + title = {How to Bypass Two Anonymity Revocation Systems}, + author = {George Danezis and Len Sassaman}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages = {187--201}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/~gdane/papers/KWF.pdf}, +} + +@inproceedings{androulaki-pet2008, + title = {Reputation Systems for Anonymous Networks}, + author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + pages={202--218}, + www_section = comm, + www_tags = {selected}, +} + +@inproceedings{raykova-pet2008, + title = {PAR: Payment for Anonymous Routing}, + author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, + pages = {219--236}, + editor = {Nikita Borisov and Ian Goldberg}, + booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)}, + month = {July}, + year = {2008}, + publisher = {Springer}, + location = {Leuven, Belgium}, + bookurl = {http://petsymposium.org/2008/}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf}, +} + +@inproceedings{DBLP:conf/esorics/MalleshW07, + author = {Nayantara Mallesh and + Matthew Wright}, + title = {Countering Statistical Disclosure with Receiver-Bound Cover + Traffic}, + pages = {547--562}, + www_section = comm, + www_tags = {selected}, + crossref = {esorics2007}, + www_pdf_url = {http://ranger.uta.edu/~mwright/papers/mallesh-esorics07.pdf}, +} + +@techreport{LOCEntropy2008, + title = {Entropy Bounds for Traffic Confirmation}, + author = {Luke O'Connor}, + institution = {IACR}, + number = {2008/365}, + year = {2008}, + month = {October}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://eprint.iacr.org/2008/365.pdf}, +} + +@inproceedings{bauer:alpaca2008, + title = { {BitBlender}: {L}ight-Weight Anonymity for BitTorrent}, + author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker}, + booktitle = {{Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008)}}, + year = {2008}, + month = {September}, + location = {Istanbul, Turkey}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/alpaca2008.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/acns/KlonowskiKL08, + author = {Marek Klonowski and + Miroslaw Kutylowski and + Anna Lauks}, + title = {Repelling Detour Attack Against Onions with Re-encryption}, + pages = {296--308}, + ee = {http://dx.doi.org/10.1007/978-3-540-68914-0_18}, + crossref = {DBLP:conf/acns/2008}, + www_section = comm, + www_publisher_url = {http://www.springerlink.com/content/c8n33l20527t0l03/}, +} + +@inproceedings{DBLP:conf/pervasive/CichonKK08, + author = {Jacek Cichon and + Marek Klonowski and + Miroslaw Kutylowski}, + title = {Privacy Protection for RFID with Hidden Subset Identifiers}, + pages = {298--314}, + ee = {http://dx.doi.org/10.1007/978-3-540-79576-6_18}, + crossref = {DBLP:conf/pervasive/2008}, + www_section = misc, + www_publisher_url={http://www.springerlink.com/content/r754w32x71176057/}, +} + +@inproceedings{GTDPV-WPES08, + title = {Revisiting A Combinatorial Approach Toward Measuring Anonymity}, + author = {Benedikt Gierlichs and Carmela Troncoso and Claudia Diaz and Bart Preneel and Ingrid Verbauwhede}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2008)}, + year = {2008}, + month = {October}, + location = {Alexandria, VA, USA}, + publisher = {ACM}, + www_tags = {}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1124.pdf}, + www_section = traffic +} + +@inproceedings{FNP04, + title = "Efficient Private Matching and Set Intersection", + author = "Michael J. Freedman and Kobbi Nissim and Benny Pinkas", + booktitle = "Proceedings of {EUROCRYPT} 2004", + location = "Interlaken, Switzerland", + month = {May}, + year = 2004, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FNP04-pm.pdf}, + www_section = misc +} + +@inproceedings{FIPR05, + title = "Keyword Search and Oblivious Pseudorandom Functions", + author = "Michael J. Freedman and Yuval Ishai and Benny Pinkas and +Omer Reingold", + booktitle = "Proceedings of the 2nd Theory of Cryptography Conference ({TCC 05})", + location = "Cambridge, MA", + month = {February}, + year = 2005, + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/FIPR05-ks.pdf}, + www_section = misc +} + +@inproceedings{fof:iptps07, + title = "Efficient Private Techniques for Verifying Social Proximity", + author = "Michael J. Freedman and Antonio Nicolosi", + booktitle = "Proceedings of the 6th {I}nternational {W}orkshop on {P}eer-to-{P}eer {S}ystems ({IPTPS07})", + location = "Bellevue, WA", + month = {February}, + year = "2007", + www_pdf_url = {http://www.cs.princeton.edu/~mfreed/docs/fof-iptps07.pdf}, + www_section = misc +} + +@inproceedings{ccs2008:wang, + title={Dependent Link Padding Algorithms for Low Latency Anonymity Systems}, + author={Wei Wang and Mehul Motani and Vikram Srinivasan}, + crossref={ccs2008}, + pages={323--332}, + www_tags={selected}, + www_section=traffic +} + +@inproceedings{ccs2008:tsang, + title={PEREA: Towards Practical TTP-Free Revocation in Anonymous + Authentication}, + author={Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, + crossref={ccs2008}, + pages={333--345}, + www_section=misc, + www_tags={selected}, +} + +@inproceedings{ccs2008:camenisch, + title={Efficient Attributes for Anonymous Credentials}, + author={Jan Camenisch and Thomas Gross}, + crossref={ccs2008}, + pages={345--356}, + www_section=credentials, + www_pdf_url={http://www.akiras.de/publications/papers/CamGro2008-Efficient_Attributes_for_Anonymous_Credentials.CCS_08.pdf}, +} + +@inproceedings{ccs2008:mittal, + title={Information Leaks in Structured Peer-to-peer Anonymous Communication Systems}, + author={Prateek Mittal and Nikita Borisov}, + crossref={ccs2008}, + pages={267--278}, + www_pdf_url={http://www.crhc.uiuc.edu/~nikita/papers/information-leak.pdf}, + www_tags={selected}, + www_section=comm, + www_remarks={Describes attacks against the SALSA and AP3 peer-to-peer + anonymity network architectures.}, +} + +@proceedings{ccs2008, + editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}, + booktitle = {{Proceedings of the 15th ACM Conference on Computer and + Communications Security (CCS 2008)}}, + location = {Alexandria, Virginia, USA}, + publisher = {ACM Press}, + day = {27--31}, + month = {October}, + year = 2008 +} + +@inproceedings{MORE, + author = {Olaf Landsiedel and Lexi Pimenidis and Klaus Wehrle and Heiko ++Niedermayer and Georg Carle}, + title = {{More: A Peer-To-Peer Based Connectionless Onion Router}}, + year = {2007}, + booktitle = {Proceedings of IEEE GLOBECOM, Globalcommunications Conference}, + location= {Washington DC, USA}, + month = {November}, + day = {26}, + www_pdf_url = {http://www.pimenidis.org/research/papers/landsiedelP2P-Core.pdf}, + www_section = {Anonymous communication}, +} + +@mastersthesis{reardon-thesis, + author = {Reardon, Joel}, + title = {Improving {Tor} using a {TCP}-over-{DTLS} Tunnel}, + school = {University of Waterloo}, + year = {2008}, + month = {September}, + www_abstract_url = {http://hdl.handle.net/10012/4011}, + www_pdf_url = {http://uwspace.uwaterloo.ca/bitstream/10012/4011/1/thesis.pdf}, + www_section = comm # and # torperf, + www_tags = {selected}, +} + +@InProceedings{morphing09, + author = {Charles Wright and Scott Coull and Fabian Monrose}, + title = {Traffic Morphing: An efficient defense against statistical traffic analysis}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '09}, + year = {2009}, + month = {February}, + publisher = {IEEE}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/morphing09.pdf", + www_tags={selected}, +} + +@phdthesis{joss-thesis, + title = {Characterising Anonymity Systems}, + author = {Joss Wright}, + school = {Department of Computer Science, University of York, York}, + year = {2007}, + month = {November}, + www_pdf_url = {http://www.pseudonymity.net/~joss/doc/papers/2007/wright07characterising.pdf}, + www_section = methods +} + +@PhdThesis{Douglas-thesis, + author = {Douglas Kelly}, + title = {A taxonomy for and analysis of anonymous communications networks}, + school = {Air Force Institute of Technology}, + year = 2009, + month = {March}, + www_section = comm, + www_pdf_url = "http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf", + www_tags={selected}, +} + +@InProceedings{congestion-longpaths, + author = {Nathan Evans and Roger Dingledine and Christian Grothoff}, + title = {A Practical Congestion Attack on {T}or Using Long Paths}, + booktitle = {Proceedings of the 18th USENIX Security Symposium}, + year = {2009}, + month = {August}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/congestion-longpaths.pdf", + www_tags={selected}, +} + +@inproceedings{wpes09-dht-attack, + title = {{Hashing it out in public: Common failure modes of DHT-based anonymity schemes}}, + author = {Andrew Tran and Nicholas Hopper and Yongdae Kim}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/hashing_it_out.pdf}, + www_section = traffic +} + +@inproceedings{wpes09-bridge-attack, + title = {{On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design}}, + author = {Jon McLachlan and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf}, + www_section = traffic +} + +@inproceedings{wpes09-xpay, + title = {{XPay: Practical anonymous payments for Tor routing and other networked services}}, + author = {Yao Chen and Radu Sion and Bogdan Carbunar}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)}, + year = {2009}, + month = {November}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.sunysb.edu/~sion/research/sion2009wpes-xpay.pdf}, + www_section = comm +} + +@inproceedings{ccsw09-fingerprinting, + title = {Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\"{\i}ve-bayes classifier}, + author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}, + booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)}, + month = {October}, + year = {2009}, + isbn = {978-1-60558-784-4}, + pages = {31--42}, + location = {Chicago, Illinois, USA}, + doi = {http://doi.acm.org/10.1145/1655008.1655013}, + publisher = {ACM}, + address = {New York, NY, USA}, + + www_tags = {selected}, + www_pdf_url = {http://epub.uni-regensburg.de/11919/1/authorsversion-ccsw09.pdf}, + www_section = traffic +} + +@Article{nymble-tdsc, + author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean W. Smith}, + title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks}, + journal ={IEEE Transactions on Dependable and Secure Computing}, + volume = {8}, + number = {2}, + year = {2011}, + month = {March--April}, + pages = {256--269}, + doi = {10.1109/TDSC.2009.38}, + www_tags = {selected}, + www_important = {1}, + www_section = misc, + www_remarks = {Describes Nymble, a system that allows services to block + anonymous users that misbehave, without making their transactions + linkable.}, +} + +@InProceedings{incentives-fc10, + author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach}, + title = {{Building Incentives into Tor}}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm # and # torperf, + www_pdf_url = "http://freehaven.net/anonbib/papers/incentives-fc10.pdf", + www_tags={selected}, +} + +@InProceedings{sphinx-onion-fc10, + author = {Aniket Kate and Ian Goldberg}, + title = {Using Sphinx to Improve Onion Routing Circuit Construction}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm # and # torperf, + www_pdf_url = "http://www.cypherpunks.ca/~iang/pubs/SphinxOR.pdf", + www_tags={selected}, +} + +@InProceedings{anon-fc10, + author = {Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan}, + title = {Cryptographic Protocol Analysis of {AN.ON}}, + booktitle = {Proceedings of Financial Cryptography (FC '10)}, + year = 2010, + month = {January}, + editor = {Radu Sion}, + www_section = comm, + www_pdf_url = "http://freehaven.net/anonbib/papers/wwpk2010.pdf", + www_tags={selected}, +} + +@INPROCEEDINGS{shalon-anon, + author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson}, + title = {{SHALON}: Lightweight Anonymization based on Open Standards}, + booktitle = {Proceedings of 18th International Conference on Computer Communications and Networks}, + year = {2009}, + location = {San Francisco, CA, USA}, + month = {August}, + www_section = comm, + www_pdf_url = "http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf", + www_tags={selected}, +} + +@INPROCEEDINGS{w09, + author = {Benedikt Westermann}, + title = {Security Analysis of {AN.ON}'s Payment Scheme}, + booktitle = {Proceedings of NordSec 2009}, + year = {2009}, + editor = {Audun J{\o}sang and Torleiv Maseng and Svein Johan Knapskog}, + volume = {5838/2009}, + series = {Lecture Notes in Computer Science}, + pages = {255--270}, + month = {October}, + publisher = {Springer}, + www_section = comm, +} + +@inproceedings{Rybczynska-incos2009, + author = {Rybczy\'{n}ska, Marta}, + title = {{A Round--based Cover Traffic Algorithm for Anonymity Systems}}, + booktitle = {{Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems}}, + year = {2009}, + pages = {93--99}, + location = {Barcelona, Spain}, + month = {November}, + publisher = {IEEE Computer Society Press}, + www_pdf_url = {http://rybczynska.net/papers/Rybczynska-Round_based-incos2009.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/pet/DanezisT09, + author = {George Danezis and + Carmela Troncoso}, + title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent + Communications}, + pages = {56--72}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/BRInference.pdf}, + www_section = traffic, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/SherrBL09, + author = {Micah Sherr and + Matt Blaze and + Boon Thau Loo}, + title = {Scalable Link-Based Relay Selection for Anonymous Routing}, + pages = {73--93}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://micah.cis.upenn.edu/papers/pets09.pdf}, + www_section = comm # and # torperf, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/SchiffnerC09, + author = {Stefan Schiffner and + Sebastian Clau{\ss}}, + title = {Using Linkability Information to Attack Mix-Based Anonymity + Services}, + pages = {94--107}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/pet/BauerMGGS09, + author = {Kevin S. Bauer and + Damon McCoy and + Ben Greenstein and + Dirk Grunwald and + Douglas C. Sicker}, + title = {Physical Layer Attacks on Unlinkability in Wireless LANs}, + pages = {108--127}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://systems.cs.colorado.edu/~bauerk/papers/bauer-pets09.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/pet/RaghavanKSW09, + author = {Barath Raghavan and + Tadayoshi Kohno and + Alex C. Snoeren and + David Wetherall}, + title = {Enlisting ISPs to Improve Online Privacy: IP Address Mixing + by Default}, + pages = {143--163}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www.cs.williams.edu/~barath/papers/ahp-pets09.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{DBLP:conf/pet/AndroulakiB09, + author = {Elli Androulaki and + Steven M. Bellovin}, + title = {APOD: Anonymous Physical Object Delivery}, + pages = {202--215}, + crossref = {DBLP:conf/pet/2009}, + www_pdf_url = {http://www1.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/pet/2009, + editor = {Ian Goldberg and + Mikhail J. Atallah}, + booktitle = {Proceedings of Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5672}, + month = {August}, + year = {2009}, + isbn = {978-3-642-03167-0}, +} + +@inproceedings{DBLP:conf/esorics/DanezisDKT09, + author = {George Danezis and + Claudia D\'{\i}az and + Emilia K{\"a}sper and + Carmela Troncoso}, + title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, + pages = {406--423}, + www_tags = {selected}, + crossref = {DBLP:conf/esorics/2009}, + www_pdf_url = {http://homes.esat.kuleuven.be/~ekasper/papers/crowds.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/esorics/ModersheimV09, + author = {Sebastian M{\"o}dersheim and + Luca Vigan{\`o}}, + title = {Secure Pseudonymous Channels}, + pages = {337--354}, + crossref = {DBLP:conf/esorics/2009}, + www_pdf_url = {http://domino.research.ibm.com/library/cyberdig.nsf/papers/51B2264FA24A84F58525753D002BE7FF/\$File/rz3724_updated_August09.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/esorics/2009, + editor = {Michael Backes and Peng Ning}, + booktitle = {Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5789}, + month = {September}, + year = {2009}, + isbn = {978-3-642-04443-4}, +} + +@inproceedings{DBLP:conf/sp/NarayananS09, + author = {Arvind Narayanan and + Vitaly Shmatikov}, + title = {De-anonymizing Social Networks}, + pages = {173--187}, + www_tags = {selected}, + crossref = {DBLP:conf/sp/2009}, + www_pdf_url = {http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf}, + www_section = misc, + www_important = 1, +} + +@inproceedings{DBLP:conf/sp/DanezisG09, + author = {George Danezis and + Ian Goldberg}, + title = {Sphinx: A Compact and Provably Secure Mix Format}, + pages = {269--282}, + ee = {http://dx.doi.org/10.1109/SP.2009.15}, + crossref = {DBLP:conf/sp/2009}, + www_tags = {selected}, + www_pdf_url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf}, + www_section = comm +} + +@proceedings{DBLP:conf/sp/2009, + editor = {}, + booktitle = {Proceedings of the 30th IEEE Symposium on Security and Privacy (S\&P 2009)}, + location = {Oakland, California, USA}, + publisher = {IEEE Computer Society}, + month = {May}, + year = {2009}, + isbn = {978-0-7695-3633-0}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@inproceedings{DBLP:conf/ccs/TroncosoD09, + author = {Carmela Troncoso and + George Danezis}, + title = {The bayesian traffic analysis of mix networks}, + pages = {369--379}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf}, + www_section = traffic +} + +@inproceedings{DBLP:conf/ccs/EdmanS09, + author = {Matthew Edman and + Paul F. Syverson}, + title = {{AS}-awareness in {T}or path selection}, + pages = {380--389}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf}, + www_section = comm +} + +@inproceedings{ccs09-nisan, + author = {Andriy Panchenko and Arne Rache and Stefan Richter}, + title = {{NISAN}: Network Information Service for Anonymization Networks}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www.nets.rwth-aachen.de/~andriy/papers/nisan-ccs09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-shadowwalker, + author = {Prateek Mittal and Nikita Borisov}, + title = {ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/shadowwalker-ccs09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-certificateless, + author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, + title = {Certificateless Onion Routing}, + crossref = {DBLP:conf/ccs/2009}, + www_pdf_url = {http://www.ippari.unict.it/~catalano/CaGeFi09.pdf}, + www_section = comm +} + +@inproceedings{ccs09-torsk, + author = {Jon McLachlan and Andrew Tran and Nicholas Hopper and Yongdae Kim}, + title = {{Scalable onion routing with Torsk}}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{DBLP:conf/ccs/VassermanJTHK09, + author = {Eugene Y. Vasserman and + Rob Jansen and + James Tyra and + Nicholas Hopper and + Yongdae Kim}, + title = {Membership-concealing overlay networks}, + pages = {390--399}, + crossref = {DBLP:conf/ccs/2009}, + www_tags = {selected}, + www_pdf_url = {http://isis.poly.edu/~csaw_research/Eugene%20Vasserman.pdf}, + www_section = comm +} + +@inproceedings{DBLP:conf/ccs/LingLYFXJ09, + author = {Zhen Ling and + Junzhou Luo and + Wei Yu and + Xinwen Fu and + Dong Xuan and + Weijia Jia}, + title = {A new cell counter based attack against tor}, + pages = {578--589}, + crossref = {DBLP:conf/ccs/2009}, + www_section = traffic +} + +@proceedings{DBLP:conf/ccs/2009, + editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}, + booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009}, + publisher = {ACM}, + location = {Chicago, Illinois, USA}, + month = {November}, + year = {2009}, + isbn = {978-1-60558-894-0}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@inproceedings{ccs10-lookup, + author = {Qiyan Wang and Prateek Mittal and Nikita Borisov}, + title = {In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf}, + www_section = traffic +} + +@inproceedings{ccs10-braids, + author = {Rob Jansen and Nicholas Hopper and Yongdae Kim}, + title = {Recruiting New {T}or Relays with {BRAIDS}}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/braids_ccs.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{ccs10-scheduling, + author = {Can Tang and Ian Goldberg}, + title = {An Improved Algorithm for {T}or Circuit Scheduling}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/ewma-ccs.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{ccs10-dissent, + author = {Henry Corrigan-Gibbs and Bryan Ford}, + title = {Dissent: Accountable Anonymous Group Messaging}, + crossref = {DBLP:conf/ccs/2010}, + www_tags = {selected}, + www_pdf_url = {http://dedis.cs.yale.edu/2010/anon/files/dissent.pdf}, + www_section = censorship +} + +@proceedings{DBLP:conf/ccs/2010, + editor = {Angelos D. Keromytis and Vitaly Shmatikov}, + booktitle = {Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010)}, + publisher = {ACM}, + location = {Chicago, Illinois, USA}, + month = {October}, + year = {2010}, +} + +@inproceedings{wpes10-shadows, + title = {Balancing the Shadows}, + author = {Max Schuchard and Alex Dean and Victor Heorhiadi and Yongdae Kim and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/shadows_wpes.pdf}, + www_section = comm +} + +@inproceedings{wpes10-jack, + title = {Jack: Scalable Accumulator-based Nymble System}, + author = {Zi Lin and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/Jack_wpes.pdf}, + www_section = misc +} + +@inproceedings{wpes10-unraveling, + title = {Unraveling an Old Cloak: k-anonymity for Location Privacy}, + author = {Reza Shokri and Carmela Troncoso and Claudia Diaz and Julien Freudiger and Jean-Pierre Hubaux}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2010)}, + year = {2010}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://infoscience.epfl.ch/record/150348/files/ShokriTDFH-WPES10_1.pdf?version=2}, + www_section = comm +} + +@article{edman2009survey, + author = {Matthew Edman and B\"{u}lent Yener}, + title = {On anonymity in an electronic society: A survey of anonymous + communication systems}, + journal = {ACM Computing Surveys}, + volume = {42}, + number = {1}, + year = {2009}, + issn = {0360-0300}, + pages = {1--35}, + doi = {http://doi.acm.org/10.1145/1592451.1592456}, + publisher = {ACM}, + address = {New York, NY, USA}, + www_section = misc, + www_tags = {selected}, + www_pdf_url = {http://www.cs.rpi.edu/~edmanm2/a5-edman.pdf}, +} + +@phdthesis{loesing2009thesis, + title = {Privacy-enhancing Technologies for Private Services}, + author = {Karsten Loesing}, + school = {University of Bamberg}, + year = {2009}, + month = {May}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.opus-bayern.de/uni-bamberg/volltexte/2009/183/pdf/loesingopusneu.pdf}, +} + +@inproceedings{lenhard2009hidserv-lowbw, + author = {J{\"o}rg Lenhard and Karsten Loesing and Guido Wirtz}, + title = {Performance Measurements of Tor Hidden Services in + Low-Bandwidth Access Networks}, + booktitle = {Proceedings of the 7th International Conference on Applied + Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, + France, June 2-5, 2009}, + year = {2009}, + month = {June}, + editor = {Michel Abdalla and David Pointcheval and Pierre-Alain Fouque + and Damien Vergnaud}, + volume = {5536}, + series = {Lecture Notes in Computer Science}, + isbn = {978-3-642-01956-2}, + www_section = comm # and # torperf, + www_tags = {selected}, + www_pdf_url = {http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Publikationen/acns09-llw.pdf}, +} + +@inproceedings{nymbler, + title = {{Making a Nymbler Nymble using VERBS (Extended Version)}}, + author = {Ryan Henry and Kevin Henry and Ian Goldberg}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-05.pdf}, + www_section = {Misc}, +} + +@inproceedings{topology-pet2010, + title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks}, + author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf}, + www_section = traffic +} + +@inproceedings{active-pet2010, + title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication}, + author = {Aaron Johnson and Joan Feigenbaum and Paul Syverson}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.yale.edu/homes/jf/FJS-PETS2010.pdf}, + www_section = traffic +} + +@inproceedings{drac-pet2010, + title = {Drac: An Architecture for Anonymous Low-Volume Communications}, + author = {George Danezis and Claudia Diaz and Carmela Troncoso and Ben Laurie}, + booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)}, + year = {2010}, + month = {July}, + location = {Berlin, Germany}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf}, + www_section = comm +} + +@inproceedings{wecsr10measuring-tor, + title = {A Case Study on Measuring Statistical Data in the {T}or Anonymity Network}, + author = {Karsten Loesing and Steven J. Murdoch and Roger Dingledine}, + booktitle = {Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)}, + year = {2010}, + month = {January}, + location = {Tenerife, Canary Islands, Spain}, + publisher = {Springer}, + series = {LNCS}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = "http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf" +} + +@inproceedings{huber2010tor, + title = {{Tor HTTP Usage and Information Leakage}}, + author = {Markus Huber and Martin Mulazzani and Edgar Weippl}, + booktitle = {Proceedings of the 11th IFIP TC 6/TC 11 International + Conference on Communications and Multimedia Security (CMS 2010)}, + year = {2010}, + month = {May}, + location = {Linz, Austria}, + publisher = {Springer}, + series = {LNCS}, + volume = {6109}, + pages = {245--255}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://www.sba-research.org/wp-content/uploads/publications/2010%20-%20Huber%20-%20Tor%20HTTP%20Usage.pdf}, +} + +@techreport{tor-blocking, + title = {Design of a blocking-resistant anonymity system}, + author = {Roger Dingledine and Nick Mathewson}, + institution = {The Tor Project}, + number = {2006-1}, + year = {2006}, + month = {November}, + www_tags = {selected}, + www_section = comm, + www_important = {1}, + www_pdf_url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, +} + +@inproceedings{wk11-malice-vs-anon, + author = {Benedikt Westermann and Dogan Kesdogan}, + title = {Malice versus AN.ON: Possible Risks of Missing Replay and +Integrity Protection}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf}, +} + +@inproceedings{bnymble11, + author = {Peter Lofgren and Nicholas Hopper}, + title = {BNymble: More anonymous blacklisting at almost no cost}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = misc, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/bnymble.pdf}, +} + +@inproceedings{proximax11, + author = {Kirill Levchenko and Damon McCoy}, + title = {Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'11)}, + year = {2011}, + month = {February}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {http://cseweb.ucsd.edu/~dlmccoy/papers/mccoy2011fc.pdf}, +} + +@article{blac-tissec, + author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W. }, + title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs}, + journal = {ACM Transactions on Information and System Security}, + issue_date = {December 2010}, + volume = {13}, + issue = {4}, + month = {December}, + year = {2010}, + issn = {1094-9224}, + pages = {39:1--39:33}, + articleno = {39}, + numpages = {33}, + url = {http://doi.acm.org/10.1145/1880022.1880033}, + doi = {http://doi.acm.org/10.1145/1880022.1880033}, + acmid = {1880033}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blac-tissec.pdf} +} + +@inproceedings{dsn-09-jing, +Title = {On the Effectiveness of Low Latency Anonymous Networks in the Presence of Timing Attacks}, +Address = {Lisbon}, +Author = {Jing Jin and Xinyuan Wang}, +Pages = {429--438}, +Booktitle = {Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, +Year = {2009}, +month = {July}, +www_section = {Anonymous communication}, +www_tags = {selected}, +www_pdf_url = {http://www.cs.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf}, +} + +@inproceedings{LZCLCP_NDSS11, + title = {{HTTPOS}: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, + year = {2011}, + month = {February}, + publisher = {Internet Society}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/HTTPOS-NDSS11.pdf}, + www_section = {Traffic analysis}, +} + +@inproceedings{ndss09-rainbow, + title = {RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows}, + author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'09}, + year = {2009}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/13.pdf}, + www_section = traffic, +} + +@inproceedings{ndss11-swirl, + title = {SWIRL: A Scalable Watermark to Detect Correlated Network Flows}, + author = {Amir Houmansadr and Nikita Borisov}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS}'11}, + year = {2011}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/7_3.pdf}, + www_section = traffic, +} + +@inproceedings{LZPL_ESORICS10, + title = {On the Secrecy of Spread-Spectrum Flow Watermarks}, + author = {Xiapu Luo and Junjie Zhang and Roberto Perdisci and Wenke Lee}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, + year = {2010}, + month = {September}, + publisher = {Springer}, + www_section = traffic, +} + +@inproceedings{LZCCL_DSN11, + title = {A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks}, + author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'11}, + year = {2011}, + month = {June}, + publisher = {IEEE}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_ICC09, + title = {{CLACK}: A Network Covert Channel Based on Partial Acknowledgment Encoding}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the International Conference on Communications - {ICC}'09}, + year = {2009}, + month = {June}, + publisher = {IEEE}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/icc09.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_DSN08, + title = {{TCP} Covert Timing Channels: Design and Detection}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks - {DSN}'08}, + year = {2008}, + month = {June}, + publisher = {IEEE}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/TCPScriptDSN08.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_ESORICS07, + title = {Cloak: A Ten-fold Way for Reliable Covert Communications}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'07}, + year = {2007}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/CloakESORICS.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{LCC_IFIPSEC07, + title = {Crafting Web Counters into Covert Channels}, + author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, + booktitle = {Proceedings of the IFIP International Information Security Conference - {IFIP SEC}'07}, + year = {2007}, + month = {May}, + publisher = {Springer}, + www_pdf_url = {http://www4.comp.polyu.edu.hk/~csrchang/PRCCMainIFIPEXT.pdf}, + www_section = {Anonymous communication}, +} + +@INPROCEEDINGS{ReedPierce10, + title = {Distance Makes the Types Grow Stronger: {A} Calculus for Differential Privacy}, + author = {Jason Reed and Benjamin C. Pierce}, + booktitle = {Proceedings of the {ACM} {SIGPLAN} {I}nternational {C}onference on {F}unctional {P}rogramming ({ICFP})}, + year = {2010}, + month = {September}, + location = {Baltimore, Maryland}, + publisher = {ACM Press}, + www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/dp.pdf}, + www_section = {Formal methods}, +} + +@INPROCEEDINGS{DPCS2010, + title = {Differential Privacy for Collaborative Security}, + author = {Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith}, + booktitle = {Proceedings of the European Workshop on System Security (EUROSEC)}, + year = {2010}, + month = {April}, + publisher = {ACM Press}, + www_pdf_url = {http://www.cis.upenn.edu/~bcpierce/papers/eurosec2010.pdf}, + www_section = {Misc} +} + +@InProceedings{pro-pro:pet2000, + author = {Kai Rannenberg and Giovanni Iachello}, + title = {Protection Profiles for Remailer Mixes}, + booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, + editor = {H. Federrath}, + publisher = {Springer-Verlag, LNCS 2009}, + year = 2000, + month = {July}, + www_section = comm, + www_pdf_url = "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.5413&rep=rep1&type=pdf", +} + + +@InProceedings{demuth:pet2002, + author = {Thomas Demuth}, + title = {A Passive Attack on the Privacy of Web Users Using Standard Log Information}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = comm, + www_pdf_url = "http://demuth.biz/veroeffentlichungen/pet02.pdf", + www_tags={selected}, +} + +@InProceedings{asonov:pet2002, + author = {Dmitri Asonov and Johann-Christoph Freytag}, + title = {Almost Optimal Private Information Retrieval}, + booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)}, + year = {2002}, + month = {April}, + editor = {Roger Dingledine and Paul Syverson}, + publisher = {Springer-Verlag, LNCS 2482}, + www_section = pir, + www_pdf_url = "http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=D038A6D6E4445C6285CB38C523283106?doi=10.1.1.9.9492&rep=rep1&type=pdf", +} + + +%%%%%%%%%%%%%%%%%% + +@inproceedings{pets2011:TorUsernames, + title={How Unique and Traceable are Usernames?}, + author={Daniele Perito and Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils}, + booktitle={Proceedings of the 11th Privacy Enhancing Technologies Symposium}, + year={2011}, + month={July}, + www_section = nym, + www_pdf_url = {http://arxiv.org/pdf/1101.5578}, +} + +@inproceedings{pets2010:eckersley2010unique, + title={How unique is your web browser?}, + author={Peter Eckersley}, + booktitle={Proceedings of the 10th Privacy Enhancing Technologies Symposium}, + pages={1--18}, + year={2010}, + month={July}, + location={Berlin, Germany}, + www_section = misc, + www_tags={selected}, + www_pdf_url = {http://crysp.uwaterloo.ca/courses/pet/W11/cache/panopticlick.eff.org/browser-uniqueness.pdf}, +} + +@inproceedings{raid2011:chakravartydetecting, + title={Detecting Traffic Snooping in Tor Using Decoys}, + author={Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis}, + booktitle = {Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection}, + series = {RAID'11}, + month = {September}, + year = {2011}, + location = {Menlo Park, CA}, + pages = {222--241}, + publisher = {Springer-Verlag}, + address = {Berlin, Heidelberg}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://www1.cs.columbia.edu/~angelos/Papers/2011/tor_decoys.pdf} +} + +@inproceedings{usenix2010:aggarwal2010analysis, + title={An Analysis of Private Browsing Modes in Modern Browsers}, + author={Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh}, + booktitle={Proceedings of the 19th Usenix Security Symposium}, + month={August}, + year={2010}, + www_section = misc, + www_tags={selected}, + www_pdf_url = {http://www.collinjackson.com/research/private-browsing.pdf}, +} + +@inproceedings{leet2011:TorBunchApple, + title = {One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users}, + author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, + booktitle = {Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats}, + series = {LEET'11}, + year = {2011}, + publisher = {USENIX Association}, + www_section = traffic, + www_pdf_url = {http://arxiv.org/pdf/1103.1518}, +} + +@inproceedings{wpes11-panchenko, + title = {Website Fingerprinting in Onion Routing Based Anonymization Networks}, + author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf}, + www_section = traffic +} + +@inproceedings{wpes11-bridgespa, + title = {{BridgeSPA}: Improving {T}or Bridges with Single Packet Authorization}, + author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf}, + www_section = comm +} + +@inproceedings{wpes11-faust, + title = {FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting}, + author = {Peter Lofgren and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2011)}, + year = {2011}, + month = {October}, + location = {Chicago, IL, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/faust-wpes.pdf}, + www_section = comm +} + +@inproceedings{ccs2011-trust, + Author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson}, + Title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/~arma/anonymity-trust-ccs2011.pdf}, +} + +@inproceedings{ccs2011-cirripede, + Author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov}, + Title = {Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, +} + +@inproceedings{ccs2011-oneswarm, + Author = {Swagatika Prusty and Marc Liberatore and Brian N. Levine}, + Title = {Forensic Investigation of the OneSwarm Anonymous Filesharing System}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf}, +} + +@inproceedings{ccs2011-stealthy, + Author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Nikita Borisov}, + Title = {Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting}, + Booktitle = {Proceedings of the 18th ACM conference on Computer and + Communications Security (CCS 2011)}, + Month = {October}, + year = {2011}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting-ccs11.pdf}, +} + +@InProceedings{foci11-decoy, + author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, + title = {Decoy Routing: Toward Unblockable Internet Communication}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, + year = {2011}, + month = {August}, + www_section = censorship, + www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Karlin.pdf}, + www_tags={selected}, +} + +@InProceedings{foci11-clouds, + author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman}, + title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)}, + year = {2011}, + month = {August}, + www_section = comm, + www_pdf_url = {http://www.usenix.org/events/foci11/tech/final_files/Jones.pdf}, +} + +@InProceedings{cset11-experimentor, + author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald}, + title = {ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation}, + booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2011)}, + year = {2011}, + month = {August}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.usenix.org/events/cset11/tech/final_files/Bauer.pdf}, + www_tags={selected}, +} + +@InProceedings{usenix11-telex, + author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, + title = {Telex: Anticensorship in the Network Infrastructure}, + booktitle = {Proceedings of the 20th USENIX Security Symposium}, + year = {2011}, + month = {August}, + www_section = censorship, + www_pdf_url = {http://www.usenix.org/events/sec/tech/full_papers/Wustrow.pdf}, + www_tags={selected}, + www_important = {1}, +} + +@InProceedings{usenix11-pirtor, + author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Nikita Borisov and Ian Goldberg}, + title = {PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval}, + booktitle = {Proceedings of the 20th USENIX Security Symposium}, + year = {2011}, + month = {August}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.usenix.org/events/sec11/tech/full_papers/Mittal.pdf}, + www_tags={selected}, +} + +@inproceedings{pets2011-bagai, + title = {An Accurate System-Wide Anonymity Metric for Probabilistic Attacks}, + author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p7-bagai.pdf}, + www_section = traffic +} + +@inproceedings{pets2011-defenestrator, + title = {DefenestraTor: Throwing out Windows in Tor}, + author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey Voelker}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p8-alsabah.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{pets2011-i2p, + title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P}, + author = {Michael Herrmann and Christian Grothoff}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + year = {2011}, + month = {July}, + location = {Waterloo, Canada}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf}, + www_section = traffic +} + +@InProceedings{oakland11-formalizing, + author = {Ryan Henry and Ian Goldberg}, + title = {Formalizing Anonymous Blacklisting Systems}, + booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + year = 2011, + month = {May}, + www_section = misc, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf}, + www_tags={selected}, +} + +@InProceedings{oakland11-extending, + author = {Ryan Henry and Ian Goldberg}, + title = {Extending Nymble-like Systems}, + booktitle = {Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + year = 2011, + month = {May}, + www_section = misc, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/extensions-Oakland.pdf}, +} + +@InProceedings{acsac11-tortoise, + title = {Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise}, + author = {W. Brad Moore and Chris Wacek and Micah Sherr}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_section = comm # and # torperf, + www_pdf_url = {https://security.cs.georgetown.edu/papers/tortoise.pdf}, + www_tags={selected}, +} + +@InProceedings{acsac11-supernodes, + title = {"Super Nodes" in Tor: Existence and Security Implication}, + author = {Chenglong Li and Yibo Xue and Yingfei Dong and Dongshen Wang}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_section = comm, + www_pdf_url = {http://www-ee.eng.hawaii.edu/~dong/papers/super-node-20110928-2.pdf}, +} + +@InProceedings{acsac11-backlit, + title = {Exposing Invisible Timing-based Traffic Watermarks with BACKLIT}, + author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}, + booktitle = {Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA}, + year = {2011}, + month = {December}, + www_tags={selected}, + www_section = traffic, + www_pdf_url = "http://freehaven.net/anonbib/papers/backlit-acsac11.pdf", +} + +@PhdThesis{kevin-thesis, + author = {Kevin Bauer}, + title = {Improving Security and Performance in Low Latency Anonymity Networks}, + school = {University of Colorado}, + year = 2011, + month = {May}, + www_section = comm, + www_pdf_url = "http://www.cs.uwaterloo.ca/~k4bauer/papers/KevinBauerPhDThesisAccepted.pdf", + www_tags={selected}, +} + +@article{perea-tissec11, + author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia}, + title = {{PEREA}: Practical {TTP}-free revocation of repeatedly misbehaving anonymous users}, + journal = {ACM Transactions on Information and System Security ({ACM TISSEC})}, + issue_date = {December 2011}, + volume = {14}, + issue = {4}, + month = {December}, + year = {2011}, + issn = {1094-9224}, + pages = {29:1--29:34}, + articleno = {29}, + numpages = {34}, + url = {http://doi.acm.org/10.1145/2043628.2043630}, + doi = {http://doi.acm.org/10.1145/2043628.2043630}, + acmid = {204363}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior}, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perea-tissec.pdf}, + www_section=misc, + www_tags={selected}, +} + +@phdthesis{Weber11, + author = {Stefan G. Weber}, + title = {Multilaterally Secure Pervasive Cooperation}, + school = {TU Darmstadt, Germany}, + year = {2011}, + month = {December}, + www_section = {comm}, + www_pdf_url = {http://tuprints.ulb.tu-darmstadt.de/2842/1/DissertationStefanGWeber2011-12-14.pdf} +} + +@inproceedings{Shokri11QLP1, + title={Quantifying location privacy}, + author={Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux}, + booktitle={Proceedings of the 2011 IEEE Symposium on Security and Privacy}, + pages={247--262}, + year={2011}, + organization={IEEE}, + www_section=misc, + www_pdf_url={http://infoscience.epfl.ch/record/164572/files/ShokriTLH_SP11.pdf} +} + +@inproceedings{Shokri11QLP2, + title={Quantifying Location Privacy: The Case of Sporadic Location Exposure}, + author={Reza Shokri and George Theodorakopoulos and George Danezis and Hubaux, Jean-Pierre and Jean-Yves Le Boudec}, + booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)}, + pages={57--76}, + year={2011}, + publisher={Springer}, + www_section=misc, + www_pdf_url={http://infoscience.epfl.ch/record/164777/files/ShokriTDHL_PETS11.pdf} +} + +@inproceedings{oakland2012-peekaboo, + title = {Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}, + author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://kpdyer.com/publications/oakland2012.pdf}, +} + +@inproceedings{oakland2012-lastor, + title = {{LASTor: A Low-Latency AS-Aware Tor Client}}, + author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf}, +} + +@inproceedings{oakland2012-lap, + title = {{LAP}: Lightweight Anonymity and Privacy}, + author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming}, + booktitle = {Proceedings of the 2012 IEEE Symposium on Security and Privacy}, + year = {2012}, + month = {May}, + www_tags = {selected}, + www_section = comm, + www_pdf_url = {http://freehaven.net/anonbib/papers/LAP.pdf}, +} + +@inproceedings{congestion-tor12, + author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg}, + title = {{Congestion-aware Path Selection for Tor}}, + booktitle = {Proceedings of Financial Cryptography and Data Security +(FC'12)}, + year = {2012}, + month = {February}, + www_tags = {selected}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/Congestion_Aware_FC12.pdf}, +} + +@InProceedings{blacr-ndss, + author = {Man Ho Au and Apu Kapadia and Willy Susilo}, + title = {{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation}, + booktitle = {Proceedings of the 19th Annual Network and Distributed System Security Symposium ({NDSS})}, + year = {2012}, + month = feb, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf} +} + +@InCollection{systems-anon-communication, + author = {George Danezis and Claudia Diaz and Paul F. Syverson}, + title = {{Systems for Anonymous Communication}}, + month = {August}, + year = {2010}, + pages = {341--390}, + editor = {B. Rosenberg and + D. Stinson}, + booktitle = {CRC Handbook of Financial Cryptography and Security}, + publisher = {Chapman \& Hall }, + series = {CRC Cryptography and Network Security Series}, + volume = {}, + www_tags = {selected}, + www_pdf_url = {https://www.cosic.esat.kuleuven.be/publications/article-1335.pdf}, + www_section = comm +} + +@inproceedings{shadow-ndss12, + title = {{Shadow: Running Tor in a Box for Accurate and Efficient Experimentation}}, + author = {Rob Jansen and Nicholas Hopper}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'12}, + year = {2012}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.internetsociety.org/sites/default/files/09_3.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{flashproxy-pets12, + title={Evading Censorship with Browser-Based Proxies}, + author={David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= censorship, + www_pdf_url= {https://crypto.stanford.edu/flashproxy/flashproxy.pdf} +} + +@inproceedings{leastsquares-pets12, + title={Understanding Statistical Disclosure: A Least Squares approach}, + author={Fernando Perez-Gonzalez and Carmela Troncoso}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_41.pdf}, +} + +@inproceedings{tcp-tor-pets12, + title={{Spying in the Dark: TCP and Tor Traffic Analysis}}, + author={Yossi Gilad and Amir Herzberg}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf}, +} + +@inproceedings{traffic-padding-pets12, + title={k-Indistinguishable Traffic Padding in Web Applications}, + author={Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_46.pdf}, +} + +@inproceedings{remote-traffic-pets12, + title={Website Detection Using Remote Traffic Analysis}, + author={Xun Gong and Nikita Borisov and Negar Kiyavash and Nabil Schear}, + booktitle = {Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012)}, + month={July}, + year={2012}, + publisher={Springer}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf}, +} + +@InProceedings{cset12-modeling, + author = {Rob Jansen and Kevin Bauer and Nicholas Hopper and Roger Dingledine}, + title = {Methodically Modeling the Tor Network}, + booktitle = {Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)}, + year = {2012}, + month = {August}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.robgjansen.com/publications/tormodel-cset2012.pdf}, + www_tags={selected}, +} + +@inproceedings{tschorsch:translayeranon, + author = {Florian Tschorsch and Bj{\"{o}}rn Scheurmann}, + title = {How (not) to build a transport layer for anonymity overlays}, + month = {June}, + year = {2012}, + booktitle = {Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy}, + www_tags = {selected}, + www_pdf_url = {http://pade12.mytestbed.net/pade12-final6.pdf}, + www_section = comm # and # torperf, +} + +@phdthesis{koot2012, + author = {Matthijs R. Koot}, + year = {2012}, + month = {June}, + school = {University of Amsterdam}, + address = {Amsterdam, The Netherlands}, + title = {Measuring and Predicting Anonymity}, + www_pdf_url={http://cyberwar.nl/d/PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf}, + www_section = traffic +} + +@inproceedings{esorics10-bandwidth, + title = {Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation}, + author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'10}, + year = {2010}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/chakravartyTA.pdf}, + www_tags = {selected}, + www_section = traffic +} + +@InProceedings{foci12-winter, + author = {Philipp Winter and Stefan Lindskog}, + title = {{How the Great Firewall of China is blocking Tor}}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, + year = {2012}, + month = {August}, + www_section = censorship, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf}, + www_tags={selected}, +} + +@InProceedings{foci12-defiance, + author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh}, + title = {Bootstrapping Communications into an Anti-Censorship System}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)}, + year = {2012}, + month = {August}, + www_section = censorship, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf}, + www_tags={selected}, +} + +@inproceedings{throttling-sec12, + title = {{Throttling Tor Bandwidth Parasites}}, + author = {Rob Jansen and Paul Syverson and Nicholas Hopper}, + booktitle = {Proceedings of the 21st USENIX Security Symposium}, + year = {2012}, + month = {August}, + www_tags = {selected}, + www_pdf_url = {http://www.robgjansen.com/publications/throttling-sec2012.pdf}, + www_section = traffic # and # torperf, +} + +@inproceedings{wpes12-cogs, + title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor}, + author = {Tariq Elahi and Kevin Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, + year = {2012}, + month = {October}, + location = {Raleigh, NC, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/~arma/cogs-wpes.pdf}, + www_section = traffic +} + +@inproceedings{wpes12-torchestra, + title = {Torchestra: Reducing interactive traffic delays over Tor}, + author = {Deepika Gopal and Nadia Heninger}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012)}, + year = {2012}, + month = {October}, + location = {Raleigh, NC, USA}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://freehaven.net/anonbib/papers/torchestra-wpes.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{ccs2012-classification, + Author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg}, + Title = {Enhancing Tor's Performance using Real-time Traffic Classification}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = comm # and # torperf, + www_tags = {selected}, + www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/difftor-ccs.pdf}, +} + +@inproceedings{ccs2012-decoys, + Author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, + Title = {Routing Around Decoys}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf}, +} + +@inproceedings{ccs2012-skypemorph, + Author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, + Title = {SkypeMorph: Protocol Obfuscation for {T}or Bridges}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {https://cs.uwaterloo.ca/~iang/pubs/skypemorph-ccs.pdf}, +} + +@inproceedings{ccs2012-stegotorus, + Author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, + Title = {{StegoTorus}: A Camouflage Proxy for the {T}or Anonymity System}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://www.owlfolio.org/media/2010/05/stegotorus.pdf}, +} + +@inproceedings{ccs2012-censorspoofer, + Author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, + Title = {CensorSpoofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {https://netfiles.uiuc.edu/qwang26/www/publications/censorspoofer.pdf}, +} + +@inproceedings{ccs2012-fingerprinting, + Author = {Xiang Cai and Xincheng Zhang and Brijesh Joshi and Rob Johnson}, + Title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses}, + Booktitle = {Proceedings of the 19th ACM conference on Computer and + Communications Security (CCS 2012)}, + Month = {October}, + year = {2012}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cs.sunysb.edu/~xcai/fp.pdf}, +} + +@inproceedings{acns11-certificateless, + author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, + title = {Fully Non-Interactive Onion Routing with Forward-Secrecy}, + crossref = {DBLP:conf/acns/2011}, + www_pdf_url = {http://www.dariofiore.it/wp-content/uploads/ACNS11.pdf}, + www_tags = {selected}, + www_section = comm +} + +@proceedings{DBLP:conf/acns/2011, + editor = {Javier Lopez and Gene Tsudik}, + booktitle = {Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011)}, + series = {Lecture Notes in Computer Science}, + location = {Malaga, Spain}, + volume = {6715}, + month = {June}, + year = {2011}, +} + +@inproceedings{ipccc12-performance, + Author = {Andriy Panchenko and Fabian Lanze and Thomas Engel}, + Title = {Improving Performance and Anonymity in the Tor Network}, + Booktitle = {Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012)}, + Month = {December}, + year = {2012}, + www_section = comm # and # torperf, + www_tags = {selected}, + www_pdf_url = {http://lorre.uni.lu/~andriy/papers/ipccc12-tor-performance.pdf}, +} + +@inproceedings{perm-ccs12, + author = {Man Ho Au and Apu Kapadia}, + title = {{PERM}: Practical Reputation-Based Blacklisting without {TTPs}}, + booktitle = {Proceedings of The 19th ACM Conference on Computer and Communications Security (CCS)}, + pages = {929--940}, + month = oct, + year = {2012}, + doi = {10.1145/2382196.2382294}, + publisher = {ACM}, + www_tags = {selected}, + www_section = nym, + www_pdf_url = {http://www.cs.indiana.edu/~kapadia/papers/perm-ccs12.pdf} +} + +@inproceedings{ndss13-lira, + title = {{LIRA: Lightweight Incentivized Routing for Anonymity}}, + author = {Rob Jansen and Aaron Johnson and Paul Syverson}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.robgjansen.com/publications/lira-ndss2013.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{ndss13-rbridge, + title = {{rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation}}, + author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.cs.umn.edu/~hopper/rbridge_ndss13.pdf}, + www_section = comm +} + +@inproceedings{ndss13-relay-selection, + title = {{An Empirical Evaluation of Relay Selection in Tor}}, + author = {Christopher Wacek and Henry Tan and Kevin Bauer and Micah Sherr}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {https://security.cs.georgetown.edu/~msherr/papers/tor-relaystudy.pdf}, + www_section = comm # and # torperf, +} + +@inproceedings{ndss13-website-fingerprinting, + title = {{Preventing Side-channel Leaks in Web Traffic: A Formal Approach}}, + author = {Michael Backes and Goran Doychev and Boris K\"opf}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://software.imdea.org/~bkoepf/papers/ndss13.pdf}, + www_section = comm +} + +@inproceedings{ndss13-freewave, + title = {{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}}, + author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, + booktitle = {Proceedings of the Network and Distributed System Security Symposium - {NDSS}'13}, + year = {2013}, + month = {February}, + publisher = {Internet Society}, + www_tags={selected}, + www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/FreeWave.pdf}, + www_section = censorship +} + +@techreport{wileydust, + title={Dust: A Blocking-Resistant Internet Transport Protocol}, + author={Brandon Wiley}, + institution={School of Information, University of Texas at Austin}, + year={2011}, + www_tags={selected}, + www_pdf_url = {http://blanu.net/Dust.pdf}, + www_section = censorship +} + +@inproceedings{esorics12-torscan, + title = {{TorScan}: Tracing Long-lived Connections and Differential Scanning Attacks}, + author = {Alex Biryukov and Ivan Pustogarov and Ralf Philipp Weinmann}, + booktitle = {Proceedings of the European Symposium Research Computer Security - {ESORICS}'12}, + year = {2012}, + month = {September}, + publisher = {Springer}, + www_pdf_url = {http://freehaven.net/anonbib/papers/torscan-esorics2012.pdf}, + www_tags = {selected}, + www_section = traffic +} + +%%%%%%% Journals and proceedings: used by reference + +@Proceedings{eurocrypt-02, + editor = {Lars R. Knudsen}, + booktitle = "Proceedings of Eurocrypt 2002", + month = {May}, + year = {2002}, + bookurl = {http://www.ec2002.tue.nl/}, + www_tags={selected}, +} + +@Proceedings{weis2006, + editor = {Ross Anderson}, + booktitle = "Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)", + month = {June}, + year = {2006}, + location = {Cambridge, UK}, + bookurl = {http://weis2006.econinfosec.org/}, +} + +% title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International +% Conference on the Theory and Applications of Cryptographic +% Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, +@Proceedings{eurocrypt2005, + editor = {Ronald Cramer}, + booktitle = {Proceedings of EUROCRYPT 2005}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {3494}, + month = {May}, + year = {2005}, + isbn = {3-540-25910-4}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@proceedings{esorics2007, + editor = {Joachim Biskup and + Javier Lopez}, + booktitle = {Proceedings of 12th European Symposium On Research In Computer Security (ESORICS 2007)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {4734}, + month = {September}, + year = {2007}, + location = {Dresden, Germany}, + isbn = {978-3-540-74834-2}, +} + +@proceedings{DBLP:conf/acns/2008, + editor = {Steven M. Bellovin and + Rosario Gennaro and + Angelos D. Keromytis and + Moti Yung}, + booktitle = {Proceedings of the 6th International Conference on + Applied Cryptography and Network Security + (ACNS 2008)}, + series = {Lecture Notes in Computer Science}, + volume = {5037}, + location = {New York, NY, USA}, + month = {June}, + year = {2008}, + isbn = {978-3-540-68913-3}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@proceedings{DBLP:conf/pervasive/2008, + editor = {Jadwiga Indulska and + Donald J. Patterson and + Tom Rodden and + Max Ott}, + booktitle = {Proceedings of the 6th International Pervasive Computing Conference (Pervasive 2008)}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {5013}, + location = {Sydney, Australia}, + month = {May}, + year = {2008}, + isbn = {978-3-540-79575-9}, + bibsource = {DBLP, http://dblp.uni-trier.de}, +} + +@article{Ruiz-Martinez_2012, + title={A survey on solutions and main free tools for privacy enhancing Web communications}, + volume={35}, + ISSN={1084-8045}, + DOI={10.1016/j.jnca.2012.02.011}, + number={5}, + journal={Journal of Network and Computer Applications}, + author={Ruiz-Mart{\'i}nez, A.}, + year={2012}, + month={September}, + pages={1473--1492}, + www_pdf_url={http://ants.inf.um.es/~arm/Survey%20privacy%20tools.pdf}, + www_section=comm, +} + +@inproceedings{oakland2013-parrot, + title = {The Parrot is Dead: Observing Unobservable Network Communications}, + author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov}, + booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, + year = {2013}, + month = {May}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {http://www.cs.utexas.edu/~amir/papers/parrot.pdf}, +} + +@inproceedings{oakland2013-trawling, + title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization}, + author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann}, + booktitle = {Proceedings of the 2013 IEEE Symposium on Security and Privacy}, + year = {2013}, + month = {May}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf}, +} + +@inproceedings{pets13-splitting, + title={The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting}, + author={Mashael Alsabah and Kevin Bauer and Tariq Elahi and Ian Goldberg}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= comm # and # torperf, + www_pdf_url= {http://www.cypherpunks.ca/~iang/pubs/conflux-pets.pdf}, +} + +@inproceedings{pets13-how-low, + title={How Low Can You Go: Balancing Performance with Anonymity in Tor}, + author={John Geddes and Rob Jansen and Nicholas Hopper}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://www-users.cs.umn.edu/~hopper/howlow-pets2013.pdf}, +} + +@inproceedings{pets13-oss, + title={{OSS}: Using Online Scanning Services for Censorship Circumvention}, + author={David Fifield and Gabi Nakibly and Dan Boneh}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= censorship, + www_pdf_url= {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf}, +} + +@inproceedings{pets13-flow-fingerprints, + title={The need for flow fingerprints to link correlated network flows}, + author={Amir Houmansadr and Nikita Borisov}, + booktitle = {Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS 2013)}, + month={July}, + year={2013}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {http://www.cs.utexas.edu/~amir/papers/Fancy.pdf}, +} + + +%%%%% +%% Sent by str4d +%% + +@inproceedings{egger2013:practical-attacks, + title = {Practical Attacks Against the I2P Network}, + author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, + booktitle = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)}, + year = {2013}, + month = {October}, + www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf}, + www_section = traffic, +} + +%% hal-00744922, version 1 +%% http://hal.inria.fr/hal-00744922 +@inproceedings{timpanaro:hal-00744922, + hal_id = {hal-00744922}, + url = {http://hal.inria.fr/hal-00744922}, + title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.}}, + language = {English}, + affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, + booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and Security}}, + publisher = {Springer}, + pages = {77--92}, + address = {Melbourne, Australia}, + volume = {4}, + audience = {international }, + doi = {10.1007/978-3-642-35362-8 }, + year = {2012}, + month = Dec, + www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf}, + www_section = comm, +} + +%% hal-00744919, version 1 +%% http://hal.inria.fr/hal-00744919 +@inproceedings{timpanaro:hal-00744919, + hal_id = {hal-00744919}, + url = {http://hal.inria.fr/hal-00744919}, + title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous file-sharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.}}, + keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing}, + language = {English}, + affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, + booktitle = {{Proceedings of the 6th International Conference on Network and System Security}}, + address = {Wu Yi Shan, China}, + audience = {international }, + year = {2012}, + month = Nov, + www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf}, + www_section = traffic, +} + +@misc{ehlert2011:usability-comparison-i2p-tor, + title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison}, + author = {Mathias Ehlert}, + institution = {Humboldt University of Berlin}, + howpublished = {Seminar}, + year = {2011}, + month = {November}, + www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf}, + www_section = comm, +} + +%% inria-00632259, version 1 +%% http://hal.inria.fr/inria-00632259 +@techreport{timpanaro:inria-00632259, + hal_id = {inria-00632259}, + url = {http://hal.inria.fr/inria-00632259}, + title = {{Monitoring the I2P network}}, + author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, + abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and we show through a one week long experiment that we are able to identify 32\% of all running applications, among web servers and file- sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after its publication on the I2P distributed database.}}, + language = {English}, + affiliation = {MADYNES - INRIA Lorraine - LORIA}, + institution = {MADYNES - INRIA Lorraine - LORIA}, + year = {2011}, + month = Oct, + www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf}, + www_section = traffic, +} + +@mastersthesis{hermann2011-mthesis, + title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P}, + author = {Michael Hermann}, + school = {TU-Munich}, + year = {2011}, + month = {March}, + www_section = traffic, +} + +@inproceedings{BlackHat2011-crenshaw, + url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers}, + title = {Darknets - I2P Identifying Hidden Servers}, + author = {Adrian Crenshaw}, + booktitle = {Proceedings of Black Hat}, + year = {2011}, + month = {January}, + location = {DC}, + www_pdf_url = {http://www.irongeek.com/downloads/Identifying\%20the\%20true\%20IP\%20of\%20I2P\%20service\%20hosts.pdf}, + www_section = traffic, +} + +@mastersthesis{delmer-mthesis, + title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes, Freenet et i2p}, + author = {Laurie Delmer}, + school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques et sociales}, + year = {2009}, + note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P. School: Catholic University of Leuven - Department of Political and Social Science}, + www_section = comm, +} + +@inproceedings{petcon2009-schomburg, + title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks}, + author = {Jens Schomburg}, + booktitle = {Proceedings of PET-CON 2009.1}, + location = {Dresden, Germany}, + year = {2009}, + month = {March}, + pages = {49--49}, + www_pdf_url = {http://freehaven.net/~karsten/volatile/petcon-proceedings-2009.1.pdf}, + www_section = comm, +} + +@inproceedings{petcon2009-zzz, + title = {Peer Profiling and Selection in the I2P Anonymous Network}, + author = {zzz (Pseudonym) and Lars Schimmer}, + booktitle = {Proceedings of PET-CON 2009.1}, + location = {Dresden, Germany}, + year = {2009}, + month = {March}, + pages = {59--59}, + www_pdf_url = {http://www.i2p2.i2p/_static/pdf/I2P-PET-CON-2009.1.pdf}, + www_section = comm, +} + +@inproceedings{esorics13-cellflood, + title = {{CellFlood}: Attacking {T}or Onion Routers on the Cheap}, + author = {Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos Keromytis}, + booktitle = {Proceedings of ESORICS 2013}, + year = {2013}, + month = {September}, + www_pdf_url = {http://www.cs.columbia.edu/~vpk/papers/cellflood.esorics13.pdf}, + www_section = traffic, + www_tags={selected}, +} + +@inproceedings{esorics13-infra, + title = {Plug-and-Play {IP} Security: Anonymity Infrastructure Instead of {PKI}}, + author = {Yossi Gilad and Amir Herzberg}, + booktitle = {Proceedings of ESORICS 2013}, + year = {2013}, + month = {September}, + www_pdf_url = {http://eprint.iacr.org/2013/410.pdf}, + www_section = comm, + www_tags={selected}, +} + +@inproceedings{wpes13-hide, + title = {You Cannot Hide for Long: De-Anonymization of Real-World Dynamic Behaviour}, + author = {George Danezis and Carmela Troncoso}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/DanezisTroncoso13.pdf}, + www_section = traffic +} + +@inproceedings{wpes13-fingerprinting, + title = {Improved Website Fingerprinting on Tor}, + author = {Tao Wang and Ian Goldberg}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/webfingerprint-wpes.pdf}, + www_section = traffic +} + +@inproceedings{wpes13-scramblesuit, + title = {ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship}, + author = {Philipp Winter and Tobias Pulls and Juergen Fuss}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cs.kau.se/philwint/pdf/wpes2013.pdf}, + www_section = traffic +} + +@inproceedings{wpes13-blac, + title = {Thinking Inside the {BLAC} Box: Smarter Protocols for Faster Anonymous Blacklisting}, + author = {Ryan Henry and Ian Goldberg}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/blacronym-wpes.pdf}, + www_section = nym +} + +@inproceedings{wpes13-gotr, + title = {Improved Group Off-The-Record Messaging}, + author = {Hong Liu and Eugene Y. Vasserman and Nicholas Hopper}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/gotr.pdf}, + www_section = comm, +} + +@inproceedings{wpes13-conscript, + title = {Conscript Your Friends into Larger Anonymity Sets with {J}ava{S}cript}, + author = {Henry Corrigan-Gibbs and Bryan Ford}, + booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2013)}, + year = {2013}, + month = {November}, + location = {Berlin, Germany}, + publisher = {ACM}, + www_tags = {selected}, + www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/wpes13.pdf}, + www_section = comm, +} + +@inproceedings{ccs2013-usersrouted, + Author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson}, + Title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries}, + Booktitle = {Proceedings of the 20th ACM conference on Computer and + Communications Security (CCS 2013)}, + Month = {November}, + year = {2013}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf}, +} + +@inproceedings{ccs2013-fte, + Author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, + Title = {Protocol Misidentification Made Easy with Format-Transforming Encryption}, + Booktitle = {Proceedings of the 20th ACM conference on Computer and + Communications Security (CCS 2013)}, + Month = {November}, + year = {2013}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://eprint.iacr.org/2012/494.pdf}, +} + +@inproceedings{ccs2013-acks, + Author = {John Geddes and Maxfield Schuchard and Nicholas Hopper}, + Title = {Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention}, + Booktitle = {Proceedings of the 20th ACM conference on Computer and + Communications Security (CCS 2013)}, + Month = {November}, + year = {2013}, + www_section = censorship, + www_tags = {selected}, + www_pdf_url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf}, +} + +@inproceedings{ccs2013-pctcp, + Author = {Mashael AlSabah and Ian Goldberg}, + Title = {{PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks}}, + Booktitle = {Proceedings of the 20th ACM conference on Computer and + Communications Security (CCS 2013)}, + Month = {November}, + year = {2013}, + www_section = comm # and # torperf, + www_tags = {selected}, + www_pdf_url = {http://www.cypherpunks.ca/~iang/pubs/pctcp-ccs.pdf}, +} + +@inproceedings{ccs2013-buddies, + Author = {David Wolinsky and Ewa Syta and Bryan Ford}, + Title = {Hang with Your Buddies to Resist Intersection Attacks}, + Booktitle = {Proceedings of the 20th ACM conference on Computer and + Communications Security (CCS 2013)}, + Month = {November}, + year = {2013}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://dedis.cs.yale.edu/dissent/papers/buddies.pdf}, +} + +@article{danner-et-al:tissec12, + Author = {Norman Danner and Sam DeFabbia-Kane and Danny Krizanc and Marc Liberatore}, + Doi = {10.1145/2382448.2382449}, + Journal = {Transactions on Information and System Security}, + Keywords = {anonymity}, + Number = {3}, + Pages = {11:1--11:25}, + Title = {Effectiveness and detection of denial of service attacks in {Tor}}, + Volume = {15}, + Year = {2012}, + www_tags = {selected}, + www_pdf_url = {http://arxiv.org/pdf/1110.5395v3.pdf}, + www_section = comm +} + +@misc{BaMaMo_13, + author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi}, + title = {{TUC: Time-sensitive and Modular Analysis of Anonymous Communication}}, + howpublished = {IACR ePrint Archive Report 2013/664}, + month = {October}, + year = {2013}, + www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/tuc.pdf}, + www_section = comm +} + +@inproceedings{BaKaMaMeMo_13, + author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser, Esfandiar Mohammadi}, + title = {{AnoA: A Framework For Analyzing Anonymous Communication Protocols}}, + booktitle = {{Proceedings of the of the 26th IEEE Computer Security Foundations Symposium (CSF)}}, + year = {2013}, + month = {June}, + pages = {163--178}, + www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~meiser/paper/anoa.pdf}, + www_section = comm +} + +@inproceedings{BaKaMo_13, + author = {Michael Backes and Aniket Kate and Esfandiar Mohammadi}, + title = {{Ace: An Efficient Key-Exchange Protocol for Onion Routing}}, + booktitle = {{Proceedings of the 11th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2013}, + month = {October}, + pages = {55--64}, + www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/owake.pdf}, + www_section = comm +} + +@inproceedings{BaKaGoMo_12, + author = {Michael Backes and Aniket Kate and Ian Goldberg and Esfandiar Mohammadi}, + title = {{Provably Secure and Practical Onion Routing}}, + booktitle = {{Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF)}}, + month = {June}, + year = {2012}, + pages = {369--385}, + www_pdf_url = {http://www.infsec.cs.uni-saarland.de/~mohammadi/paper/uc-or.pdf}, + www_section = comm +} + +@InProceedings{sniper14, + author = {Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\"{o}}rn Scheuermann}, + title = {The Sniper Attack: Anonymously Deanonymizing and Disabling the {T}or Network}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14}, + year = {2014}, + month = {February}, + publisher = {IEEE}, + www_section = traffic, + www_pdf_url = "http://www.robgjansen.com/publications/sniper-ndss2014.pdf", + www_tags={selected}, +} + +@InProceedings{entropist, + author = {Paul Syverson}, + title = {Why {I'm} not an Entropist}, + booktitle = {Proceedings of Security Protocols XVII: 17th International Workshop, April 2009, Revised Selected Papers}, + pages = {231--239}, + editor = {Bruce Christianson and James A. Malcolm and Vashek Maty\'{a}\v{s} and Michael Roe}, + year = 2013, + www_section = traffic, + www_pdf_url = "http://www.syverson.org/entropist-final.pdf", + publisher = {Springer-Verlag, LNCS 7028}, + www_tags={selected}, +} + +@phdthesis{jansen-phd-thesis, + title = {Privacy Preserving Performance Enhancements for Anonymous Communication Systems}, + author = {Rob Jansen}, + school = {University of Minnesota}, + year = {2012}, + month = {October}, + www_tags = {selected}, + www_section = comm # and # torperf, + www_pdf_url = {http://www.robgjansen.com/publications/jansen-phd-dissertation.pdf}, +} + +@inproceedings{nowlanreducing, + title={Reducing Latency in Tor Circuits with Unordered Delivery}, + author={Nowlan, Michael F and Wolinsky, David and Ford, Bryan}, + booktitle={Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet}, + organization={USENIX}, + year = 2013, + www_section = comm # and # torperf, + www_pdf_url = "http://dedis.cs.yale.edu/2010/anon/papers/foci13.pdf", +} + +@inproceedings{ndss13:mittal:a, + title={Pisces: Anonymous Communication Using Social Networks}, + author={Prateek Mittal and Matthew Wright and Nikita Borisov}, + crossref={ndss13}, + www_tags = {selected}, + www_section=comm, + www_pdf_url={http://internetsociety.org/sites/default/files/05_1_0.pdf}, +} + +@inproceedings{ndss13:mittal:b, + title={Preserving Link Privacy in Social Network Based Systems}, + author={Prateek Mittal and Charalampos Papamanthou and Dawn Song}, + crossref={ndss13}, + www_section=comm, + www_pdf_url={http://internetsociety.org/sites/default/files/05_2_0.pdf}, +} +@inproceedings{ndss12:mittal, + title={X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks}, + author={Prateek Mittal and Matthew Caesar and Nikita Borisov}, + crossref={ndss12}, + www_section=comm, + www_pdf_url={http://www.internetsociety.org/sites/default/files/02_2.pdf}, +} + +@proceedings{ndss13, + editor = {}, + booktitle = {Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS2013)}, + location = {San Diego, California, USA}, + publisher = {The Internet Society 2013}, + month = {February}, + year = {2013}, +} + +@proceedings{ndss12, + editor = {}, + booktitle = {Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS2012)}, + location = {San Diego, California, USA}, + publisher = {The Internet Society 2013}, + month = {January}, + year = {2012}, +} + +@inproceedings{miab-acsac13, + title = {Message In A Bottle: Sailing Past Censorship}, + author={Luca Invernizzi and Christopher Kruegel and Giovanni Vigna }, + booktitle={Proceedings of the Annual Computer Security Applications Conference (ACSAC)}, + publisher={ACM}, + year=2013, + www_section=censorship, + www_pdf_url="http://www.cs.ucsb.edu/~vigna/publications/2013_ACSAC_MITB.pdf", + www_tags={selected} +} + +@inproceedings{houmansadrnodirection, + title={No Direction Home: The True Cost of Routing Around Decoys}, + author={Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14}, + year = {2014}, + month = {February}, + publisher = {Internet Society}, + www_section = censorship, + www_pdf_url = "http://www.internetsociety.org/sites/default/files/01_2_1.pdf", + www_tags={selected}, +} + +@inproceedings{garmandecentralized, + title={Decentralized Anonymous Credentials}, + author={Christina Garman and Matthew Green and Ian Miers}, + booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '14}, + year = {2014}, + month = {February}, + publisher = {Internet Society}, + www_section = credentials, + www_pdf_url = "http://www.internetsociety.org/sites/default/files/07_3_1.pdf", + www_tags={selected}, +} + +@inproceedings{botnetfc14, + title={Challenges in protecting Tor hidden services from botnet abuse}, + author={Nicholas Hopper}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'14)}, + year = {2014}, + month = {March}, + www_section = comm, + www_pdf_url = "http://fc14.ifca.ai/papers/fc14_submission_152.pdf", + www_tags={selected}, +} + +@inproceedings{mop2mop-fc14, + title={MoP-2-MoP -- Mobile private microblogging}, + author={Marius Senftleben and Mihai Bucicoiu and Erik Tews and Frederik Armknecht and Stefan Katzenbeisser and Ahmad-Reza Sadeghi}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'14)}, + year = {2014}, + month = {March}, + www_section = comm, + www_pdf_url = "http://fc14.ifca.ai/papers/fc14_submission_99.pdf", +} + +@inproceedings{bitcoin-p2p-anon, + title={An Analysis of Anonymity in Bitcoin Using P2P Network Traffic}, + author={Philip Koshy and Diana Koshy and Patrick McDaniel}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'14)}, + year = {2014}, + month = {March}, + www_section = traffic, + www_pdf_url = "http://fc14.ifca.ai/papers/fc14_submission_71.pdf", +} + +@inproceedings{mixcoin-fc14, + title={Mixcoin: Anonymity for Bitcoin with accountable mixes}, + author={Joseph Bonneau and Jeremy Clark and Joshua A. Kroll and Andrew Miller and Arvind Narayanan}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'14)}, + year = {2014}, + month = {March}, + www_section = credentials, + www_pdf_url = "http://fc14.ifca.ai/papers/fc14_submission_170.pdf", +} + +@inproceedings{Zamani:FOCI13, + title = {Towards Provably-Secure Scalable Anonymous Broadcast}, + author = {Mahdi Zamani and Jared Saia and Mahnush Movahedi and Joud Khoury}, + booktitle = {Proceedings of the USENIX Workshop on Free and Open Communications on the Internet}, + year = {2013}, + month = {August}, + day = {13}, + series = {FOCI '13}, + location = {Washington, DC, USA}, + www_tags = {selected}, + www_section = {Anonymous communication}, + www_pdf_url = {http://www.cs.unm.edu/~saia/papers/foci13.pdf}, +} + +@inproceedings{nfattackpam14, + title = {On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records}, + author = {S. Chakravarty and M. V. Barbera and G. Portokalidis and M. Polychronakis and A. D. Keromytis}, + booktitle = {Proceedings of the 15th Passive and Active Measurements Conference (PAM '14)}, + year = {2014}, + month = {March}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://www.cs.columbia.edu/~sc2516/papers/pam2014-tor-nfattack.pdf}, +} + +@inproceedings{zerocash, + title={Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin}, + author={Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, + booktitle={Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy}, + year={2014}, + month={May}, + publisher={IEEE}, + www_section=credentials, + www_tags = {selected}, + www_pdf_url = "http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf", +} + +@inproceedings{anonize, + title={{ANONIZE}: A Large-Scale Anonymous Survey System}, + author={Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat}, + booktitle={Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy}, + year={2014}, + month={May}, + publisher={IEEE}, + www_section=misc, + www_pdf_url = "http://ieee-security.org/TC/SP2014/papers/ANONIZE_c_ALarge-ScaleAnonymousSurveySystem.pdf", +} + +@inproceedings{kuesters-rpc, + title={Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, + author={Ralf K\"usters and Tomasz Truderung and Andreas Vogt}, + booktitle={Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy}, + year={2014}, + month={May}, + publisher={IEEE}, + www_section=comm, + www_tags = {selected}, + www_pdf_url = "http://infsec.uni-trier.de/publications/paper/KuestersTruderungVogt-SP-2014.pdf", +} + +@inproceedings{asiaccs2014-reputation, + Author = {Anupam Das and Nikita Borisov and Prateek Mittal and Matthew Caesar}, + Title = {$Re^3$: Relay Reliability Reputation for Anonymity Systems}, + Booktitle = {Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)}, + Month = {June}, + year = {2014}, + www_section = comm, + www_tags = {selected}, + www_pdf_url = {http://hatswitch.org/~nikita/papers/re3-asiaccs14.pdf}, +} + +@inproceedings{pets14-cellular-ident, + title={Exploiting Delay Patterns for User IPs Identification in Cellular Networks}, + author={Vasile Claudiu Perta and Marco Valerio Barbera and Alessandro Mei}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Perta.pdf}, +} + +@inproceedings{pets14-combining-pir, + title={The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency}, + author={Casey Devet and Ian Goldberg}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= pir, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Devet.pdf}, +} + +@inproceedings{pets14-https-traffic-analysis, + title={I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis}, + author={Brad Miller and Ling Huang and A. D. Joseph and J. D. Tygar}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= traffic, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Miller.pdf}, +} + +@inproceedings{pets14-dummy-traffic, + title={Do dummies pay off? Limits of dummy traffic protection in anonymous communications}, + author={Simon Oya, Carmela Troncoso and Fernando P{\'e}rez-Gonz\'alez}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= traffic # and # comm, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Oya.pdf}, +} + +@inproceedings{pets14-dovetail, + title={Dovetail: Stronger Anonymity in Next-Generation Internet Routing}, + author={Jody Sankey and Matthew Wright}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= comm, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Sankey.pdf}, +} + +@inproceedings{pets14-spoiled-onions, + title={Spoiled Onions: Exposing Malicious Tor Exit Relays}, + author={Philipp Winter and Richard K\"ower and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= comm, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Winter.pdf}, +} + +@inproceedings{pets14-measuring-freenet, + title={Measuring Freenet in the Wild: Censorship-resilience under Observation}, + author={Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= pub, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Roos.pdf}, +} + +@inproceedings{pets14-cloudtransport, + title={CloudTransport: Using Cloud Storage for Censorship-Resistant Networking}, + author={Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov}, + booktitle = {Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS 2014)}, + month={July}, + year={2014}, + www_tags = {selected}, + www_section= censorship, + www_pdf_url= {https://www.petsymposium.org/2014/papers/Brubaker.pdf}, +} + +@inproceedings{jansen14-kist, + author = {Rob Jansen and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson}, + title = {Never Been KIST: Tor{\textquoteright}s Congestion Management Blossoms with Kernel-Informed Socket Transport}, + booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_tags = {selected}, + www_section = torperf, + www_pdf_url = {http://www.robgjansen.com/publications/kist-sec2014.pdf}, +} + +@inproceedings{wang14-fingerprinting-defenses, + author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg}, + title = {Effective Attacks and Provable Defenses for Website Fingerprinting}, + booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_tags = {selected}, + www_section = traffic, + www_pdf_url = {http://cacr.uwaterloo.ca/techreports/2014/cacr2014-05.pdf}, +} + +@inproceedings{wustrow14-tapdance, + author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman}, + title = {TapDance: End-to-Middle Anticensorship without Flow Blocking}, + booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {https://jhalderm.com/pub/papers/tapdance-sec14.pdf}, +} + +@inproceedings{fte-usenix14, + author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton}, + title = {LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, + booktitle = {Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_tags = {selected}, + www_section = censorship, + www_pdf_url = {https://kpdyer.com/publications/usenix2014-fte.pdf}, +} + +@inproceedings{safeplug-foci, + author = {Anne Edmundson and Anna Kornfeld Simpson and Joshua A. Kroll and Edward W. Felten}, + title = {{Security Audit of Safeplug ``Tor in a Box''}}, + booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + www_tags = {selected}, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-edmundson.pdf}, + www_section = comm, + publisher = {USENIX Association}, +} + +@inproceedings{gfw-foci14, + author = {Anonymous}, + title = {Towards a Comprehensive Picture of the Great Firewall's {DNS} Censorship}, + booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + www_tags = {selected}, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf}, + www_section = censorship, + publisher = {USENIX Association}, +} + +@inproceedings{facade-foci, + author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak}, + title = {Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search}, + booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf}, + www_section = censorship, +} + +@inproceedings{trist-foci, + author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran}, + title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography}, + booktitle = {Proceedings of 4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 14)}, + year = {2014}, + month = Aug, + address = {San Diego, CA}, + publisher = {USENIX Association}, + www_pdf_url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf}, + www_section = censorship, +} + +@inproceedings{usableTor, + title = {Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems}, + author = {Greg Norcie and Jim Blythe and Kelly Caine and L Jean Camp}, + booktitle = {Proceedings of the 2014 Workshop on Usable Security (USEC)}, + year = {2014}, + month = {February}, + www_tags = {selected}, + www_pdf_url = {http://www.norcie.com/papers/torUSEC.pdf}, + www_section = {Misc}, +} + +@inproceedings{fan2009efficient, + title={An efficient privacy-preserving scheme against traffic analysis attacks in network coding}, + author={Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Shen, Xuemin}, + booktitle={Proceedings of the 28th Annual IEEE Conference on Computer Communications (INFOCOM 2009)}, + pages={2213--2221}, + year={2009}, + organization={IEEE}, + www_pdf_url = {http://adhoc-security.googlecode.com/svn/trunk/Research/Research%20Papers/Network%20Coding/An%20Efficient%20Privacy%20Traffic%20Analysis%20Attacks%20in%20Network%20Coding.pdf}, + www_section={Misc} +} + +@article{fan2011network, + title={Network coding based privacy preservation against traffic analysis in multi-hop wireless networks}, + author={Fan, Yanfei and Jiang, Yixin and Zhu, Haojin and Chen, Jiming and Shen, Xuemin}, + journal={IEEE Transactions on Wireless Communications}, + volume={10}, + number={3}, + pages={834--843}, + year={2011}, + publisher={IEEE}, + www_pdf_url = {http://bbcr.uwaterloo.ca/papers/FJZCS11.pdf}, + www_section={Misc} +} + +@inproceedings{wang2011anonymous, + title={Anonymous communication with network coding against traffic analysis attack}, + author={Wang, Jin and Wang, Jianping and Wu, Chuan and Lu, Kejie and Gu, Naijie}, + booktitle={Proceedings of the 30th Annual IEEE Conference on Computer Communications (INFOCOM 2011)}, + pages={1008--1016}, + year={2011}, + organization={IEEE}, + www_pdf_url = {http://i.cs.hku.hk/~cwu/papers/jwang-infocom11.pdf}, + www_section={Misc} +} + +@inproceedings{wan2012priv, + title={Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks}, + author={Wan, Zhiguo and Xing, Kai and Liu, Yunhao}, + booktitle={Proceedings of the 31st Annual IEEE Conference on Computer Communications (INFOCOM 2012)}, + pages={73--81}, + year={2012}, + organization={IEEE}, + www_pdf_url = {http://www.cse.ust.hk/~liu/Infocom_12_Zhiguo.pdf}, + www_section={Misc} +} + +@inproceedings{DBLP:conf/sp/LeeDWWK13, + title = {Anon-Pass: Practical Anonymous Subscriptions}, + author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel}, + booktitle = {Proceedings of the 34th IEEE Symposium on Security and Privacy (S\&P 2013)}, + year = {2013}, + month = {May}, + location = {San Francisco, California, USA}, + pages = {319--333}, + publisher = {IEEE Computer Society}, + www_section = pub, + www_tags = {selected}, + www_pdf_url = {http://www.cs.utexas.edu/users/witchel/pubs/lee13oak-anon-pass.pdf}, +} + +@inproceedings{wpes14-csbuflo, + author = {Xiang Cai and Rishab Nithyanand and Rob Johnson}, + title = {{CS-BuFLO}: A Congestion Sensitive Website Fingerprinting Defense}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {http://pub.cs.sunysb.edu/~rob/papers/csbuflo.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{wpes14-glove, + author = {Rishab Nithyanand and Xiang Cai and Rob Johnson}, + title = {Glove: A Bespoke Website Fingerprinting Defense}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/glove.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{wpes14-webbrowsers, + author = {Jiangmin Yu and Eric Chan-Tin}, + title = {Identifying Webbrowsers in Encrypted Communications}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {http://www.cs.okstate.edu/~chantin/WPES2014.pdf}, + www_section = traffic +} + +@inproceedings{wpes14-farb, + author = {Li Xi and Dengguo Feng}, + title = {{FARB}: Fast Anonymous Reputation-Based Blacklisting without {TTPs}}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {}, + www_tags = {selected}, + www_section = nym +} + +@inproceedings{wpes14-facet, + author = {Shuai Li and Mike Schliep and Nick Hopper}, + title = {Facet: Streaming over Videoconferencing for Censorship Circumvention }, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf}, + www_tags = {selected}, + www_section = censorship +} + +@inproceedings{wpes14-leakage, + author = {Aziz Mohaisen and Matthew Thomas}, + title = {Measuring the Leakage of Onion at the Root}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {https://labs.verisigninc.com/assets/labs/Measuring-the-Leakage-of-Onion-at-the-Root.pdf}, + www_tags = {selected}, + www_section = comm +} + +@inproceedings{wpes14-imux, + author = {John Geddes, Rob Jansen and Nicholas Hopper}, + title = {Tor {IMUX}: Managing Connections from Two to Infinity, and Beyond}, + booktitle = {{Proceedings of the 12th Workshop on Privacy in the Electronic Society (WPES)}}, + year = {2014}, + month = {November}, + www_pdf_url = {https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf}, + www_tags = {selected}, + www_section = comm # and # torperf, +} + +@inproceedings{ccs2014-fingerprinting, + Author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg}, + Title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses}, + Booktitle = {Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)}, + Month = {November}, + year = {2014}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cs.stonybrook.edu/~rob/papers/ccs14.pdf}, +} + +@inproceedings{ccs2014-critical, + Author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt}, + Title = {A Critical Evaluation of Website Fingerprinting Attacks}, + Booktitle = {Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)}, + Month = {November}, + year = {2014}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2456.pdf}, +} + +@inproceedings{ccs2014-mators, + Author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi}, + Title = {(Nothing else) {MAT}or(s): Monitoring the Anonymity of Tor's Path Selection}, + Booktitle = {Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)}, + Month = {November}, + year = {2014}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {https://eprint.iacr.org/2014/621.pdf}, +} + +@inproceedings{ccs2014-tracking, + Author = {Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and Arvind Narayanan and Claudia Diaz}, + Title = {The web never forgets: Persistent tracking mechanisms in the wild}, + Booktitle = {Proceedings of the 21th ACM conference on Computer and Communications Security (CCS 2014)}, + Month = {November}, + year = {2014}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {http://www.cosic.esat.kuleuven.be/publications/article-2457.pdf}, +} + +%%%%%% Added 26 Feb by nickm from anonbib emails + +@mastersthesis{hirt2004thesis, + author = {Andreas Hirt}, + school = {The University of Calgary}, + title = {A Practical Buses Protocol for Anonymous Network Communication}, + year = {2004}, + month = {June}, + doi = {10.1.1.90.4163}, + www_abstract_url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.4163}, + www_section={comm}, + www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.4163&rep=rep1&type=pdf} +} + +@article{seidena2005busing, + title={New bounds for randomized busing}, + author={Seidena, Steven S and Chena, Peter P and Laxb, RF and Chena, J and Dingb, Guoli}, + journal={Theoretical Computer Science}, + volume={332}, + pages={63--81}, + year={2005}, + www_section={comm}, + www_pdf_url = {https://www.math.lsu.edu/~lax/TCS.pdf} +} + +@inproceedings{hirt2005practical, + title = {A Practical Buses Protocol for Anonymous Internet Communication}, + author = {Hirt, Andreas and Jacobson Jr, Michael J and Williamson, Carey L}, + booktitle = {Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST)}, + year = {2005}, + www_section={comm}, + www_pdf_url = {http://pages.cpsc.ucalgary.ca/~carey/papers/2005/pst2005.pdf} +} + +@inproceedings{hirt2008taxis, + title={Taxis: scalable strong anonymous communication}, + author={Hirt, Andreas and Jacobson, M and Williamson, Carey}, + booktitle={Proceedings of the IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems, 2008. (MASCOTS)}, + pages={1--10}, + year={2008}, + organization={IEEE}, + www_section={comm}, + www_pdf_url = {http://pages.cpsc.ucalgary.ca/~carey/papers/2008/mascots08-paper113.pdf} +} + +@article{carlsson2012motorcycles, + author = {Carlsson, Niklas and Williamson, Carey and Hirt, Andreas and Jacobson, Jr., Michael}, + title = {Performance modelling of anonymity protocols}, + journal = {Performance Evaluation}, + year = {2012}, + volume = {69}, + number = {12}, + pages = {643--661}, + month = dec, + publisher = {Elsevier}, + doi = {{10.1016/j.peva.2012.08.001}}, + issn = {{0166-5316}}, + www_section={comm}, + www_pdf_url = {https://www.ida.liu.se/~nikca/papers/pe12.pdf} +} + +@inproceedings{young2014drunkmotorcyclist, + title={The drunk motorcyclist protocol for anonymous communication}, + author={Young, Adam L and Yung, Moti}, + booktitle={Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2014}, + pages={157--165}, + year={2014}, + www_section={comm}, + organization={IEEE} +} + + +@phdthesis{huhta-thesis, + title = {Linking Tor Circuits}, + author = {Otto Huhta}, + booktitle = {}, + year = {2014}, + month = {September}, + www_pdf_url = +{http://www0.cs.ucl.ac.uk/staff/G.Danezis/students/Huhta14-UCL-Msc.pdf}, + www_section = {Traffic analysis}, +} + + + +@misc{clarke1999freenet, + title={Freenet: A distributed anonymous information storage and retrieval system. Freenet White Paper}, + author={Clarke, I and Sandberg, O and Wiley, B and Hong, TW}, + year={1999}, + howpublished="white paper", + www_section = {comm}, + www_pdf_url = "https://freenetproject.org/papers/ddisrs.pdf" +} + +%% Update to "freenet" entry +%% Is it possible to rename it to something like "clarke2001freenet"? +%% Publication year is actually 2001, you can see it in bibtex entry in cached HTML, also Google Scholar + + +@article{clarke2002protecting, + title={Protecting free expression online with Freenet}, + author={Clarke, Ian and Miller, Scott G and Hong, Theodore W and Sandberg, Oskar and Wiley, Brandon}, + journal={Internet Computing, IEEE}, + volume={6}, + number={1}, + pages={40--49}, + year={2002}, + publisher={IEEE}, + www_section = {comm}, + www_pdf_url = {https://freenetproject.org/papers/freenet-ieee.pdf} +} + +@article{clarke2010private, + title={Private communication through a network of trusted connections: The dark freenet}, + author={Clarke, Ian and Sandberg, Oskar and Toseland, Matthew and Verendel, Vilhelm}, + journal={Network}, + year={2010}, + www_section = {comm}, + www_pdf_url = {https://freenetproject.org/papers/freenet-0.7.5-paper.pdf} +} + +@inproceedings{conf/iwsec/PalmieriP14, + title = {Key Management for Onion Routing in a True Peer to Peer Setting}, + author = {Paolo Palmieri and Johan Pouwelse}, + booktitle = {Proceedings of the 9th International Workshop on Security +({IWSEC} 2014)}, + year = {2014}, + month = {August}, + www_pdf_url = +{http://paolopalmieri.com/pdf/Palmieri_Pouwelse_IWSEC2014.pdf}, + www_section = {Anonymous communication}, +} + +@inproceedings{conf/fc/PalmieriP15, + title = {Paying the Guard: an Entry-Guard-based Payment System for Tor}, + author = {Paolo Palmieri and Johan Pouwelse}, + booktitle = {Proceedings of the 19th International Conference on +Financial Cryptography and Data Security ({FC} 2015)}, + year = {2015}, + month = {January}, + www_tags = {selected}, + www_pdf_url = {http://paolopalmieri.com/pdf/Palmieri_Pouwelse_FC2015.pdf}, + www_section = {Economics}, +} +%%% Added 5 March 2015 by Nick Hopper + +@InProceedings{ndss15-trackingfree, + author = {Xiang Pan and Yinzhi Cao and Yan Chen}, + title = {I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with {TrackingFree} Browser}, + Booktitle = {Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium}, + Month = {February}, + year = {2015}, + www_section = traffic, + www_tags = {selected}, + www_pdf_url = {https://www.internetsociety.org/sites/default/files/01_5_0.pdf}, +} + +@InProceedings{ndss15-socialnetwork, + author = {Shouling Ji and Weiqing Li and Neil Zhenqiang Gong and Prateek Mittal and Raheem Beyah}, + title = {On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge}, + Booktitle = {Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium}, + Month = {February}, + year = {2015}, + www_section = Misc, + www_tags = {selected}, + www_pdf_url = {https://www.internetsociety.org/sites/default/files/07_2_2.pdf}, +} + +@inproceedings{muffler-fc14, + title={Multi-Class Traffic Morphing for Encrypted VoIP Communication}, + author={W. Brad Moore and Henry Tan and Micah Sherr and Marcus A. Maloof}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'15)}, + year = {2015}, + month = {February}, + www_section = traffic, + www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_108.pdf", +} + +@inproceedings{fontmetrics-fc14, + title={Fingerprinting web users through font metrics}, + author={David Fifield and Serge Egelman}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'15)}, + year = {2015}, + month = {February}, + www_section = traffic, + www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_83.pdf", +} + +@inproceedings{sublinearpir-fc14, + title={Sublinear Scaling for Multi-Client Private Information Retrieval}, + author={Wouter Lueks and Ian Goldberg}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'15)}, + year = {2015}, + month = {February}, + www_section = pir, + www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_48.pdf", +} + +@inproceedings{payguard-fc14, + title={Paying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper)}, + author={Paolo Palmieri and Johan Pouwelse}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'15)}, + year = {2015}, + month = {February}, + www_section = torperf, + www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_112.pdf", +} + +@inproceedings{relay-anon-micropay-fc14, + title={Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay [short paper]}, + author={Alex Biryukov and Ivan Pustogarov}, + booktitle={Proceedings of Financial Cryptography and Data Security (FC'15)}, + year = {2015}, + month = {February}, + www_section = torperf, + www_pdf_url = "http://fc15.ifca.ai/preproceedings/paper_71.pdf", +} + + +@inproceedings{SPIR, + title={Protecting data privacy in private information retrieval schemes}, + author={Gertner, Yael and Ishai, Yuval and Kushilevitz, Eyal and Malkin, Tal}, + booktitle={Proceedings of the thirtieth annual ACM symposium on Theory of computing}, + pages={151--160}, + year={1998}, + organization={ACM}, + www_section = pir, + www_pdf_url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.50.6801&rep=rep1&type=pdf} +} + +@inproceedings{SalehCISS15, + title = {IM Session Identification by Outlier Detection in Cross-correlation Functions}, + author = {Saad Saleh and Muhammad U. Ilyas and Khawar Khurshid and Alex X. Liu and Hayder Radha}, + booktitle = {Proceedings of the 49th Annual Conference on Information Sciences and Systems (CISS 2015)}, + year = {2015}, + location = {Baltimore, MD, USA}, + www_pdf_url = {https://www.researchgate.net/publication/274635819_IM_Session_Identification_by_Outlier_Detection_in_Cross-correlation_Functions}, + www_section = {Anonymous communication}, +} + +@phdthesis{gulyas-thesis, + title = {Protecting Privacy Against Structural De-anonymization Attacks in Social Networks}, + author = {G{\'a}bor Gy{\"o}rgy Guly{\'a}s}, + school = {CrySyS Lab, Budapest University of Technology and Economics}, + year = {2015}, + month = {May}, + www_section = {Misc}, + www_pdf_url = {http://www.omikk.bme.hu/collections/phd/Villamosmernoki_es_Informatikai_Kar/2015/Gulyas_Gabor_Gyorgy/ertekezes.pdf}, +} + +@article{DBLP:journals/corr/KhattakSM14, + author = {Sheharbano Khattak and + Laurent Simon and + Steven J. Murdoch}, + title = {Systemization of Pluggable Transports for Censorship Resistance}, + journal = {CoRR}, + volume = {abs/1412.7448}, + year = {2014}, + timestamp = {Thu, 01 Jan 2015 19:51:08 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/KhattakSM14}, + bibsource = {dblp computer science bibliography, http://dblp.org}, + www_pdf_url = {http://arxiv.org/pdf/1412.7448v1.pdf}, + www_section = censorship, + www_tags={selected}, +} + +@article{MultiBinomial2015, + title = {{Multi-Binomial Mix: A Proposal for Secure and Efficient Anonymous Communication}}, + author = {Shaahin Madani and Ibrahim Khalil}, + journal = {Computer Networks}, + volume = {93, Part 1}, + number = {}, + pages = {41--53}, + year = {2015}, + issn = {1389-1286}, + doi = {http://dx.doi.org/10.1016/j.comnet.2015.10.007}, + url = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV}, + www_section = comm, + www_html_url = "http://authors.elsevier.com/a/1R-Ng4xsUrfGOV", +} + +@article{GR2014, + title = {{Garbled Routing (GR): A Generic Framework towards Unification of Anonymous Communication Systems}}, + author = {Shaahin Madani and Ibrahim Khalil}, + journal = {{Journal of Network and Computer Applications}}, + volume = {44}, + number = {}, + pages = {183--195}, + year = {2014}, + issn = {1084-8045}, + doi = "http://dx.doi.org/10.1016/j.jnca.2014.05.005", + www_html_url = "http://www.sciencedirect.com/science/article/pii/S1084804514001246", + www_section = comm, +} + +@phdthesis{MadaniThesis, + title = {{Improving Security and Efficiency of Mix-Based Anonymous Communication Systems}}, + author = {Shaahin Madani}, + school = {RMIT University, Melbourne, Australia}, + year = {2015}, + month = {April}, + url = {https://researchbank.rmit.edu.au/view/rmit:161447}, + www_section = {Anonymous communication}, + www_pdf_url = {https://researchbank.rmit.edu.au/eserv/rmit:161447/Madani.pdf}, +} + + +@inproceedings{vuvuzela:sosp15, + title = {Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis}, + author = {Jelle van den Hooff and David Lazar and Matei Zaharia and Nickolai Zeldovich}, + booktitle = {Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP 2015)}, + year = {2015}, + month = {October}, + address = {Monterey, California}, + www_pdf_url = {https://pdos.csail.mit.edu/papers/vuvuzela:sosp15.pdf}, + www_section = {Anonymous communication}, + www_tags={selected}, +} + +@misc{cryptoeprint:2014:1011, + author = {Alex Biryukov and Ivan Pustogarov}, + title = {Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay}, + howpublished = {Cryptology ePrint Archive, Report 2014/1011}, + year = {2014}, + www_pdf_url = {https://eprint.iacr.org/2014/1011.pdf}, + www_section = {Economics}, +} + diff --git a/testdata/author.bib b/testdata/author.bib new file mode 100644 index 0000000..4572866 --- /dev/null +++ b/testdata/author.bib @@ -0,0 +1,87 @@ +@article {1, + author = "Last1--,--First1-- and Last2,-First2 and Last3 -, First3" +} +@article {2, + author = "Last1, First1,and and and,Last2 and T1,T2,T3,T4" +} +@article {3, + author = "" +} +@article {4, + author = "and" +} +@article {5, + author = "AA BB", +} +@article {6, + author = "AA", +} +@article {7, + author = "AA bb", +} +@article {8, + author = "aa", +} +@article {9, + author = "AA bb CC", +} +@article {10, + author = "AA bb CC dd EE", +} +@article {11, + author = "AA 1B cc dd", +} +@article {12, + author = "AA 1b cc dd", +} +@article {13, + author = "AA {b}B cc dd", +} +@article {14, + author = "AA {b}b cc dd", +} +@article {15, + author = "AA {B}b cc dd", +} +@article {16, + author = "AA {B}B cc dd", +} +@article {17, + author = "AA \\BB{b} cc dd", +} +@article {18, + author = "AA \\bb{b} cc dd", +} +@article {19, + author = "AA {bb} cc DD", +} +@article {20, + author = "AA bb {cc} DD", +} +@article {21, + author = "AA {bb} CC", +} +@article {22, + author = "bb CC, AA", +} +@article {23, + author = "bb CC, aa", +} +@article {24, + author = "bb CC dd EE, AA", +} +@article {25, + author = "bb, AA", +} +@article {26, + author = "BB,", +} +@article {27, + author = "bb CC,XX, AA", +} +@article {28, + author = "bb CC,xx, AA", +} +@article {29, + author = "BB,, AA", +} diff --git a/testdata/btxdoc.bib b/testdata/btxdoc.bib new file mode 100644 index 0000000..5a30c68 --- /dev/null +++ b/testdata/btxdoc.bib @@ -0,0 +1,93 @@ +% Copyright (C) 1988, 2010 Oren Patashnik. +% Unlimited copying and redistribution of this file are permitted if it +% is unmodified. Modifications (and their redistribution) are also +% permitted, as long as the resulting file is renamed. + +@COMMENT(You may put a comment in a `comment' command, + the way you would with SCRIBE.) + +Or you may dispense with the command and simply give the comment, +as long as it's not within an entry. + +If you really want to put a comment inside an entry, simply +make up a never-to-be-used field. + +@FAKE-ENTRY + {fake-database-key, + never-to-be-used-field = "Even if this were a real entry, + I could still have a comment inside an entry + by making up a fake field" + } + +@string (SCRIBE-NOTE = {Chapter twelve and appendices E8 through E10 deal + with bibliographies}) + +The next entry shows some of the syntactically legal things that +those with the inclination may use.@ + +MaNuAl (scribe, + TITLE="Scribe Document Production System + + + User Manual", + ORGANIZATION = {Unilogic,}#" Ltd"# {. + }, + ADDRESS = "Pittsburgh", + MONTH +=aPR + ,YEAR=1984, + note = scribe-note, +) May the inclination not be with you. + + +@MISC{prime-number-theorem, + author = "Charles Louis Xavier Joseph de la Vall{\'e}e Poussin", + note = "A strong form of the prime number theorem, 19th century" } + +@INBOOK{chicago, + title = "The Chicago Manual of Style", + publisher = "University of Chicago Press", + edition = "Thirteenth", + year = 1982, + pages = "400--401", + key = "Chicago" } + +@BOOK{texbook, + author = "Donald E. Knuth", + title= "The {{\TeX}book}", + publisher = "Addison-Wesley", + year = 1984 } + +@BOOK{latex, + author = "Leslie Lamport", + title = "{\LaTeX \rm:} {A} Document Preparation System", + publisher = "Addison-Wesley", + year = 1986 } + +@UNPUBLISHED{btxdoc, + author = "Oren Patashnik", + title = "{{\BibTeX ing}}", + note = "Documentation for general {\BibTeX} users", + month = "8~" # feb, + year = 1988 } + +@UNPUBLISHED{btxhak, + author = "Oren Patashnik", + title = "Designing {\BibTeX} Styles", + note = "The part of \BibTeX's documentation + that's not meant for general users", + month = "8~" # feb, + year = 1988 } + +@BOOK{strunk-and-white, + author = "Strunk, Jr., William and E. B. White", + title = "The Elements of Style", + publisher = "Macmillan", + edition = "Third", + year = 1979 } + +@BOOK{van-leunen, + title = "A Handbook for Scholars", + author = "Mary-Claire van Leunen", + publisher = "Knopf", + year = 1979 } diff --git a/testdata/econcs.bib b/testdata/econcs.bib new file mode 100644 index 0000000..edd808c --- /dev/null +++ b/testdata/econcs.bib @@ -0,0 +1,5043 @@ +@article{Alon10, + title = {{A Note on Competitive Diffusion Through Social Networks}}, + author = {Noga Alon and Michal Feldman and Ariel D. Procaccia and Moshe Tennenholtz}, + journal = {Information Processing Letters}, + volume = {110}, + year = {2010}, + pages = {221-225}, + www_section = {Computational Social Choice|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Alon10.pdf}, +} + +Ashlagi10 + +@inproceedings{Ashlagi10, + title = {{Mix and Match}}, + author = {Itai Ashlagi and Felix A. Fischer and Ian A. Kash and Ariel D. Procaccia}, + booktitle = {Proceedings of the 11th ACM Conference on Electronic Commerce (EC'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Ashlagi10.pdf}, + www_section = {Mechanism Design|Applications and E-Commerce}, +} + +Azar_aamas12 + +@inproceedings{Azar_aamas12, + title = {{Mastering multi-player games}}, + author = {Yossi Azar and Uriel Feige and Michal Feldman and Moshe Tennenholtz}, + booktitle = {Proceedings of the 11th International Conference on Autonomous Agents and + Multiagent Systems (AAMAS-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Azar_aamas12.pdf}, + www_section = {Artificial Intelligence}, +} + +AzariSoufiani_icml14 + +@inproceedings{AzariSoufiani_icml14, + title = {{Computing Parametric Ranking Models via Rank-Breaking}}, + author = {Hossein {{Azari Soufiani}} and David Parkes and Lirong Xia}, + booktitle = {Proceedings of the International Conference on Machine Learning (ICML + 2014)}, + year = {2014}, + pages = {360-368}, + www_section = {Computational Social Choice|Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/AzariSoufiani_icml14_2.pdf}, +} + +AzariSoufiani_nips13 + +@inproceedings{AzariSoufiani_nips13, + title = {{Generalized Random Utility Models with Multiple Types}}, + author = {Hossein {{Azari Soufiani}} and Hansheng Diao and Zhenyu Lai and David C. + Parkes}, + booktitle = {Proceedings of the Annual Conference on Neural Information Processing + Systems (NIPS 2013)}, + year = {2013}, + pages = {73-81}, + www_section = {Computational Social Choice|Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/AzariSoufiani_nips13.pdf}, +} + +AzariSoufiani_nips13_b + +@inproceedings{AzariSoufiani_nips13_b, + title = {{Generalized Method-of-Moments for Rank Aggregation}}, + author = {Hossein {{Azari Soufiani}} and William Chen and David C. Parkes and Lirong + Xia}, + booktitle = {Proceedings of the Annual Conference on Neural Information Processing + Systems (NIPS 2013)}, + year = {2013}, + pages = {2706-2714}, + www_section = {Computational Social Choice|Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/AzariSoufiani_nips13_b.pdf}, +} + +AzariSoufiani_nips14 + +@inproceedings{AzariSoufiani_nips14, + title = {{A Statistical Decision-Theoretic Framework for Social Choice}}, + author = {Hossein {{Azari Soufiani}} and David C. Parkes and Lirong Xia}, + booktitle = {Proc. Advances in Neural Information Processing Systems 27 (NIPS 2014)}, + year = {2014}, + pages = {3185-3193}, + www_section = {Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/AzariSoufiani_nips14.pdf}, +} + +AzariSoufiani_uai13 + +@inproceedings{AzariSoufiani_uai13, + title = {{Preference Elicitation For General Random Utility Models}}, + author = {Hossein {{Azari Soufiani}} and David C. Parkes and Lirong Xia}, + booktitle = {Proceedings of the 29th Conference on Uncertainty in Artificial Intelligence + (UAI-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/AzariSoufiani_uai13.pdf}, + www_section = {Computational Social Choice|Information Elicitation and Aggregation}, +} + +Azari_aamas14 + +@inproceedings{Azari_aamas14, + title = {{Approximating the Shapley Value via Multi-Issue Decomposition, }}, + author = {Hossein {{Azari Soufiani}} and Denis J. Charles and David M. Chickering and + David C. Parkes}, + booktitle = {Proceedings of the 13th Int. Conf. on Automonous Agents and Multiagent + Systems (AAMAS'14)}, + year = {2014}, + pages = {1209-1216}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Azari_aamas14.pdf}, +} + +Azari_thesis14 + +@phdthesis{Azari_thesis14, + title = {Revisiting Random Utility Models}, + author = {Hossein {{Azari Soufiani}}}, + school = {Computer Science}, + year = {2014}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Azari_thesis14.pdf}, +} + +Bachrach_ai14 + +@article{Bachrach_ai14, + title = {{Computing Cooperative Solution Concepts in Coalitional Skill Games}}, + author = {Yoram Bachrach and David C. Parkes and Jeffrey S. Rosenschein}, + journal = {Artificial Intelligence}, + volume = {204}, + year = {2014}, + pages = {1-21}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Bachrach_ai14.pdf}, +} + +Bacon_aamas12 + +@inproceedings{Bacon_aamas12, + title = {{Predicting Your Own Effort}}, + author = {David F. Bacon and Yiling Chen and Ian A. Kash and David C. Parkes and Malvika + Rao and Manu Sridharan}, + booktitle = {Proceedings of the 11th International Conference on Autonomous Agents and + Multiagent Systems (AAMAS '12)}, + year = {2012}, + pages = {695-702}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Bacon_aamas12.pdf}, +} + +Balkanski_ACM15 + +@inproceedings{Balkanski_ACM15, + title = {{Mechanisms for Fair Attribution}}, + author = {Eric Balkanski and Yaron Singer}, + booktitle = {Proc. ACM Conference on Economics and Computation (EC) 2015}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Balkanski_ACM15.pdf}, + www_section = {Mechanism Design|Market Design}, +} + +Branzei_aaai14 + +@inproceedings{Branzei_aaai14, + title = {{The Fisher Market Game: Equilibrium and Welfare}}, + author = {Simina Branzei and Yiling Chen and Xiaotie Deng and Aris Filos-Ratsikas and + Soren Kristoffer Stiil Frederiksen and Jie Zhang}, + booktitle = {Proceedings of the 28th Conference on Artificial Intelligence (AAAI'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Branzei_aaai14.pdf}, + www_section = {Artificial Intelligence}, +} + +Byers_ec12 + +@inproceedings{Byers_ec12, + title = {{The Groupon Effect on Yelp Ratings: A Root Cause Analysis}}, + author = {John W. Byers and Michael Mitzenmacher and Georgios Zervas}, + booktitle = {In Proceedings of the 13th ACM Conference on Electronic Commerce (EC-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Byers_ec12.pdf}, + www_section = {Applications and E-Commerce}, +} + +Cai_wine13 + +@inproceedings{Cai_wine13, + title = {{Designing Markets for Daily Deals}}, + author = {Yang Cai and Mohammad Mahdian and Aranyak Mehta and Bo Waggoner}, + booktitle = {9th Conference on Web and Internet Economics (WINE-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Cai_wine13.pdf}, + www_section = {Market Design}, +} + +Caragiannis10 + +@inproceedings{Caragiannis10, + title = {{Voting Almost Maximizes Social Welfare Despite Limited Communication}}, + author = {Ioannis Caragiannis and Ariel D. Procaccia}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Caragiannis10.pdf}, + www_section = {Computational Social Choice}, +} + +Caragiannis10b + +@inproceedings{Caragiannis10b, + title = {{Socially Desirable Approximations for Dodgson's Voting Rule}}, + author = {Ioannis Caragiannis and Christos Kaklamanis and Nikos Karanikolas and Ariel D. + Procaccia}, + booktitle = {Proceedings of the 11th ACM Conference on Electronic Commerce}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Caragiannis10b.pdf}, + www_section = {Computational Social Choice}, +} + +Cavallo05 + +@inproceedings{Cavallo05, + title = {TBBL: A Tree-Based Bidding Language for Iterative Combinatorial Exchanges}, + author = {Ruggiero Cavallo and David C. Parkes and Adam I. Juda and Adam Kirsch and Alex + Kulesza and S\'ebastien Lahaie and Benjamin Lubin and Loizos Michael and Jeffrey + Shneidman}, + booktitle = {Multidisciplinary Workshop on Advances in Preference Handling (IJCAI)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/tbbl-ijcai05.pdf}, + www_section = {Market Design}, +} + +Chen10 + +@inproceedings{Chen10, + title = {{Truth, Justice and Cake Cutting}}, + author = {Yiling Chen and John K. Lai and David C. Parkes and Ariel D. Procaccia}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + pages = {756-761}, + www_section = {Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen10.pdf}, +} + +Chen:04a + +@inproceedings{Chen:04a, + title = {Theoretical Investigation of Prediction Markets with Aggregate Uncertainty}, + author = {Yiling Chen and Tracy Mullen and Chao-Hsien Chu}, + booktitle = {Proceedings of the Seventh International Conference on Electronic Commerce + Research (ICECR-7)}, + year = {2004}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ICECR04.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:05a + +@inproceedings{Chen:05a, + title = {Information Markets vs. Opinion Pools: An Empirical Comparison}, + author = {Yiling Chen and Chao-Hsien Chu and Tracy Mullen and David M. Pennock}, + booktitle = {Proceedings of the Sixth ACM Conference on Electronic Commerce (EC'05)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/EC221-Chen.pdf}, + date = {5--8}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:05b + +@inproceedings{Chen:05b, + title = {Predicting Uncertain Outcomes Using Information Markets}, + author = {Yiling Chen and Tracy Mullen and Chao-Hsien Chu}, + booktitle = {Proceedings of the Eighth Joint Conference on Information Sciences + (JCIS'05)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/JCIS2005.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:05c + +@techreport{Chen:05c, + title = {Security Design and Information Aggregation in Markets}, + author = {Yiling Chen and Anthony M. Kwasnica}, + institution = {The Pennsylvania State University}, + year = {2005}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/MajorityParity.pdf}, +} + +Chen:05e + +@phdthesis{Chen:05e, + title = {Markets as An Information Aggregation Mechanism for Decision Support}, + author = {Yiling Chen}, + school = {College of Information Sciences and Technology, The Pennsylvania State + University}, + year = {2005}, + month = {December}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Thesis_Yiling_Chen.pdf}, +} + +Chen:06a + +@article{Chen:06a, + title = {An In-Depth Analysis of Information Markets with Aggregate Uncertainty}, + author = {Yiling Chen and Tracy Mullen and Chao-Hsien Chu}, + journal = {Electronic Commerce Research}, + volume = {6}, + number = {2}, + year = {2006}, + pages = {201--221}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ECR_2006.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:06b + +@article{Chen:06b, + title = {Predicting Uncertain Outcomes Using Information Markets: {T}rader behavior and + information aggregtion}, + author = {Yiling Chen and Tracy Mullen and Chao-Hsien Chu}, + journal = {New Mathematics and Natural Computation}, + volume = {2}, + number = {3}, + year = {2006}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/NMNC_CIEF.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:07 + +@inproceedings{Chen:07, + title = {Betting on Permutations}, + author = {Yiling Chen and Lance Fortnow and Evdokia Nikolova and David M. Pennock}, + booktitle = {Proceedings of the Eighth ACM Conference on Electronic Commerce (EC'07)}, + year = {2007}, + pages = {326--335}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ec270-chen.pdf}, +} + +Chen:07b + +@inproceedings{Chen:07b, + title = {A Utility Framework for Bounded-Loss Market Makers}, + author = {Yiling Chen and David M. Pennock}, + booktitle = {Proceedings of the 23rd Conference on Uncertainty in Artificial Intelligence + (UAI'07)}, + year = {2007}, + pages = {49--56}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/MM_UAI_final.pdf}, +} + +Chen:07c + +@inproceedings{Chen:07c, + title = {Bluffing and Strategic Reticence in Prediction Markets}, + author = {Yiling Chen and David M. Reeves and David M. Pennock and Robin D. Hanson and + Lance Fortnow and Rica Gonen}, + booktitle = {Lecture Notes in Computer Science 4858, The International Workshop on + Internet and Network Economics (WINE)}, + year = {2007}, + pages = {70--81}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/wine082.pdf}, +} + +Chen:07d + +@article{Chen:07d, + title = {Combinatorial betting}, + author = {Yiling Chen and Lance Fortnow and Evdokia Nikolova and David M. Pennock}, + journal = {SIGecom Exch.}, + volume = {7}, + number = {1}, + year = {2007}, + pages = {61--64}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sigecom-5.pdf}, + www_section = {Edited Collections and Overview}, +} + +Chen:07d1 + +@article{Chen:07d1, + title = {Combinatorial betting}, + author = {Yiling Chen and Lance Fortnow and Evdokia Nikolova and David M. Pennock}, + journal = {SIGecom Exch.}, + volume = {7}, + number = {1}, + year = {2007}, + pages = {61--64}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sigecom-5.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:07e + +@inproceedings{Chen:07e, + title = {Socially Embedded Prediction Markets}, + author = {Yiling Chen and David M. Pennock}, + booktitle = {Special Issue Workshop for Economica on: The Growth of Gambling and + Prediction Markets: Economic and Financial Implication}, + year = {2007}, + month = {May}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/socpm.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen:08 + +@inproceedings{Chen:08, + title = {Complexity of Combinatorial Market Makers}, + author = {Yiling Chen and Lance Fortnow and Nicolas Lambert and David M. Pennock and + Jennifer Wortman Vaughan}, + booktitle = {Proceedings of the Eighth ACM Conference on Electronic Commerce (EC'08)}, + year = {2008}, + pages = {190--199}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chen-ec08.pdf}, +} + +Chen:08b + +@inproceedings{Chen:08b, + title = {Pricing Combinatorial Markets for Tournaments}, + author = {Yiling Chen and Sharad Goel and David M. Pennock}, + booktitle = {Proceedings of the 40th ACM Symposium on Theory of Computing (STOC)}, + year = {2008}, + pages = {305--314}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/tournament-markets.pdf}, +} + +Chen:08c + +@inproceedings{Chen:08c, + title = {An Empirical Study of Dynamic Pari-mutuel Markets: {E}vidence from the {T}ech + {B}uzz {G}ame}, + author = {Yiling Chen and David M. Pennock and Tejaswi Kasturi}, + booktitle = {Lecture Notes in Computer Science, The Workshop on Web Mining and Web Usage + Analysis (WebKDD)}, + year = {2008}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/BuzzGameAnalysis.pdf}, + www_section = {Applications and E-Commerce|Information Elicitation and Aggregation}, +} + +Chen:08d + +@inproceedings{Chen:08d, + title = {Sharing Online Advertising Revenue with Consumers}, + author = {Yiling Chen and Arpita Ghosh and R. Preston McAfee and David M. Pennock}, + booktitle = {Lecture Notes in Computer Science 5385, International Workshop on Internet + and Network Economics (WINE)}, + year = {2008}, + pages = {556--565}, + note = {short paper}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/rwine-final.pdf}, +} + +Chen:09 + +@article{Chen:09, + title = {Gaming Prediction Markets: Equilibrium Strategies with a Market Maker}, + author = {Yiling Chen and Stanko Dimitrov and Rahul Sami and Daniel M. Reeves and David + M. Pennock and Robin D. Hanson and Lance Fortnow and Rica Gonen}, + journal = {Algorithmica}, + volume = {58}, + number = {4}, + year = {2010}, + pages = {930--969}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/algorithmica_author.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +ChenACM10 + +@inproceedings{ChenACM10, + title = {{A New Understanding of Prediction Markets Via No-Regret Learning}}, + author = {Yiling Chen and Jennifer Wortman Vaughan}, + booktitle = {Proceedings of the ACM Conference on Electronic Commerence (EC'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ChenACM10.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +ChenSigecom10 + +@article{ChenSigecom10, + title = {Connections Between Markets and Learning}, + author = {Yiling Chen and Jennifer Wortman Vaughan}, + journal = {ACM SIGecom Exchanges}, + volume = {9}, + number = {1}, + year = {2010}, + month = {June}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ChenSigecom10.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Chen_EC13 + +@inproceedings{Chen_EC13, + title = {{Truthful Mechanisms for Agents that Value Privacy}}, + author = {Yiling Chen and Stephen Chong and Ian A. Kash and Tal Moran and Salil Vadhan}, + booktitle = {Proceedings of of the 14th ACM Conference on Electronic Commerce (EC13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_EC13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Chen_EC13_b + +@inproceedings{Chen_EC13_b, + title = {{Cost Function Market Makers for Measurable Spaces}}, + author = {Yiling Chen and Mike Ruberry and Jennifer Wortman Vaughan}, + booktitle = {Proceedings of of the 14th ACM Conference on Electronic Commerce (EC13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_EC13_b.pdf}, + www_section = {Social Computing and Incentives}, +} + +Chen_Jaam + +@article{Chen_Jaam, + title = {{Market Manipulation with Outside Incentives}}, + author = {Yiling Chen and Xi Alice Gao and Rick Goldstein and Ian A. Kash}, + journal = {Journal of Autonomous Agents and Multi-Agent Systems}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_Jaam.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +Chen_aaai11 + +@inproceedings{Chen_aaai11, + title = {{Market Manipulation with Outside Incentives}}, + author = {Yiling Chen and Xi Alice Gao and Rich Goldstein and Ian A. Kash}, + booktitle = {Proceedings of the 25th AAAI Conference on Artificial Intelligence + (AAAI'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_aaai11.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +Chen_aaai15 + +@inproceedings{Chen_aaai15, + title = {{Fair Information Sharing for Treasure Hunting}}, + author = {Yiling Chen and Kobbi Nissim and Bo Waggoner}, + booktitle = {Proc. Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_aaai15.pdf}, + www_section = {Mechanism Design}, +} + +Chen_aamas11 + +@inproceedings{Chen_aamas11, + title = {{Incentive Design for Adaptive Agents}}, + author = {Yiling Chen and Jerry L. Kung and David Parkes and Ariel Procaccia and Haoqi + Zhang}, + booktitle = {Proc. The Autonomous Agents and MultiAgent Systems (AAMAS 2011)}, + year = {2011}, + pages = {627-634}, + www_section = {Artificial Intelligence|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_aamas11.pdf}, +} + +Chen_acm14 + +@inproceedings{Chen_acm14, + title = {{Removing Arbitrage from Wagering Mechanisms}}, + author = {Yiling Chen and Nikhil R. Devanur and David Pennock and Jennifer Wortman + Vaughan}, + booktitle = {Proceedings of the 15th ACM Conference on Economics and Computation + (EC'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_acm14.pdf}, + www_section = {Artificial Intelligence}, +} + +Chen_acmtrans14 + +@article{Chen_acmtrans14, + title = {{Eliciting Predictions and Recommendations for Decision Making}}, + author = {Yiling Chen and Ian A. Kash and Mike Ruberry and Victor Shnayder}, + journal = {ACM Transactions on Economics and Computation}, + volume = {2}, + number = {2}, + year = {2014}, + pages = {6:1-6:27}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_acmtrans14.pdf}, + www_section = {Edited Collections and Overview}, +} + +Chen_gamesecon13 + +@article{Chen_gamesecon13, + title = {{Truth, Justice and Cake Cutting}}, + author = {Yiling Chen and John K. Lai and David C. Parkes and Ariel D. Procaccia}, + journal = {Games and Economic Behavior}, + volume = {77}, + number = {1}, + year = {2013}, + pages = {284-297}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_gamesecon13.pdf}, + www_section = {Computational Social Choice}, +} + +Chen_thesis14 + +@undergradthesis{Chen_thesis14, + title = {How to Order Sushi: A Nonparametric Approach to Modeling Rank Data}, + author = {William Chen}, + school = {Statistics}, + year = {2014}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Chen_thesis14.pdf}, +} + +Cohler_aaai11 + +@inproceedings{Cohler_aaai11, + title = {{Optimal Envy-Free Cake Cutting}}, + author = {Yuga Cohler and John Lai and David C. Parkes and Ariel D. Procaccia}, + booktitle = {Proceedings of the 25th AAAI Conference on Artificial Intelligence + (AAAI'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Cohler_aaai11.pdf}, + www_section = {Computational Social Choice}, +} + +Conitzer_kr12 + +@inproceedings{Conitzer_kr12, + title = {{Paradoxes of Multiple Elections: An Approximation Approach}}, + author = {Vincent Conitzer and Lirong Xia}, + booktitle = {Proceedings of the 13th International Conference on Principles of Knowledge + Representation and Reasoning (KR-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Conitzer_kr12.pdf}, + www_section = {Computational Social Choice}, +} + +Constantin10 + +@inproceedings{Constantin10, + title = {{On Expressing Value Externalities in Position Auctions}}, + author = {Florin Constantin and Malvika Rao and Chien-Chung Huang and David C. Parkes}, + booktitle = {Proceedings of the 6th Ad Auctions Workshop}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Constantin10.pdf}, + www_section = {Applications and E-Commerce|Market Design}, +} + +Constantin_aaai11 + +@inproceedings{Constantin_aaai11, + title = {{On Expressing Value Externalities in Position Auctions}}, + author = {Florin Constantin and Malvika Rao and Chien-Chung Huang and David C. Parkes}, + booktitle = {Proceedings of the 25th AAAI Conference on Artificial Intelligence + (AAAI'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Constantin_aaai11.pdf}, + www_section = {Applications and E-Commerce|Market Design}, +} + +Corbo_podc05 + +@inproceedings{Corbo_podc05, + title = {The Price of Selfish Behavior in Bilateral Network Formation}, + author = {Jacomo Corbo and David C. Parkes}, + booktitle = {Proc. 24rd ACM Symp. on Principles of Distributed Computing (PODC'05)}, + year = {2005}, + address = {Las Vegas, Nevada, USA}, + pages = {99--107}, + note = {{\bf This is a revised version of the published paper, fixing a number of + errors.}}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Corbo_podc05.pdf}, +} + +Dekel10 + +@article{Dekel10, + title = {{Incentive Compatible Regression Learning}}, + author = {Ofer Dekel and Felix A. Fischer and Ariel D. Procaccia}, + journal = {Journal of Computer and System Sciences}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Dekel10.pdf}, + www_section = {Computational Social Choice}, +} + +Duetting_acmtec14 + +@article{Duetting_acmtec14, + title = {{Payment Rules through Discriminant-Based Classifiers}}, + author = {Paul Duetting and Felix A. Fischer and Pichayut Jirapinyo and John Lai and + Benjamin Lubin and David C. Parkes}, + journal = {ACM Transactions on Economics and Computation}, + volume = {3}, + number = {1}, + year = {2014}, + pages = {5}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Duetting_acmtec14.pdf}, + www_section = {Mechanism Design}, +} + +Duetting_ec14 + +@inproceedings{Duetting_ec14, + title = {{Expressiveness and Robustness of First-Price Position Auctions}}, + author = {Paul Duetting and Felix A. Fischer and David Parkes}, + booktitle = {Proc. 15th ACM Conference on Economics and Computation (EC'14)}, + year = {2014}, + pages = {57-74}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Duetting_ec14.pdf}, +} + +Emek_ec12 + +@inproceedings{Emek_ec12, + title = {{Signaling Schemes for Revenue Maximization}}, + author = {Yuval Emek and Michal Feldman and Iftah Gamzu and Renato Paes Leme and Moshe + Tennenholtz}, + booktitle = {In Proceedings of the 13th ACM Conference on Electronic Commerce (EC-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Emek_ec12.pdf}, + www_section = {Mechanism Design}, +} + +EricHuangthesis + +@undergradthesis{EricHuangthesis, + title = {Automatic Task Design on Amazon Mechanical Turk}, + author = {Eric Huang}, + school = {Applied Mathematics, Harvard College}, + year = {2010}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/EricHuangthesis.pdf}, +} + +Faltings2006 + +@inproceedings{Faltings2006, + title = {Optimizing Streaming Applications with Self-Interested Users using {MDPOP}}, + author = {Boi Faltings and David C. Parkes and Adrian Petcu and Jeffrey Shneidman}, + booktitle = {Proc. International Workshop on Computational Social Choice (COMSOC'06)}, + year = {2006}, + address = {Amsterdam, The Netherlands}, + www_pdf_url = {http://liawww.epfl.ch/Publications/Archive/Faltings2006.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Feldman_aamas12 + +@inproceedings{Feldman_aamas12, + title = {{Stability scores: measuring coalitional stability}}, + author = {Michal Feldman and Reshef Meir and Moshe Tennenholtz}, + booktitle = {Proceedings of the 11th International Conference on Autonomous Agents and + Multiagent Systems (AAMAS-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_aamas12.pdf}, + www_section = {Mechanism Design}, +} + +Feldman_ec12 + +@inproceedings{Feldman_ec12, + title = {{Revenue Maximizing Envy-free Multi-unit Auctions with Budgets}}, + author = {Michal Feldman and Amos Fiat and Stefano Leonardi and Piotr Sankowski}, + booktitle = {In Proceedings of the 13th ACM Conference on Electronic Commerce (EC-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_ec12.pdf}, + www_section = {Mechanism Design}, +} + +Feldman_ec13a + +@inproceedings{Feldman_ec13a, + title = {{Pricing Public Goods for Private Sale Michal Feldman}}, + author = {Michal Feldman and David Kempe and Brendan Lucier and Renato Paes Leme}, + booktitle = {Proceedings of the 14th ACM Conference on Electronic Commerce (EC-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_ec13a.pdf}, + www_section = {Mechanism Design}, +} + +Feldman_ec13b + +@inproceedings{Feldman_ec13b, + title = {{Strategyproof facility location and the least squares objective}}, + author = {Michal Feldman and Yoav Wilf}, + booktitle = {Proceedings of the 14th ACM Conference on Electronic Commerce (EC-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_ec13b.pdf}, + www_section = {Mechanism Design|Computational Social Choice}, +} + +Feldman_stoc13a + +@inproceedings{Feldman_stoc13a, + title = {{Combinatorial Walrasian Equilibrium}}, + author = {Michal Feldman and Nick Gravin and Brendan Lucier}, + booktitle = {Proceedings of the 45th ACM Symposium on the Theory of Computing (STOC-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_stoc13a.pdf}, + www_section = {Mechanism Design}, +} + +Feldman_stoc13b + +@inproceedings{Feldman_stoc13b, + title = {{Simultaneous Auctions are (almost) Efficient}}, + author = {Michal Feldman and Hu Fu and Nick Gravin and Brendan Lucier}, + booktitle = {Proceedings of the 45th ACM Symposium on the Theory of Computing (STOC-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Feldman_stoc13b.pdf}, + www_section = {Mechanism Design}, +} + +FreudigerMHP2012 + +@article{FreudigerMHP2012, + title = {{Non-Cooperative Location Privacy}}, + author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean-Pierre Hubaux and David + C. Parkes}, + journal = {Transactions on Dependable and Secure Computing}, + volume = {10}, + number = {2}, + year = {2013}, + pages = {84--98}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/FreudigerMHP2012.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Frongillo_aaai15 + +@inproceedings{Frongillo_aaai15, + title = {{Elicitation for Aggregation}}, + author = {Rafael M. Frongillo and Yiling Chen and Ian A. Kash}, + booktitle = {Proceedings of the 29th Conference on Artificial Intelligence (AAAI'15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Frongillo_aaai15.pdf}, + www_section = {Artificial Intelligence}, +} + +Gao09 + +@inproceedings{Gao09, + title = {{Betting on the Real Line}}, + author = {Xi Alice Gao and Yiling Chen and David Pennock}, + booktitle = {5th Workshop on Internet and Network Economics (WINE'09)}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao09.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +GaoUAI10 + +@inproceedings{GaoUAI10, + title = {{Learning Game Representations from Data Using Rationality Constraints}}, + author = { Xi Alice Gao and Avi Pfeffer}, + booktitle = {Proceedings of the 26th Conference on on Uncertainty in Artificial + Intelligence (UAI'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/GaoUAI10.pdf}, + www_section = {Artificial Intelligence}, +} + +Gao_EC14 + +@inproceedings{Gao_EC14, + title = {{Trick or Treat: Putting Peer Prediction to the Test}}, + author = {Xi Alice Gao and Andrew Mao and Yiling Chen and Ryan P. Adams}, + booktitle = {Proceedings of the 15th ACM Conference on Economics and Computation (EC + 2014)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao_EC14.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +Gao_Thesis14 + +@phdthesis{Gao_Thesis14, + title = {Eliciting and Aggregating Truthful and Noisy Information}, + author = {Xi Gao}, + school = {Computer Science}, + year = {2014}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao_Thesis14.pdf}, +} + +Gao_aaai12 + +@inproceedings{Gao_aaai12, + title = {{Quality Expectation-Variance Tradeoffs in Crowdsourcing Contests}}, + author = {Xi Alice Gao and Yoram Bachrach and Peter Key and Thore Graepel}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao_aaai12.pdf}, + www_section = {Social Computing and Incentives}, +} + +Gao_acm13 + +@inproceedings{Gao_acm13, + title = {{Trick or Treat --- Putting Peer Prediction to the Test}}, + author = {Xi Alice Gao and Andrew Mao and Yiling Chen}, + booktitle = {Workshop on Crowdsourcing and Online Behavioral Experiment at 14th ACM + Conference on Electronic Commerce}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao_acm13.pdf}, + www_section = {Social Computing and Incentives|Information Elicitation and + Aggregation|Artificial Intelligence}, +} + +Gao_ec13 + +@inproceedings{Gao_ec13, + title = {{What You Jointly Know Determines How You Act --- Strategic Interactions in + Prediction Markets}}, + author = {Xi Alice Gao and Jie Zhang and Yiling Chen}, + booktitle = {Proceedings of the 14th ACM Conference on Electronic Commerce (EC-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gao_ec13.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +Green_Thesis14 + +@undergradthesis{Green_Thesis14, + title = {Good Advice Costs Nothing and it's Worth the Price: Incentive Compatible + Recommendation Mechanisms forExploring Unknown Options}, + author = {Perry Green}, + school = {Computer Science}, + year = {2014}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Green_Thesis14.pdf}, +} + +Gujar10 + +@inproceedings{Gujar10, + title = {{Dynamic Matching with a Fall-Back Option}}, + author = {Sujit Gujar and David C. Parkes}, + booktitle = {Proceedings of the 19th European Conference on Artificial Intelligence + (ECAI'10)}, + year = {2010}, + pages = {263-268}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Gujar10.pdf}, +} + +Halpern_CommunACM11 + +@article{Halpern_CommunACM11, + title = {{Journals for Certification, Conferences for Rapid Dissemination}}, + author = {Joseph Y Halpern and David C. Parkes}, + journal = {Communications of the ACM}, + volume = {54}, + number = {8}, + year = {2011}, + pages = {36-38}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Halpern_CommunACM11.pdf}, + www_section = {Edited Collections and Overview}, +} + +Harrisonthesis + +@undergradthesis{Harrisonthesis, + title = {Move Prediction in the Game of Go}, + author = {Brett Alexander Harrison}, + school = {Computer Science, Harvard College}, + year = {2010}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Harrisonthesis.pdf}, +} + +Horel_www15 + +@inproceedings{Horel_www15, + title = {{Scalable Methods for Adaptively Seeding a Social Network}}, + author = {Thibaut Horel and Yaron Singer}, + booktitle = {The International World Wide Web Conference (WWW-15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Horel_www15.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Huang10 + +@inproceedings{Huang10, + title = {{Toward Automatic Task Design: A Progress Report}}, + author = {Eric Huang and Haoqi Zhang and David C. Parkes and Krzysztof Z. Gajos and + Yiling Chen}, + booktitle = {Proceedings of the Second Human Computation Workshop}, + year = {2010}, + pages = {77-85}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Huang10.pdf}, +} + +Jain_acm_trans_econ_compu + +@article{Jain_acm_trans_econ_compu, + title = {{A Game-Theoretic Analysis of the ESP Game}}, + author = {Shaili Jain and David C. Parkes}, + journal = {ACM Transactions on Economics and Computation}, + volume = {1}, + number = {1}, + year = {2013}, + pages = {3:1--3:35}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Jain_acm_trans_econ_compu.pdf}, + www_section = {Social Computing and Incentives}, +} + +Jain_gamesandecon14 + +@article{Jain_gamesandecon14, + title = {{Designing Incentives for Online Question-and-Answer Forums}}, + author = {Shaili Jain and Yiling Chen and David Parkes}, + journal = {Games and Economic Behavior}, + volume = {86}, + year = {2014}, + pages = {458-474}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Jain_gamesandecon14.pdf}, +} + +Jain_sagt11 + +@inproceedings{Jain_sagt11, + title = {{Combinatorial Agency of Threshold Functions}}, + author = {Shaili Jain and David C. Parkes}, + booktitle = {Proceedings of the 4th Symposium on Algorithmic Game Theory (SAGT'11)}, + year = {2011}, + pages = {154-165}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Jain_sagt11.pdf}, +} + +Kash_ch16_mechgames + +@incollection{Kash_ch16_mechgames, + title = {Enabling Sharing in Auctions for Short-term Spectrum Licenses}, + author = {Ian A. Kash and Rohan Murty and David C. Parkes}, + booktitle = {Mechanisms and Games for Dynamic Spectrum Allocation}, + year = {2013}, + chapter = {16}, + publisher = {Cambridge University Press}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Kash_ch16_mech&games.pdf}, + www_section = {Networks, Systems and Economics|Market Design}, +} + +Kash_ieee_trans_mobcompu + +@article{Kash_ieee_trans_mobcompu, + title = {{Enabling Spectrum Sharing in Secondary Market Auctions}}, + author = {Ian A. Kash and Rohan Murty and David C. Parkes}, + journal = {IEEE Transactions on Mobile Computing}, + volume = {13}, + year = {2014}, + pages = {556-568}, + www_section = {Networks, Systems and Economics|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Kash_ieee_trans_mobcompu.pdf}, + issue = {3}, +} + +Kash_netecon11 + +@inproceedings{Kash_netecon11, + title = {{Enabling Spectrum Sharing in Secondary Market Auctions}}, + author = {Ian A. Kash and Rohan Murty and David C. Parkes}, + booktitle = {Proceedings of the 6th Workshop on the Economics of Networks, Systems, and + Computation (NetEcon'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Kash_netecon11.pdf}, + www_section = {Applications and E-Commerce|Market Design}, +} + +Kopparty_thesis + +@undergradthesis{Kopparty_thesis, + title = {Modeling Task Allocation with Time using Auction Mechanisms}, + author = {Swara S. Kopparty}, + school = {Applied Mathematics, Harvard College}, + year = {2012}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Kopparty_thesis.pdf}, +} + +Kung_thesis + +@undergradthesis{Kung_thesis, + title = {Incentive Design for Adaptive Agents}, + author = {Jerry L. Kung}, + school = {Department of Applied Mathematics, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Kung_thesis.pdf}, +} + +LahaieCoPa05 + +@inproceedings{LahaieCoPa05, + title = {More on the Power of Demand Queries in Combinatorial Auctions: Learning Atomic + Languages and Handling Incentives}, + author = {S\'{e}bastien Lahaie and Florin Constantin and David C. Parkes}, + booktitle = {Proc. 19th International Joint Conference on Artificial Intelligence + (IJCAI'05)}, + year = {2005}, + pages = {959--964}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lahaiecopa05.pdf}, +} + +Lambert:08b + +@inproceedings{Lambert:08b, + title = {Self-Financed Wagering Mechanisms for Forecasting}, + author = {Nicolas Lambert and John Langford and Jennifer Wortman Vaughan and Yiling Chen + and Daniel M. Reeves and Yoav Shoham and David M. Pennock}, + booktitle = {Proceedings of the Eighth ACM Conference on Electronic Commerce (EC'08)}, + year = {2008}, + pages = {170-179}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lambert-ec08.pdf}, +} + +Lambert_jet14 + +@article{Lambert_jet14, + title = {{An Axiomatic Characterization of Wagering Mechanisms}}, + author = {Nicolas S. Lambert and John Langford and Jennifer Wortman Vaughan and Yiling + Chen and Daniel Reeves and Yoav Shoham and David M. Pennock}, + journal = {Journal of Economic Theory}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lambert_jet14.pdf}, + www_section = {Edited Collections and Overview}, +} + +Lattanzi_wsdm15 + +@inproceedings{Lattanzi_wsdm15, + title = {{The Power of Random Neighbors in Social Networks}}, + author = {Silvio Lattanzi and Yaron Singer}, + booktitle = {The ACM Conference on Web Search and Data Mining (WSDM-15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lattanzi_wsdm15.pdf}, + www_section = {Networks, Systems and Economics|Social Computing and Incentives}, +} + +Liem_hcomp11 + +@inproceedings{Liem_hcomp11, + title = {{An Iterative Dual Pathway Structure for Speech-to-Text Transcription}}, + author = {Beatrice Liem and Haoqi Zhang and Yiling Chen}, + booktitle = {Proceedings of the AAAI Workshop on Human Computation (HCOMP)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Liem_hcomp11.pdf}, + www_section = {Social Computing and Incentives|Applications and E-Commerce}, +} + +Liem_thesis + +@undergradthesis{Liem_thesis, + title = {Designing a Transcription Game}, + author = {Beatrice Liem}, + school = {Department of Applied Mathematics, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Liem_thesis.pdf}, +} + +Lin09 + +@inproceedings{Lin09, + title = {{Gaming Dynamic Parimutuel Markets}}, + author = {Qianya Lin and Yiling Chen}, + booktitle = {5th Workshop on Internet and Network Economics (WINE'09)}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lin09.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +Liu_thesis14 + +@undergradthesis{Liu_thesis14, + title = {Better than PageRank: Hitting Time as a Reputation Mechanism}, + author = {Brandon Liu}, + school = {Computer Science}, + year = {2014}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Liu_thesis14.pdf}, +} + +Lubin_CurrentScience12 + +@article{Lubin_CurrentScience12, + title = {{Approximate strategyproofness}}, + author = {Benjamin Lubin and David C. Parkes}, + journal = {Current Science}, + volume = {103}, + year = {2012}, + pages = {1021-1032}, + www_section = {Market Design|Edited Collections and Overview}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lubin_CurrentScience12.pdf}, + issue = {9}, +} + +Lubin_Thesis + +@phdthesis{Lubin_Thesis, + title = {Combinatorial Markets in Theory and Practice:Mitigating Incentives and + Facilitating Elicitation}, + author = {Benjamin Lubin}, + school = {Computer Science}, + year = {2010}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lubin_Thesis.pdf}, +} + +Lucier_KDD15 + +@inproceedings{Lucier_KDD15, + title = {{Influence at Scale: Distributed Computation of Contagion in Networks}}, + author = {Brendan Lucier and Joel Oren and Yaron Singer}, + booktitle = {The ACM Conference on Knowledge Discovery and Data Mining (KDD) 2015}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Lucier_KDD15.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Mao_aaai13 + +@inproceedings{Mao_aaai13, + title = {{Better Human Computation Through Principled Voting}}, + author = {Andrew Mao and Ariel D. Procaccia and Yiling Chen}, + booktitle = {Proceedings of of the 27th Conference on Artificial Intelligence (AAAI'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Mao_aaai13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Mao_hcomp13 + +@inproceedings{Mao_hcomp13, + title = {{Volunteering vs. Work for Pay: Incentives and Tradeoffs in Crowdsourcing}}, + author = {Andrew Mao and Ece Kamar and Yiling Chen and Eric Horvitz and Megan E. Schwamb + and Chris J. Lintott and Arfon M. Smith}, + booktitle = {Proceedings of the 1st AAAI Conference on Human Computation and + Crowdsourcing (HCOMP'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Mao_hcomp13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Mao_hcomp13b + +@inproceedings{Mao_hcomp13b, + title = {{Why Stop Now? Predicting Worker Engagement in Online Crowdsourcing}}, + author = {Andrew Mao and Ece Kamar and Eric Horvitz}, + booktitle = {Proceedings of the 1st AAAI Conference on Human Computation and + Crowdsourcing (HCOMP'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Mao_hcomp13b.pdf}, + www_section = {Social Computing and Incentives}, +} + +Mao_thesis15 + +@phdthesis{Mao_thesis15, + title = {Experimental Studies of Human Behavior in Social Computing Systems}, + author = {Qiushi Mao}, + school = {Doctor of Philosophy}, + year = {2015}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Mao_thesis15.pdf}, +} + +Mehta_soda15 + +@inproceedings{Mehta_soda15, + title = {{Online Stochastic Matching with Unequal Probabilities}}, + author = {Aranyak Mehta and Bo Waggoner and Morteza Zadimoghaddam}, + booktitle = {Proceedings of the Twenty-Sixth Annual {ACM-SIAM} Symposium on Discrete + Algorithms (SODA-15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Mehta_soda15.pdf}, + www_section = {Market Design}, +} + +Meir10 + +@inproceedings{Meir10, + title = {{On the Limits of Dictatorial Classification}}, + author = {Reshef Meir and Ariel D. Procaccia and Jeffrey S. Rosenschein}, + booktitle = {Proceedings of the 9th Intl. Joint Conference on Autonomous Agents and + Multiagent Systems (AAMAS'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Meir10.pdf}, + www_section = {Computational Social Choice}, +} + +Meir_aaai15 + +@inproceedings{Meir_aaai15, + title = {{Congestion Games with Distance-Based Strict Uncertainty}}, + author = {Reshef Meir and David C. Parkes}, + booktitle = {Proc. Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15)}, + year = {2015}, + pages = {986-992}, + www_section = {Networks, Systems and Economics|Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Meir_aaai15.pdf}, +} + +Meir_aamas13 + +@inproceedings{Meir_aamas13, + title = {{Efficient Parking Allocation as Online Bipartite Matching}}, + author = {Reshef Meir and Yiling Chen and Michal Feldman}, + booktitle = {Proceedings of the 12th International Conference on Autonomous Agents \& + Multiagent Systems (AAMAS'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Meir_aamas13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Meir_aamas15 + +@inproceedings{Meir_aamas15, + title = {{On Sex, Evolution, and the Multiplicative Weights UpdateAlgorithm}}, + author = {Reshef Meir and David Parkes}, + booktitle = {Proc. The Autonomous Agents and MultiAgent Systems (AAMAS 2015)}, + year = {2015}, + pages = {929-937}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Meir_aamas15.pdf}, +} + +Meir_netecon15 + +@inproceedings{Meir_netecon15, + title = {{Playing the Wrong Game: Smoothness Bounds forCongestion Games with Behavioral + Biases}}, + author = {Reshef Meir and David C. Parkes}, + booktitle = {Proc. 10th Workshop on the Economics of Networks, Systems and Computation + (NetEcon 2015)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Meir_netecon15.pdf}, + www_section = {Networks, Systems and Economics|Computational Social Choice}, +} + +NanneyThesis + +@undergradthesis{NanneyThesis, + title = {Entertainment Shopping: An Analysis of Profit and Strategy in a New Auction + Format}, + author = {Jeff Nanney}, + school = {Applied Mathematics, Harvard College}, + year = {2010}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Nanneythesis.pdf}, +} + +Narasimhan_NIPS15 + +@inproceedings{Narasimhan_NIPS15, + title = {{Learnability of Influence in Networks}}, + author = {Harikrishna Narasimhan and David C. Parkes and Yaron Singer}, + booktitle = {Proceedings of the 29th Annual Conference on Neural Information Processing + Systems (NIPS 2015)}, + year = {2015}, + pages = {3168-3176}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Narasimhan_NIPS15.pdf}, +} + +OB_PrefWS_IJCAI05 + +@inproceedings{OB_PrefWS_IJCAI05, + title = {Preference-Based Characterizations of Truthfulness and the Limited + Expressiveness of Order-Based Domains}, + author = {Florin Constantin and David C. Parkes}, + booktitle = {Proc. Workshop on Preference Handling}, + year = {2005}, + month = {August}, + address = {Edinburgh, Scotland}, + note = {Position Paper}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/OB_PrefWS_IJCAI05.pdf}, + www_section = {Mechanism Design}, +} + +PZhang_thesis + +@undergradthesis{PZhang_thesis, + title = {Beyond the Bayesian Truth Serum: The Knowledge Free Peer Prediction Mechanism}, + author = {Peter Zhang}, + school = {Department of Computer Science and Mathematics, Harvard University}, + year = {2013}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/PZhang_thesis.pdf}, +} + +Parkes_Amma15 + +@inproceedings{Parkes_Amma15, + title = {{Achieving Trust without Disclosure: Dark Pools and a Role for + Secrecy-Preserving Verification}}, + author = {David Parkes and Chrisopher Thorpe and Wei Li}, + booktitle = {Proceedings of the Third Conference on Auctions, Market Mechanisms and Their + Applications (AMMA'15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Parkes_Amma15.pdf}, + www_section = {Cryptographic Methods|Market Design}, +} + +Parkes_Science15 + +@article{Parkes_Science15, + title = {{Economic Reasoning and Artificial Intelligence}}, + author = {David C. Parkes and Michael P. Wellman}, + journal = {Science}, + volume = {349}, + number = {6245}, + year = {2015}, + pages = {267-272}, + www_html_url = {http://web.eecs.umich.edu/srg/?page_id=1672}, + www_section = {Artificial Intelligence|Edited Collections and Overview|Applications and + E-Commerce}, +} + +Parkes_aaai12 + +@inproceedings{Parkes_aaai12, + title = {{A Complexity-of-Strategic-Behavior Comparison between Schulze's Rule and Ranked + Pairs}}, + author = {David C. Parkes and Lirong Xia}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Parkes_aaai12.pdf}, + www_section = {Computational Social Choice}, +} + +Parkes_aaai13 + +@inproceedings{Parkes_aaai13, + title = {{Dynamic Social Choice with Evolving Preferences}}, + author = {David C. Parkes and Ariel D. Procaccia}, + booktitle = {Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence + (AAAI-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Parkes_aaai13.pdf}, + www_section = {Computational Social Choice}, +} + +Parkes_acmtec14 + +@article{Parkes_acmtec14, + title = {{Beyond Dominant Resource Fairness: Extensions, Limitations, and + Indivisibilities}}, + author = {David C. Parkes and Ariel Procaccia and Nisarg Shah}, + journal = {Transactions on Economics and Computation}, + volume = {3}, + number = {1}, + year = {2014}, + pages = {3}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Parkes_acmtec14.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Parkes_ec12 + +@inproceedings{Parkes_ec12, + title = {{Beyond Dominant Resource Fairness: Extensions, Limitations, and + Indivisibilities}}, + author = {David C. Parkes and Ariel D. Procaccia and Nisarg Shah}, + booktitle = {Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12)}, + year = {2012}, + pages = {808-825}, + www_section = {Computational Social Choice|Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Parkes_ec12.pdf}, +} + +Peleg10 + +@article{Peleg10, + title = {{Implementation by Mediated Equilibrium}}, + author = {Bezalel Peleg and Ariel D. Procaccia}, + journal = {International Journal of Game Theory}, + volume = {39}, + year = {2010}, + pages = {191-207}, + www_section = {Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Peleg10.pdf}, +} + +Pfeiffer_aaai12 + +@inproceedings{Pfeiffer_aaai12, + title = {{Adaptive Polling for Information Aggregation}}, + author = {Thomas Pfeiffer and Xi Alice Gao and Andrew Mao and Yiling Chen and David G. + Rand}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Pfeiffer_aaai12.pdf}, + www_section = {Social Computing and Incentives}, +} + +Polgreen:2008 + +@article{Polgreen:2008, + title = {Using Internet Searches for Influenza Surveillance}, + author = {Philip M. Polgreen and Yiling Chen and David M. Pennock and Forrest D. Nelson}, + journal = {Clinical Infectious Diseases}, + volume = {47}, + year = {2008}, + pages = {1443--1448}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Influenza_almost_final_copy.pdf}, +} + +Pouget_ICML15 + +@inproceedings{Pouget_ICML15, + title = {{Inferring Graphs from Cascades: {A} Sparse Recovery Framework}}, + author = {Jean Pouget{-}Abadie and Thibaut Horel}, + booktitle = {Proceedings of the 32nd International Conference on Machine Learning, (ICML + 2015)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Pouget_ICML15.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Procaccia10 + +@inproceedings{Procaccia10, + title = {{Can Approximation Circumvent Gibbard-Satterthwaite}}, + author = {Ariel D. Procaccia}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Procaccia10.pdf}, + www_section = {Computational Social Choice}, +} + +Rao_witec14 + +@inproceedings{Rao_witec14, + title = {{A Framework for Incentivizing Deep Fixes}}, + author = {Malvika Rao and David C. Parkes and Margo Seltzer and David F. Bacon}, + booktitle = {AAAI 2014 Workshop on Incentives and Trust in E-Communities (WIT-EC'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Rao_witec14.pdf}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, +} + +Robu_ijcai13 + +@inproceedings{Robu_ijcai13, + title = {{Efficient Interdependent Value Combinatorial Auctions with Single Minded + Bidders}}, + author = {Valentin Robu and David C. Parkes and Takayuki Ito and Nicholas R. Jennings}, + booktitle = {Proceedings of the 23rd International Joint Conference on Artificial + Intelligence (IJCAI 2013)}, + year = {2013}, + pages = {339-345}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Robu_ijcai13.pdf}, +} + +Robu_jair13 + +@article{Robu_jair13, + title = {{An Online Mechanism for Multi-Unit Demand and its Application to Plug-in Hybrid + Electric Vehicle Charging}}, + author = {Valentin Robu and Enrico H. Gerding and Sebastian Stein and David C. Parkes and + Alex Rogers and Nicholas R. Jennings}, + journal = {Journal of Artificial Intelligence Research}, + volume = {48}, + year = {2013}, + pages = {175-230}, + www_section = {Dynamic Mechanism Design|Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Robu_jair13.pdf}, +} + +Rosenman_thesis + +@undergradthesis{Rosenman_thesis, + title = {Retweets-but Not Just Retweets: Quantifying and Predicting Influence on + Twitter}, + author = {Evan T.R. Rosenman}, + school = {Applied Mathematics, Harvard College}, + year = {2012}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Rosenman_thesis.pdf}, +} + +Ruberry_thesis13 + +@phdthesis{Ruberry_thesis13, + title = {Prediction Markets: Theory and Applications}, + author = {Michael Edward Ruberry}, + school = {Computer Science}, + year = {2013}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Ruberry_thesis13.pdf}, +} + +Rubinstein_ACM15 + +@inproceedings{Rubinstein_ACM15, + title = {{Approximability of Adaptive Seeding under Knapsack Constraints}}, + author = {Aviad Rubinstein and Lior Seeman and Yaron Singer}, + booktitle = {The ACM Conference on Economics and Computation (EC) 2015}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Rubinstein_ACM15.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Seeman_focs13 + +@inproceedings{Seeman_focs13, + title = {{Adaptive Seeding in Social Networks}}, + author = {Lior Seeman and Yaron Singer}, + booktitle = {Proceedings of the IEEE Annual Symposium on Foundations of Computer Science + (FOCS-13)}, + year = {2013}, + note = {Forthcoming}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seeman_focs13.pdf}, + www_section = {Networks, Systems and Economics}, +} + +Seuken10a + +@inproceedings{Seuken10a, + title = {{Hidden Market Design}}, + author = {Sven Seuken and Kamal Jain and David C. Parkes}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + pages = {1498-1503}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken10a.pdf}, +} + +Seuken10b + +@inproceedings{Seuken10b, + title = {{Accounting Mechanisms for Distributed Work Systems}}, + author = {Sven Seuken and Jie Tang and David C. Parkes}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + pages = {860-866}, + www_section = {Social Computing and Incentives|Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken10b.pdf}, +} + +Seuken_aamas14 + +@inproceedings{Seuken_aamas14, + title = {{Sybil-proof Accounting Mechanisms with Transitive Trust}}, + author = {Sven Seuken and David C. Parkes}, + booktitle = {Proceedings of the 13th Int. Conf. on Automonous Agents and Multiagent + Systems (AAMAS'14)}, + year = {2014}, + pages = {205-212}, + www_section = {Social Computing and Incentives|Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken_aamas14.pdf}, +} + +Seuken_amma11 + +@inproceedings{Seuken_amma11, + title = {{Market User Interface Design}}, + author = {Sven Seuken and David C. Parkes and Eric Horvitz and Kamal Jain and Mary + Czerwinski and Desney Tan}, + booktitle = {Proceedings of the Second Conference on Auctions, Market Mechanisms and + Their Applications (AMMA)}, + year = {2011}, + pages = {2-4}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken_amma11.pdf}, +} + +Seuken_ec12 + +@inproceedings{Seuken_ec12, + title = {{Market User Interface Design}}, + author = {Sven Seuken and David C. Parkes and Eric Horvitz and Kamal Jain and Mary + Czerwinski and Desney Tan}, + booktitle = {Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12)}, + year = {2012}, + pages = {898-915}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken_ec12.pdf}, +} + +Seuken_netecon11 + +@inproceedings{Seuken_netecon11, + title = {{On the Sybil-Proofness of Accounting Mechanisms}}, + author = {Sven Seuken and David C. Parkes}, + booktitle = {Proceedings of the 6th Workshop on the Economics of Networks, Systems, and + Computation (NetEcon'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken_netecon11.pdf}, + www_section = {Social Computing and Incentives|Networks, Systems and Economics}, +} + +Seuken_thesis + +@phdthesis{Seuken_thesis, + title = {Hidden Markets: Designing Efficient but Usable Market-based Systems}, + author = {Sven Seuken}, + school = {Computer Science}, + year = {2011}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Seuken_thesis.pdf}, +} + +Shnayder_mobihoc14 + +@inproceedings{Shnayder_mobihoc14, + title = {{Truthful Prioritization for Dynamic Bandwidth Sharing}}, + author = {Victor Shnayder and Vikas Kawadia and Jeremy Hoon and David C. Parkes}, + booktitle = {Proceedings 15th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing + (MobiHoc 2014)}, + year = {2014}, + pages = {235-244}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Shnayder_mobihoc14.pdf}, +} + +SingerSigecom13 + +@article{SingerSigecom13, + title = {{Budget Feasible Mechanism Design}}, + author = {Yaron Singer}, + journal = {ACM SIGecom Exchanges}, + volume = {12}, + number = {2}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/SingerSigecom13.pdf}, + www_section = {Edited Collections and Overview|Mechanism Design}, +} + +Singer_www13 + +@inproceedings{Singer_www13, + title = {{Pricing Mechanisms for Crowdsourcing Markets}}, + author = {Yaron Singer and Manas Mittal}, + booktitle = {Proceedings of the ACM International World Wide Web Conference (WWW-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Singer_www13.pdf}, + www_section = {Mechanism Design|Dynamic Mechanism Design|Social Computing and + Incentives}, +} + +Thammaiah_thesis + +@undergradthesis{Thammaiah_thesis, + title = {Applying Rank-Dependent Expected Utility Theory}, + author = {Pramod Thammaiah}, + school = {Department of Applied Mathematics, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Thammaiah_thesis.pdf}, +} + +Toulis_acm15 + +@article{Toulis_acm15, + title = {{Incentive-Compatible Experimental Design}}, + author = {Panos Toulis and David C. Parkes and Elery Pfeffer and James Zou}, + journal = {Proceedings 16th ACM Conference on Economics and Computation (EC '15)}, + year = {2015}, + pages = {285-302}, + www_section = {Applications and E-Commerce|Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Toulis_acm15.pdf}, +} + +Toulis_acm15b + +@article{Toulis_acm15b, + title = {{Long-term causal effects of interventions in multiagent economic mechanisms}}, + author = {Panos Toulis and David C. Parkes}, + journal = {Working paper; extended abstract presented at Workshop of Algorithmic Game + Theory and Data Science, EC'2015}, + year = {2015}, + note = {Forthcoming}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Toulis_acm15b.pdf}, + www_section = {Applications and E-Commerce|Networks, Systems and Economics}, +} + +Toulis_gamesecon15 + +@article{Toulis_gamesecon15, + title = {{Design and Analysis of Multi-Hospital Kidney Exchange Mechanisms Using Random + Graphs}}, + author = {Panos Toulis and David C. Parkes}, + journal = {Games and Economic Behavior}, + volume = {91}, + year = {2015}, + pages = {360-382}, + www_section = {Applications and E-Commerce|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Toulis_gamesecon15.pdf}, +} + +Toulis_icml13 + +@inproceedings{Toulis_icml13, + title = {{Estimation of Causal Peer Influence Effects}}, + author = {Panos Toulis and Edward Kao}, + booktitle = {Proceedings of the International Conference on Machine Learning (ICML-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Toulis_icml13.pdf}, + www_section = {Networks, Systems and Economics}, +} + +TravisMaythesis + +@undergradthesis{TravisMaythesis, + title = {Understanding Elections: Measuring Electoral Determinants with Electronic + Prediction Markets}, + author = {S. Travis May}, + school = {Department of Economics, Harvard College}, + year = {2009}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/TravisMaythesis.pdf}, +} + +Waggoner_aaai12 + +@inproceedings{Waggoner_aaai12, + title = {{Evaluating Resistance to False-Name Manipulations in Elections }}, + author = {Bo Waggoner and Lirong Xia and Vincent Conitzer}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Waggoner_aaai12.pdf}, + www_section = {Computational Social Choice}, +} + +Waggoner_aaai14 + +@inproceedings{Waggoner_aaai14, + title = {{Output Agreement Mechanisms and Common Knowledge}}, + author = {Bo Waggoner and Yiling Chen}, + booktitle = {Proceedings of the 2nd AAAI Conference on Human Computation and + Crowdsourcing (HCOMP'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Waggoner_aaai14.pdf}, + www_section = {Artificial Intelligence}, +} + +Waggoner_ec13 + +@inproceedings{Waggoner_ec13, + title = {{Information Elicitation Sans Verification}}, + author = {Bo Waggoner and Yiling Chen}, + booktitle = {Proceedings of the 3rd Workshop on Social Computing and User Generated + Content, in conjunction with ACM EC'13}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Waggoner_ec13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Walsh10 + +@inproceedings{Walsh10, + title = {{Automated Channel Abstraction for Advertising Auctions}}, + author = {William Walsh and Tuomas Sandholm and Craig Boutilier and Rob Shields and + George Nemhauser and David C. Parkes}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + pages = {887-894}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Walsh10.pdf}, +} + +Walsh_aamas12 + +@inproceedings{Walsh_aamas12, + title = {{Lot-based Voting Rules}}, + author = {Toby Walsh and Lirong Xia}, + booktitle = {Proceedings of the 11th International Conference on Autonomous Agents and + Multiagent Systems (AAMAS-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Walsh_aamas12.pdf}, + www_section = {Computational Social Choice}, +} + +Witkowski_aaai11 + +@inproceedings{Witkowski_aaai11, + title = {{Incentive-Compatible Escrow Mechanisms}}, + author = {Jens Witkowski and Sven Seuken and David C. Parkes}, + booktitle = {Proceedings of the 25th AAAI Conference on Artificial Intelligence + (AAAI'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Witkowski_aaai11.pdf}, + www_section = {Applications and E-Commerce|Market Design}, +} + +Witkowski_ec13 + +@inproceedings{Witkowski_ec13, + title = {{Learning the Prior in Minimal Peer Prediction}}, + author = {Jens Witkowski and David C. Parkes}, + booktitle = {Proceedings of the 3rd Workshop on Social Computing and User Generated + Content}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Witkowski_ec13.pdf}, + www_section = {Applications and E-Commerce|Information Elicitation and Aggregation|Social + Computing and Incentives}, +} + +Witkowski_hcomp13 + +@inproceedings{Witkowski_hcomp13, + title = {{Dwelling on the Negative: Incentivizing Effort in Peer Prediction}}, + author = {Jens Witkowski and Yoram Bachrach and Peter Key and David C. Parkes}, + booktitle = {Proceedings of the 1st AAAI Conference on Human Computation and + Crowdsourcing (HCOMP'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Witkowski_hcomp13.pdf}, + www_section = {Social Computing and Incentives|Applications and E-Commerce|Information + Elicitation and Aggregation}, +} + +Witkowski_soccomp11 + +@inproceedings{Witkowski_soccomp11, + title = {{Peer Prediction with Private Beliefs}}, + author = {Jens Witkowski and David C. Parkes}, + booktitle = {Proceedings of the Workshop on Social Computing and User Generated Content}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Witkowski_soccomp11.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +Xia10 + +@inproceedings{Xia10, + title = {{A Scheduling Approach to Coalitional Manipulation}}, + author = {Lirong Xia and Vincent Conitzer and Ariel D. Procaccia}, + booktitle = {Proceedings of the 11th ACM Conference on Electronic Commerce (EC'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Xia10.pdf}, + www_section = {Computational Social Choice}, +} + +Xia_ec12 + +@inproceedings{Xia_ec12, + title = {{Computing the Margin of Victory for Various Voting Rules}}, + author = {Lirong Xia}, + booktitle = {In Proceedings of the 13th ACM Conference on Electronic Commerce (EC-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Xia_ec12.pdf}, + www_section = {Computational Social Choice}, +} + +Yin_aaai13 + +@inproceedings{Yin_aaai13, + title = {{The Effects of Performance-Contingent Financial Incentives in Online Labor + Markets}}, + author = {Ming Yin and Yiling Chen and Yu-An Sun}, + booktitle = {Proceedings of the 27th AAAI Conference on Artificial Intelligence + (AAAI'13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Yin_aaai13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Yin_aaai14 + +@inproceedings{Yin_aaai14, + title = {{Monetary Interventions in Crowdsourcing Task Switching}}, + author = {Ming Yin and Yiling Chen and Yu-An Sun}, + booktitle = {Proc. of the 2nd AAAI Conference on Human Computation and Crowdsourcing + (HCOMP'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Yin_aaai14.pdf}, + www_section = {Social Computing and Incentives}, +} + +Yin_aamas15 + +@inproceedings{Yin_aamas15, + title = {{Human Behavior Models for Virtual Agents in Repeated Decision Making under + Uncertainty}}, + author = {Ming Yin and Yu-An Sun}, + booktitle = {Proceedings of the 14th International Conference on Autonomous Agent & + Multiagent Systems (AAMAS'15)}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Yin_aamas15.pdf}, + www_section = {Artificial Intelligence}, +} + +Yin_ijcai15 + +@inproceedings{Yin_ijcai15, + title = {{Bonus or Not? Learn to Reward in Crowdsourcing}}, + author = {Ming Yin and Yiling Chen}, + booktitle = {In the Proc. of the 24th International Joint Conference on Artificial + Intelligence (IJCAI'15), 2015}, + year = {2015}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Yin_ijcai15.pdf}, + www_section = {Social Computing and Incentives}, +} + +Zhang_aaai13 + +@inproceedings{Zhang_aaai13, + title = {{Automated Workflow Synthesis}}, + author = {Haoqi Zhang and Eric Horvitz and David C. Parkes}, + booktitle = {Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence + (AAAI-13)}, + year = {2013}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zhang_aaai13.pdf}, + www_section = {Social Computing and Incentives}, +} + +Zhang_aamas14 + +@inproceedings{Zhang_aamas14, + title = {{Elicitability and Knowledge-Free Elicitation with Peer Prediction}}, + author = {Peter Zhang and Yiling Chen}, + booktitle = {Proceedings of the 14th International Conference on Autonomous Agent & + Multiagent Systems (AAMAS'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zhang_aamas14.pdf}, + www_section = {Artificial Intelligence}, +} + +Zou10 + +@inproceedings{Zou10, + title = {{Tolerable Manipulability in Dynamic Assignment without Money}}, + author = {James Zou and Sujit Gujar and David C. Parkes}, + booktitle = {Proceedings of the 24th AAAI Conference on Artificial Intelligence + (AAAI'10)}, + year = {2010}, + pages = {947-952}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou10.pdf}, +} + +Zou_comsoc14 + +@inproceedings{Zou_comsoc14, + title = {{Approval Voting Behavior in Doodle Polls}}, + author = {James Zou and Reshef Meir and David C. Parkes}, + booktitle = {5th Int. Workshop on Computational Social Choice (COMSOC'14)}, + year = {2014}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou_comsoc14.pdf}, + www_section = {Computational Social Choice}, +} + +Zou_cscw15 + +@inproceedings{Zou_cscw15, + title = {{Strategic Voting Behavior in Doodle Polls}}, + author = {James Zou and Reshef Meir and David C. Parkes}, + booktitle = {Proc. 18th ACM Conference on Computer-Supported Cooperative Work and Social + Computing (CSCW 2015)}, + year = {2015}, + pages = {464-472}, + www_section = {Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou_cscw15.pdf}, +} + +Zou_icml12 + +@inproceedings{Zou_icml12, + title = {{Get another worker? Active crowdlearning with sequential arrivals}}, + author = {James Zou and David C. Parkes}, + booktitle = {Proceedings of the Workshop on Machine Learning in Human Computation and + Crowdsourcing(ICML'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou_icml12.pdf}, + www_section = {Social Computing and Incentives}, +} + +Zou_nips13 + +@inproceedings{Zou_nips13, + title = {{Contrastive Learning Using Spectral Methods}}, + author = {James Zou and Daniel Hsu and David C. Parkes and Ryan P. Adams}, + booktitle = {Proceedings of the Annual Conference on Neural Information Processing + Systems (NIPS 2013)}, + year = {2013}, + pages = {2238-2246}, + www_section = {Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou_nips13.pdf}, +} + +Zou_thesis13 + +@phdthesis{Zou_thesis13, + title = {Algorithms and Models for Genome Biology}, + author = {James Zou}, + school = {Applied Mathematics}, + year = {2013}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/Zou_thesis13.pdf}, +} + +a12-abernethy + +@article{a12-abernethy, + title = {{Efficient Market Making via Convex Optimization, and a Connection to Online + Learning}}, + author = {Jacob Abernethy and Yiling Chen and Jennifer Wortman Vaughan}, + journal = {ACM Transactions on Economics and Computation}, + volume = {1}, + number = {2}, + year = {2013}, + pages = {12:1--12:39}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/a12-abernethy.pdf}, + www_section = {Social Computing and Incentives}, +} + +aamas08 + +@book{aamas08, + title = {Proceedings of the Seventh International Conference on Autonomous Agents and + MultiAgent Systems (AAMAS'08)}, + author = {Lin Padgham and David C. Parkes and Joerg Mueller and Simon Parsons}, + year = {2008}, + editor = {Lin Padgham and David C. Parkes and Joerg Mueller and Simon Parsons}, + www_section = {Edited Collections and Overview}, + www_html_url = {http://www.ifaamas.org/proceedings.html}, +} + +aamas10Tang + +@inproceedings{aamas10Tang, + title = {{Hybrid Transitive Trust Mechanisms}}, + author = {Jie Tang and Sven Seuken and David C. Parkes}, + booktitle = {International Conference on Autonomous Agents and Multiagent + Systems(AAMAS'10)}, + year = {2010}, + pages = {233-240}, + www_section = {Social Computing and Incentives|Applications and E-Commerce|Networks, + Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/aamas10Tang.pdf}, +} + +abernethy_nips10.pdf + +@inproceedings{abernethy_nips10.pdf, + title = {{An Optimization-Based Framework for Automated Maket-Making}}, + author = {Jacob Abernethy and Yiling Chen and Jennifer Wortman Vaughan}, + booktitle = {NIPS Workshop on Computational Social Science and the Wisdom of Crowds}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/abernethy_nips10.pdf}, + www_section = {Market Design|Information Elicitation and Aggregation}, +} + +abernethyec11.pdf + +@inproceedings{abernethyec11.pdf, + title = {{An Optimization-Based Framework for Automated Maket-Making}}, + author = {Jacob Abernethy and Yiling Chen and Jennifer Wortman Vaughan}, + booktitle = {Proceedings of the 12th ACM Conference on Electronic Commerce (EC'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/abernethyec11.pdf}, + www_section = {Market Design|Information Elicitation and Aggregation}, +} + +adamjuda_thesis + +@phdthesis{adamjuda_thesis, + title = {Coordination and Costly Preference Elicitation in Electronic Markets}, + author = {Adam I. Juda}, + school = {Science, Technology and Management, Harvard University}, + year = {2009}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/adamjuda_thesis.pdf}, +} + +ashah_thesis + +@undergradthesis{ashah_thesis, + title = {On Coordinating Electricity Markets: Smart Power Schedulingfor Demand Side + Management and Economic Dispatch}, + author = {Ashin D. Shah}, + school = {Applied Mathematics, Harvard College}, + year = {2012}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ashah_thesis.pdf}, +} + +aspnes03 + +@inproceedings{aspnes03, + title = {Towards Better Definitions and Measures of Internet Security}, + author = {James Aspnes and Joan Feigenbaum and Michael Mitzenmacher and David C. Parkes}, + booktitle = {Proc. Workshop on Large-Scale-Network Security and Deployment Obstacles}, + year = {2003}, + month = {March}, + address = {Landsdowne VA}, + note = {Position Paper}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/security.pdf}, + www_section = {Networks, Systems and Economics}, +} + +auyong09 + +@incollection{auyong09, + title = {Two Auction-Based Resource Allocation Environments: {Design} and Experience}, + author = {Alvin AuYoung and Philip Buonadonna and Brent N. Chun and Chaki Ng and David C. + Parkes and Jeffrey Shneidman and Alex C. Snoeren and Amin Vahdat}, + booktitle = {Market Oriented Grid and Utility Computing}, + year = {2009}, + chapter = {23}, + editor = {Rajmukar Buyya and Kris Bubendorfer}, + publisher = {Wiley}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/auyoung09.pdf}, + www_section = {Applications and E-Commerce|Networks, Systems and Economics}, +} + +azar_aamas12 + +@article{azar_aamas12, + title = {{Mastering Multi-Player Games. International Conference on Autonomous Agents and + Multiagent Systems}}, + author = {Yossi Azar and Uriel Feige and Michal Feldman and Moshe Tennenholtz}, + journal = {Proceedings of the 11th International Conference on Autonomous Agents and + Multi-Agent Systems}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/azar_aamas12.pdf}, + www_section = {Artificial Intelligence}, +} + +azari_nips12 + +@inproceedings{azari_nips12, + title = {{Random Utility Theory for Social Choice}}, + author = {Hossein {{Azari Soufiani}} and David C. Parkes and Lirong Xia}, + booktitle = {Proceeedings of the 25th Annual Conference on Neural Information Processing + Systems (NIPS'12)}, + year = {2012}, + pages = {126-134}, + www_section = {Computational Social Choice}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/azari_nips12.pdf}, +} + +bacon-foser10 + +@inproceedings{bacon-foser10, + title = {{Software economies}}, + author = {David F. Bacon and Eric Bokelberg and Yiling Chen and Ian A. Kash and David C. + Parkes and Malvika Rao and Manu Sridharan}, + booktitle = {Proceedings of the FSE/SDP workshop on Future of software engineering + research (FoSER '10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/bacon-foser10.pdf}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, +} + +bacon09 + +@inproceedings{bacon09, + title = {A Market-Based Approach to Software Evolution}, + author = {David F. Bacon and Yiling Chen and David C. Parkes and Malvika Rao}, + booktitle = {ACM Onward! Conference}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/bacon09.pdf}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, +} + +bosworth04 + +@undergradthesis{bosworth04, + title = {{DRATS: D}ynamically Re-Allocated Team Search}, + author = {Andrew Bosworth}, + school = {Computer science, Harvard College}, + year = {2004}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/boz-thesis.pdf}, +} + +boutilier08 + +@inproceedings{boutilier08, + title = {Expressive Banner Ad auctions and Model-based Online Optimization for Clearing}, + author = {Craig Boutilier and David C. Parkes and Tuomas Sandholm and William E. Walsh}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence (AAAI'08)}, + year = {2008}, + pages = {30--37}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/walsh08_banner.pdf}, +} + +brams_aaai12 + +@inproceedings{brams_aaai12, + title = {{On Maxsum Fair Allocations}}, + author = {Steven J. Brams and Michal Feldman and John K. Lai and Jamie Morgenstern and + Ariel D. Procaccia}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/brams_aaai12.pdf}, + www_section = {Computational Social Choice}, +} + +bredin07 + +@article{bredin07, + title = {{Chain: A Dynamic Double Auction Framework for Matching Patient Agents}}, + author = {Jonathan Bredin and David C. Parkes and Quang Duong}, + journal = {Journal of Artificial Intelligence Research}, + volume = {30}, + year = {2007}, + pages = {133--179}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/bredin07.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +byers_wsdm12 + +@inproceedings{byers_wsdm12, + title = {{Daily deals: Prediction, Social Diffusion, and Reputational Ramifications}}, + author = {John W. Byers and Michael Mitzenmacher and Georgios Zervas}, + booktitle = {Proceedings of the fifth ACM international conference on Web search and data + mining (WSDM'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/byers_wsdm12.pdf}, + www_section = {Applications and E-Commerce}, +} + +cap-sigops06 + +@article{cap-sigops06, + title = {A study of {Nash} equilibrium in contribution games for peer-to-peer networks}, + author = {Jacomo Corbo and Antoni Calv\'{o}-Armengol and David C. Parkes}, + journal = {SIGOPS Oper. Syst. Rev.}, + volume = {40}, + number = {3}, + year = {2006}, + address = {New York, NY, USA}, + pages = {61--66}, + publisher = {ACM Press}, + www_section = {Networks, Systems and Economics}, + issn = {0163-5980}, + www_html_url = {http://portal.acm.org/citation.cfm?id=1151374.1151388}, + doi = {http://doi.acm.org/10.1145/1151374.1151388}, +} + +cat07 + +@inproceedings{cat07, + title = {Cryptographic Securities Exchanges}, + author = {Christopher Thorpe and David C. Parkes}, + booktitle = {Proc. 11th International Conference onFinancial Cryptography and Data + Security}, + year = {2007}, + month = {February}, + address = {Trinidad/Tobago}, + pages = {163--178}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://www.eecs.harvard.edu/~cat/cm.pdf}, +} + +cavallo-ec08 + +@inproceedings{cavallo-ec08, + title = {Efficiency and Redistribution in Dynamic Mechanism Design}, + author = {Ruggiero Cavallo}, + booktitle = {Proc. 9th ACM Conf. on Electronic Commerce (EC'08)}, + year = {2008}, + address = {Chicago, IL}, + pages = {220-229}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cavallo-ec08.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +cavallo08 + +@phdthesis{cavallo08, + title = {Social Welfare Maximization in Dynamic Strategic Decision Problems}, + author = {Ruggiero Cavallo}, + school = {Computer Science, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cavallo_thesis.pdf}, +} + +cavallo10 + +@techreport{cavallo10, + title = {Efficient Mechanisms with Dynamic Populations and Dynamic Types}, + author = {Ruggiero Cavallo and David C. Parkes and Satinder Singh}, + institution = {Harvard University}, + year = {2010}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cps-persistent.pdf}, +} + +cavalloNectar + +@inproceedings{cavalloNectar, + title = {Handling Self-Interest in Groups, with Minimal Cost}, + author = {Ruggiero Cavallo}, + booktitle = {Proceedings of the 21st National Conference on Artificial Intelligence + (AAAI'06), Nectar Paper Track}, + year = {2006}, + address = {Boston, MA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cavallo-aaai06-nectar.pdf}, + www_section = {Mechanism Design}, +} + +cavalloRedis + +@inproceedings{cavalloRedis, + title = {Optimal Decision-Making With Minimal Waste: Strategyproof Redistribution of VCG + Payments}, + author = {Ruggiero Cavallo}, + booktitle = {Proc. of the 5th Int. Joint Conf. on Autonomous Agents and Multi Agent + Systems (AAMAS'06)}, + year = {2006}, + address = {Hakodate, Japan}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cavallo-redis.pdf}, + www_section = {Mechanism Design}, +} + +chakiNg_thesis + +@phdthesis{chakiNg_thesis, + title = {Online Mechanism and Virtual Currency Design for Distributed Systems}, + author = {Chaki Ng}, + school = {Computer Science}, + year = {2011}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chakiNg_thesis.pdf}, +} + +chen09 + +@phdthesis{chen09, + title = {Essays on Mobile Advertising and Commerce}, + author = {David Yu-Chung Chen}, + school = {Science, Technology and Management, Harvard University}, + year = {2009}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chen09.pdf}, +} + +chen_aamas11a + +@inproceedings{chen_aamas11a, + title = {{Information Elicitation for Decision Making}}, + author = {Yiling Chen and Ian A. Kash}, + booktitle = {Proceedings of the 10th International Conference on Autonomous Agents and + Multi-Agent Systems (AAMAS'11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chen_aamas11.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +chen_aimag10 + +@article{chen_aimag10, + title = {{Designing Markets for Predictions}}, + author = {Yiling Chen and David M. Pennock}, + journal = {Artificial Intelligence Magazine}, + volume = {31}, + year = {2010}, + pages = {42--52}, + no. = {4}, + www_section = {Edited Collections and Overview}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chen_aimag10.pdf}, +} + +chen_uai12 + +@inproceedings{chen_uai12, + title = {{Designing Informative Securities}}, + author = {Yiling Chen and Mike Ruberry and Jennifer Wortman Vaughan}, + booktitle = {Proceedings of the 28th Conference on Uncertainty in Artificial Intelligence + (UAI '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chen_uai12.pdf}, + www_section = {Market Design|Information Elicitation and Aggregation}, +} + +chenwine11 + +@inproceedings{chenwine11, + title = {{Decision Markets with Good Incentives}}, + author = {Yiling Chen and Ian A. Kash and Mike Ruberry and Victor Shnayder}, + booktitle = {Proceedings of the Seventh Workshop on Internet and Network Economics + (WINE)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chenwine11.pdf}, + www_section = {Information Elicitation and Aggregation}, +} + +chi10Seuken + +@inproceedings{chi10Seuken, + title = {{Hidden Markets: UI Design for a P2P Backup Application}}, + author = {Sven Seuken and Kamal Jain and Desney Tan and Mary Czerwinski}, + booktitle = {Proceedings of the Conference on Human Factors in Computing Systems + (CHI'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/chi10Seuken.pdf}, + www_section = {Networks, Systems and Economics|Market Design}, +} + +cjmpnetecon07 + +@inproceedings{cjmpnetecon07, + title = {An Economically Principled Generative Model of {AS} Graph Connectivity}, + author = {Jacomo Corbo and Shaili Jain and Michael Mitzenmacher and David C. Parkes}, + booktitle = {Proc. Joint Workshop on The Economics of Networked Systems and + Incentive-Based Computing}, + year = {2007}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cjmp-netecon2007.pdf}, + www_section = {Networks, Systems and Economics}, +} + +cohler_thesis + +@undergradthesis{cohler_thesis, + title = {Optimal Envy-Free Cake-Cutting}, + author = {Yuga Cohler}, + school = {Department of Computer Science, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cohler_thesis.pdf}, +} + +constantin07 + +@inproceedings{constantin07, + title = {Online Auctions for Bidders with Interdependent Values}, + author = {Florin Constantin and Takayuki Ito and David C. Parkes}, + series = {short paper}, + booktitle = {Proc. 6th International Joint Conference on AutonomousAgents and Multiagent + Systems (AAMAS'07)}, + year = {2007}, + month = {May}, + address = {Honolulu, Hawaii}, + www_pdf_url = {http://www.eecs.harvard.edu/~florin/pubs/ConstantinItoParkesOABIV.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +constantin07a + +@inproceedings{constantin07a, + title = {On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values}, + author = {Florin Constantin and David C. Parkes}, + booktitle = {Proc. Workshop on Agent Mediated Electronic Commerce IX (AMEC'IX)}, + year = {2007}, + address = {Honolulu, Hawaii}, + www_pdf_url = {http://www.eecs.harvard.edu/~florin/pubs/ConstantinParkesORODABIVFinal.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +constantin08 + +@inproceedings{constantin08, + title = {Online Ad Slotting With Cancellations}, + author = {Florin Constantin and Jon Feldman and S. Muthukrishnan and Martin Pal}, + booktitle = {Proceedings of the Fourth Workshop on Ad Auctions}, + year = {2008}, + address = {Chicago, IL}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/OnlineAdSlottingWithCancellations.pdf}, + www_section = {Applications and E-Commerce}, +} + +constantin09 + +@inproceedings{constantin09, + title = {An Online Mechanism for Ad Slot Reservations with Cancellations}, + author = {Florin Constantin and Jon Feldman and S. Muthukrishnan and Martin Pal}, + booktitle = {Proc. ACM-SIAM Symposium on Discrete Algorithms (SODA'09)}, + year = {2009}, + pages = {1265--1274}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/soda09.pdf}, +} + +constantin_thesis09 + +@phdthesis{constantin_thesis09, + title = {Expressiveness and Optimization under Incentive Compatibility Constraints in + Dynamic Auctions}, + author = {G. Florin Constantin}, + school = {Computer Science}, + year = {2009}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/constantin_thesis09.pdf}, +} + +constantinec09 + +@inproceedings{constantinec09, + title = {{Self-Correcting Sampling-Based Dynamic Multi-Unit Auctions}}, + author = {Florin Constantin and David C. Parkes}, + booktitle = {10th ACM Electronic Commerce Conference (EC'09)}, + year = {2009}, + pages = {89--98}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/constantinec09.pdf}, +} + +corbo04a + +@inproceedings{corbo04a, + title = {Selfish Routing and Peering in the {Internet}}, + author = {Jacomo Corbo and Thomas Petermann}, + booktitle = {Santa Fe Inst. Complex Systems Summer School}, + year = {2004}, + month = {June}, + address = {Santa Fe, NM}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/CorboPetermann_Peering.pdf}, + www_section = {Networks, Systems and Economics}, +} + +corbo08 + +@phdthesis{corbo08, + title = {Multiparty Large-Scale Network Formation:Economic Models and Mechanisms}, + author = {Jacomo Corbo}, + school = {Computer Science, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/corbo_thesis.pdf}, +} + +corbo09 + +@inproceedings{corbo09, + title = {An Economically-Principled Generative Model of {AS} Graph Connectivity}, + author = {Jacomo Corbo and Shaili Jain and Michael Mitzenmacher and David C. Parkes}, + booktitle = {IEEE INFOCOM Mini-Conference}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/corbo09.pdf}, + www_section = {Networks, Systems and Economics}, +} + +cp-aaai08 + +@inproceedings{cp-aaai08, + title = {Efficient Metadeliberation Auctions}, + author = {Ruggiero Cavallo and David C. Parkes}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence (AAAI'08)}, + year = {2008}, + address = {Chicago, IL}, + pages = {50--56}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cp-aaai08.pdf}, + www_section = {Artificial Intelligence|Dynamic Mechanism Design}, +} + +cpsRobot + +@inproceedings{cpsRobot, + title = {Optimal Coordination of Loosely-Coupled Self-Interested Robots}, + author = {Ruggiero Cavallo and David C. Parkes and Satinder Singh}, + booktitle = {Workshop on Auction Mechanisms for Robot Coordination, AAAI'06}, + year = {2006}, + address = {Boston, MA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cps-aaai06-robot.pdf}, + www_section = {Artificial Intelligence|Dynamic Mechanism Design}, +} + +cpsUAI06 + +@inproceedings{cpsUAI06, + title = {Optimal Coordinated Planning Amongst Self-Interested Agents with Private State}, + author = {Ruggiero Cavallo and David C. Parkes and Satinder Singh}, + booktitle = {Proceedings of the 22nd Conference on Uncertainty in Artificial Intelligence + (UAI'06)}, + year = {2006}, + address = {Cambridge, MA}, + pages = {55--62}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cps-uai06.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +dash03 + +@article{dash03, + title = {Computational-Mechanism Design: {A} Call to Arms}, + author = {Rajdeep K Dash and Nicholas R. Jennings and David C. Parkes}, + journal = {IEEE Intelligent Systems}, + year = {2003}, + month = {November}, + pages = {40--47}, + note = {Special Issue on Agents and Markets}, + www_section = {Market Design|Edited Collections and Overview|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/call_to_arms.pdf}, +} + +davies05 + +@undergradthesis{davies05, + title = {Distributed {Generalized Vickrey Auctions} Based on the {Dantzig-Wolfeand + Benders} Decomposition Methods for {Linear Programs}}, + author = {Ryan Davies}, + school = {Applied mathematics, Harvard College}, + year = {2005}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/davies_thesis.pdf}, +} + +deMars_thesis + +@undergradthesis{deMars_thesis, + title = {Crowdsourcing Education: A Game-Theoretic Analysis of Contribution and Learning + inPeer to Peer Education Platforms}, + author = {Spencer de Mars}, + school = {Department of Applied Mathematics, Harvard College}, + year = {2013}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/deMars_thesis.pdf}, +} + +dong04 + +@inproceedings{dong04, + title = {{HarTAC-- The Harvard TAC SCM'03} Agent}, + author = {Rui Dong and Terry Tai and Wilfred Yeung and David C. Parkes}, + booktitle = {Proc. Second Workshop on Trading Agent Design and Analysis (TADA'04)}, + year = {2004}, + address = {New York, USA}, + pages = {1--8}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/tac03.pdf}, +} + +dong05 + +@undergradthesis{dong05, + title = {Combinatorial Clock Auction for Airport Time Slots: An Agent-Based Analysis}, + author = {Rui Dong}, + school = {Computer science and Economics, Harvard College}, + year = {2005}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/rui_thesis.pdf}, +} + +dss04 + +@book{dss04, + title = {Special Issue Dedicated to the Fourth ACM Conference on Electronic Commerce + (EC'03)}, + author = {David C. Parkes}, + series = {Decision Support Systems}, + volume = {39}, + number = {1}, + year = {2005}, + editor = {David C. Parkes}, + publisher = {Elsevier}, + www_section = {Edited Collections and Overview}, + www_html_url = {http://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%235878%232005%23999609998%23529481%23FLA%23&_cdi=5878&_pubType=J&view=c&_auth=y&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=737ccfebac4eed5c9e4adb8fc5107a15}, +} + +duetting_ec12_2 + +@inproceedings{duetting_ec12_2, + title = {{Payment Rules through Discriminant-Based Classifiers}}, + author = {Paul Duetting and Felix A. Fischer and Pichayut Jirapinyo and John K. Lai and + Benjamin Lubin and David C. Parkes}, + booktitle = {Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12)}, + year = {2012}, + pages = {477-494}, + www_section = {Mechanism Design|Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/duetting_ec12_2.pdf}, +} + +dutting_ec11 + +@inproceedings{dutting_ec11, + title = {{Simplicity-Expressiveness Tradeoffs in Mechanism Design}}, + author = {Paul Duetting and Felix A. Fischer and David C. Parkes}, + booktitle = {Proceedings of the 12th ACM Conference on Electronic Commerce (EC'11)}, + year = {2011}, + pages = {341-350}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/dutting_ec11.pdf}, +} + +dwu_thesis + +@undergradthesis{dwu_thesis, + title = {Move Ranking and Evaluation in the Game of Arimaa}, + author = {David Jian Wu}, + school = {Department of Computer Science, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/dwu_thesis.pdf}, +} + +ec07 + +@book{ec07, + title = {Proceedings 8th ACM Conference on Electronic Commerce (EC'07)}, + author = {Jeffrey K. MacKie-Mason and David C. Parkes and Paul Resnick}, + year = {2007}, + editor = {Jeffrey K. MacKie-Mason and David C. Parkes and Paul Resnick}, + publisher = {ACM}, + www_section = {Edited Collections and Overview}, + www_pdf_url = {http://portal.acm.org/toc.cfm?id=1250910&idx=SERIES958&type=proceeding&coll=ACM&dl=ACM&part=series&WantType=Proceedings&title=EC&CFID=28820055&CFTOKEN=54993442}, +} + +ec10Seuken + +@inproceedings{ec10Seuken, + title = {{Market Design and Analysis for a P2P Backup System}}, + author = {Sven Seuken and Denis Charles and Max Chickering and Sidd Puri}, + booktitle = {Proceedings of the ACM Conference on Electronic Commerence (EC'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ec10Seuken.pdf}, + www_section = {Networks, Systems and Economics|Market Design}, +} + +egg06 + +@inproceedings{egg06, + title = {Egg: {An} Extensible and Economics-Inspired Open Grid Computing Platform}, + author = {John Brunelle and Peter Hurst and John Huth and Laura Kang and Chaki Ng and + David C. Parkes and Margo Seltzer and Jim Shank and Saul Youssef}, + booktitle = {Proc. 3rd International Workshop on Grid Economics and Business Models + (GECON'06)}, + year = {2006}, + address = {Singapore}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/egg.pdf}, + www_section = {Networks, Systems and Economics}, +} + +faratin04 + +@book{faratin04, + title = {Agent Mediated Electronic Commerce {V}}, + author = {Peyman Faratin and David C. Parkes and Juan A. Rodriguez-Aguilar and William E + Walsh}, + series = {Lecture Notes in Artificial Intelligence}, + volume = {3048}, + year = {2004}, + editor = {Peyman Faratin and David C. Parkes and Juan A. Rodriguez-Aguilar and William E + Walsh}, + publisher = {Springer-Verlag}, + www_section = {Edited Collections and Overview}, + www_html_url = {http://www.springer.com/west/home/generic/search/results?SGWID=4-40109-22-35030179-0}, +} + +feigenbaum09 + +@article{feigenbaum09, + title = {Computational challenges in e-commerce}, + author = {Joan Feigenbaum and David C. Parkes and David M. Pennock}, + journal = {Communications of the ACM}, + volume = {52}, + year = {2009}, + pages = {70--74}, + www_section = {Edited Collections and Overview|Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jf_cacm.pdf}, +} + +feigenbaum_wine12 + +@inproceedings{feigenbaum_wine12, + title = {{An Economic Analysis of User-Privacy Options in Ad-Supported Services}}, + author = {Joan Feigenbaum and Michael Mitzenmacher and Georgios Zervas}, + booktitle = {Proceedings of the The 8th Workshop on Internet \& Network Economics + (WINE'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/feigenbaum_wine12.pdf}, + www_section = {Networks, Systems and Economics}, +} + +feldman_aamas12 + +@article{feldman_aamas12, + title = {{Stability Scores: Measuring Coalitional Stability. International Conference on + Autonomous Agents and Multiagent Systems}}, + author = {Michal Feldman and Reshef Meir and Moshe Tennenholtz}, + journal = {Proceedings of the 11th International Conference on Autonomous Agents and + Multi-Agent Systems}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/feldman_aamas12.pdf}, + www_section = {Artificial Intelligence}, +} + +feldman_sagt12 + +@inproceedings{feldman_sagt12, + title = {{Mechanisms and impossibilities for truthful, envy-free allocations}}, + author = {Michal Feldman and John Lai}, + booktitle = {Proceedings of the Symposium on Algorithmic Game Theory (SAGT'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/feldman_sagt12.pdf}, + www_section = {Networks, Systems and Economics}, +} + +feldman_sagt12_b + +@inproceedings{feldman_sagt12_b, + title = {{Capacitated Network Design Games}}, + author = {Michal Feldman and Tom Ron}, + booktitle = {Proceedings of the Symposium on Algorithmic Game Theory (SAGT'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/feldman_sagt12_b.pdf}, + www_section = {Networks, Systems and Economics}, +} + +feldman_wine12 + +@inproceedings{feldman_wine12, + title = {{Convergence of Best-Response Dynamics in Games with Conflicting Congestion + Effects}}, + author = {Michal Feldman and Tami Tamir}, + booktitle = {Proceedings of the The 8th Workshop on Internet \& Network Economics + (WINE'12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/feldman_wine12.pdf}, + www_section = {Networks, Systems and Economics}, +} + +ficici08 + +@inproceedings{ficici08, + title = {Learning and solving many-player games through a cluster-based representation}, + author = {Sevan Ficici and David C. Parkes and Avi Pfeffer}, + booktitle = {Proc. 24th Conference in Uncertainty in Artificial Intelligence (UAI'08)}, + year = {2008}, + pages = {187--195}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ficici08.pdf}, +} + +fong03 + +@undergradthesis{fong03, + title = {Multi-stage Information Acquisition in Auction Design}, + author = {Kyna Fong}, + school = {Applied mathematics and Economics, Harvard College}, + year = {2003}, + address = {Cambridge, MA}, + note = {{\bf Hoopes prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/fong.pdf}, +} + +freudiger09 + +@inproceedings{freudiger09, + title = {On Non-Cooperative Location Privacy: A Game-Theoretic Analysis}, + author = {Julien Freudiger and Mohammed Hossein Manshaei and Jean-Pierre Hubaux and David + C. Parkes}, + booktitle = {16th ACM Conference on Computer and Communications Security}, + year = {2009}, + pages = {324--337}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/freudiger.pdf}, +} + +friedman03 + +@inproceedings{friedman03, + title = {Pricing {WiFi} at {S}tarbucks-- {I}ssues in Online Mechanism Design}, + author = {Eric Friedman and David C. Parkes}, + booktitle = {Fourth ACM Conf. on Electronic Commerce (EC'03)}, + year = {2003}, + pages = {240--241}, + www_section = {Applications and E-Commerce|Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/pp042-friedman.pdf}, +} + +gao_wine10 + +@inproceedings{gao_wine10, + title = {{An Axiomatic Characterization of Continuous-Outcome Market Makers}}, + author = {Xi Alice Gao and Yiling Chen}, + booktitle = {6th Workshop on Internet and Network Economics (WINE'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/gao_wine10.pdf}, + www_section = {Market Design|Information Elicitation and Aggregation}, +} + +geb07 + +@book{geb07, + title = {Special issue Dedicated to the ACM Conference on Electronic Commerce (EC'07)}, + author = {David C. Parkes and Moshe Tennenholtz}, + series = {Games and Economic Behavior}, + year = {2009}, + editor = {David C. Parkes and Moshe Tennenholtz}, + publisher = {Elsevier}, + vol = {67}, + www_section = {Edited Collections and Overview}, +} + +gerding-aamas11 + +@inproceedings{gerding-aamas11, + title = {{Online mechanism design for electric vehicle charging}}, + author = {Enrico H. Gerding and Valentin Robu and Sebastian Stein and David C. Parkes and + Alex Rogers and Nicholas R. Jennings}, + booktitle = {Proceedings of the 10th International Conference on Autonomous Agents and + Multi-Agent Systems (AAMAS'11)}, + year = {2011}, + pages = {811-818}, + www_section = {Dynamic Mechanism Design|Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/gerding-aamas11.pdf}, +} + +hajiaghayi04 + +@inproceedings{hajiaghayi04, + title = {Adaptive Limited-Supply Online Auctions}, + author = {Mohammad T. Hajiaghayi and Robert Kleinberg and David C. Parkes}, + booktitle = {Proc. ACM Conf. on Electronic Commerce}, + year = {2004}, + pages = {71--80}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/hajiaghayi04.pdf}, +} + +hajiaghayi05 + +@inproceedings{hajiaghayi05, + title = {Online Auctions with Re-usable Goods}, + author = {Mohammad Hajiaghayi and Robert Kleinberg and Mohammad Mahdian and David + Parkes}, + booktitle = {Proc. 6th ACM Conf. on Electronic Commerce (EC'05)}, + year = {2005}, + pages = {165--174}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/f188-hajiaghayi.pdf}, +} + +harsha09 + +@article{harsha09, + title = {Strong Activity Rules for Iterative Combinatorial Auctions}, + author = {Pavithra Harsha and Cynthia Barnhart and David C. Parkes and Haoqi Zhang}, + journal = {Computers \& Operations Research}, + year = {2009}, + pages = {1271-1284}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/harsha09.pdf}, +} + +hedrick05 + +@undergradthesis{hedrick05, + title = {A Computational Model of the role of affect in decision-making: Learnability of + approach avoidance behaviors by simple agents}, + author = {Luke Hedrick}, + school = {Computer Science and Psychology, Harvard College}, + year = {2005}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, +} + +hotdep05 + +@inproceedings{hotdep05, + title = {Computational Risk Management for Building Highly Reliable Network Services}, + author = {Brent N. Chun and Philip Buonadonna and Chaki Ng}, + booktitle = {Proceedings of 1st Workshop on Hot Topics in System Dependability (HotDep)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/hotdep05.pdf}, + www_section = {Networks, Systems and Economics}, +} + +ito06 + +@inproceedings{ito06, + title = {Instantiating the Contingent Bids Model of Truthful Interdependent Value + Auctions}, + author = {Takayuki Ito and David C. Parkes}, + booktitle = {Proc. 5th International Joint Conference on Autonomous Agents and Multiagent + Systems (AAMAS'06)}, + year = {2006}, + pages = {1151--1158}, + note = {{\bf Best paper award}}, + www_section = {Mechanism Design|Market Design}, + www_pdf_url = {http://www.mta.nitech.ac.jp/~ito/papers/itota-aamas2006-interdependent.pdf}, +} + +jain-ec11 + +@inproceedings{jain-ec11, + title = {{Combinatorial Agency of Threshold Functions}}, + author = {Shaili Jain and David C. Parkes}, + booktitle = {Proceedings EC'11 Workshop on Social Computing and User Generated Content}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jain-ec11.pdf}, + www_section = {Social Computing and Incentives}, +} + +jain08 + +@inproceedings{jain08, + title = {A Game-Theoretic Analysis of Games with a Purpose}, + author = {Shaili Jain and David C. Parkes}, + booktitle = {4th International Workshop on Internet and Network Economics (WINE'08)}, + year = {2008}, + pages = {342--350}, + note = {Short paper}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jain08.pdf}, +} + +jainec09 + +@inproceedings{jainec09, + title = {{Designing Incentives for Online Question and Answers Forums}}, + author = {Shaili Jain and Yiling Chen and David C. Parkes}, + booktitle = {10th ACM Electronic Commerce Conference (EC'09)}, + year = {2009}, + pages = {129--138}, + www_section = {Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jainec09.pdf}, +} + +jhoon_thesis + +@undergradthesis{jhoon_thesis, + title = {RABID: Random Auctions for Bandwidth in Internet Devices}, + author = {Jeremy D. Hoon}, + school = {Department of Computer Science, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jhoon_thesis.pdf}, +} + +jin07 + +@inproceedings{jin07, + title = {Analysis of Bidding Networks in {eBay: Aggregate} Preference Identification + through Community Detection}, + author = {R. Kang-Xing Jin and David C. Parkes and Patrick J. Wolfe}, + booktitle = {Proc. AAAI Workshop on Plan, Activity and Intent Recognition (PAIR)}, + year = {2007}, + address = {Vancouver, Canada}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jin07.pdf}, + www_section = {Artificial Intelligence}, +} + +jirapinyo_thesis + +@undergradthesis{jirapinyo_thesis, + title = {Designing Incentive Compatible Payment Rules for Combinatorial Auctions with + Structural SVMs}, + author = {Pichayut Jirapinyo}, + school = {Department of Computer Science, Harvard College}, + year = {2011}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jirapinyo_thesis.pdf}, +} + +jjsun07 + +@undergradthesis{jjsun07, + title = {{The Role of Value of Information Based Meta-reasoning in Adaptive Sponsored + Search Auctions}}, + author = {Jimmy Sun}, + school = {Computer Science and Economics, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jsun-thesis.pdf}, +} + +juda04 + +@incollection{juda04, + title = {An Options-Based Method to Solve the Composability Problem in Sequential + Auctions}, + author = {Adam I. Juda and David C. Parkes}, + series = {Lecture Notes in Computer Science}, + booktitle = {Agent Mediated Electronic Commerce {VI}}, + number = {3435}, + year = {2006}, + publisher = {Springer Verlag}, + note = {Revised Papers from AAMAS Workskshop, New York NY (2004)}, + editors = {Peyman Faratin and Juan Rodriguez Aguilar}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/options_lnai.pdf}, + www_section = {Applications and E-Commerce|Dynamic Mechanism Design}, +} + +juda06 + +@inproceedings{juda06, + title = {The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution}, + author = {Adam I. Juda and David C. Parkes}, + booktitle = {Proc. 7th ACM Conf. on Electronic Commerce (EC'06)}, + year = {2006}, + pages = {180--189}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/seqAucEbay.pdf}, + www_section = {Applications and E-Commerce|Dynamic Mechanism Design}, +} + +juda07a + +@article{juda07a, + title = {An Options-Based Solution to the Sequential Auction Problem}, + author = {Adam I. Juda and David C. Parkes}, + journal = {Artificial Intelligence}, + volume = {173}, + year = {2009}, + pages = {876-899}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/juda09.pdf}, +} + +kalagnanam04 + +@incollection{kalagnanam04, + title = {Auctions, Bidding and Exchange Design}, + author = {Jayant R. Kalagnanam and David C. Parkes}, + series = {Int. Series in Operations Research and Management Science}, + booktitle = {Handbook of Quantitative Supply Chain Analysis: Modeling in the E-Business + Era}, + year = {2004}, + chapter = {5}, + editor = {David Simchi-Levi and S. David Wu and Max Shen}, + publisher = {Kluwer}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ehandbook.pdf}, + www_section = {Market Design|Edited Collections and Overview}, +} + +kang06 + +@inproceedings{kang06, + title = {Passive Verification of the Strategyproofness of Mechanisms in Open + Environments}, + author = {Laura Kang and David C. Parkes}, + booktitle = {Proc. Eighth International Conference on Electronic Commerce (ICEC'06)}, + year = {2006}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/verif3.pdf}, + www_section = {Networks, Systems and Economics|Mechanism Design}, +} + +kang07 + +@inproceedings{kang07, + title = {A Decentralized Auction Framework to Promote Efficient Resource Allocation in + Open Computational Grids}, + author = {Laura Kang and David C. Parkes}, + booktitle = {Proc. Joint Workshop on The Economics of Networked Systems and + Incentive-Based Computing (NetEcon-IBC)}, + year = {2007}, + address = {San Diego, CA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/netecon_kang.pdf}, + www_section = {Networks, Systems and Economics}, +} + +kang08 + +@phdthesis{kang08, + title = {Open Mechanism Design: {E}nsuring and Verifying the Strategyproofness of + Mechanisms in Open Environments}, + author = {Laura Kang}, + school = {Computer Science, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kang_thesis.pdf}, +} + +kash-wine10 + +@inproceedings{kash-wine10, + title = {{Impersonation Strategies in Auctions (Short Paper)}}, + author = {Ian A. Kash and David C. Parkes}, + booktitle = {Proceedings of the Sixth Workshop on Internet and Network Economics + (WINE'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kash-wine10.pdf}, + www_section = {Market Design}, +} + +kash_www12 + +@inproceedings{kash_www12, + title = {{Economics of BitTorrent Communities}}, + author = {Ian A. Kash and John K. Lai and Haoqi Zhang and Aviv Zohar}, + booktitle = {Proceedings of the ACM International World Wide Web Conference (WWW '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kash_www12.pdf}, + www_section = {Applications and E-Commerce|Market Design|Social Computing and + Incentives}, +} + +kim02 + +@undergradthesis{kim02, + title = {The Appeal of Randomness: Introducing a Social Commitment Policy Basedon + Probabilistic Determination}, + author = {Richard Kim}, + school = {Computer Science, Harvard College}, + year = {2002}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, +} + +klein-foser10 + +@inproceedings{klein-foser10, + title = {{Designing for incentives: better information sharing for better software + engineering}}, + author = {Mark Klein and Gabriel A. Moreno and David C. Parkes and Kurt Wallnau}, + booktitle = {Proceedings of the FSE/SDP workshop on Future of software engineering + research (FoSER '10)}, + year = {2010}, + pages = {195-199}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/klein-foser10.pdf}, +} + +klein08 + +@inproceedings{klein08, + title = {Handling interdependent values in an auction mechanism for bandwidth allocation + in tactical data networks}, + author = {Mark Klein and Gabriel A. Moreno and David C. Parkes and Daniel Plakosh and + Sven Seuken and Kurt C. Wallnau}, + booktitle = {Proc. ACM SIGCOMM 2008 Workshop on Economics of Networked Systems + (NetEcon'08)}, + year = {2008}, + pages = {73--78}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/klein08.pdf}, +} + +kmilkman_thesis.pdf + +@phdthesis{kmilkman_thesis.pdf, + title = {Studies of Intrapersonal Conflict and Its Implications}, + author = {Katherine L. Milkman}, + school = {Science, Technology and Management, Harvard University}, + year = {2009}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kmilkman_thesis.pdf}, +} + +kothari03 + +@inproceedings{kothari03, + title = {Approximately-Strategyproof and Tractable Multi-Unit Auctions}, + author = {Anshul Kothari and David C. Parkes and Subhash Suri}, + booktitle = {Fourth ACM Conf. on Electronic Commerce (EC'03)}, + year = {2003}, + pages = {166--175}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/p133-kothari.pdf}, +} + +kothari04 + +@article{kothari04, + title = {Approximately-Strategyproof and Tractable Multi-Unit Auctions}, + author = {Anshul Kothari and David C. Parkes and Subhash Suri}, + journal = {Decision Support Systems}, + volume = {39}, + year = {2005}, + pages = {105--121}, + note = {Special issue dedicated to the Fourth ACMConference on Electronic Commerce}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kothari_long.pdf}, +} + +krych03 + +@undergradthesis{krych03, + title = {Calculation and Analysis of {N}ash Equilibria of {V}ickrey-Based Payment Rules + for Combinatorial Exchanges}, + author = {David Krych}, + school = {Computer science, Harvard College}, + year = {2003}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/krych_Thesis.pdf}, +} + +lahaie04 + +@inproceedings{lahaie04, + title = {Applying Learning Algorithms to Preference Elicitation}, + author = {S\'{e}bastien Lahaie and David C. Parkes}, + booktitle = {Proceedings of the 5th ACM Conference on Electronic Commerce}, + year = {2004}, + month = {May}, + pages = {180--188}, + publisher = {ACM Press}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/p214-lahaie.pdf}, +} + +lahaie06 + +@inproceedings{lahaie06, + title = {An Analysis of Alternative Slot Auction Designs for Sponsored Search}, + author = {S\'{e}bastien Lahaie}, + booktitle = {Proc. 7th ACM Conference on Electronic Commerce (EC'06)}, + year = {2006}, + pages = {218--227}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/~slahaie/pubs/fp185-lahaie.pdf}, +} + +lahaie07 + +@phdthesis{lahaie07, + title = {A Modular Framework for Multi-Agent PreferenceElicitation}, + author = {S\'{e}bastien Lahaie}, + school = {Computer Science, Harvard University}, + year = {2007}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lahaie_thesis.pdf}, +} + +lahaie07a + +@inproceedings{lahaie07a, + title = {Revenue Analysis of a Family of Ranking Rules for Keyword Auctions}, + author = {S\'{e}bastien Lahaie and David Pennock}, + booktitle = {Proc. 8th ACM Conference on Electronic Commerce (EC'07)}, + year = {2007}, + pages = {50--56}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http:///www.eecs.harvard.edu/econcs/pubs/lahaie07.pdf}, +} + +lahaie08 + +@article{lahaie08, + title = {A Modular Framework for Iterative Combinatorial Auctions}, + author = {S\'{e}bastien Lahaie and David C. Parkes}, + journal = {SIGecom Exchanges}, + volume = {7.2}, + year = {2008}, + www_pdf_url = {http://www.sigecom.org/exchanges/volume_7/2/lahaie.pdf}, + www_section = {Edited Collections and Overview|Market Design}, +} + +lahaie08b + +@inproceedings{lahaie08b, + title = {An Expressive Auction Design for Online Display Advertising}, + author = {S\'{e}bastien Lahaie and David C. Parkes and David Pennock}, + booktitle = {23rd AAAI Conference on Artificial Intelligence}, + year = {2008}, + pages = {108--113}, + www_section = {Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lahaie_aaai08.pdf}, +} + +lahaie08c + +@inproceedings{lahaie08c, + title = {On the Communication Requirements of Verifying the {VCG} Outcome}, + author = {S\'{e}bastien Lahaie and David C. Parkes}, + booktitle = {ACM Conference on Electronic Commerce (EC'08)}, + year = {2008}, + pages = {108--113}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lahaie_ec08.pdf}, +} + +lahaie09 + +@inproceedings{lahaie09, + title = {Fair Package Assignment}, + author = {Sebastien Lahaie and David C. Parkes}, + booktitle = {Proc. First Conf. on Auctions, Market Mechanisms and TheirApplications + (AMMA'09)}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lahaie09.pdf}, + www_section = {Market Design}, +} + +lai05 + +@undergradthesis{lai05, + title = {Accelerated Implementations of the Ascending Proxy Auction}, + author = {John Lai}, + school = {Computer science and Mathematics, Harvard College}, + year = {2005}, + address = {Cambridge, MA}, + note = {{\bf Hoopes prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lai_thesis.pdf}, +} + +lai_ec12 + +@inproceedings{lai_ec12, + title = {{Monotone Branch-and-Bound Search for Restricted Combinatorial Auctions}}, + author = {John K. Lai and David C. Parkes}, + booktitle = {Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12)}, + year = {2012}, + pages = {705-722}, + www_section = {Mechanism Design|Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lai_ec12.pdf}, +} + +lai_thesis13 + +@phdthesis{lai_thesis13, + title = {Truthful and Fair Resource Allocation}, + author = {John K. Lai}, + school = {Computer Science}, + year = {2013}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lai_thesis13.pdf}, +} + +law_aaai11 + +@inproceedings{law_aaai11, + title = {{Towards Large-Scale Collaborative Planning: Answering High-Level Search Queries + Using Human Computation}}, + author = {Edith Law and Haoqi Zhang}, + booktitle = {Proceedings of the ACM Symposium on User Interface Software and Technology + (UIST '11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/law_aaai11.pdf}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, +} + +lubin07 + +@article{lubin07, + title = {{ICE: An Expressive Iterative Combinatorial Exchange}}, + author = {Benjamin Lubin and Adam I. Juda and Ruggiero Cavallo and S\'{e}bastien Lahaie + and Jeffrey Shneidman and David C. Parkes}, + journal = {Journal of Artificial Intelligence Research}, + volume = {33}, + year = {2008}, + pages = {33--77}, + www_section = {Market Design}, + www_pdf_url = {http://www.jair.org/media/2440/live-2440-4051-jair.pdf}, +} + +lubin09 + +@inproceedings{lubin09, + title = {{Expressive Power-Based Resource Allocation for Data Centers}}, + author = {Benjamin Lubin and David C. Parkes and Jeff Kephart and Rajarshi Das}, + booktitle = {Twenty-First International Joint Conference on Artificial Intelligence + (IJCAI'09)}, + year = {2009}, + pages = {1451--1456}, + www_section = {Applications and E-Commerce|Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lubin09.pdf}, +} + +lubin_UAI09 + +@inproceedings{lubin_UAI09, + title = {{Quantifying the Strategyproofness of Mechanisms via Metrics on Payoff + Distributions}}, + author = {Benjamin Lubin and David C. Parkes}, + booktitle = {25th Conference on Uncertainty in Artificial Intelligence}, + year = {2009}, + pages = {349--358}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/lubin_UAI09.pdf}, +} + +ma06 + +@undergradthesis{ma06, + title = {{Utility-Based Bandwidth Allocation and Link Scheduling inWireless Networks: + Linear Programming and Market-Oriented Approaches}}, + author = {Qicheng Ma}, + school = {Computer Science, Harvard College}, + year = {2006}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ma-thesis.pdf}, +} + +ma07 + +@inproceedings{ma07, + title = {A Utility-Based Approach to Bandwidth Allocation and Link Scheduling in Wireless + Networks}, + author = {Qicheng Ma and David C. Parkes and Matt Welsh}, + booktitle = {Proc. 1st. International Workshop on Agent Technology for Sensor Networks + (ATSN'07)}, + year = {2007}, + address = {Honolulu, Hawaii}, + www_pdf_url = {http://www.eecs.harvard.edu/~mdw/papers/utility-atsn07.pdf}, + www_section = {Networks, Systems and Economics}, +} + +mainland04 + +@inproceedings{mainland04, + title = {Using Virtual Markets to Program Global Behavior in Sensor Networks}, + author = {Geoffrey Mainland and Laura Kang and S\'{e}bastien Lahaie and David C. Parkes + and Matt Welsh}, + booktitle = {Proc. 11th ACM SIGOPS European Workshop}, + year = {2004}, + address = {Leuven, Belgium}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/macro04.pdf}, + www_section = {Networks, Systems and Economics}, +} + +mainland05 + +@inproceedings{mainland05, + title = {Adaptive Resource Allocation for Sensor Networks}, + author = {Geoffrey Mainland and David C. Parkes and Matt Welsh}, + booktitle = {Proc. 2nd USENIX/ACM Symposium on Networked Systems Design and + Implementation (NSDI'05)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sora-nsdi05.pdf}, + www_section = {Networks, Systems and Economics}, +} + +mao_hcomp12 + +@inproceedings{mao_hcomp12, + title = {{TurkServer: Enabling Synchronous and Longitudinal Online Experiments}}, + author = {Andrew Mao and Yiling Chen and Krzysztof Z. Gajos and David Parkes and Ariel D. + Procaccia and Haoqi Zhang}, + booktitle = {Proceedings of the Fourth Workshop on Human Computation (HCOMP-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mao_hcomp12.pdf}, + www_section = {Computational Social Choice}, +} + +mao_hcomp12_2 + +@inproceedings{mao_hcomp12_2, + title = {{Social Choice for Human Computation}}, + author = {Andrew Mao and Ariel D. Procaccia and Yiling Chen}, + booktitle = {Proceedings of the Fourth Workshop on Human Computation (HCOMP-12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mao_hcomp12_2.pdf}, + www_section = {Networks, Systems and Economics}, +} + +martin08 + +@phdthesis{martin08, + title = {Seeing the Forest for theTrees: Information Aggregation in Online + Decision-Making}, + author = {Jolie Martin}, + school = {Information, Technology and Management, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/martin_thesis.pdf}, +} + +martin_thesis + +@phdthesis{martin_thesis, + title = {Seeing the Forest for the Trees: Information Aggregation in Online + Decision-Making}, + author = {Jolie M. Martin}, + school = {Science, Technology and Management, Harvard University}, + year = {2009}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/martin_thesis.pdf}, +} + +michael04a + +@inproceedings{michael04a, + title = {Specifying and Monitoring Market Mechanisms using Rights and Obligations}, + author = {Loizos Michael and David C. Parkes and Avi Pfeffer}, + booktitle = {LNAI: Agent Mediated Electronic Commerce {VI}}, + year = {2006}, + editor = {P. Faratin and J.A. Rodriguez-Aguilar}, + publisher = {Springer-Verlag}, + note = {Revised Papers from AAMAS workshop, New York NY (2004)}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/rights_long.pdf}, + www_section = {Artificial Intelligence}, +} + +michael09 + +@article{michael09, + title = {Specifying and Monitoring Economic Environments using Rights and Obligations}, + author = {Loizos Michael and David C. Parkes and Avi Pfeffer}, + journal = {Autonomous Agents \& Multi-Agent Systems}, + volume = {20}, + year = {2009}, + pages = {158--197}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/loizos09.pdf}, +} + +milkman08 + +@article{milkman08, + title = {Testing a Purportedly More Learnable Auction Mechanism}, + author = {Katherine L. Milkman and James Burns and David C. Parkes and Greg Barron and + Kagan Tumer}, + journal = {Applied Economics Research Bulletin}, + volume = {Special Issue I}, + year = {2008}, + pages = {106--141}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/milkman08.pdf}, +} + +mirage + +@inproceedings{mirage, + title = {Mirage: A Microeconomic Resource Allocation System for SensorNet Testbeds}, + author = {Brent N. Chun and Philip Buonadonna and Alvin AuYoung and Chaki Ng and David C. + Parkes and Jeffrey Shneidman and Alex C. Snoeren and Amin Vahdat}, + booktitle = {Proceedings of 2nd IEEE Workshop on Embedded Networked Sensors (EmNetsII)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mirage.pdf}, + www_section = {Networks, Systems and Economics}, +} + +mishra06 + +@article{mishra06, + title = {Ascending Price {V}ickrey Auctions for General Valuations}, + author = {Debasis Mishra and David C. Parkes}, + journal = {Journal of Economic Theory}, + volume = {132}, + year = {2007}, + pages = {335--366}, + www_section = {Mechanism Design|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mishra_jet.pdf}, +} + +mishra07 + +@article{mishra07, + title = {Multi-Item {Vickrey-Dutch} Auctions}, + author = {Debasis Mishra and David C. Parkes}, + journal = {Games and Economic Behavior}, + volume = {66}, + year = {2009}, + pages = {326-347}, + www_section = {Mechanism Design|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mishra_geb.pdf}, +} + +ms04 + +@book{ms04, + title = {Special Issue on Electronic Markets}, + author = {Anand Anandalingam and Jayant R. Kalagnanam and David C. Parkes and Michael + Rothkopf and Tuomas Sandholm}, + series = {Management Science}, + volume = {51}, + number = {3}, + year = {2005}, + editor = {Anand Anandalingam and Jayant R. Kalagnanam and David C. Parkes and Michael + Rothkopf and Tuomas Sandholm}, + publisher = {INFORMS}, + www_section = {Edited Collections and Overview}, + www_html_url = {http://mansci.journal.informs.org/content/vol51/issue3/index.dtl}, +} + +nagurney07 + +@article{nagurney07, + title = {{The Internet, Evolutionary Variational Inequalities, and the Time-Dependent + Braess Paradox}}, + author = {Anna Nagurney and David C. Parkes and Patrizia Daniele}, + journal = {Computational Management Science}, + volume = {4}, + year = {2007}, + pages = {355--375}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/cms.pdf}, +} + +naim04 + +@undergradthesis{naim04, + title = {Consensus Mechanisms: {A}nytime Strategyproof Mechanisms for Combinatorial + Auctions}, + author = {Ed Naim}, + school = {Computer science, Harvard College}, + year = {2004}, + month = {April}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/naim-thesis.pdf}, +} + +ng02 + +@techreport{ng02, + title = {{Virtual Worlds: Fast and Strategyproof Auctions for Dynamic Resource + Allocation}}, + author = {Chaki Ng and David C. Parkes and Margo Seltzer}, + institution = {Harvard University}, + year = {2002}, + www_section = {Networks, Systems and Economics|Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/virtual_long.pdf}, +} + +ng03 + +@inproceedings{ng03, + title = {{Virtual Worlds: Fast and Strategyproof Auctions for Dynamic Resource + Allocation}}, + author = {Chaki Ng and David C. Parkes and Margo Seltzer}, + booktitle = {Fourth ACM Conf. on Electronic Commerce (EC'03)}, + year = {2003}, + pages = {238--239}, + note = {Short paper}, + www_section = {Networks, Systems and Economics|Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/virtual_short.pdf}, +} + +ng03a + +@inproceedings{ng03a, + title = {{Strategyproof Computing: S}ystems Infrastructures for Self-Interested Parties}, + author = {Chaki Ng and David C. Parkes and Margo Seltzer}, + booktitle = {1st Workshop on Economics of Peer-to-Peer Systems}, + year = {2003}, + month = {June}, + address = {Berkeley, CA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/spc.pdf}, + www_section = {Networks, Systems and Economics}, +} + +noronha_uist11 + +@inproceedings{noronha_uist11, + title = {{PlateMate: Crowdsourcing Nutrition Analysis from Food Photographs}}, + author = {Jon Noronha and Eric Hysen and Haoqi Zhang and Krzysztof Z. Gajos}, + booktitle = {Proceedings of the ACM Symposium on User Interface Software and Technology + (UIST '11)}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/noronha_uist11.pdf}, + www_section = {Applications and E-Commerce|Market Design|Social Computing and + Incentives}, +} + +ong09 + +@inproceedings{ong09, + title = {Fairness with an Honest Minority and a Rational Majority}, + author = {Shien Jin Ong and David C. Parkes and Alon Rosen and Salil Vadhan}, + booktitle = {Sixth Theory of Cryptography Conference (TCC'09)}, + volume = {5444}, + year = {2009}, + pages = {36-53}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://www.eecs.harvard.edu/~alon/PAPERS/OPRV/OPRV09.pdf}, +} + +othman07 + +@undergradthesis{othman07, + title = {{The Dancer and the Dance: Agents, Beliefs and Actions in Prediction Markets}}, + author = {Abe Othman}, + school = {Applied Mathematics and Economics, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/abe-thesis.pdf}, +} + +p100-parkes + +@article{p100-parkes, + title = {{Technical Perspective: Complex Financial Products: Caveat Emptor}}, + author = {David C. Parkes}, + journal = {Communications of the ACM}, + volume = {54}, + year = {2011}, + pages = {100}, + no. = {5}, + www_section = {Applications and E-Commerce|Edited Collections and Overview}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/p100-parkes.pdf}, +} + +p2pecon05 + +@inproceedings{p2pecon05, + title = {Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator}, + author = {Chaki Ng and Philip Buonadonna and Brent N. Chun and Alex C. Snoeren and Amin + Vahdat}, + booktitle = {Proceedings of 3rd Workshop on the Economics of Peer to Peer Systems + (p2pecon)}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/p2pecon05.pdf}, + www_section = {Networks, Systems and Economics}, +} + +padget02 + +@book{padget02, + title = {Agent Mediated Electronic Commerce {IV}: Designing Mechanisms and Systems, AAMAS + 2002 Workshop}, + author = {Julian A. Padget and David C. Parkes and Norman M. Sadeh and Onn Shehory and + William E. Walsh}, + series = {Lecture Notes in Artificial Intelligence}, + volume = {2531}, + year = {2002}, + editor = {Julian A. Padget and David C. Parkes and Norman M. Sadeh and Onn Shehory and + William E. Walsh}, + publisher = {Springer-Verlag}, + www_section = {Edited Collections and Overview}, + www_html_url = {http://www.springer.com/west/home/generic/search/results?SGWID=4-40109-22-2244570-0}, +} + +parashkevov06 + +@undergradthesis{parashkevov06, + title = {{Joint Action Learners in Competitive Stochastic Games}}, + author = {Ivo Parashkevov}, + school = {Computer Science, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ivo-thesis.pdf}, +} + +parkes-aimag + +@article{parkes-aimag, + title = {{Dynamic Incentive Mechanisms}}, + author = {David C. Parkes and Ruggiero Cavallo and Florin Constantin and Satinder Singh}, + journal = {Artificial Intelligence Magazine}, + volume = {31}, + year = {2010}, + pages = {79-94}, + www_section = {Dynamic Mechanism Design|Edited Collections and Overview}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/parkes-aimag.pdf}, +} + +parkes00 + +@inproceedings{parkes00, + title = {Iterative Combinatorial Auctions: {T}heory and Practice}, + author = {David C. Parkes and Lyle H. Ungar}, + booktitle = {Proc. 17th National Conference on Artificial Intelligence (AAAI'00)}, + year = {2000}, + pages = {74--81}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ibundle00.pdf}, +} + +parkes00a + +@inproceedings{parkes00a, + title = {Preventing Strategic Manipulation in Iterative Auctions: {P}roxy Agents and + Price-Adjustment}, + author = {David C. Parkes and Lyle H. Ungar}, + booktitle = {Proc. 17th National Conference on Artificial Intelligence (AAAI'00)}, + year = {2000}, + pages = {82--89}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/iGVA00.pdf}, +} + +parkes01 + +@inproceedings{parkes01, + title = {Achieving Budget-Balance with {V}ickrey-Based Payment Schemes in Exchanges}, + author = {David C. Parkes and Jayant R. Kalagnanam and Marta Eso}, + booktitle = {Proc. 17th International Joint Conference on Artificial Intelligence + (IJCAI'01)}, + year = {2001}, + pages = {1161--1168}, + www_section = {Market Design|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/combexch01.pdf}, +} + +parkes01a + +@inproceedings{parkes01a, + title = {An Auction-Based Method for Decentralized Train Scheduling}, + author = {David C. Parkes and Lyle H. Ungar}, + booktitle = {Proc. 5th International Conference on Autonomous Agents ({AGENTS}-01)}, + year = {2001}, + pages = {43--50}, + www_section = {Applications and E-Commerce|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/trains01.pdf}, +} + +parkes01b + +@phdthesis{parkes01b, + title = {Iterative Combinatorial Auctions: Achieving Economic and Computational + Efficiency}, + author = {David C. Parkes}, + school = {Department of Computer and Information Science, University of Pennsylvania}, + year = {2001}, + month = {May}, + www_section = {PhD and Senior Theses}, + www_html_url = {http://www.eecs.harvard.edu/~parkes/diss.html}, +} + +parkes01bb + +@inproceedings{parkes01bb, + title = {{Approximate and Compensate: A} method for risk-sensitive meta-deliberation and + continual computation}, + author = {David C. Parkes and Lloyd Greenwald}, + booktitle = {Proc. AAAI Fall Symposium on Using Uncertainty within Computation}, + year = {2001}, + address = {North Falmouth, USA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/approxcomp.pdf}, + www_section = {Artificial Intelligence}, +} + +parkes01c + +@article{parkes01c, + title = {Multiagent Cooperative Search for Portfolio Selection}, + author = {David C. Parkes and Bernardo A Huberman}, + journal = {Games and Economic Behavior}, + volume = {35}, + year = {2001}, + pages = {124--165}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/gebfinal.pdf}, +} + +parkes01e + +@inproceedings{parkes01e, + title = {An Iterative Generalized {V}ickrey Auction: Strategy-Proofness without Complete + Revelation}, + author = {David C. Parkes}, + booktitle = {Proc. AAAI Spring Symposium on Game Theoretic and Decision Theoretic + Agents}, + year = {2001}, + month = {March}, + pages = {78--87}, + publisher = {AAAI Press}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ivickrey01.pdf}, +} + +parkes01h + +@techreport{parkes01h, + title = {Achieving Budget-Balance with Vickrey-Based Payment Schemes in Combinatorial + Exchanges}, + author = {David C. Parkes and Jayant R. Kalagnanam and Marta Eso}, + institution = {IBM Research Report RC 22218}, + year = {2001}, + note = {Updated, March 2002}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/combexch.pdf}, +} + +parkes02 + +@inproceedings{parkes02, + title = {An Ascending-Price Generalized {V}ickrey Auction}, + author = {David C. Parkes and Lyle H. Ungar}, + booktitle = {Proc. Stanford Institute for Theoretical Economics Workshop on The Economics + of the Internet}, + year = {2002}, + address = {Stanford, CA}, + www_section = {Market Design}, +} + +parkes02a + +@incollection{parkes02a, + title = {Price-Based Information Certificates for Minimal-Revelation Combinatorial + Auctions}, + author = {David C. Parkes}, + booktitle = {Agent Mediated Electronic Commerce {IV}: Designing Mechanisms and Systems + (LNAI 2531)}, + year = {2002}, + pages = {103--122}, + editor = {J. Padget and D. Parkes and N.Sadeh and O.Shehory and W.Walsh}, + publisher = {Springer-Verlag}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/certificates.pdf}, +} + +parkes02p + +@techreport{parkes02p, + title = {On Indirect and Direct Implementations of Core Outcomes in Combinatorial + Auctions}, + author = {David C. Parkes}, + institution = {Harvard University}, + year = {2002}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/T3.pdf}, +} + +parkes02yy + +@inproceedings{parkes02yy, + title = {Challenge Problem: {Agent-Mediated Decentralized Information Mechanisms}}, + author = {David C. Parkes}, + booktitle = {Proc. AAMAS'02 Workshop on AgentCities: Challenges in Open Agent + Environments}, + year = {2002}, + address = {Bologna, Italy}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/agentcities.pdf}, + www_section = {Artificial Intelligence|Edited Collections and Overview|Social Computing + and Incentives}, +} + +parkes03a + +@inproceedings{parkes03a, + title = {Five {AI} Challenges in {Strategyproof Computing}}, + author = {David C. Parkes}, + booktitle = {Proc. IJCAI'03 Workshop on Autonomic Computing}, + year = {2003}, + address = {Aculpulco, Mexico}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ai_challenges.pdf}, + www_section = {Artificial Intelligence|Edited Collections and Overview|Networks, Systems + and Economics}, +} + +parkes03c + +@inproceedings{parkes03c, + title = {An {MDP-B}ased Approach to {Online Mechanism Design}}, + author = {David C. Parkes and Satinder Singh}, + booktitle = {Proc. 17th Annual Conf. on Neural Information Processing Systems (NIPS'03)}, + year = {2003}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mdp_omd03.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +parkes03d + +@article{parkes03d, + title = {{Models for Iterative Multiattribute Procurement Auctions}}, + author = {David C. Parkes and Jayant R. Kalagnanam}, + journal = {Management Science}, + volume = {51}, + year = {2005}, + pages = {435--451}, + note = {Special Issue on Electronic Markets}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/map.pdf}, +} + +parkes03e + +@incollection{parkes03e, + title = {Iterative Combinatorial Auctions}, + author = {David C. Parkes}, + booktitle = {Combinatorial Auctions}, + year = {2006}, + chapter = {2}, + editor = {Peter Cramton and Yoav Shoham and Richard Steinberg}, + publisher = {MIT Press}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/icas.pdf}, + www_section = {Market Design}, +} + +parkes03e1 + +@incollection{parkes03e1, + title = {Iterative Combinatorial Auctions}, + author = {David C. Parkes}, + booktitle = {Combinatorial Auctions}, + year = {2006}, + chapter = {2}, + editor = {Peter Cramton and Yoav Shoham and Richard Steinberg}, + publisher = {MIT Press}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/icas.pdf}, + www_section = {Edited Collections and Overview}, +} + +parkes03f + +@incollection{parkes03f, + title = {On Learnable Mechanism Design}, + author = {David C. Parkes}, + booktitle = {Collectives and the Design of Complex Systems}, + year = {2004}, + pages = {107--131}, + editor = {Kagan Tumer and David Wolpert}, + publisher = {Springer-Verlag}, + www_section = {Artificial Intelligence|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/coin.pdf}, +} + +parkes04 + +@inproceedings{parkes04, + title = {Distributed Implementations of {Vickrey-Clarke-Groves} Mechanisms}, + author = {David C. Parkes and Jeffrey Shneidman}, + booktitle = {Proc. 3rd Int. Joint Conf. on Autonomous Agents and Multi Agent Systems}, + year = {2004}, + pages = {261--268}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/distr_vcg.pdf}, +} + +parkes04a + +@inproceedings{parkes04a, + title = {Approximately Efficient Online Mechanism Design}, + author = {David C. Parkes and Satinder Singh and Dimah Yanovsky}, + booktitle = {Proc. 18th Annual Conf. on Neural Information Processing Systems (NIPS'04)}, + year = {2004}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/mdp_omd04.pdf}, + www_section = {Dynamic Mechanism Design}, +} + +parkes04c + +@article{parkes04c, + title = {Auction Design with Costly Preference Elicitation}, + author = {David C. Parkes}, + journal = {Annals of Mathematics and AI}, + volume = {44}, + year = {2005}, + pages = {269--302}, + note = {Special Issue on the Foundations of Electronic Commerce}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/costlyprefs.pdf}, +} + +parkes05ice + +@inproceedings{parkes05ice, + title = {{ICE}: An Iterative Combinatorial Exchange}, + author = {David C. Parkes and Ruggiero Cavallo and Nick Elprin and Adam I. Juda and + Sebastien Lahaie and Benjamin Lubin and Loizos Michael and Jeffrey Shneidman and + Hassan Sultan}, + booktitle = {Proc. 6th ACM Conf. on Electronic Commerce (EC'05)}, + year = {2005}, + pages = {249--258}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ice.pdf}, +} + +parkes06 + +@inproceedings{parkes06, + title = {Practical secrecy-preserving, verifiably correct and trustworthy auctions}, + author = {David C. Parkes and Michael O. Rabin and Stuart M. Shieber and Christopher + Thorpe}, + booktitle = {Proc. 8th International Conferenceon Electronic Commerce (ICEC'06)}, + year = {2006}, + pages = {70--81}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://portal.acm.org/citation.cfm?id=1151454.1151478&coll=portal&dl=ACM&CFID=15151515&CFTOKEN=6184618}, +} + +parkes07 + +@inproceedings{parkes07, + title = {An Ironing-Based Approach to Adaptive Online Mechanism Design in Single-Valued + Domains}, + author = {David C. Parkes and Quang Duong}, + booktitle = {Proc. 22nd National Conference on Artificial Intelligence (AAAI'07)}, + year = {2007}, + pages = {94--101}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/aaai07.pdf}, +} + +parkes07a + +@incollection{parkes07a, + title = {Online Mechanisms}, + author = {David C. Parkes}, + booktitle = {Algorithmic Game Theory}, + year = {2007}, + chapter = {16}, + pages = {411--439}, + editor = {Noam Nisan and Tim Roughgarden and Eva Tardos and Vijay Vazirani}, + publisher = {Cambridge University Press}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/online07.pdf}, +} + +parkes08 + +@incollection{parkes08, + title = {Computational Mechanism Design}, + author = {David C. Parkes}, + booktitle = {Lecture notes of Tutorials at 10th Conf. on Theoretical Aspectsof + Rationality and Knowledge (TARK'05)}, + year = {2008}, + publisher = {Institute of Mathematical Sciences, University of Singapore}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/tark08.pdf}, + www_section = {Mechanism Design|Edited Collections and Overview}, +} + +parkes09 + +@incollection{parkes09, + title = {When Analysis Fails: Heuristic Mechanism Design via Self-Correcting Procedures}, + author = {David C. Parkes}, + booktitle = {Proc. 35th International Conference on Current Trends in Theory and Practice + of Computer Science (SOFSEM'09)}, + year = {2009}, + pages = {62--66}, + www_section = {Edited Collections and Overview|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sofsem09.pdf}, +} + +parkes10 + +@inproceedings{parkes10, + title = {{Promoting Sustainability: Exploring the Role of Expressive, Indirect, and + Hidden Markets}}, + author = { David C. Parkes}, + booktitle = {2nd International Conference on Computational Sustainability (CompSust'10)}, + year = {2010}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/parkes10.pdf}, + www_section = {Edited Collections and Overview|Social Computing and + Incentives|Applications and E-Commerce}, +} + +parkes97 + +@techreport{parkes97, + title = {Bouded Rationality}, + author = {David C. Parkes}, + institution = {University of Pennsylvania}, + year = {1997}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/bounded.pdf}, +} + +parkes97a + +@inproceedings{parkes97a, + title = {Learning and Adaption in Multiagent Systems}, + author = {David C. Parkes and Lyle H. Ungar}, + booktitle = {Proc. AAAI'97 Multiagent Learning Workshop}, + year = {1997}, + address = {Providence, USA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/learning.pdf}, + www_section = {Artificial Intelligence}, +} + +parkes98 + +@inproceedings{parkes98, + title = {Cooperative Multiagent Search for Portfolio Selection}, + author = {David C. Parkes and Bernardo A Huberman}, + booktitle = {Proc. AGENTS Workshop on Artificial Societies and Computational Markets}, + year = {1998}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ascma.pdf}, + www_section = {Artificial Intelligence}, +} + +parkes99 + +@inproceedings{parkes99, + title = {Optimal Auction Design for Agents with Hard Valuation Problems}, + author = {David C. Parkes}, + booktitle = {Proc. IJCAI-99 Workshop on Agent Mediated Electronic Commerce}, + year = {1999}, + month = {July}, + address = {Stockholm, Sweden}, + pages = {206--219}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/springer-valuation.pdf}, +} + +parkes99b + +@incollection{parkes99b, + title = {Accounting for cognitive costs in on-line auction design}, + author = {David C. Parkes and Lyle H. Ungar and Dean P. Foster}, + booktitle = {Agent Mediated Electronic Commerce (LNAI 1571)}, + year = {1999}, + pages = {25--40}, + editor = {P Noriega and C Sierra}, + publisher = {Springer-Verlag}, + www_section = {Artificial Intelligence|Applications and E-Commerce|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/on-line-auctions.pdf}, +} + +parkes99d + +@inproceedings{parkes99d, + title = {{{\em i}Bundle}: An Efficient Ascending Price Bundle Auction}, + author = {David C. Parkes}, + booktitle = {Proc. 1st ACM Conf. on Electronic Commerce (EC'99)}, + year = {1999}, + pages = {148--157}, + www_section = {Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ibundle.pdf}, +} + +petcu06 + +@inproceedings{petcu06, + title = {{MDPOP: Faithful} Distributed Implementation of Efficient Social Choice + Problems}, + author = {Adrian Petcu and Boi Faltings and David C. Parkes}, + booktitle = {Proc. 5th International Joint Conference on Autonomous Agents and Multiagent + Systems (AAMAS'06)}, + year = {2006}, + pages = {1397--1404}, + www_section = {Artificial Intelligence|Computational Social Choice|Mechanism Design}, + www_pdf_url = {http://liawww.epfl.ch/Publications/Archive/Petcu2006b.pdf}, +} + +petcu08 + +@article{petcu08, + title = {{M-DPOP: Faithful Distributed Implementations of Efficient Social Choice + Problems}}, + author = {Adrian Petcu and Boi Faltings and David C. Parkes}, + journal = {Journal of Artificial Intelligence Research}, + volume = {32}, + year = {2008}, + pages = {705--755}, + www_section = {Artificial Intelligence|Computational Social Choice|Mechanism Design}, + www_pdf_url = {http://www.jair.org/media/2500/live-2500-3967-jair.pdf}, +} + +procaccia_aimag10 + +@article{procaccia_aimag10, + title = {{AI's War on Manipulation: Are We Winning?}}, + author = {Piotr Faliszewski and Ariel D. Procaccia}, + journal = {Artificial Intelligence Magazine}, + volume = {31}, + year = {2010}, + pages = {53--64}, + no. = {4}, + www_section = {Computational Social Choice|Edited Collections and Overview}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/procaccia_aimag10.pdf}, +} + +qduong07 + +@undergradthesis{qduong07, + title = {{Adaptive Online Mechanism Design in Single-Valued Domains: An Ironing + Approach}}, + author = {Quang Duong}, + school = {Computer Science and Economics, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, +} + +rjin06 + +@undergradthesis{rjin06, + title = {{Leveraging Bidder Behavior to Identify Categories ofSubstitutable and + Complementary Goods on eBay}}, + author = {R. Kang-Xing Jin}, + school = {Computer Science, Harvard College}, + year = {2006}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/kangxing-thesis.pdf}, +} + +robu_amma2011 + +@inproceedings{robu_amma2011, + title = {{An Online Mechanism for Multi-Speed Electric Vehicle Charging}}, + author = {Valentin Robu and Sebastian Stein and Enrico H. Gerding and David C. Parkes and + Alex Rogers and Nicholas R. Jennings}, + booktitle = {Proceedings of the Second Conference on Auctions, Market Mechanisms and + Their Applications (AMMA)}, + year = {2011}, + pages = {100-112}, + www_section = {Dynamic Mechanism Design|Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/robu_amma2011.pdf}, +} + +sandholm05 + +@inproceedings{sandholm05, + title = {Optimize-and-Dispatch Architecture for Expressive Ad Auctions}, + author = {David C. Parkes and Tuomas Sandholm}, + booktitle = {Proceedings of First Workshop on Sponsored Search Auctions}, + year = {2005}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sandholm.pdf}, + location = {Vancouver, Canada}, + www_section = {Applications and E-Commerce}, +} + +sanghvi04 + +@techreport{sanghvi04, + title = {Hard-to-Manipulate Combinatorial Auctions}, + author = {Saurabh Sanghvi and David C. Parkes}, + institution = {Harvard University}, + year = {2004}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/hard_to_manipulate.pdf}, +} + +sanghvi06 + +@undergradthesis{sanghvi06, + title = {{An Online, Budget-Constrained Truthful Mechanism}}, + author = {Aditya Sanghvi}, + school = {Computer Science and Economics, Harvard College}, + year = {2006}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, +} + +schoenebeck04 + +@inproceedings{schoenebeck04, + title = {{GrowRange: Anytime VCG-Based Mechanisms}}, + author = {David C. Parkes and Grant Schoenebeck}, + booktitle = {Proc. 19th National Conference on Artificial Intelligence (AAAI'04)}, + year = {2004}, + pages = {34--41}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/anytime.pdf}, +} + +schultin07 + +@undergradthesis{schultin07, + title = {{Economic Approaches to Hierarchical Reinforcement Learning}}, + author = {Erik Schultink}, + school = {Computer Science, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, +} + +schultink08 + +@inproceedings{schultink08, + title = {Economic hierarchical {Q}-learning}, + author = {Erik Schultink and Ruggiero Cavallo and David C. Parkes}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence (AAAI'08)}, + year = {2008}, + pages = {689--695}, + www_section = {Artificial Intelligence}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/schultink08.pdf}, +} + +seuken08 + +@inproceedings{seuken08, + title = {Partially synchronized {DEC-MDP}s in Dynamic Mechanism Design}, + author = {Sven Seuken and Ruggiero Cavallo and David C. Parkes}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence(AAAI'08)}, + year = {2008}, + pages = {162--169}, + www_section = {Artificial Intelligence|Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/seuken08.pdf}, +} + +shain_kdd_09 + +@inproceedings{shain_kdd_09, + title = {{The Role of Game Theory in Human Computation Systems}}, + author = {Shaili Jain and David Parkes}, + booktitle = {Human Computation Workshop (KDD-HCOMP'09)}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/shain_kdd_09.pdf}, + www_section = {Social Computing and Incentives}, +} + +shnayder_netecon12 + +@inproceedings{shnayder_netecon12, + title = {{Truthful Prioritization Schemes for Spectrum Sharing}}, + author = {Victor Shnayder and Jeremy Hoon and David Parkes and Vikas Kawadia}, + booktitle = {Proceedings of the Seventh Workshop on the Economics of Networks, Systems + and Computation (NetEcon'12)}, + year = {2012}, + pages = {196-201}, + www_section = {Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/shnayder_netecon12.pdf}, +} + +shneidman03 + +@inproceedings{shneidman03, + title = {Rationality and Self-Interest in Peer to Peer Networks}, + author = {Jeffrey Shneidman and David C. Parkes}, + booktitle = {2nd Int. Workshop on Peer-to-Peer Systems (IPTPS'03)}, + year = {2003}, + pages = {139--148}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/shneidmanparkes_iptps.pdf}, +} + +shneidman03a + +@inproceedings{shneidman03a, + title = {Using Redundancy to Improve Robustness of Distributed Mechanism + Implementations}, + author = {Jeffrey Shneidman and David C. Parkes}, + booktitle = {Fourth ACM Conf. on Electronic Commerce (EC'03)}, + year = {2003}, + pages = {276--277}, + note = {Short paper}, + www_section = {Networks, Systems and Economics}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/pp068-shneidman.pdf}, +} + +shneidman04 + +@inproceedings{shneidman04, + title = {Specification Faithfulness in Networks with Rational Nodes}, + author = {Jeffrey Shneidman and David C. Parkes}, + booktitle = {Proc. 23rd ACM Symp. on Principles of Distributed Computing (PODC'04)}, + year = {2004}, + address = {St. John's, Canada}, + pages = {88-97}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/podc04.pdf}, + www_section = {Mechanism Design|Networks, Systems and Economics}, +} + +shneidman04a + +@inproceedings{shneidman04a, + title = {Faithfulness in {Internet} Algorithms}, + author = {Jeffrey Shneidman and David C. Parkes and Laurent Massoulie}, + booktitle = {Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory + in Networked Systems (PINS'04)}, + year = {2004}, + address = {Portland, USA}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/pins04.pdf}, + www_section = {Networks, Systems and Economics}, +} + +shneidman05 + +@inproceedings{shneidman05, + title = {Why Markets Could (But Don't Currently) Solve Resource Allocation Problems in + Systems}, + author = {Jeffrey Shneidman and Chaki Ng and David C. Parkes and Alvin AuYoung and Alex + C. Snoeren and Amin Vahdat and Brent Chun}, + booktitle = {Proc. 10th Workshop on Hot Topics in Operating Systems (HotOS-X)}, + year = {2005}, + address = {Santa Fe, NM}, + www_pdf_url = {http://www.eecs.harvard.edu/~jeffsh/pubs/hotos05/05hotos.pdf}, + www_section = {Networks, Systems and Economics}, +} + +shneidman08 + +@phdthesis{shneidman08, + title = {Rational Failure in Distributed Systems}, + author = {Jeffrey Shneidman}, + school = {Computer Science, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/shneidman_thesis.pdf}, +} + +shneidman_thesis + +@phdthesis{shneidman_thesis, + title = {Rationally Motivated Failure in Distributed Systems}, + author = {Jeffrey A. Shneidman}, + school = {Computer Science}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/shneidman_thesis.pdf}, +} + +sunderam03 + +@inproceedings{sunderam03, + title = {Preference Elicitation in Proxied Multiattribute Auctions}, + author = {Aditya V. Sunderam and David C. Parkes}, + booktitle = {Fourth ACM Conf. on Electronic Commerce (EC'03)}, + year = {2003}, + pages = {214--215}, + www_section = {Artificial Intelligence|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/pp024-sunderam.pdf}, +} + +tang08 + +@undergradthesis{tang08, + title = {{Informativeness and Incentive-Compatability for Reputation Systems}}, + author = {Jie Tang}, + school = {Computer Science and Economics, Harvard College}, + year = {2008}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/jt_thesis.pdf}, +} + +thorpe07 + +@article{thorpe07, + title = {Practical Secrecy-Preserving, Verifiably Correct and Trustworthy Auctions}, + author = {David C. Parkes and Michael O. Rabin and Stuart M. Shieber and Christopher + Thorpe}, + journal = {Electronic Commerce Research and Applications}, + volume = {7}, + year = {2007}, + pages = {294--312}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/ecra07.pdf}, +} + +thorpe08 + +@phdthesis{thorpe08, + title = {Provably Correct, Secrecy Preserving Computationand its Applications in Auctions + and Securities Exchanges}, + author = {Christopher Thorpe}, + school = {Computer Science, Harvard University}, + year = {2008}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/thorpe_thesis.pdf}, +} + +thorpe09 + +@inproceedings{thorpe09, + title = {Cryptographic Combinatorial Securities Exchanges}, + author = {Christopher Thorpe and David C. Parkes}, + booktitle = {Financial Cryptography and Data Security (FC'09)}, + year = {2009}, + pages = {285--304}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/thorpe09.pdf}, +} + +thorpe09a + +@inproceedings{thorpe09a, + title = {Cryptographic Combinatorial Clock-Proxy Auctions}, + author = {David C. Parkes and Michael O. Rabin and Christopher Thorpe}, + booktitle = {Financial Cryptography and Data Security (FC'09)}, + year = {2009}, + pages = {305--324}, + www_section = {Cryptographic Methods}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/fc_ccpa.pdf}, +} + +toulis-ec11 + +@inproceedings{toulis-ec11, + title = {{A Random Graph Model of Kidney Exchanges: Efficiency, Individual-Rationality + and Incentives}}, + author = {Panos Toulis and David C. Parkes}, + booktitle = {Proceedings of the 12th ACM Conference on Electronic Commerce (EC'11)}, + year = {2011}, + pages = {323-332}, + www_section = {Applications and E-Commerce|Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/toulis-ec11.pdf}, +} + +uai05 + +@inproceedings{uai05, + title = {Models for Truthful Online Double Auctions}, + author = {Jonathan Bredin and David C. Parkes}, + booktitle = {Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence + (UAI'05)}, + year = {2005}, + pages = {50--59}, + www_section = {Dynamic Mechanism Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/uai05.pdf}, +} + +walsh04 + +@incollection{walsh04, + title = {Choosing Samples to Compute Heuristic-Strategy Nash Equilibrium}, + author = {William E. Walsh and David C. Parkes and Rajarshi Das}, + booktitle = {Agent Mediated Electronic Commerce (LNAI 3048)}, + year = {2004}, + editor = {Peyman Faratin and David C. Parkes and Juan A. Rodriguez-Aguilar and William E + Walsh}, + publisher = {Springer-Verlag}, + note = {Revised Papers from AAMAS workshop, Melbourne Australia (2003)}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/sampling_long.pdf}, + www_section = {Artificial Intelligence}, +} + +walsh08 + +@inproceedings{walsh08, + title = {Computing reserve prices and identifying the value distribution in real-world + auctions with market dynamics}, + author = {William E. Walsh and David C. Parkes and Tuomas Sandholm and Craig Boutilier}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence (AAAI'08)}, + year = {2008}, + pages = {1499-1502}, + note = {Short paper}, + www_section = {Applications and E-Commerce|Market Design}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/walsh08.pdf}, +} + +walsh09 + +@inproceedings{walsh09, + title = {{Automated Channel Abstraction for Advertising Auctions}}, + author = {William E. Walsh and Craig Boutilier and Tuomas Sandholm and Rob Shields and + George Nemhauser and David C. Parkes}, + booktitle = {Proceedings of the Ad Auctions Workshop}, + year = {2009}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/walsh09.pdf}, + www_section = {Market Design|Applications and E-Commerce}, +} + +witkowski_aaai12 + +@inproceedings{witkowski_aaai12, + title = {{A Robust Bayesian Truth Serum for Small Populations}}, + author = {Jens Witkowski and David C. Parkes}, + booktitle = {Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI + '12)}, + year = {2012}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/witkowski_aaai12.pdf}, + www_section = {Social Computing and Incentives|Information Elicitation and + Aggregation|Applications and E-Commerce}, +} + +witkowski_ec12 + +@inproceedings{witkowski_ec12, + title = {{Peer Prediction without a Common Prior}}, + author = {Jens Witkowski and David C. Parkes}, + booktitle = {Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12)}, + year = {2012}, + pages = {964-981}, + www_section = {Social Computing and Incentives|Information Elicitation and + Aggregation|Applications and E-Commerce}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/witkowski_ec12.pdf}, +} + +woodard03 + +@inproceedings{woodard03, + title = {Strategyproof Mechanisms for Ad Hoc Network Formation (Extended Abstract)}, + author = {Jason Woodard and David C. Parkes}, + booktitle = {1st Workshop on Economics of Peer-to-Peer Systems}, + year = {2003}, + month = {June}, + note = {http://www.sims.berkeley.edu/research/conferences/p2pecon}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/woodard03adhoc.pdf}, + www_section = {Networks, Systems and Economics}, +} + +woodard06 + +@phdthesis{woodard06, + title = {Architectural Strategy and Design Evolution in Complex Engineered Systems}, + author = {Jason Woodard}, + school = {Information, Technology and Management, Harvard University}, + year = {2006}, + www_section = {PhD and Senior Theses}, + www_html_url = {http://kuala.smu.edu.sg/~jason/diss.html}, +} + +yanovsky05 + +@undergradthesis{yanovsky05, + title = {Uniform Sampling in a Wireless Network Via a Market Inspired Method}, + author = {Dimah Yanovsky}, + school = {Computer science, Harvard College}, + year = {2005}, + address = {Cambridge, MA}, + www_section = {PhD and Senior Theses}, +} + +zhang-ec11 + +@inproceedings{zhang-ec11, + title = {{Task Routing for Prediction Tasks}}, + author = {Haoqi Zhang and Eric Horvitz and Yiling Chen and David C. Parkes}, + booktitle = {Proceedings EC'11 Workshop on Social Computing and User Generated Content}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang-ec11.pdf}, + www_section = {Information Elicitation and Aggregation|Social Computing and Incentives}, +} + +zhang07 + +@undergradthesis{zhang07, + title = {{Policy Teaching through Reward Function Learning}}, + author = {Haoqi Zhang}, + school = {Computer Science and Economics, Harvard College}, + year = {2007}, + address = {Cambridge, MA}, + note = {{\bf Hoopes Prize}}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/hq-thesis.pdf}, +} + +zhang09 + +@inproceedings{zhang09, + title = {{A General Approach to Environment Design with One Agent}}, + author = {Haoqi Zhang and Yiling Chen and David C. Parkes}, + booktitle = {Twenty-First International Joint Conference on Artificial Intelligence + (IJCAI'09)}, + year = {2009}, + pages = {2002-2009}, + www_section = {Artificial Intelligence|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang09.pdf}, +} + +zhang_aamas12 + +@inproceedings{zhang_aamas12, + title = {{Task Routing for Prediction Tasks}}, + author = {Haoqi Zhang and Eric Horvitz and Yiling Chen and David Parkes}, + booktitle = {Proceedings of the 11th International Conference on Autonomous Agents and + Multiagent Systems (AAMAS-12)}, + year = {2012}, + pages = {889-896}, + www_section = {Social Computing and Incentives|Information Elicitation and Aggregation}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang_aamas12.pdf}, +} + +zhang_chi11 + +@inproceedings{zhang_chi11, + title = {{Crowdsourcing General Computation}}, + author = {Haoqi Zhang and Eric Horvitz and Rob C. Miller and David C. Parkes}, + booktitle = {Proceedings of the CHI 2011 Workshop on Crowdsourcing and Human + Computation}, + year = {2011}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang_chi11.pdf}, + www_section = {Social Computing and Incentives}, +} + +zhang_chi12 + +@inproceedings{zhang_chi12, + title = {{Human Computation Tasks with Global Constraints: A Case Study}}, + author = {Haoqi Zhang and Edith Law and Robert C. Miller and Krzysztof Z. Gajos and David + C. Parkes and Eric Horvitz}, + booktitle = {Proceedings of the ACM Conference on Human Factors in Computing (CHI'12)}, + year = {2012}, + pages = {217-226}, + www_section = {Applications and E-Commerce|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang_chi12.pdf}, +} + +zhang_thesis12 + +@phdthesis{zhang_thesis12, + title = {Computational Environment Design}, + author = {Haoqi Zhang}, + school = {Computer Science}, + year = {2012}, + www_section = {PhD and Senior Theses}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhang_thesis12.pdf}, +} + +zhangec09 + +@inproceedings{zhangec09, + title = {{Policy Teaching Through Reward Function Learning}}, + author = {Haoqi Zhang and David C. Parkes and Yiling Chen}, + booktitle = {10th ACM Electronic Commerce Conference (EC'09)}, + year = {2009}, + pages = {295--304}, + www_section = {Artificial Intelligence|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zhangec09.pdf}, +} + +zp-aaai08 + +@inproceedings{zp-aaai08, + title = {Value-based Policy Teaching with Active Indirect Elicitation}, + author = {Haoqi Zhang and David C. Parkes}, + booktitle = {Proc. 23rd AAAI Conference on Artificial Intelligence (AAAI'08)}, + year = {2008}, + month = {July}, + address = {Chicago, IL}, + pages = {208--214}, + www_section = {Artificial Intelligence|Social Computing and Incentives}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zp-aaai08.pdf}, +} + +zp-mpref08 + +@inproceedings{zp-mpref08, + title = {Enabling Environment Design via Active Indirect Elicitation}, + author = {Haoqi Zhang and David C. Parkes}, + booktitle = {Proc. Workshop on Preference Handling}, + year = {2008}, + month = {July}, + address = {Chicago, IL}, + www_pdf_url = {http://www.eecs.harvard.edu/econcs/pubs/zp-mpref08.pdf}, + www_section = {Artificial Intelligence|Social Computing and Incentives}, +} + diff --git a/testdata/names.bst b/testdata/names.bst new file mode 100644 index 0000000..a72e888 --- /dev/null +++ b/testdata/names.bst @@ -0,0 +1,38 @@ +ENTRY + { + author + } + {} + { label } + +INTEGERS { nameptr namesleft numnames } + +STRINGS { s t } + +FUNCTION {format.names} +{ 's := + #1 'nameptr := + s num.names$ 'numnames := + numnames 'namesleft := + { namesleft #0 > } + { + s nameptr "{ff}|{vv}|{ll}|{jj}" format.name$ write$ newline$ + s nameptr "{f}|{v}|{l}|{j}" format.name$ write$ newline$ + s nameptr "{ff~}{vv~}{ll}{, jj}" format.name$ write$ newline$ + s nameptr "{f~}{vv~}{ll}{, jj}" format.name$ write$ newline$ + namesleft #1 - 'namesleft := + nameptr #1 + 'nameptr := + } + while$ +} + +FUNCTION {format.authors} +{ author empty$ + { "" } + { author format.names } + if$ +} + +READ + +ITERATE {format.authors} diff --git a/testdata/parsing.bib b/testdata/parsing.bib new file mode 100644 index 0000000..21b32bb --- /dev/null +++ b/testdata/parsing.bib @@ -0,0 +1,53 @@ +identifier can contain weird things + +@ string ( @f0/0\:0 = "foo" ) +@string { foo = "foo" # @f0/0\:0 } + +@ preamble( + foo +) +@preamble { foo } + +entry can be empty + +@misc{} + +key can be empty + +@misc(,) + +key can contain weird things. The following three lines are only defining one +entry + +@misc( +@misc{author="test"}, +) + +@misc{ ()cr@zy{,} + +Now testing entries with unknown type. + +@cr@zy {key1, + year = 2010, + title = @f0/0\:0 # "jou{"}rn@l" # { {j}ou#"n@{l} } # @f0/0\:0 + author = "JÅ“hn + + Nash", +} + +@comment{ This is a comment + + field names can contain weird things, including at-signs but probably not + a good idea. The following line starts a new entry, even though few + parsers will catch it + @article{key2, + @my_field = "test", + year = "2010", +} + +we are now outside of an entry again, balancedness does not matter +} +} @ comment + +The next line defines an entry of type "comment<at>article" +@ commment@article {key3,} diff --git a/testdata/pdos.bib b/testdata/pdos.bib new file mode 100644 index 0000000..d17957b --- /dev/null +++ b/testdata/pdos.bib @@ -0,0 +1,1742 @@ +%% *** +%% *** ASK YOURSELF: +%% *** +%% *** Did I put it in the right section? +%% *** Did I include a `www_section' tag? +%% *** Did I include the page numbers? +%% *** Did I include the location of the conference (in the `address' tag)? +%% *** +%% *** When you are done editing this file, run this command: +%% *** ./mkpdospubs.pl pdos.bib ../pubs.html +%% *** + +@string{MIT = "Massachusetts Institute of Technology"} +@string{MIT-LCS = "{MIT} Laboratory for Computer Science"} +@string{ACMabbr = "{ACM}"} +@string{SOSP = ACMabbr # " {S}ymposium on {O}perating {S}ystems {P}rinciples"} +@string{IEEEabbr = "{IEEE}"} +@string{IEEECompSoc = IEEEabbr # " {C}omputer {S}ociety"} +@string{OSDI = "{USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation"} + +@string{PDOSWWW = "http://www.pdos.lcs.mit.edu"} + +%% P2P PAPERS + +@string{p2p = "Peer-to-peer Computing"} + +@inproceedings{ivy:osdi02, + title = "Ivy: A Read/Write Peer-to-peer File System", + author = "Athicha Muthitacharoen and Robert Morris and Thomer Gil and Benjie Chen", + crossref = osdi5, + www_section = p2p, + www_abstract_url = PDOSWWW # "/ivy/osdi02.html", + www_ps_url = PDOSWWW # "/ivy/osdi02.ps", + www_ps_gz_url = PDOSWWW # "/ivy/osdi02.ps.gz", + www_pdf_url = PDOSWWW # "/ivy/osdi02.pdf" +} + +@inproceedings{trie:iptps02, + title = "Efficient Peer-To-Peer Lookup Based on a Distributed Trie", + author = "Michael J. Freedman and Radek Vingralek", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/trie:iptps02/index.html", + www_ps_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.ps", + www_ps_gz_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/trie:iptps02/trie:iptps02.pdf" +} + +@inproceedings{chord:dns02, + title = "Serving DNS using Chord", + author = "Russ Cox and Athicha Muthitacharoen and Robert Morris", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:dns02/index.html", + www_ps_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:dns02/chord:dns02.pdf" +} + +@inproceedings{chord:security02, + title = "Security Considerations for Peer-to-Peer Distributed Hash Tables", + author = "Emil Sit and Robert Morris", + crossref = "iptps02", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:security02/index.html", + www_ps_url = PDOSWWW # "/papers/chord:security02/chord:security02.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:security02/chord:security02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:security02/chord:security02.pdf" +} + +@inproceedings{cfs:sosp01, + title = "Wide-area cooperative storage with {CFS}", + author = "Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica", + crossref = "sosp18", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/cfs:sosp01/", + www_ps_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.ps", + www_ps_gz_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.ps.gz", + www_pdf_url = PDOSWWW # "/papers/cfs:sosp01/cfs_sosp.pdf", +} + +@inproceedings{chord:sigcomm01, + title = "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications", + author = "Ion Stoica and Robert Morris and David Karger and M. Frans Kaashoek and Hari Balakrishnan", + crossref = "sigcomm01", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:sigcomm01/", + www_ps_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:sigcomm01/chord_sigcomm.pdf", +} + +@inproceedings{chord:hotos, + title = "Building Peer-to-Peer Systems With Chord, a Distributed Lookup Service", + author = "Frank Dabek and Emma Brunskill and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica and Hari Balakrishnan", + crossref = "hotos8", + pages = "", + www_section = p2p, + www_abstract_url = PDOSWWW # "/papers/chord:hotos01/", + www_ps_url = PDOSWWW # "/papers/chord:hotos01/hotos8.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:hotos01/hotos8.ps.gz", + www_pdf_url = PDOSWWW # "/papers/chord:hotos01/hotos8.pdf", +} + + +%% NETWORKING PAPERS + +@string{networking = "Networking and Communication"} + +@inproceedings{click:asplos02, + title = "Programming Language Optimizations for Modular Router Configurations", + author = "Eddie Kohler and Robert Morris and Benjie Chen", + booktitle = "Proceedings of the 10th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)", + location = "San Jose, CA", + month = oct, + year = 2002, + www_section = networking, + www_pdf_url = PDOSWWW # "/papers/click:asplos02.pdf" +} + +@inproceedings{grid:hotnets02, + title = "Performance of Multihop Wireless Networks: Shortest Path is Not Enough", + author = "Douglas S. J. {De Couto} and Daniel Aguayo and Benjamin A. Chambers and Robert Morris", + crossref = "hotnets1", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:hotnets02/", + www_ps_url = PDOSWWW # "/papers/grid:hotnets02/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:hotnets02/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:hotnets02/paper.pdf" +} + +@techreport{grid:losstr01, + title = "Effects of Loss Rate on Ad Hoc Wireless Routing", + author = "Douglas S. J. {De Couto} and Daniel Aguayo and Benjamin A. Chambers and Robert Morris", + institution = MIT-LCS, + year = 2002, month = mar, + number = "MIT-LCS-TR-836", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:losstr02/", + www_ps_url = PDOSWWW # "/papers/grid:losstr02/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:losstr02/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:losstr02/paper.pdf" +} + + +@article{span:wireless01, + title = "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks", + author = "Benjie Chen and Kyle Jamieson and Hari Balakrishnan and Robert Morris", + crossref = "journal:winet", + volume = 8, + number = "5", + year = 2002, + month = sep, + pages = "", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/span:wireless01/", + www_ps_url = PDOSWWW # "/papers/span:wireless01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/span:wireless01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/span:wireless01/paper.pdf" +} + +@inproceedings{dnscache:sigcommimw01, + title = "DNS Performance and the Effectiveness of Caching", + author = "Jaeyeon Jung, Emil Sit, Hari Balakrishnan and Robert Morris", + crossref = "sigcommimw01", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/dns-imw2001.pdf" +} + +@inproceedings{ron:sosp01, + title = "Resilient Overlay Networks", + author = "David Andersen and Hari Balakrishnan and M. Frans Kaashoek and Robert Morris", + crossref = "sosp18", + pages = "", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/ron-sosp2001.pdf", +} + +@techreport{grid:proxytr01, + title = "Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding", + author = "Douglas S. J. {De Couto} and Robert Morris", + institution = MIT-LCS, + year = 2001, month = jun, + number = "MIT-LCS-TR-824", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:proxytr01/", + www_ps_url = PDOSWWW # "/papers/grid:proxytr01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:proxytr01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:proxytr01/paper.pdf", +} + +@inproceedings{span:mobicom01, + title = "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks", + author = "Benjie Chen and Kyle Jamieson and Hari Balakrishnan and Robert Morris", + crossref = "mobicom01", + pages = "85--96", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/span:mobicom01/", + www_ps_url = PDOSWWW # "/papers/span:mobicom01/span.ps", + www_ps_gz_url = PDOSWWW # "/papers/span:mobicom01/span.ps.gz", + www_pdf_url = PDOSWWW # "/papers/span:mobicom01/span.pdf" +} + +@inproceedings{grid:mobicom01, + title = "Capacity of Ad Hoc Wireless Networks", + author = "Jinyang Li and Charles Blake and Douglas S. J. {De Couto} and Hu Imm Lee and Robert Morris", + crossref = "mobicom01", + pages = "61--69", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:mobicom01/", + www_ps_url = PDOSWWW # "/papers/grid:mobicom01/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:mobicom01/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:mobicom01/paper.pdf" +} + +@inproceedings{click:usenix01, + title = "Flexible Control of Parallelism in a Multiprocessor PC Router", + author = "Benjie Chen and Robert Morris", + crossref = "usenix01", + pages = "333--346", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:usenix01/", + www_ps_url = PDOSWWW # "/papers/click:usenix01/usenix01.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:usenix01/usenix01.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:usenix01/usenix01.pdf", +} + +@inproceedings{ron:hotos8, + title = "Resilient Overlay Networks", + author = "David Andersen and Hari Balakrishnan and M. Frans Kaashoek and Robert Morris", + crossref = "hotos8", + www_section = networking, + www_abstract_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/papers/ron-hotos2001.pdf", +} + +@techreport{click:rewritertr, + title = "Modular components for network address translation", + author = "Eddie Kohler and Robert Morris and Massimiliano Poletto", + institution = "MIT LCS Click Project", + year = 2000, month = dec, + note = "http://www.pdos.lcs.mit.edu/papers/click-rewriter/", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click-rewriter/", + www_ps_url = PDOSWWW # "/papers/click-rewriter/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click-rewriter/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click-rewriter/paper.pdf", +} + +@inproceedings{grid:sigops-euro9, + title = "{C}ar{N}et: A Scalable Ad Hoc Wireless Network System", + author = "Robert Morris and John Jannotti and Frans Kaashoek and Jinyang Li and Douglas S. J. {De Couto}", + crossref = "sigops-euro9", + pages = "", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:sigops-euro9/", + www_ps_gz_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.ps.gz", + www_ps_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.ps", + www_pdf_url = PDOSWWW # "/papers/grid:sigops-euro9/paper.pdf", + note = "The published version incorrectly lists Douglas De Couto's name" +} + +@inproceedings{grid:mobicom00, + title = "A Scalable Location Service for Geographic Ad Hoc Routing", + author = "Jinyang Li and John Jannotti and Douglas S. J. {De Couto} and David R. Karger and Robert Morris", + crossref = "mobicom00", + pages = "120--130", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/grid:mobicom00/", + www_ps_url = PDOSWWW # "/papers/grid:mobicom00/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:mobicom00/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/grid:mobicom00/paper.pdf" +} + +@techreport{click:lcstr00, + title = "Programming language techniques for modular router configurations", + author = "Eddie Kohler and Benjie Chen and M. Frans Kaashoek and Robert Morris and Massimiliano Poletto", + institution = MIT-LCS, + year = 2000, month = aug, + number = "MIT-LCS-TR-812", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:lcstr00/", + www_ps_url = PDOSWWW # "/papers/click:lcstr00/tr.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:lcstr00/tr.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:lcstr00/tr.pdf", +} + +@article{click:tocs00, + title = "The Click modular router", + author = "Eddie Kohler and Robert Morris and Benjie Chen and John Jannotti and M. Frans Kaashoek", + crossref = "journal:tocs", + volume = 18, number = 3, + year = 2000, month = aug, + pages = "263--297", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:tocs00/", + www_ps_url = PDOSWWW # "/papers/click:tocs00/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:tocs00/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:tocs00/paper.pdf" +} + +@inproceedings{click:sosp99, + title = "The {C}lick modular router", + author = "Robert Morris and Eddie Kohler and John Jannotti and M. Frans Kaashoek", + crossref = "sosp17", + pages = "217--231", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/click:sosp99/", + www_ps_url = PDOSWWW # "/papers/click:sosp99/paper.ps", + www_ps_gz_url = PDOSWWW # "/papers/click:sosp99/paper.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:sosp99/paper.pdf" +} + +@inproceedings{prolac:sigcomm99, + title = "A readable {TCP} in the {Prolac} protocol language", + author = "Eddie Kohler and M. Frans Kaashoek and David R. Montgomery", + crossref = "sigcomm99", + pages = "3--13", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/prolac:sigcomm99/", + www_ps_url = PDOSWWW # "/papers/prolac:sigcomm99/paper.ps", + www_pdf_url = PDOSWWW # "/papers/prolac:sigcomm99/paper.pdf" +} + +@inproceedings{ash:sigcomm96, + title = "{ASHs}: application-specific handlers for high-performance messaging", + author = "Deborah A. Wallach and Dawson R. Engler and M. Frans Kaashoek", + crossref = "sigcomm96", + pages = "40--52", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/ash-sigcomm96.ps" +} + +@inproceedings{dpf:sigcomm96, + title = "{DPF}: fast, flexible message demultiplexing using dynamic code generation", + author = "Dawson R. Engler and M. Frans Kaashoek", + crossref = "sigcomm96", + pages = "53--59", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/dpf.ps" +} + +@inproceedings{oam:ppopp95, + title = "Optimistic active messages: a mechanism for scheduling communication with computation", + author = "Deborah A. Wallach and Wilson C. Hsieh and Kirk Johnson and M. Frans Kaashoek and William E. Weihl", + crossref = "ppopp95", + pages = "217--226", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/oam.ps" +} + +@techreport{user-level-comm:tr, + title = "Efficient implementation of high-level languages on user-level communication architectures", + author = "Wilson C. Hsieh and Kirk L. Johnson and M. Frans Kaashoek and Deborah A. Wallach and William E. Weihl", + institution = MIT-LCS, + year = 1994, month = may, + number = "MIT-LCS-TR-616", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/UserLevelCommunication.ps", +} + +@inproceedings{ipc-persistent-relevance:wwos4, + title = "The persistent relevance of IPC performance", + author = "Wilson C. Hsieh and M. Frans Kaashoek and William E. Weihl", + crossref = "wwos4", + pages = "186--190", + www_section = networking, + www_ps_url = PDOSWWW # "/papers/RelevanceOfIPC.ps", +} + +@inproceedings{pan:openarch99, + title = "{PAN}: a high-performance active network node supporting multiple mobile code systems", + author = "Erik L. Nygren and Stephen J. Garland and M. Frans Kaashoek", + crossref = "openarch99", + pages = "78--89", + www_section = networking, + www_abstract_url = PDOSWWW # "/papers/pan-openarch99/", + www_ps_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.ps", + www_ps_gz_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.ps.gz", + www_pdf_url = PDOSWWW # "/papers/pan-openarch99/pan-openarch99.pdf", +} + +%% DISTRIBUTED COMPUTING + +@string{distribcomp = "Distributed Computing"} + +@inproceedings{lbfs:sosp01, + title = "A Low-bandwidth Network File System", + author = "Athicha Muthitacharoen and Benjie Chen and David Mazi{\`e}res", + crossref = "sosp18", + pages = "174--187", + www_section = distribcomp, + www_abstract_url = PDOSWWW # "/papers/lbfs:sosp01/", + www_ps_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.ps", + www_ps_gz_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.ps.gz", + www_pdf_url = PDOSWWW # "/papers/lbfs:sosp01/lbfs.pdf", +} + +@inproceedings{server-os:sigops-euro, + title = "Server operating systems", + author = "M. Frans Kaashoek and Dawson R. Engler and Gregory R. Ganger and Deborah A. Wallach", + crossref = "sigops-euro7", + pages = "141--148", + www_section = distribcomp, + www_html_url = PDOSWWW # "/papers/serverOS.html" +} + +@inproceedings{amoeba-eval:dcs16, + title = "An evaluation of the {Amoeba} group communication system", + author = "M. Frans Kaashoek and Andrew S. Tanenbaum", + crossref = "dcs16", + pages = "436--448", + www_section = distribcomp, + www_ps_url = PDOSWWW # "/papers/group-dcs16.ps" +} + + +%% SECURITY AND PRIVACY + +@string{security = "Security and Privacy"} + +@techreport{sfs:rex, + title = "REX: Secure, modular remote execution through file descriptor passing", + author = "Michael Kaminsky and Eric Peterson and Kevin Fu and David Mazi{\`e}res and M. Frans Kaashoek", + institution = "MIT-LCS", + year = 2003, month = jan, + number = "MIT-LCS-TR-884", + note = "http://www.pdos.lcs.mit.edu/papers/sfs:rex/", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/sfs:rex/", + www_ps_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:rex/MIT-LCS-TR-884.pdf", +} + +@inproceedings{tarzan:ccs9, + title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Robert Morris", + crossref = "ccs9", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/tarzan:ccs9/index.html", + www_ps_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tarzan:ccs9/tarzan:ccs9.pdf" +} + +@inproceedings{tarzan:iptps02, + title = "Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris", + crossref = "iptps02", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/tarzan:iptps02/index.html", + www_ps_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tarzan:iptps02/tarzan:iptps02.pdf" +} + +@article{sfsro:tocs2002, + title = "{F}ast and secure distributed read-only file system", + author = "Kevin Fu and M. Frans Kaashoek and David Mazi{\`e}res", + crossref = "journal:tocs", + volume = 20, number = 1, + year = 2002, month = feb, + pages = "1--24", + www_section = security, + www_abstract_url = "http://portal.acm.org/citation.cfm?doid=505452.505453" +} + + +@inproceedings{webauth:sec10, + title = "{D}os and Don'ts of Client Authentication on the Web", + author = "Kevin Fu and Emil Sit and Kendra Smith and Nick Feamster", + crossref = "sec10", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/webauth.html", + www_ps_url = PDOSWWW # "/papers/webauth:sec10.ps", + www_pdf_url = PDOSWWW # "/papers/webauth:sec10.pdf", + www_ps_gz_url = PDOSWWW # "/papers/webauth:sec10.ps.gz", + note = "An extended version is available as MIT-LCS-TR-818", +} + +@techreport{webauth:tr, + title = "{D}os and Don'ts of Client Authentication on the Web", + author = "Kevin Fu and Emil Sit and Kendra Smith and Nick Feamster", + institution = MIT-LCS, + year = 2001, month = may, + number = "MIT-LCS-TR-818", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/webauth.html", + www_ps_url = PDOSWWW # "/papers/webauth:tr.ps", + www_pdf_url = PDOSWWW # "/papers/webauth:tr.pdf", + www_ps_gz_url = PDOSWWW # "/papers/webauth:tr.ps.gz", +} + +@inproceedings{sfsro:osdi2000, + title = "{F}ast and secure distributed read-only file system", + author = "Kevin Fu and M. Frans Kaashoek and David Mazi{\`e}res", + crossref = "osdi4", + pages = "181-196", + www_section = security, + www_abstract_url = PDOSWWW # "/papers/sfsro.html", + www_ps_url = PDOSWWW # "/papers/sfsro:osdi2000.ps", + www_pdf_url = PDOSWWW # "/papers/sfsro:osdi2000.pdf", + www_ps_gz_url = PDOSWWW # "/papers/sfsro:osdi2000.ps.gz", +} + +@inproceedings{sfs:sosp99, + title = "{S}eparating key management from file system security", + author = "David Mazi{\`e}res and Michael Kaminsky and M. Frans Kaashoek and Emmett Witchel", + crossref = "sosp17", + pages = "", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/sfs:sosp99.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:sosp99.pdf", +} + +@inproceedings{nymserver:ccs5, + title = "The design, implementation and operation of an email pseudonym server", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + crossref = "ccs5", + pages = "27--36", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/nymserver:ccs5.ps.gz", + www_pdf_url = PDOSWWW # "/papers/nymserver:ccs5.pdf", +} + +@inproceedings{sfs:sigops-euro8, + title = "Escaping the evils of centralized control with self-certifying pathnames", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + crossref = "sigops-euro8", + pages = "", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/sfs:sigops-euro8.ps.gz" +} + +@inproceedings{secure-apps:hotos6, + title = "Secure applications need flexible operating systems", + author = "David Mazi{\`e}res and M. Frans Kaashoek", + pages = "56--61", + crossref = "hotos6", + www_section = security, + www_ps_gz_url = PDOSWWW # "/papers/mazieres:hotos6.ps.gz", +} + + +%% MOBILE COMPUTING + +@string{mobilecomp = "Mobile Computing"} + +@inproceedings{migrate:hotos8, + title = "Reconsidering Internet Mobility", + author = "Alex C. Snoeren and Hari Balakrishnan and M. Frans Kaashoek", + crossref = "hotos8", + www_section = mobilecomp, + www_abstract_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.html", + www_ps_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.ps", + www_pdf_url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.pdf", +} + +@misc{rover:rfs-wip, + title = "{RFS}: a mobile-transparent file system for the {Rover} toolkit", + author = "Anthony D. Joseph and George M. Candea and M. Frans Kaashoek", + howpublished = "Works-in-progress poster, the 16th " # SOSP, + crossref = "sosp16", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/RFS_SOSP_WIP.ps", + www_show = no, +} + +@article{rover:winet, + title = "Building reliable mobile-aware applications using the {Rover} toolkit", + author = "Anthony D. Joseph and M. Frans Kaashoek", + crossref = "journal:winet", + volume = 3, number = 5, + year = 1997, + pages = "405--419", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/winet.ps", + www_ps_gz_url = PDOSWWW # "/papers/winet.ps.gz" +} + +@article{rover:ieee-toc, + title = "Mobile computing with the {Rover} toolkit", + author = "Anthony D. Joseph and Joshua A. Tauber and M. Frans Kaashoek", + crossref = "journal:ieee-toc", + volume = 46, number = 3, + year = 1997, month = mar, + pages = "337--352", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/toc.ps", + www_ps_gz_url = PDOSWWW # "/papers/toc.ps.gz" +} + +@inproceedings{rover:mobicom, + title = "Building reliable mobile-aware applications using the {Rover} toolkit", + author = "Anthony D. Joseph and Joshua A. Tauber and M. Frans Kaashoek", + crossref = "mobicom96", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/mobicom96.ps", + www_ps_gz_url = PDOSWWW # "/papers/mobicom96.ps.gz", +} + +@inproceedings{rover:sosp95, + title = "{Rover}: a toolkit for mobile information access", + author = "Anthony D. Joseph and {deLespinasse}, Alan F. and Joshua A. Tauber and David K. Gifford and M. Frans Kaashoek", + crossref = "sosp15", + pages = "156--171", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/rover-sosp95.ps", + www_ps_gz_url = PDOSWWW # "/papers/rover-sosp95.ps.gz", +} + +@inproceedings{dynamic-documents:wmcsa, + title = "Dynamic documents: mobile wireless access to the {WWW}", + author = "M. Frans Kaashoek and Tom Pinckney and Joshua A. Tauber", + crossref = "wmcsa94", + pages = "179--184", + www_section = mobilecomp, + www_abstract_url = PDOSWWW # "/papers/wmcsa94.abstract.html", + www_ps_url = PDOSWWW # "/papers/wmcsa94.ps", + www_ps_gz_url = PDOSWWW # "/papers/wmcsa94.ps.gz", +} + +@inproceedings{mobile-storage-alt:osdi1, + title = "Storage alternatives for mobile computers", + author = "Fred Douglis and Ramón Cáceres and M. Frans Kaashoek and Kai Li and Brian Marsh and Joshua A. Tauber", + crossref = "osdi1", + pages = "25--37", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/storage-alternatives.ps" +} + +@inproceedings{dynamic-documents:www94, + title = "Dynamic documents: extensibility and adaptability in the {WWW}", + author = "M. Frans Kaashoek and Tom Pinckney and Joshua A. Tauber", + crossref = "www94", + edition = "developers' day track", + www_section = mobilecomp, + www_ps_url = PDOSWWW # "/papers/www94.ps", + www_ps_gz_url = PDOSWWW # "/papers/www94.ps.gz", + www_html_url = PDOSWWW # "/papers/www94.html", +} + + +%% STORAGE MANAGEMENT + +@string{storage = "Storage Management"} + +@inproceedings{cffs:usenix97, + title = "Embedded inodes and explicit grouping: exploiting disk bandwidth for small files", + author = "Gregory R. Ganger and M. Frans Kaashoek", + crossref = "usenix97", + pages = "1--17", + www_section = storage, + www_abstract_url = PDOSWWW # "/papers/cffs.html", + www_ps_url = PDOSWWW # "/papers/cffs-usenix97.ps", + www_ps_gz_url = PDOSWWW # "/papers/cffs-usenix97.ps.gz", +} + +@inproceedings{arus:dcs16, + title = "Atomic recovery units: failure atomicity for logical disks", + author = "Robert Grimm and Wilson C. Hsieh and Wiebren de Jonge and M. Frans Kaashoek", + crossref = "dcs16", + pages = "26--37", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/arus.ps", +} + +@inproceedings{logicaldisk:sosp14, + title = "The logical disk: a new approach to improving file systems", + author = "Wiebren de Jonge and M. Frans Kaashoek and Wilson C. Hsieh", + crossref = "sosp14", + pages = "15--28", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/LogicalDisk.ps" +} + + +%% EXOKERNEL PAPERS + +@string{exokernels = "Exokernels"} + +@article{exo:tocs2002, + title = "{F}ast and flexible Application-Level Networking on Exokernel Systems", + author = "Gregory R. Ganger and Dawson R. Engler and M. Frans Kaashoek and Hector M. Briceno and Russell Hunt and Thomas Pinckney", + crossref = "journal:tocs", + volume = 20, + number = 1, + year = 2002, + month = feb, + pages = "49--83", + www_section = exokernels, + www_abstract_url = PDOSWWW # "papers/exo:tocs.html", + www_pdf_url = PDOSWWW # "papers/exo:tocs.pdf", + www_ps_url = PDOSWWW # "papers/exo:tocs.ps", + www_ps_gz_url = PDOSWWW # "papers/exo:tocs.ps.gz" +} + +@inproceedings{exo:sosp97, + title = "Application performance and flexibility on exokernel systems", + author = "M. Frans Kaashoek and Dawson R. Engler and Gregory R. Ganger and H{\'e}ctor M. Brice{\~n}o and Russell Hunt and David Mazi{\`e}res and Thomas Pinckney and Robert Grimm and John Jannotti and Kenneth Mackenzie", + pages = "52--65", + crossref = "sosp16", + www_section = exokernels, + www_abstract_url = PDOSWWW # "/papers/exo-sosp97.html", + www_html_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.html", + www_ps_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.ps", + www_ps_gz_url = PDOSWWW # "/papers/exo-sosp97/exo-sosp97.ps.gz", +} + +@inproceedings{exo:sosp95, + title = "{E}xokernel: an operating system architecture for application-level resource management", + author = "Dawson R. Engler and M. Frans Kaashoek and James {O'Toole Jr.}", + pages = "251--266", + crossref = "sosp15", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/exokernel-sosp95.ps", +} + +@inproceedings{exo:osdi1, + title = "The exokernel approach to extensibility (panel statement)", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + pages = "198", + crossref = "osdi1", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/exo-abstract.ps", +} + +@inproceedings{exo:hotos5, + title = "Exterminate all operating system abstractions", + author = "Dawson R. Engler and M. Frans Kaashoek", + pages = "78--83", + crossref = "hotos5", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/hotos-jeremiad.ps", +} + +@article{exo:osr, + title = "The operating system kernel as a secure programmable machine", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + crossref = "journal:osr", + year = 1995, month = jan, + volume = 29, number = 1, + pages = "78--82", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/osr-exo.ps", +} + +@inproceedings{exo:sigops-euro, + title = "The operating system kernel as a secure programmable machine", + author = "Dawson R. Engler and M. Frans Kaashoek and {O'Toole Jr.}, James W.", + crossref = "sigops-euro6", + pages = "62--67", + www_section = exokernels, + www_ps_url = PDOSWWW # "/papers/xsigops.ps", +} + + +%% DYNAMIC CODE GENERATION + +@string{dcg = "Dynamic Code Generation"} + +@article{tickc:toplas, + title = "{`C} and {tcc}: A language and compiler for dynamic code generation", + author = "Massimiliano Poletto and Wilson C. Hsieh and Dawson R. Engler and M. Frans Kaashoek", + crossref = "journal:toplas", + volume = 21, number = 2, + year = 1999, month = mar, + pages = "324--369", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tickc-toplas.ps", +} + +@article{linearscan, + title = "Linear scan register allocation", + author = "Massimiliano Poletto and Vivek Sarkar", + crossref = "journal:toplas", + volume = 21, number = 5, + year = 1999, month = sep, + pages = "895--913", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/toplas-linearscan.ps", +} + +@inproceedings{tickc:pldi97, + title = "tcc: a system for fast, flexible, and high-level dynamic code generation", + author = "Massimiliano Poletto and Dawson R. Engler and M. Frans Kaashoek", + crossref = "pldi97", + pages = "109--121", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tcc-pldi97.ps", +} + +@inproceedings{tickc:popl96, + title = "{`C}: A language for efficient, machine-independent dynamic code generation", + author = "Dawson R. Engler and Wilson C. Hsieh and M. Frans Kaashoek", + crossref = "popl96", + pages = "131--144", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/popl96.ps", + note = "An earlier version is available as MIT-LCS-TM-526", +} + +@inproceedings{tickc:wcsss96, + title = "tcc: a template-based compiler for {`C}", + author = "Massimiliano Poletto and Dawson R. Engler and M. Frans Kaashoek", + crossref = "wcsss96", + pages = "1--7", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/tcc-wcsss96.ps" +} + +@inproceedings{vcode:pldi96, + title = "{VCODE}: a retargetable, extensible, very fast dynamic code generation system", + author = "Dawson R. Engler", + crossref = "pldi96", + pages = "160--170", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/vcode-pldi96.ps", +} + +@inproceedings{dcg:asplos6, + title = "{DCG}: an efficient, retargetable dynamic code generation system", + author = "Dawson R. Engler and Todd A. Proebsting", + crossref = "asplos6", + pages = "263--272", + www_section = dcg, + www_ps_url = PDOSWWW # "/papers/dcg.ps", +} + + +%% PROGRAMMING LANGUAGES + +@string{proglang = "Programming Languages"} + +@inproceedings{pct:usenix02, + title = "Simple and General Statistical Profiling with PCT", + author = "Charles Blake and Steve Bauer", + crossref = "usenix02", + pages = "333--346", + www_section = proglang, + www_abstract_url = PDOSWWW # "/papers/pct:usenix02/", + www_ps_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.ps", + www_ps_gz_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.ps.gz", + www_pdf_url = PDOSWWW # "/papers/pct:usenix02/blake02:pct.pdf", +} + +@inproceedings{evolving-software:wcsss99, + title = "Evolving software with an application-specific language", + author = "Eddie Kohler and Massimiliano Poletto and David R. Montgomery", + crossref = "wcsss99", + pages = "94--102", + www_section = proglang, + www_abstract_url = PDOSWWW # "/papers/evolving-software:wcsss99/", + www_ps_url = PDOSWWW # "/papers/evolving-software:wcsss99/paper.ps", + www_pdf_url = PDOSWWW # "/papers/evolving-software:wcsss99/paper.pdf", +} + + +%% STORAGE MANAGEMENT + +@string{storage = "Storage Management"} + +@inproceedings{cffs:usenix97, + title = "Embedded inodes and explicit grouping: exploiting disk bandwidth for small files", + author = "Gregory R. Ganger and M. Frans Kaashoek", + crossref = "usenix97", + pages = "1--17", + www_section = storage, + www_abstract_url = PDOSWWW # "/papers/cffs.html", + www_ps_url = PDOSWWW # "/papers/cffs-usenix97.ps", + www_ps_gz_url = PDOSWWW # "/papers/cffs-usenix97.ps.gz", +} + +@inproceedings{arus:dcs16, + title = "Atomic recovery units: failure atomicity for logical disks", + author = "Robert Grimm and Wilson C. Hsieh and Wiebren de Jonge and M. Frans Kaashoek", + crossref = "dcs16", + pages = "26--37", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/arus.ps", +} + +@inproceedings{logicaldisk:sosp14, + title = "The logical disk: a new approach to improving file systems", + author = "Wiebren de Jonge and M. Frans Kaashoek and Wilson C. Hsieh", + crossref = "sosp14", + pages = "15--28", + www_section = storage, + www_ps_url = PDOSWWW # "/papers/LogicalDisk.ps" +} + + +%% VIRTUAL MEMORY + +@string{vm = "Virtual Memory"} + +@inproceedings{avm:hotos5, + title = "{AVM}: application-level virtual memory", + author = "Dawson R. Engler and Sandeep K. Gupta and M. Frans Kaashoek", + crossref = "hotos5", + pages = "72--77", + www_section = vm, + www_ps_url = PDOSWWW # "/papers/hotos-uvm.ps", +} + +@inproceedings{software-tlb-prefetch:osdi1, + title = "Software prefetching and caching for translation lookaside buffers", + author = "Kavita Bala and M. Frans Kaashoek and William Weihl", + crossref = "osdi1", + pages = "243--253", + www_section = vm, + www_ps_url = PDOSWWW # "/papers/tlb.ps", +} + + + + +%% DISTRIBUTED SHARED MEMORY AND PARALLEL COMPUTING + +@string{dsm/parallel = "Distributed Shared Memory and Parallel Computing"} + +@inproceedings{dynamic-migration:supercomp96, + title = "Dynamic computation migration in distributed +shared memory systems", + author = "Wilson C. Hsieh and M. Frans Kaashoek and William E. Weihl", + crossref = "supercomp96", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/mcrl.ps" +} + +@inproceedings{crl:sosp95, + title = "{CRL}: high-performance all-software distributed shared memory", + author = "Kirk L. Johnson and M. Frans Kaashoek and Deborah A. Wallach", + crossref = "sosp15", + pages = "213--226", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/crl-sosp95.ps", + note = "An earlier version of this work appeared as Technical Report MIT-LCS-TM-517, MIT Laboratory for Computer Science, March 1995", +} + +@inproceedings{formal-sequential-consistent:dcs15, + title = "Implementing sequentially consistent shared objects using broadcast and point-to-point communication", + author = "Alan Fekete and M. Frans Kaashoek and Nancy Lynch", + crossref = "dcs15", + pages = "439--449", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/formal.ps" +} + +@techreport{formal-sequential-consistent:tr, + title = "Implementing sequentially consistent shared objects using broadcast and point-to-point communication", + author = "Alan Fekete and M. Frans Kaashoek and Nancy Lynch", + institution = MIT-LCS, + year = 1995, month = jun, + number = "MIT-LCS-TR-518", + www_section = dsm/parallel, + www_ps_url = PDOSWWW # "/papers/formaltr.ps" +} + +%inproceedings{triangle-puzzle:dimacs94, +% title = "A case study of shared-memory and +%message-passing implementations of parallel breadth-first search: The +%triangle puzzle", +% author = "Kevin Lew and Kirk Johnson and M. Frans Kaashoek", +% crossref = "dimacs94", +% www_section = dsm/parallel, +% www_ps_url = PDOSWWW # "/papers/dimacs94.ps" +%} + + +%% PHD THESES + +@string{phdtheses = "Ph.D. Theses"} + +@phdthesis{snoeren-phd, + title = "A Session-Based Architecture for Internet Mobility", + author = "Alex C. Snoeren", + school = MIT, + year = 2002, month = dec, + www_section = phdtheses, + www_ps_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.ps", + www_ps_gz_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.ps.gz", + www_pdf_url = "http://nms.lcs.mit.edu/~snoeren/papers/thesis/thesis.pdf", +} + +@phdthesis{jannotti-phd, + title = "Network Layer Support for Overlay Networks", + author = "John Jannotti", + school = MIT, + year = 2002, month = aug, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/papers/jannotti-phd.ps", + www_ps_gz_url = PDOSWWW # "/papers/jannotti-phd.ps.gz", + www_pdf_url = PDOSWWW # "/papers/jannotti-phd.pdf" +} + +@phdthesis{click:kohler-phd, + title = "The Click modular router", + author = "Eddie Kohler", + school = MIT, + year = 2000, month = nov, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/click:kohler-phd/thesis.ps.gz", + www_pdf_url = PDOSWWW # "/papers/click:kohler-phd/thesis.pdf" +} + +@phdthesis{sfs:mazieres-phd, + title = "Self-certifying File System", + author = "David Mazieres", + school = MIT, + year = 2000, month = may, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:mazieres-phd.ps.gz" +} + +@phdthesis{tickc:poletto-phd, + title = "Language and compiler support for dynamic code generation", + author = "Massimiliano Poletto", + school = MIT, + year = 1999, month = jun, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/papers/tickc-poletto-phd.ps", + www_ps_gz_url = PDOSWWW # "/papers/tickc-poletto-phd.ps.gz", + www_pdf_url = PDOSWWW # "/papers/tickc-poletto-phd.pdf" +} + +@phdthesis{exo:engler-phd, + title = "The exokernel operating system architecture", + author = "Dawson R. Engler", + school = MIT, + year = 1998, month = oct, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/exo/theses/engler/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/engler/thesis.ps.gz", +} + +@phdthesis{fugu:mackenzie-phd, + title = "An efficient virtual network interface in the {FUGU} scalable workstation", + author = "Kenneth M. Mackenzie", + school = MIT, + year = 1998, month = feb, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/exo/theses/kenmac/thesis.ps.gz", +} + +@phdthesis{app-specific-networking:wallach-phd, + title = "High-performance application-specific networking", + author = "Deborah Anne Wallach", + school = MIT, + year = 1997, month = jan, + www_section = phdtheses, + www_ps_url = PDOSWWW # "/exo/theses/kerr/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/kerr/thesis.ps.gz", +} + +@phdthesis{crl:johnson-phd, + title = "High-performance all-software distributed shared memory", + author = "Kirk L. Johnson", + school = MIT, + year = 1995, month = dec, + www_section = phdtheses, + www_ps_gz_url = PDOSWWW # "/papers/crl:johnson-phd.ps.gz", + www_abstract_url = "http://www.cag.lcs.mit.edu/~tuna/papers/thesis.html", +} + +@phdthesis{dyn-comp-migration:hsieh-phd, + title = "Dynamic computation migration in distributed shared memory systems", + author = "Wilson C. Hsieh", + school = MIT, + year = 1995, month = sep, + www_section = phdtheses, + www_pdf_url = PDOSWWW # "/papers/dyn-comp-migration:hsieh-phd.pdf", + note = "Also available as MIT LCS tech report MIT-LCS-TR-665." +} + + +%% MASTERS THESES + +@string{masterstheses = "Master's Theses"} + +@mastersthesis{sfs:savvides-meng, + title = "Access Control Lists for the Self-Certifying Filesystem", + author = "George Savvides", + school = MIT, + year = 2002, month = Aug, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:savvides-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:savvides-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:savvides-meng.ps.gz", +} + +@mastersthesis{sfs:euresti-meng, + title = "Self-Certifying Filesystem Implementation for Windows", + author = "David Euresti", + school = MIT, + year = 2002, month = Aug, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:euresti-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:euresti-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:euresti-meng.ps.gz", +} + +@mastersthesis{sfs:zeldovich-meng, + title = "Concurrency Control for Multi-Processor Event-Driven Systems", + author = "Nickolai Zeldovich", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/sfs:zeldovich-meng.pdf", + www_ps_url = PDOSWWW # "/papers/sfs:zeldovich-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/sfs:zeldovich-meng.ps.gz", +} + +@mastersthesis{chord:om_p-meng, + title = "A Keyword Set Search System for Peer-to-Peer Networks", + author = "Omprakash D Gnawali", + school = MIT, + year = 2002, month = Jun, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:om_p-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:om_p-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:om_p-meng.ps.gz", +} + +@mastersthesis{grid:bac-meng, + title = "The Grid Roofnet: a Rooftop Ad Hoc Wireless Network", + author = "Benjamin A. Chambers", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/grid:bac-meng.pdf", + www_ps_url = PDOSWWW # "/papers/grid:bac-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/grid:bac-meng.ps.gz", +} + +@mastersthesis{tarzan:freedman-meng, + title = "A Peer-to-Peer Anonymizing Network Layer", + author = "Michael J. Freedman", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/tarzan:freedman-meng/index.html", + www_pdf_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.pdf", + www_ps_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/tarzan:freedman-meng/tarzan:freedman-meng.ps.gz", +} + + +@mastersthesis{chord:tburkard-meng, + title = "Herodotus: A Peer-to-Peer Web Archival System", + author = "Timo Burkard", + school = MIT, + year = 2002, month = May, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:tburkard-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:tburkard-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:tburkard-meng.ps.gz", +} + +@mastersthesis{cfs:dabek-meng, + title = "A Cooperative File System", + author = "Frank Dabek", + school = MIT, + year = 2001, month = September, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:dabek_thesis/dabek.pdf", + www_ps_url = PDOSWWW # "/papers/chord:dabek_thesis/dabek.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:dabek_thesis/tyan-meng.ps.gz", +} + +@mastersthesis{chord:tyan-meng, + title = "A Case Study of Server Selection", + author = "Tina Tyan", + school = MIT, + year = 2001, month = September, + www_section = masterstheses, + www_pdf_url = PDOSWWW # "/papers/chord:tyan-meng.pdf", + www_ps_url = PDOSWWW # "/papers/chord:tyan-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/chord:tyan-meng.ps.gz", +} + +@mastersthesis{click:gil-ms, + title = "MULTOPS: a data structure for denial-of-service attack detection", + author = "Thomer M. Gil", + school = "Vrije Universiteit", + year = 2000, month = August, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/click:gil-ms.ps.gz", +} + +@mastersthesis{click:sit-ms, + title = "A Study of Caching in the Internet Domain Name System", + author = "Emil Sit", + school = MIT, + year = 2000, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/click:sit-ms.ps.gz", +} + + +@mastersthesis{sfs:kaminsky-ms, + title = "Flexible Key Management with SFS Agents", + author = "Michael Kaminsky", + school = MIT, + year = 2000, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:kaminsky-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:kaminsky-ms.pdf", +} + +@mastersthesis{sfs:almeida-ms, + title = "Framework for Implementing File Systems in Windows NT", + author = "Danilo Almeida", + school = MIT, + year = 1998, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:almeida-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:almeida-ms.pdf", +} + +@mastersthesis{sfs:rimer-ms, + title = "The Secure File System under Windows NT", + author = "Matthew Rimer", + school = MIT, + year = 1999, month = June, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:rimer-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/sfs:rimer-ms.pdf", +} + +@mastersthesis{prolac:montgomery-meng, + title = "A fast {Prolac} {TCP} for the real world", + author = "Montgomery, Jr., David Rogers", + school = MIT, + year = 1999, month = may, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/prolac:montgomery-meng.ps.gz", +} + +@mastersthesis{exo:coffing-meng, + title = "An x86 Protected Mode Virtual Machine Monitor for the MIT Exokernel", + author = "Charles L. Coffing", + school = MIT, + year = 1999, month = May, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/exo:coffing-meng.ps", + www_ps_gz_url = PDOSWWW # "/papers/exo:coffing-meng.ps.gz", +} + +@mastersthesis{exo:chen-meng, + title = "Multiprocessing with the Exokernel Operating System", + author = "Benjie Chen", + school = MIT, + year = 2000, month = February, + www_section = masterstheses, + www_html_url = PDOSWWW # "/papers/exo:chen-meng.html", + www_ps_url = PDOSWWW # "/papers/exo:chen-meng.ps", + www_pdf_url = PDOSWWW # "/papers/exo:chen-meng.pdf", + www_ps_gz_url = PDOSWWW # "/papers/exo:chen-meng.ps.gz", +} + +@mastersthesis{exo:candea-meng, + title = "Flexible and efficient sharing of protected abstractions", + author = "George M. Candea", + school = MIT, + year = 1998, month = may, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/candea-meng.html", + www_ps_url = PDOSWWW # "/papers/ProtAbs.ps", + www_ps_gz_url = PDOSWWW # "/papers/ProtAbs.ps.gz", + www_pdf_url = PDOSWWW # "/papers/ProtAbs.pdf", +} + +@mastersthesis{exo-os:jj-meng, + title = "Applying Exokernel Principles to Conventional Operating Systems", + author = "John Jannotti", + school = MIT, + year = 1998, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/jj-meng-exo-feb98.ps", + www_ps_gz_url = PDOSWWW # "/papers/jj-meng-exo-feb98.ps.gz", + www_pdf_url = PDOSWWW # "/papers/jj-meng-exo-feb98.pdf", +} + +@mastersthesis{pan:nygren-meng, + title = "The design and implementation of a high-performance active network node", + author = "Erik L. Nygren", + school = MIT, + year = 1998, month = feb, + www_section = masterstheses, + www_abstract_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.html", + www_ps_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.ps", + www_ps_gz_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.ps.gz", + www_pdf_url = PDOSWWW # "/papers/nygren-mengthesis-pan-feb98.pdf", +} + +@mastersthesis{exo:wyatt-meng, + title = "Shared libraries in an exokernel operating system", + author = "Douglas Karl Wyatt", + school = MIT, + year = 1997, month = sep, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/dwyatt/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/dwyatt/thesis.ps.gz", +} + +@mastersthesis{prolac:kohler-ms, + title = "Prolac: a language for protocol compilation", + author = "Eddie Kohler", + school = MIT, + year = 1997, month = sep, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/prolac:kohler-ms.ps.gz", + www_pdf_url = PDOSWWW # "/papers/prolac:kohler-ms.pdf", +} + +@mastersthesis{sfs:mazieres-ms, + title = "Security and decentralized control in the {SFS} global file system", + author = "David Mazi{\`e}res", + school = MIT, + year = 1997, month = aug, + www_section = masterstheses, + www_ps_gz_url = PDOSWWW # "/papers/sfs:mazieres-ms.ps.gz" +} + +@mastersthesis{exo:pinckney-meng, + title = "Operating system extensibility through event capture", + author = "Thomas {Pinckney III}", + school = MIT, + year = 1997, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/pinckney/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/pinckney/thesis.ps.gz", +} + +@mastersthesis{exo:briceno-meng, + title = "Decentralizing {UNIX} abstractions in the exokernel architecture", + author = "H{\'e}ctor Manuel {Brice{\~n}o Pulido}", + school = MIT, + year = 1997, month = feb, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/hbriceno/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/hbriceno/thesis.ps.gz", +} + +@mastersthesis{rover:nntp, + title = "The {Rover} {NNTP} proxy", + author = "Constantine Cristakos", + school = MIT, + year = 1996, month = jun, + type = "Advanced Undergraduate Project", + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/DeanAUP.ps", + www_ps_gz_url = PDOSWWW # "/papers/DeanAUP.ps.gz", +} + +@mastersthesis{exo:grimm-ms, + title = "Exodisk: maximizing application control over storage management", + author = "Robert Grimm", + school = MIT, + year = 1996, month = may, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/exo/theses/rgrimm/thesis.ps", + www_ps_gz_url = PDOSWWW # "/exo/theses/rgrimm/thesis.ps.gz", +} + +@mastersthesis{rover:tauber-ms, + title = "Issues in building mobile-aware applications with the {Rover} toolkit", + author = "Joshua A. Tauber", + school = MIT, + year = 1996, month = may, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/JoshThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/JoshThesis.ps.gz", +} + +@mastersthesis{rover-mosaic:delespinasse-thesis, + title = "{Rover} {Mosaic}: e-mail communication for a full-function {Web} browser", + author = "Alan F. {deLespinasse}", + school = MIT, + year = 1995, month = jun, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/RoverMosaicThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/RoverMosaicThesis.ps.gz", +} + +@mastersthesis{r2over-mosaic:delespinasse-thesis, + title = {{Rover} {Mosaic}: e-mail communication for a full-function {Web} browser}, + author = "Alan F. {deLespinasse}", + school = MIT, + year = 1995, month = jun, + www_section = masterstheses, + www_ps_url = PDOSWWW # "/papers/RoverMosaicThesis.ps", + www_ps_gz_url = PDOSWWW # "/papers/RoverMosaicThesis.ps.gz", +} + + +%% PROCEEDINGS + +@proceedings{asplos6, + booktitle = "Proceedings of the 6th International Conference on Architectural Support for Programming Languages and Operating Systems ({ASPLOS-VI})", + year = 1994, month = oct, + address = "San Jose, California" +} + +@proceedings{ccs5, + booktitle = "Proceedings of the 5th {ACM} Conference on Computer and Communications Security ({CCS-5})", + year = 1998, month = nov, + address = "San Francisco, California", + bookurl = "http://www.bell-labs.com/user/reiter/ccs5/" +} + +@proceedings{ccs9, + booktitle = "Proceedings of the 9th {ACM} Conference on Computer and Communications Security ({CCS-9})", + year = 2002, month = nov, + address = "Washington, D.C.", + bookurl = "http://www.acm.org/sigs/sigsac/ccs/" +} + +@proceedings{dcs16, + booktitle = "Proceedings of the 16th International Conference on Distributed Computing Systems", + organization = IEEECompSoc, + year = 1996, month = may, + address = "Hong Kong", +} + +@proceedings{dcs15, + booktitle = "Proceedings of the 15th International Conference on Distributed Computing Systems", + organization = IEEECompSoc, + year = 1995, month = jun, + address = "Vancouver, British Columbia", +} + +@proceedings{hotnets1, + booktitle = "Proceedings of the First {W}orkshop on {H}ot {T}opics in {N}etworks ({HotNets-I})", + year = 2002, month = oct, + organization = "{ACM SIGCOMM}", + address = "Princeton, New Jersey", + bookurl = "http://www.cs.washington.edu/hotnets/", +} + +@proceedings{hotos8, + booktitle = "Proceedings of the 8th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-VIII})", + year = 2001, month = may, + organization = IEEECompSoc, + address = "Schloss Elmau, Germany", + bookurl = "http://i30www.ira.uka.de/conferences/HotOS/", +} + +@proceedings{hotos6, + booktitle = "Proceedings of the 6th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-VI})", + year = 1997, month = may, + organization = IEEECompSoc, + address = "Chatham, Cape Cod, Massachusetts", + bookurl = "http://www.eecs.harvard.edu/hotos", +} + +@proceedings{hotos5, + booktitle = "Proceedings of the 5th {W}orkshop on {H}ot {T}opics in {O}perating {S}ystems ({HotOS-V})", + year = 1995, month = may, + organization = IEEECompSoc, + address = "Orcas Island, Washington", + bookurl = "http://www.research.microsoft.com/research/os/HotOs/", +} + +@proceedings{mobicom96, + booktitle = "Proceedings of the 2nd {ACM} International Conference on Mobile Computing and Networking ({MobiCom} '96)", + year = 1996, month = nov, + address = "Rye, New York", + bookurl = "http://www.acm.org/sigmobile/conf/mobicom96/", +} + +@proceedings{usenix02, + booktitle = "Proceedings of the 2002 USENIX Annual Technical Conference (USENIX '02)", + year = 2002, month = jun, + address = "Monterey, California", + bookurl = "http://www.usenix.org/events/usenix02/", +} + +@proceedings{usenix01, + booktitle = "Proceedings of the 2001 USENIX Annual Technical Conference (USENIX '01)", + year = 2001, month = jun, + address = "Boston, Massachusetts", + bookurl = "http://www.usenix.org/events/usenix01/", +} + +@proceedings{mobicom01, + booktitle = "Proceedings of the 7th {ACM} International Conference on Mobile Computing and Networking", + year = 2001, month = jul, + address = "Rome, Italy", + bookurl = "http://www.research.ibm.com/acm_sigmobile_conf_2001/" +} + +@proceedings{mobicom00, + booktitle = "Proceedings of the 6th {ACM} International Conference on Mobile Computing and Networking ({MobiCom} '00)", + year = 2000, month = aug, + address = "Boston, Massachusetts", + bookurl = "http://www.argreenhouse.com/mobicom2000/", +} + +@proceedings{openarch99, + booktitle = "Proceedings of the 2nd {IEEE} Conference on Open Architectures and Network Programming ({OpenArch} '99)", + year = 1999, month = mar, + address = "New York, New York", + bookurl = "http://www.ctr.columbia.edu/comet/activities/openarch99/", +} + +@proceedings{osdi5, + booktitle = "Proceedings of the 5th {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} '02)", + year = 2002, month = dec, + address = "Boston, Massachusetts", +} + +@proceedings{osdi1, + booktitle = "Proceedings of the 1st {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} '94)", + year = 1994, month = nov, + address = "Monterey, California", + bookurl = "http://www2.cs.utah.edu/~lepreau/osdi94/", +} + +@proceedings{osdi4, + booktitle = "Proceedings of the 4th {USENIX} {S}ymposium on {O}perating {S}ystems {D}esign and {I}mplementation ({OSDI} 2000)", + year = 2000, month = oct, + address = "San Diego, California", + bookurl = "http://www.usenix.org/events/osdi2000/", +} + +@proceedings{pldi97, + booktitle = "Proceedings of the {ACM} {SIGPLAN} '97 Conference on Programming Design and Implementation ({PLDI} '97)", + year = 1997, month = jun, + address = "Las Vegas, Nevada", + bookurl = "http://cs-www.bu.edu/pub/pldi97/", +} + +@proceedings{pldi96, + booktitle = "Proceedings of the {ACM} {SIGPLAN} '96 Conference on Programming Design and Implementation ({PLDI} '96)", + year = 1996, month = may, + address = "Philadelphia, Pennsylvania", +} + +@proceedings{popl96, + booktitle = "Proceedings of the 23rd {ACM} {SIGPLAN}-{SIGACT} Symposium on Principles of Programming Languages ({POPL} '96)", + year = 1996, month = jan, + address = "St. Petersburg Beach, Florida", + bookurl = "ftp://parcftp.xerox.com/pub/popl96/popl96.html" +} + +@proceedings{ppopp95, + booktitle = "Proceedings of the 5th {ACM} {SIGPLAN} Symposium on Principles and Practice of Parallel Programming ({PPoPP} '95)", + year = 1995, month = jul, + address = "Santa Barbara, California", + bookurl = "http://www.cs.ucsb.edu/Conferences/PPOPP95/", +} + +@proceedings{sigcomm99, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication", + year = 1999, month = aug, + address = "Cambridge, Massachusetts", + bookurl = "http://www.acm.org/sigcomm/sigcomm99/", +} + +@proceedings{sigcomm96, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '96 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication", + year = 1996, month = aug, + address = "Stanford, California", + bookurl = "http://www.acm.org/sigcomm/sigcomm96/", +} + +@proceedings{sigcommimw01, + booktitle = "Proceedings of the {ACM} {SIGCOMM} Internet Measurement Workshop '01", + year = 2001, month = nov, + address = "San Francisco, California", + bookurl = "http://www.acm.org/sigcomm/measworkshop2001.html" +} + +@proceedings{sigcomm01, + booktitle = "Proceedings of the {ACM} {SIGCOMM} '01 Conference", + year = 2001, month = aug, + address = "San Diego, California", + bookurl = "http://www.acm.org/sigcomm/sigcomm2001/", +} + +@proceedings{iptps02, + booktitle = "Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS)", + year = 2002, month = mar, + address = "Cambridge, MA", + bookurl = "http://www.cs.rice.edu/Conferences/IPTPS02/" +} + +@proceedings{sigops-euro9, + booktitle = "Proceedings of the 9th {ACM} {SIGOPS} {E}uropean workshop: Beyond the {PC}: New Challenges for the Operating System", + year = 2000, month = sep, + address = "Kolding, Denmark", + bookurl = "http://www.diku.dk/ew2000/", +} + +@proceedings{sigops-euro8, + booktitle = "Proceedings of the 8th {ACM} {SIGOPS} {E}uropean workshop: Support for composing distributed applications", + year = 1998, month = sep, + address = "Sintra, Portugal", + bookurl = "http://www.dsg.cs.tcd.ie/~vjcahill/sigops98/", +} + +@proceedings{sigops-euro7, + booktitle = "Proceedings of the 7th {ACM} {SIGOPS} {E}uropean workshop: Systems support for worldwide applications", + year = 1996, month = sep, + address = "Connemara, Ireland", + bookurl = "http://mosquitonet.stanford.edu/sigops96/", +} + +@proceedings{sigops-euro6, + booktitle = "Proceedings of the 6th {ACM} {SIGOPS} {E}uropean workshop: Matching operating systems to application needs", + year = 1994, month = sep, + address = "Dagstuhl Castle, Wadern, Germany", +} + +@proceedings{sosp18, + booktitle = "Proceedings of the 18th " # SOSP # " ({SOSP} '01)", + year = 2001, month = oct, + address = "Chateau Lake Louise, Banff, Canada", + bookurl = "http://www.cs.ucsd.edu/sosp01/", +} + +@proceedings{sosp17, + booktitle = "Proceedings of the 17th " # SOSP # " ({SOSP} '99)", + year = 1999, month = dec, + address = "Kiawah Island, South Carolina", + bookurl = "http://www.diku.dk/sosp99/", +} + +@proceedings{sosp16, + booktitle = "Proceedings of the 16th " # SOSP # " ({SOSP} '97)", + year = 1997, month = oct, + address = "Saint-Mal{\^o}, France", + bookurl = "http://www.cs.washington.edu/sosp16", +} + +@proceedings{sosp15, + booktitle = "Proceedings of the 15th " # SOSP # " ({SOSP} '95)", + year = 1995, month = dec, + address = "Copper Mountain Resort, Colorado", +} + +@proceedings{sosp14, + booktitle = "Proceedings of the 14th " # SOSP # " ({SOSP} '93)", + year = 1993, month = dec, + address = "Asheville, North Carolina", +} + +@proceedings{supercomp96, + booktitle = "Supercomputing '96 Conference Proceedings: The international conference on high performance computing and communications", + organization = ACMabbr, + year = 1996, month = nov, + address = "Pittsburgh, Pennsylvania", + bookurl = "http://www.supercomp.org/sc96/", +} + +@proceedings{usenix97, + booktitle = "Proceedings of the {USENIX} 1997 Annual Technical Conference", + year = 1997, month = jan, + address = "Anaheim, California", + bookurl = "http://www.usenix.org/ana97/", +} + +@proceedings{wcsss96, + booktitle = "Workshop Record of {WCSSS} '96: The Inaugural Workshop on Compiler Support for Systems Software", + organization = "{ACM} {SIGPLAN}", + year = 1996, month = feb, + address = "Tuscon, Arizona", + bookurl = "http://www.cs.arizona.edu/wcsss96/" +} + +@proceedings{wcsss99, + booktitle = "Workshop Record of {WCSSS} '99: The 2nd {ACM} {SIGPLAN} Workshop on Compiler Support for Systems Software", + year = 1999, month = may, + address = "Atlanta, Georgia", + bookurl = "http://www.irisa.fr/compose/wcsss99/" +} + +@proceedings{wmcsa94, + booktitle = "Proceedings of the Workshop on Mobile Computing Systems and Applications ({WMCSA} '94)", + organization = IEEECompSoc, + year = 1994, month = dec, + address = "Santa Cruz, California", +} + +@proceedings{wwos4, + booktitle = "Proceedings of the 4th Workshop on Workstation Operating Systems", + organization = IEEECompSoc, + year = 1993, month = oct, + address = "Napa, California" +} + +@proceedings{www94, + booktitle = "Proceedings of the 2nd International {WWW} Conference: Mosaic and the Web", + year = 1994, month = oct, + address = "Chicago, Illinois", + bookurl = "http://www.ncsa.uiuc.edu/SDG/IT94/IT94Info-old.html", +} + +@proceedings{sec10, + booktitle = "Proceedings of the 10th {USENIX} {S}ecurity {S}ymposium", + year = 2001, month = aug, + address = "Washington, D.C.", + bookurl = "http://www.usenix.org/events/sec01/", +} + + +%% JOURNALS + +@journal{journal:ieee-toc, + journal = IEEEabbr # " Transactions on Computers", +} + +@journal{journal:osr, + journal = "Operating Systems Review", + organization = ACM, +} + +@journal{journal:toplas, + journal = ACMabbr # " Transactions on Programming Languages and Systems", +} + +@journal{journal:tocs, + journal = ACMabbr # " Transactions on Computer Systems", +} + +@journal{journal:winet, + journal = ACMabbr # " Wireless Networks", +} + diff --git a/testdata/xampl.bib b/testdata/xampl.bib new file mode 100644 index 0000000..85ee5cb --- /dev/null +++ b/testdata/xampl.bib @@ -0,0 +1,361 @@ +% Copyright (C) 1988, 2010 Oren Patashnik. +% Unlimited copying and redistribution of this file are permitted if it +% is unmodified. Modifications (and their redistribution) are also +% permitted, as long as the resulting file is renamed. + +@preamble{ "\newcommand{\noopsort}[1]{} " + # "\newcommand{\printfirst}[2]{#1} " + # "\newcommand{\singleletter}[1]{#1} " + # "\newcommand{\switchargs}[2]{#2#1} " } + +@ARTICLE{article-minimal, + author = {L[eslie] A. Aamport}, + title = {The Gnats and Gnus Document Preparation System}, + journal = {\mbox{G-Animal's} Journal}, + year = 1986, +} + +@ARTICLE{article-full, + author = {L[eslie] A. Aamport}, + title = {The Gnats and Gnus Document Preparation System}, + journal = {\mbox{G-Animal's} Journal}, + year = 1986, + volume = 41, + number = 7, + pages = "73+", + month = jul, + note = "This is a full ARTICLE entry", +} + +The KEY field is here to override the KEY field in the journal being +cross referenced (so is the NOTE field, in addition to its imparting +information). + +@ARTICLE{article-crossref, + crossref = {WHOLE-JOURNAL}, + key = "", + author = {L[eslie] A. Aamport}, + title = {The Gnats and Gnus Document Preparation System}, + pages = "73+", + note = "This is a cross-referencing ARTICLE entry", +} + +@ARTICLE{whole-journal, + key = "GAJ", + journal = {\mbox{G-Animal's} Journal}, + year = 1986, + volume = 41, + number = 7, + month = jul, + note = {The entire issue is devoted to gnats and gnus + (this entry is a cross-referenced ARTICLE (journal))}, +} + +@INBOOK{inbook-minimal, + author = "Donald E. Knuth", + title = "Fundamental Algorithms", + publisher = "Addison-Wesley", + year = "{\noopsort{1973b}}1973", + chapter = "1.2", +} + +@INBOOK{inbook-full, + author = "Donald E. Knuth", + title = "Fundamental Algorithms", + volume = 1, + series = "The Art of Computer Programming", + publisher = "Addison-Wesley", + address = "Reading, Massachusetts", + edition = "Second", + month = "10~" # jan, + year = "{\noopsort{1973b}}1973", + type = "Section", + chapter = "1.2", + pages = "10--119", + note = "This is a full INBOOK entry", +} + +@INBOOK{inbook-crossref, + crossref = "whole-set", + title = "Fundamental Algorithms", + volume = 1, + series = "The Art of Computer Programming", + edition = "Second", + year = "{\noopsort{1973b}}1973", + type = "Section", + chapter = "1.2", + note = "This is a cross-referencing INBOOK entry", +} + +@BOOK{book-minimal, + author = "Donald E. Knuth", + title = "Seminumerical Algorithms", + publisher = "Addison-Wesley", + year = "{\noopsort{1973c}}1981", +} + +@BOOK{book-full, + author = "Donald E. Knuth", + title = "Seminumerical Algorithms", + volume = 2, + series = "The Art of Computer Programming", + publisher = "Addison-Wesley", + address = "Reading, Massachusetts", + edition = "Second", + month = "10~" # jan, + year = "{\noopsort{1973c}}1981", + note = "This is a full BOOK entry", +} + +@BOOK{book-crossref, + crossref = "whole-set", + title = "Seminumerical Algorithms", + volume = 2, + series = "The Art of Computer Programming", + edition = "Second", + year = "{\noopsort{1973c}}1981", + note = "This is a cross-referencing BOOK entry", +} + +@BOOK{whole-set, + author = "Donald E. Knuth", + publisher = "Addison-Wesley", + title = "The Art of Computer Programming", + series = "Four volumes", + year = "{\noopsort{1973a}}{\switchargs{--90}{1968}}", + note = "Seven volumes planned (this is a cross-referenced set of BOOKs)", +} + +@BOOKLET{booklet-minimal, + key = "Kn{\printfirst{v}{1987}}", + title = "The Programming of Computer Art", +} + +@BOOKLET{booklet-full, + author = "Jill C. Knvth", + title = "The Programming of Computer Art", + howpublished = "Vernier Art Center", + address = "Stanford, California", + month = feb, + year = 1988, + note = "This is a full BOOKLET entry", +} + +@INCOLLECTION{incollection-minimal, + author = "Daniel D. Lincoll", + title = "Semigroups of Recurrences", + booktitle = "High Speed Computer and Algorithm Organization", + publisher = "Academic Press", + year = 1977, +} + +@INCOLLECTION{incollection-full, + author = "Daniel D. Lincoll", + title = "Semigroups of Recurrences", + editor = "David J. Lipcoll and D. H. Lawrie and A. H. Sameh", + booktitle = "High Speed Computer and Algorithm Organization", + number = 23, + series = "Fast Computers", + chapter = 3, + type = "Part", + pages = "179--183", + publisher = "Academic Press", + address = "New York", + edition = "Third", + month = sep, + year = 1977, + note = "This is a full INCOLLECTION entry", +} + +@INCOLLECTION{incollection-crossref, + crossref = "whole-collection", + author = "Daniel D. Lincoll", + title = "Semigroups of Recurrences", + pages = "179--183", + note = "This is a cross-referencing INCOLLECTION entry", +} + +@BOOK{whole-collection, + editor = "David J. Lipcoll and D. H. Lawrie and A. H. Sameh", + title = "High Speed Computer and Algorithm Organization", + booktitle = "High Speed Computer and Algorithm Organization", + number = 23, + series = "Fast Computers", + publisher = "Academic Press", + address = "New York", + edition = "Third", + month = sep, + year = 1977, + note = "This is a cross-referenced BOOK (collection) entry", +} + +@MANUAL{manual-minimal, + key = "Manmaker", + title = "The Definitive Computer Manual", +} + +@MANUAL{manual-full, + author = "Larry Manmaker", + title = "The Definitive Computer Manual", + organization = "Chips-R-Us", + address = "Silicon Valley", + edition = "Silver", + month = apr # "-" # may, + year = 1986, + note = "This is a full MANUAL entry", +} + +@MASTERSTHESIS{mastersthesis-minimal, + author = "{\'{E}}douard Masterly", + title = "Mastering Thesis Writing", + school = "Stanford University", + year = 1988, +} + +@MASTERSTHESIS{mastersthesis-full, + author = "{\'{E}}douard Masterly", + title = "Mastering Thesis Writing", + school = "Stanford University", + type = "Master's project", + address = "English Department", + month = jun # "-" # aug, + year = 1988, + note = "This is a full MASTERSTHESIS entry", +} + +@MISC{misc-minimal, + key = "Missilany", + note = "This is a minimal MISC entry", +} + +@MISC{misc-full, + author = "Joe-Bob Missilany", + title = "Handing out random pamphlets in airports", + howpublished = "Handed out at O'Hare", + month = oct, + year = 1984, + note = "This is a full MISC entry", +} + +@STRING{STOC-key = "OX{\singleletter{stoc}}"} + +@STRING{ACM = "The OX Association for Computing Machinery"} + +@STRING{STOC = " Symposium on the Theory of Computing"} + +@INPROCEEDINGS{inproceedings-minimal, + author = "Alfred V. Oaho and Jeffrey D. Ullman and Mihalis Yannakakis", + title = "On Notions of Information Transfer in {VLSI} Circuits", + booktitle = "Proc. Fifteenth Annual ACM" # STOC, + year = 1983, +} + +@INPROCEEDINGS{inproceedings-full, + author = "Alfred V. Oaho and Jeffrey D. Ullman and Mihalis Yannakakis", + title = "On Notions of Information Transfer in {VLSI} Circuits", + editor = "Wizard V. Oz and Mihalis Yannakakis", + booktitle = "Proc. Fifteenth Annual ACM" # STOC, + number = 17, + series = "All ACM Conferences", + pages = "133--139", + month = mar, + year = 1983, + address = "Boston", + organization = ACM, + publisher = "Academic Press", + note = "This is a full INPROCEDINGS entry", +} + +@INPROCEEDINGS{inproceedings-crossref, + crossref = "whole-proceedings", + author = "Alfred V. Oaho and Jeffrey D. Ullman and Mihalis Yannakakis", + title = "On Notions of Information Transfer in {VLSI} Circuits", + organization = "", + pages = "133--139", + note = "This is a cross-referencing INPROCEEDINGS entry", +} + +@PROCEEDINGS{proceedings-minimal, + key = STOC-key, + title = "Proc. Fifteenth Annual" # STOC, + year = 1983, +} + +@PROCEEDINGS{proceedings-full, + editor = "Wizard V. Oz and Mihalis Yannakakis", + title = "Proc. Fifteenth Annual" # STOC, + number = 17, + series = "All ACM Conferences", + month = mar, + year = 1983, + address = "Boston", + organization = ACM, + publisher = "Academic Press", + note = "This is a full PROCEEDINGS entry", +} + +@PROCEEDINGS{whole-proceedings, + key = STOC-key, + organization = ACM, + title = "Proc. Fifteenth Annual" # STOC, + address = "Boston", + year = 1983, + booktitle = "Proc. Fifteenth Annual ACM" # STOC, + note = "This is a cross-referenced PROCEEDINGS", +} + +@PHDTHESIS{phdthesis-minimal, + author = "F. Phidias Phony-Baloney", + title = "Fighting Fire with Fire: Festooning {F}rench Phrases", + school = "Fanstord University", + year = 1988, +} + +@PHDTHESIS{phdthesis-full, + author = "F. Phidias Phony-Baloney", + title = "Fighting Fire with Fire: Festooning {F}rench Phrases", + school = "Fanstord University", + type = "{PhD} Dissertation", + address = "Department of French", + month = jun # "-" # aug, + year = 1988, + note = "This is a full PHDTHESIS entry", +} + +@TECHREPORT{techreport-minimal, + author = "Tom Terrific", + title = "An {$O(n \log n / \! \log\log n)$} Sorting Algorithm", + institution = "Fanstord University", + year = 1988, +} + +@TECHREPORT{techreport-full, + author = "Tom T{\'{e}}rrific", + title = "An {$O(n \log n / \! \log\log n)$} Sorting Algorithm", + institution = "Fanstord University", + type = "Wishful Research Result", + number = "7", + address = "Computer Science Department, Fanstord, California", + month = oct, + year = 1988, + note = "This is a full TECHREPORT entry", +} + +@UNPUBLISHED{unpublished-minimal, + author = "Ulrich {\"{U}}nderwood and Ned {\~N}et and Paul {\={P}}ot", + title = "Lower Bounds for Wishful Research Results", + note = "Talk at Fanstord University (this is a minimal UNPUBLISHED entry)", +} + +@UNPUBLISHED{unpublished-full, + author = "Ulrich {\"{U}}nderwood and Ned {\~N}et and Paul {\={P}}ot", + title = "Lower Bounds for Wishful Research Results", + month = nov # ", " # dec, + year = 1988, + note = "Talk at Fanstord University (this is a full UNPUBLISHED entry)", +} + +@MISC{random-note-crossref, + key = {Volume-2}, + note = "Volume~2 is listed under Knuth \cite{book-full}" +} |
