@misc{cryptoeprint:2017:1000,
  author = {Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg},
  title = {No right to remain silent: Isolating Malicious Mixes},
  year = {2017},
  month = {October},
  howpublished = {Cryptology ePrint Archive, Report 2017/1000},
  www_tags = {selected},
  www_section = {Anonymous communication},
  www_pdf_url = {http://eprint.iacr.org/2017/1000.pdf},
  www_html_url = {http://eprint.iacr.org/2017/1000},
}
@inproceedings{DBLP:conf/sp/Das0MK18,
  author = {Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate},
  Bibsource = {dblp computer science bibliography, https://dblp.org},
  Biburl = {https://dblp.org/rec/bib/conf/sp/Das0MK18},
  Booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}},
  Crossref = {DBLP:conf/sp/2018},
  Date-Added = {2019-01-29 02:25:00 +0100},
  Date-Modified = {2019-01-29 02:25:00 +0100},
  Doi = {10.1109/SP.2018.00011},
  Pages = {108--126},
  Timestamp = {Fri, 24 Aug 2018 00:34:59 +0200},
  Title = {Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two},
  Url = {https://doi.org/10.1109/SP.2018.00011},
  Year = {2018},
  Bdsk-Url-1 = {https://doi.org/10.1109/SP.2018.00011},
}
@article{DBLP:journals/csur/ShiraziSABD18,
  author = {Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia D{\'{\i}}az},
  Bibsource = {dblp computer science bibliography, https://dblp.org},
  Biburl = {https://dblp.org/rec/bib/journals/csur/ShiraziSABD18},
  Date-Added = {2019-01-29 01:58:26 +0100},
  Date-Modified = {2019-01-29 01:58:26 +0100},
  Doi = {10.1145/3182658},
  Journal = {{ACM} Computing Surveys},
  Number = {3},
  Pages = {51:1--51:39},
  Timestamp = {Wed, 21 Nov 2018 12:44:28 +0100},
  Title = {A Survey on Routing in Anonymous Communication Protocols},
  Url = {https://doi.org/10.1145/3182658},
  Volume = {51},
  Year = {2018},
  Bdsk-Url-1 = {https://doi.org/10.1145/3182658},
}
@inproceedings{DBLP:conf/uss/AlexopoulosKT017,
  author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias},
  Bibsource = {dblp computer science bibliography, https://dblp.org},
  Biburl = {https://dblp.org/rec/bib/conf/uss/AlexopoulosKT017},
  Booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017.},
  Crossref = {DBLP:conf/uss/2017},
  Date-Added = {2019-01-29 01:58:04 +0100},
  Date-Modified = {2019-01-29 01:58:04 +0100},
  Pages = {1217--1234},
  Timestamp = {Fri, 01 Sep 2017 12:29:11 +0200},
  Title = {MCMix: Anonymous Messaging via Secure Multiparty Computation},
  Url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos},
  Year = {2017},
  Bdsk-Url-1 = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos},
}
@inproceedings{DBLP:conf/asiacrypt/ChaidosFK018,
  author = {Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias},
  Bibsource = {dblp computer science bibliography, https://dblp.org},
  Biburl = {https://dblp.org/rec/bib/conf/asiacrypt/ChaidosFK018},
  Booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  Crossref = {DBLP:conf/asiacrypt/2018-3},
  Date-Added = {2019-01-29 01:57:14 +0100},
  Date-Modified = {2019-01-29 01:57:14 +0100},
  Doi = {10.1007/978-3-030-03332-3\_8},
  Pages = {191--221},
  Timestamp = {Thu, 22 Nov 2018 11:41:13 +0100},
  Title = {A Universally Composable Framework for the Privacy of Email Ecosystems},
  Url = {https://asiacrypt.iacr.org/2018/files/SLIDES/THURSDAY/P514/0900-1015/AC2018-conf-flat.pdf},
  Year = {2018},
  Bdsk-Url-1 = {https://doi.org/10.1007/978-3-030-03332-3%5C_8},
}
@inproceedings{entropist,
  author = {Paul Syverson},
  Booktitle = {Proceedings of Security Protocols XVII: 17th International Workshop, April 2009, Revised Selected Papers},
  Pages = {231--239},
  Publisher = {Springer-Verlag, LNCS 7028},
  Title = {Why {I'm} not an Entropist},
  Www_Pdf_Url = {http://www.syverson.org/entropist-final.pdf},
  Www_Tags = {selected},
  Year = {2013},
}
@misc{cryptoeprint:2016:489,
  author = {Nethanel Gelernter and Amir Herzberg and Hemi Leibowitz},
  Howpublished = {Cryptology ePrint Archive, Report 2016/489},
  Title = {Two Cents for Strong Anonymity: The Anonymous Post-office Protocol},
  Url = {https://eprint.iacr.org/2016/489.pdf},
  Year = {2016},
  Bdsk-Url-1 = {https://eprint.iacr.org/2016/489.pdf},
}
@misc{pets2011,
  author = {Paul Syverson},
  Title = {Sleeping dogs lie on a bed of onions but wake when mixed},
  Url = {https://petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf},
  Year = {2011},
  Bdsk-Url-1 = {https://petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf},
}
@article{chaum-mix,
  author = {David Chaum},
  Journal = {Communications of the ACM},
  Month = {February},
  Number = {2},
  Title = {Untraceable electronic mail, return addresses, and digital pseudonyms},
  Url = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf},
  Volume = {24},
  Year = {1981},
  Bdsk-Url-1 = {http://www.ovmj.org/GNUnet/papers/p84-chaum.pdf},
}
@inproceedings{ISDN-mixes,
  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  Booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems},
  Month = {February},
  Pages = {451--463},
  Title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
  Www_Ps_Gz_Url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
  Www_Tags = {selected},
  Year = {1991},
}
@inproceedings{BM:mixencrypt,
  author = {Bodo M{\"o}ller},
  Booktitle = {Proceedings of {CT-RSA} 2003},
  Month = {April},
  Publisher = {Springer-Verlag, LNCS 2612},
  Title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  Www_Pdf_Url = {http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@misc{mixmaster-spec,
  author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman},
  Howpublished = {IETF Internet Draft},
  Month = {July},
  Title = {Mixmaster {P}rotocol --- {V}ersion 2},
  Www_Important = {1},
  Www_Tags = {selected},
  Www_Txt_Url = {http://www.abditum.com/mixmaster-spec.txt},
  Year = {2003},
}
@inproceedings{abe,
  author = {Masayuki Abe},
  Booktitle = {Proceedings of {EUROCRYPT} 1998},
  Publisher = {Springer-Verlag, LNCS 1403},
  Title = {Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers},
  Www_Tags = {selected},
  Year = {1998},
}
@inproceedings{desmedt,
  author = {Yvo Desmedt and Kaoru Kurosawa},
  Booktitle = {Proceedings of {EUROCRYPT} 2000},
  Publisher = {Springer-Verlag, LNCS 1803},
  Title = {How To Break a Practical {MIX} and Design a New One},
  Www_Html_Url = {http://citeseer.nj.nec.com/447709.html},
  Www_Tags = {selected},
  Year = {2000},
}
@inproceedings{hybrid-mix,
  author = {Miyako Ohkubo and Masayuki Abe},
  Booktitle = {Proceedings of {ASIACRYPT} 2000},
  Publisher = {Springer-Verlag, LNCS 1976},
  Title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  Www_Tags = {selected},
  Year = {2000},
}
@inproceedings{jakobsson-optimally,
  author = {Markus Jakobsson and Ari Juels},
  Booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '01},
  Publisher = {ACM Press},
  Title = {An Optimally Robust Hybrid Mix Network (Extended Abstract)},
  Www_Html_Url = {http://citeseer.nj.nec.com/492015.html},
  Www_Tags = {selected},
  Year = {2001},
}
@inproceedings{stop-and-go,
  author = {Dogan Kesdogan and Jan Egner and Roland B\"uschkes},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 1998)},
  Publisher = {Springer-Verlag, LNCS 1525},
  Title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System},
  Www_Pdf_Url = {http://www.uow.edu.au/~ldn01/infohide98.pdf},
  Www_Tags = {selected},
  Year = {1998},
}
@inproceedings{flash-mix,
  author = {Markus Jakobsson},
  Booktitle = {Proceedings of Principles of Distributed Computing - {PODC} '99},
  Publisher = {ACM Press},
  Title = {Flash {M}ixing},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/flashmix/flashmix.pdf},
  Www_Tags = {selected},
  Year = {1999},
}
@inproceedings{babel,
  author = {Ceki G\"ulc\"u and Gene Tsudik},
  Booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
  Month = {February},
  Pages = {2--16},
  Publisher = {IEEE},
  Title = {Mixing {E}-mail With {B}abel},
  Www_Html_Url = {http://citeseer.nj.nec.com/2254.html},
  Www_Important = {1},
  Www_Ps_Url = {http://www.isoc.org/conferences/ndss96/gulcu.ps},
  Www_Tags = {selected},
  Year = {1996},
}
@inproceedings{minion-design,
  author = {George Danezis and Roger Dingledine and Nick Mathewson},
  Booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
  Month = {May},
  Pages = {2--15},
  Title = {{Mixminion: Design of a Type III Anonymous Remailer Protocol}},
  Www_Important = {1},
  Www_Pdf_Url = {http://mixminion.net/minion-design.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{agrawal03,
  author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz},
  Booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
  Month = {May},
  Pages = {16--27},
  Title = {{Probabilistic Treatment of MIXes to Hamper Traffic Analysis}},
  Www_Pdf_Url = {http://www.research.ibm.com/people/a/agrawal/publications/AKP2003.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{wright03,
  author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  Booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy},
  Month = {May},
  Pages = {28--43},
  Title = {Defending Anonymous Communication Against Passive Logging Attacks},
  Www_Pdf_Url = {http://www.cs.umass.edu/~mwright/papers/wright-passive.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{mix-acc,
  author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
  Month = {April},
  Pages = {126--141},
  Publisher = {Springer-Verlag, LNCS 2137},
  Title = {{A Reputation System to Increase MIX-net Reliability}},
  Www_Pdf_Url = {http://freehaven.net/doc/mix-acc/mix-acc.pdf},
  Www_Ps_Url = {http://freehaven.net/doc/mix-acc/mix-acc.ps},
  Www_Tags = {selected},
  Year = {2001},
}
@inproceedings{casc-rep,
  author = {Roger Dingledine and Paul Syverson},
  Booktitle = {Proceedings of Financial Cryptography (FC '02)},
  Month = {March},
  Publisher = {Springer-Verlag, LNCS 2357},
  Title = {{Reliable MIX Cascade Networks through Reputation}},
  Www_Pdf_Url = {http://freehaven.net/doc/casc-rep/casc-rep.pdf},
  Www_Ps_Url = {http://freehaven.net/doc/casc-rep/casc-rep.ps},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{pfitzmann90how,
  author = {Birgit Pfitzmann and Andreas Pfitzmann},
  Booktitle = {Proceedings of {EUROCRYPT} 1989},
  Publisher = {Springer-Verlag, LNCS 434},
  Title = {How to Break the Direct {RSA}-Implementation of {MIXes}},
  Www_Ps_Gz_Url = {http://www.semper.org/sirene/lit/abstr90.html#PfPf_90},
  Year = {1990},
}
@inproceedings{trickle02,
  author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 2002)},
  Month = {October},
  Publisher = {Springer-Verlag, LNCS 2578},
  Title = {From a Trickle to a Flood: Active Attacks on Several Mix Types},
  Www_Important = {1},
  Www_Pdf_Url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf},
  Www_Ps_Url = {http://freehaven.net/doc/batching-taxonomy/taxonomy.ps},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{disad-free-routes,
  author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  Booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability},
  Month = {July},
  Pages = {30--45},
  Publisher = {Springer-Verlag, LNCS 2009},
  Title = {The disadvantages of free {MIX} routes and how to overcome them},
  Www_Pdf_Url = {http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf},
  Www_Tags = {selected},
  Year = {2000},
}
@inproceedings{randomized-checking,
  author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest},
  Booktitle = {Proceedings of the 11th USENIX Security Symposium},
  Month = {August},
  Title = {Making mix nets robust for electronic voting by randomized partial checking},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/rpcmix/rpcmix.pdf},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{web-mix:pet2000,
  author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  Booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability},
  Month = {July},
  Pages = {115--129},
  Publisher = {Springer-Verlag, LNCS 2009},
  Title = {Web {MIX}es: A system for anonymous and unobservable {I}nternet access},
  Www_Pdf_Url = {http://www.inf.fu-berlin.de/~feder/publ/2001/BeFK2001BerkeleyLNCS2009.pdf},
  Www_Tags = {selected},
  Year = {2000},
}
@inproceedings{BonehGolle:psp2002,
  author = {Dan Boneh and Philippe Golle},
  Booktitle = {{Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)}},
  Location = {Washington, DC},
  Month = {November},
  Pages = {68--77},
  Title = {Almost Entirely Correct Mixing With Application to Voting},
  Www_Pdf_Url = {http://crypto.stanford.edu/~pgolle/papers/psp.ps},
  Www_Tags = {selected},
  Year = {2002},
}
@article{realtime-mix,
  author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
  Journal = {IEEE Journal on Selected Areas in Communications},
  Number = {4},
  Title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  Volume = {16},
  Www_Html_Url = {http://www.zurich.ibm.com/security/publications/1998.html},
  Www_Tags = {selected},
  Year = {1998},
}
@inproceedings{SK,
  author = {Joe Kilian and Kazue Sako},
  Booktitle = {Proceedings of {EUROCRYPT} 1995},
  Month = {May},
  Publisher = {Springer-Verlag},
  Title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth},
  Www_Tags = {selected},
  Year = {1995},
}
@inproceedings{danezis:pet2003,
  author = {George Danezis},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
  Month = {March},
  Pages = {1--17},
  Publisher = {Springer-Verlag, LNCS 2760},
  Title = {Mix-networks with Restricted Routes},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.cl.cam.ac.uk/~gd216/ExpMix.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{diaz:pet2003,
  author = {Claudia Diaz and Andrei Serjantov},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
  Month = {March},
  Pages = {18--31},
  Publisher = {Springer-Verlag, LNCS 2760},
  Title = {Generalising Mixes},
  Www_Important = {1},
  Www_Ps_Gz_Url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{nguyen:pet2003,
  author = {Lan Nguyen and Rei Safavi-Naini},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
  Month = {March},
  Pages = {66--80},
  Publisher = {Springer-Verlag, LNCS 2760},
  Title = {Breaking and Mending Resilient Mix-nets},
  Www_Pdf_Url = {http://www.petworkshop.org/2003/preproc/05-preproc.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{morphmix:wpes2002,
  author = {Marc Rennhard and Bernhard Plattner},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)}},
  Location = {Washington, DC, USA},
  Month = {November},
  Title = {{Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection}},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf},
  Www_Ps_Gz_Url = {http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.ps.gz},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{RP03-1,
  author = {Marc Rennhard and Bernhard Plattner},
  Booktitle = {{Proceedings of the IEEE 8th Intl. Workshop on Enterprise Security (WET ICE 2003)}},
  Location = {Linz, Austria},
  Month = {June},
  Title = {{Practical Anonymity for the Masses with Mix-Networks}},
  Www_Pdf_Url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.pdf},
  Www_Ps_Gz_Url = {http://www.tik.ee.ethz.ch/~rennhard/publications/WetIce2003.ps.gz},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{Dan:SFMix03,
  author = {George Danezis},
  Booktitle = {Proceedings of 7th Nordic Workshop on Secure {IT} Systems},
  Day = {7},
  Location = {Karlstad, Sweden},
  Month = {November},
  Pages = {195--207},
  Title = {Forward Secure Mixes},
  Www_Pdf_Url = {http://www.cl.cam.ac.uk/~gd216/fsmix.pdf},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{SN03,
  author = {Andrei Serjantov and Richard E. Newman},
  Booktitle = {Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems},
  Location = {Athens, Greece},
  Month = {May},
  Pages = {427--434},
  Publisher = {Kluwer},
  Title = {On the Anonymity of Timed Pool Mixes},
  Www_Ps_Url = {http://www.cl.cam.ac.uk/~aas23/papers_aas/timed_mix_final.ps},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{reusable-channels:wpes2003,
  author = {Philippe Golle and Markus Jakobsson},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}},
  Location = {Washington, DC, USA},
  Month = {October},
  Title = {Reusable Anonymous Return Channels},
  Www_Pdf_Url = {http://crypto.stanford.edu/~pgolle/papers/return.pdf},
  Www_Ps_Url = {http://crypto.stanford.edu/~pgolle/papers/return.ps},
  Www_Remarks = {Reencryption mix-nets can allow users to use a single reply channel even when they maintain multiple separate nyms (think of it like a reply block but it looks different each time you give it to somebody).},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{danezis:wpes2003,
  author = {George Danezis and Len Sassaman},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}},
  Location = {Washington, DC, USA},
  Month = {October},
  Title = {Heartbeat Traffic to Counter (n-1) Attacks},
  Www_Pdf_Url = {http://www.cl.cam.ac.uk/users/gd216/p125_danezis.pdf},
  Www_Remarks = {Mix nodes should send out "heartbeat" messages (dummies that start and end at that node). By measuring how many return in a given time, they can detect whether the adversary is dropping or delaying traffic coming into them (possibly so he can launch an active blending attack).},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{bauer:wpes2003,
  author = {Matthias Bauer},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)}},
  Location = {Washington, DC, USA},
  Month = {October},
  Title = {{New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets}},
  Www_Important = {1},
  Www_Ps_Url = {http://www1.informatik.uni-erlangen.de/~bauer/109-bauer.ps},
  Www_Remarks = {Anonymity sets in deployed systems are small because few people think it's worthwhile to use them. But we can take advantage of ordinary web users to transfer messages (that is, mix them) from one webserver to another via cookies and http redirect tricks. Senders and receivers should also look like ordinary web users, so anonymity sets are large.},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{GolleJakobssonJuelsSyverson:universal04,
  author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul Syverson},
  Booktitle = {Proceedings of the 2004 RSA Conference, Cryptographer's track},
  Location = {San Francisco, USA},
  Month = {February},
  Title = {Universal Re-Encryption for Mixnets},
  Www_Pdf_Url = {http://www.syverson.org/univrenc-ctrsa.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{GKK03,
  author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski},
  Booktitle = {Proceedings of ESORICS 2003},
  Month = {October},
  Title = {Rapid Mixing and Security of Chaum's Visual Electronic Voting},
  Www_Pdf_Url = {http://www.im.pwr.wroc.pl/~kutylow/articles/chaum.pdf},
  Www_Tags = {selected},
  Year = {2003},
}
@inproceedings{timing-fc2004,
  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
  Booktitle = {Proceedings of Financial Cryptography (FC '04)},
  Month = {February},
  Pages = {251--265},
  Publisher = {Springer-Verlag, LNCS 3110},
  Title = {Timing Attacks in Low-Latency Mix-Based Systems},
  Www_Pdf_Url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{morphmix-fc2004,
  author = {Marc Rennhard and Bernhard Plattner},
  Booktitle = {Proceedings of Financial Cryptography (FC '04)},
  Month = {February},
  Pages = {233--250},
  Publisher = {Springer-Verlag, LNCS 3110},
  Title = {Practical Anonymity for the Masses with MorphMix},
  Www_Pdf_Url = {http://home.zhwin.ch/~rer/publications/FC2004.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{mixminion-fc2004,
  author = {Nick Mathewson and Roger Dingledine},
  Booktitle = {Proceedings of Financial Cryptography (FC '04)},
  Month = {February},
  Pages = {227--232},
  Publisher = {Springer-Verlag, LNCS 3110},
  Title = {Mixminion: Strong Anonymity for Financial cryptography},
  Www_Pdf_Url = {http://freehaven.net/doc/fc04/minion-systems.pdf},
  Year = {2004},
}
@inproceedings{pool-dummy04,
  author = {Claudia Diaz and Bart Preneel},
  Booktitle = {Proceedings of 6th Information Hiding Workshop (IH 2004)},
  Location = {Toronto},
  Month = {May},
  Series = {LNCS},
  Title = {Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic},
  Www_Pdf_Url = {https://www.cosic.esat.kuleuven.be/publications/article-95.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{taxonomy-dummy,
  author = {Claudia Diaz and Bart Preneel},
  Booktitle = {Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems},
  Location = {Toulouse, France},
  Month = {August},
  Title = {Taxonomy of Mixes and Dummy Traffic},
  Www_Pdf_Url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_inetsec.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{newman:pet2004,
  author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {1--16},
  Series = {LNCS},
  Title = {Anonymity and Covert Channels in Simple Timed Mix-firewalls},
  Volume = {3424},
  Www_Pdf_Url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.pdf},
  Www_Ps_Url = {http://chacs.nrl.navy.mil/publications/CHACS/2004/2004newman-pet2004.ps},
  Www_Remarks = {If we think about leaked anonymity as a covert channel between the sender Alice and the adversary Eve, then by measuring covert channel capacity we can get an upper bound on the amount of information Alice could leak.},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{danezis:pet2004,
  author = {George Danezis},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {35--50},
  Series = {LNCS},
  Title = {The Traffic Analysis of Continuous-Time Mixes},
  Volume = {3424},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{golle:pet2004,
  author = {Philippe Golle},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {51--63},
  Series = {LNCS},
  Title = {Reputable Mix Networks},
  Volume = {3424},
  Www_Pdf_Url = {http://crypto.stanford.edu/~pgolle/papers/reputable.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{fairbrother:pet2004,
  author = {Peter Fairbrother},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {79--87},
  Series = {LNCS},
  Title = {An Improved Construction for Universal Re-encryption},
  Volume = {3424},
  Www_Pdf_Url = {http://www.m-o-o-t.org/ICUR.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{sync-batching,
  author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {186--206},
  Series = {LNCS},
  Title = {Synchronous Batching: From Cascades to Free Routes},
  Volume = {3424},
  Www_Pdf_Url = {http://freehaven.net/doc/sync-batching/sync-batching.pdf},
  Www_Ps_Url = {http://freehaven.net/doc/sync-batching/sync-batching.ps},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{flow-correlation04,
  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Month = {May},
  Pages = {207--225},
  Series = {LNCS},
  Title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
  Volume = {3424},
  Www_Pdf_Url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{cascades-vs-p2p:pet2004,
  author = {Rainer B\"ohme and George Danezis and Claudia Diaz and Stefan K\"opsell and Andreas Pfitzmann},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
  Pages = {226--241},
  Series = {Springer-Verlag, LNCS},
  Title = {On the PET Workshop Panel ``Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?''},
  Volume = {3424},
  Www_Pdf_Url = {http://www.cosic.esat.kuleuven.be/publications/article-523.pdf},
  Year = {2004},
}
@inproceedings{mixmaster-reliable,
  author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte},
  Booktitle = {Proceedings of ESORICS 2004},
  Location = {France},
  Month = {September},
  Series = {LNCS},
  Title = {Comparison between two practical mix designs},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.cosic.esat.kuleuven.be/publications/article-98.pdf},
  Www_Ps_Gz_Url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/cdiaz_esorics.ps.gz},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{danezis:wpes2004,
  author = {George Danezis and Ben Laurie},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
  Location = {Washington, DC, USA},
  Month = {October},
  Title = {Minx: A simple and efficient anonymous packet format},
  Www_Pdf_Url = {http://research.microsoft.com/~gdane/papers/minx.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{reiter:ccs2004,
  author = {Michael Reiter and XiaoFeng Wang},
  Booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}},
  Month = {October},
  Publisher = {ACM Press},
  Title = {Fragile Mixing},
  Www_Pdf_Url = {http://www.cs.cmu.edu/~xiaofeng/papers/fragile-mixing.pdf},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{golle:ccs2004,
  author = {Philippe Golle and Ari Juels},
  Booktitle = {{Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)}},
  Month = {October},
  Publisher = {ACM Press},
  Title = {Parallel Mixing},
  Www_Pdf_Url = {http://crypto.stanford.edu/~pgolle/papers/parallel.pdf},
  Www_Ps_Url = {http://crypto.stanford.edu/~pgolle/papers/parallel.ps},
  Www_Tags = {selected},
  Year = {2004},
}
@inproceedings{pet05-borisov,
  author = {Nikita Borisov},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  Month = {May},
  Pages = {12--25},
  Title = {An Analysis of Parallel Mixing with Attacker-Controlled Inputs},
  Www_Pdf_Url = {http://www.crhc.uiuc.edu/~nikita/papers/parmix.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{pet05-zhu,
  author = {Ye Zhu and Riccardo Bettati},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  Month = {May},
  Pages = {110--127},
  Title = {Unmixing Mix Traffic},
  Www_Pdf_Url = {http://faculty.cs.tamu.edu/bettati/Papers/pet05/pet2005.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{pet05-camenisch,
  author = {Jan Camenisch and Anton Mityagin},
  Booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
  Month = {May},
  Pages = {128--147},
  Title = {Mix-network with Stronger Security},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{ih05-danezisclulow,
  author = {George Danezis and Jolyon Clulow},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
  Month = {June},
  Pages = {11--25},
  Title = {Compulsion Resistant Anonymous Communications},
  Www_Pdf_Url = {http://www.cl.cam.ac.uk/users/gd216/compel.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{ih05-Klonowski,
  author = {Marek Klonowski and Miroslaw Kutylowski},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
  Month = {June},
  Pages = {26--38},
  Title = {Provable Anonymity for Networks of Mixes},
  Www_Pdf_Url = {http://kutylowski.im.pwr.wroc.pl/articles/kaskady-WWW.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{ih05-Luke,
  author = {Luke O'Connor},
  Booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
  Month = {June},
  Pages = {39--52},
  Title = {On Blending Attacks For Mixes with Memory},
  Www_Pdf_Url = {http://lukejamesoconnor.googlepages.com/blending-attacks.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@misc{cryptoeprint:2005:394,
  author = {Ben Adida and Douglas Wikstr\"om},
  Howpublished = {Cryptology ePrint Archive, Report 2005/394},
  Month = {November},
  Title = {Obfuscated Ciphertext Mixing},
  Www_Html_Url = {http://eprint.iacr.org/2005/394},
  Www_Pdf_Url = {http://eprint.iacr.org/2005/394.pdf},
  Www_Tags = {selected},
  Year = {2005},
}
@inproceedings{UREbreak06,
  author = {George Danezis},
  Booktitle = {Proceedings of Information Security Conference 2006},
  Month = {September},
  Publisher = {Springer-Verlag},
  Title = {Breaking Four Mix-related Schemes Based on Universal Re-encryption},
  Www_Pdf_Url = {http://homes.esat.kuleuven.be/~gdanezis/UREbreak.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{Golle:sp2006,
  author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow},
  Booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
  Location = {Oakland, CA},
  Month = {May},
  Pages = {121--131},
  Publisher = {IEEE CS},
  Title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
  Www_Pdf_Url = {http://www.informatics.indiana.edu/xw7/papers/tdmix-sp.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{icdcs2006:m2,
  author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
  Booktitle = {Proceedings of the 26th IEEE Conference on Distributed Computing Systems},
  Day = {4--7},
  Month = {July},
  Title = {M2: Multicasting Mixes for Efficient and Anonymous Communication},
  Www_Pdf_Url = {http://www.ece.cmu.edu/~reiter/papers/2006/ICDCS.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{morphmix:pet2006,
  author = {Parisa Tabriz and Nikita Borisov},
  Booktitle = {Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)},
  Bookurl = {http://petworkshop.org/2006/},
  Location = {Cambridge, UK},
  Month = {June},
  Pages = {368--384},
  Publisher = {Springer},
  Title = {Breaking the Collusion Detection Mechanism of MorphMix},
  Www_Pdf_Url = {http://petworkshop.org/2006/preproc/preproc_21.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{ShWa-Timing06,
  author = {Vitaly Shmatikov and Ming-Hsiu Wang},
  Booktitle = {Proceedings of ESORICS 2006},
  Month = {September},
  Title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses},
  Www_Important = {1},
  Www_Pdf_Url = {http://www.cs.utexas.edu/~shmat/shmat_esorics06.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{ShWa-Relationship,
  author = {Vitaly Shmatikov and Ming-Hsiu Wang},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}},
  Month = {October},
  Title = {Measuring Relationship Anonymity in Mix Networks},
  Www_Pdf_Url = {http://www.cs.utexas.edu/~shmat/shmat_wpes06.pdf},
  Www_Tags = {selected},
  Year = {2006},
}
@inproceedings{wpes06:heydt-benjamin,
  author = {Thomas S. Heydt-Benjamin and Andrei Serjantov and Benessa Defend},
  Address = {New York, NY, USA},
  Booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006)}},
  Doi = {http://doi.acm.org/10.1145/1179601.1179603},
  Isbn = {1-59593-556-8},
  Location = {Alexandria, Virginia, USA},
  Month = {October},
  Pages = {1--8},
  Publisher = {ACM Press},
  Title = {Nonesuch: a mix network with sender unobservability},
  Www_Pdf_Url = {http://www.cs.umass.edu/~tshb/wpes40-heydt-benjamin.pdf},
  Www_Tags = {selected},
  Year = {2006},
  Bdsk-Url-1 = {http://doi.acm.org/10.1145/1179601.1179603},
}
@inproceedings{serjantov-pet2007,
  author = {Andrei Serjantov},
  Booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)},
  Bookurl = {http://petworkshop.org/2007/},
  Location = {Ottawa, Canada},
  Month = {June},
  Publisher = {Springer},
  Title = {A Fresh Look at the Generalized Mix Framework},
  Www_Pdf_Url = {http://petworkshop.org/2007/papers/PET2007_preproc_Fresh_look.pdf},
  Year = {2007},
}
@inproceedings{nagaraja-pet2007,
  author = {Shishir Nagaraja},
  Booktitle = {Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)},
  Bookurl = {http://petworkshop.org/2007/},
  Location = {Ottawa, Canada},
  Month = {June},
  Publisher = {Springer},
  Title = {Anonymity in the wild: Mixes on unstructured networks},
  Www_Pdf_Url = {http://petworkshop.org/2007/papers/PET2007_preproc_Anonymity_wild.pdf},
  Year = {2007},
}
@article{regroup2006,
  author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao},
  Doi = {http://dx.doi.org/10.1108/10662240610656528},
  Journal = {Journal of Internet Research},
  Number = {2},
  Pages = {213--223},
  Publisher = {Emerald Group Publishing Limited},
  Title = {Regroup-And-Go mixes to counter the $(n-1)$ attack},
  Volume = {16},
  Www_Tags = {selected},
  Year = {2006},
  Bdsk-Url-1 = {http://dx.doi.org/10.1108/10662240610656528},
}
@article{wagner,
  author = {Robyn Wagner},
  Journal = {New Mexico Law Review},
  Number = {Winter},
  Pages = {99--142},
  Title = {{Don't Shoot the Messenger: Limiting the Liability of Anonymous Remailers}},
  Volume = {32},
  Www_Tags = {selected},
  Year = {2002},
}
@inproceedings{1166488,
  author = {Ira S. Moskowitz and Richard E. Newman},
  Address = {Anaheim, CA, USA},
  Booktitle = {Proceedings of the 2nd IASTED international conference on Advances in computer science and technology (ACST '06)},
  Isbn = {0-88986-545-0},
  Location = {Puerto Vallarta, Mexico},
  Month = {January},
  Pages = {251--256},
  Publisher = {ACTA Press},
  Title = {Timing channels, anonymity, mixes, and spikes},
  Year = {2006},
}
@article{10.1109/SP.2006.17,
  author = {Dogan Kesdogan and Dakshi Agrawal and Vinh Pham and Dieter Rautenbach},
  Address = {Los Alamitos, CA, USA},
  Doi = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17},
  Issn = {1081-6011},
  Journal = {sp},
  Pages = {86--99},
  Publisher = {IEEE Computer Society},
  Title = {Fundamental Limits on the Anonymity Provided by the MIX Technique},
  Volume = {0},
  Www_Pdf_Url = {http://domino.research.ibm.com/comm/research_people.nsf/pages/agrawal.KAPR2006.html/%24FILE/KAPR2006.pdf},
  Year = {2006},
  Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/SP.2006.17},
}
@article{melchor2006dnp,
  author = {C.A. Melchor and Y. Deswarte},
  Journal = {Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications},
  Pages = {163--172},
  Publisher = {IEEE Computer Society Washington, DC, USA},
  Title = {{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}},
  Year = {2006},
}
@inproceedings{TH06b,
  author = {Gergely T\'oth and Zolt\'an Horn\'ak},
  Booktitle = {Proceedings of the 11th Nordic Workshop on Secure IT-systems, Link\"oping, Sweden},
  Title = {{The Chances of Successful Attacks against Continuous-time Mixes}},
  Www_Pdf_Url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2006/nordsec06/tg_nordsec2006_06_final-reviewed.pdf},
  Year = {2006},
}
@inproceedings{KesdoganPK06,
  author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"o}lsch},
  Booktitle = {Proceedings of First Workshop on Quality of Protection},
  Locations = {Milan, Italy},
  Month = {September},
  Pages = {159--171},
  Series = {Advances in Information Security},
  Title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis},
  Volume = {23},
  Www_Pdf_Url = {http://www.qop-workshop.org/QoP2005/Resourses/Kolsch.pdf},
  Year = {2005},
}
@inproceedings{diaz-esorics2008,
  author = {Claudia Diaz and Carmela Troncoso and Bart Preneel},
  Booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)},
  Location = {Malaga,ES},
  Month = {October},
  Publisher = {Springer-Verlag},
  Series = {Lecture Notes in Computer Science},
  Title = {A Framework for the Analysis of Mix-Based Steganographic File Systems},
  Volume = {LNCS (in print)},
  Www_Pdf_Url = {https://www.cosic.esat.kuleuven.be/publications/article-1051.pdf},
  Year = {2008},
}
@inproceedings{shimshock-pet2008,
  author = {Eric Shimshock and Matt Staats and Nicholas Hopper},
  Booktitle = {Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)},
  Bookurl = {http://petsymposium.org/2008/},
  Location = {Leuven, Belgium},
  Month = {July},
  Pages = {99--114},
  Publisher = {Springer},
  Title = {Breaking and Provably Fixing Minx},
  Www_Pdf_Url = {http://www-users.cs.umn.edu/~hopper/breaking_and_fixing_minx.pdf},
  Www_Tags = {selected},
  Year = {2008},
}
@inproceedings{DBLP:conf/pet/SchiffnerC09,
  author = {Stefan Schiffner and Sebastian Clau{\ss}},
  Booktitle = {International Symposium on Privacy Enhancing Technologies Symposium},
  Crossref = {DBLP:conf/pet/2009},
  Pages = {94--107},
  Title = {Using Linkability Information to Attack Mix-Based Anonymity Services},
  Url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf},
  Www_Pdf_Url = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf},
  Year = {2009},
  Bdsk-Url-1 = {http://www.cosic.esat.kuleuven.be/publications/article-1215.pdf},
}
@inproceedings{DBLP:conf/sp/DanezisG09,
  author = {George Danezis and Ian Goldberg},
  Booktitle = {2009 30th IEEE Symposium on Security and Privacy},
  Crossref = {DBLP:conf/sp/2009},
  Ee = {http://dx.doi.org/10.1109/SP.2009.15},
  Pages = {269--282},
  Title = {Sphinx: A Compact and Provably Secure Mix Format},
  Url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf},
  Www_Pdf_Url = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf},
  Www_Tags = {selected},
  Year = {2009},
  Bdsk-Url-1 = {http://research.microsoft.com/en-us/um/people/gdane/papers/sphinx-eprint.pdf},
}
@inproceedings{DBLP:conf/ccs/TroncosoD09,
  author = {Carmela Troncoso and George Danezis},
  Booktitle = {Proceedings of the 16th ACM conference on Computer and communications security},
  Crossref = {DBLP:conf/ccs/2009},
  Pages = {369--379},
  Title = {The bayesian traffic analysis of mix networks},
  Url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf},
  Www_Pdf_Url = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf},
  Www_Tags = {selected},
  Year = {2009},
  Bdsk-Url-1 = {http://conspicuouschatter.files.wordpress.com/2009/08/ccsinfer1.pdf},
}
@inproceedings{mixcoin-fc14,
  author = {Joseph Bonneau and Jeremy Clark and Joshua A. Kroll and Andrew Miller and Arvind Narayanan},
  Booktitle = {Proceedings of Financial Cryptography and Data Security (FC'14)},
  Month = {March},
  Title = {Mixcoin: Anonymity for Bitcoin with accountable mixes},
  Www_Pdf_Url = {http://fc14.ifca.ai/papers/fc14_submission_170.pdf},
  Year = {2014},
}
@inproceedings{kuesters-rpc,
  author = {Ralf K\"usters and Tomasz Truderung and Andreas Vogt},
  Booktitle = {Proceedings of the 2014 {IEEE} {S}ymposium on Security and Privacy},
  Month = {May},
  Publisher = {IEEE},
  Title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
  Www_Pdf_Url = {http://infsec.uni-trier.de/publications/paper/KuestersTruderungVogt-SP-2014.pdf},
  Www_Tags = {selected},
  Year = {2014},
}
@article{MultiBinomial2015,
  author = {Shaahin Madani and Ibrahim Khalil},
  Doi = {http://dx.doi.org/10.1016/j.comnet.2015.10.007},
  Issn = {1389-1286},
  Journal = {Computer Networks},
  Pages = {41--53},
  Title = {{Multi-Binomial Mix: A Proposal for Secure and Efficient Anonymous Communication}},
  Url = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV},
  Volume = {93, Part 1},
  Www_Html_Url = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV},
  Year = {2015},
  Bdsk-Url-1 = {http://authors.elsevier.com/a/1R-Ng4xsUrfGOV},
  Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.comnet.2015.10.007},
}
@phdthesis{MadaniThesis,
  author = {Shaahin Madani},
  Month = {April},
  School = {RMIT University, Melbourne, Australia},
  Title = {{Improving Security and Efficiency of Mix-Based Anonymous Communication Systems}},
  Url = {https://researchbank.rmit.edu.au/view/rmit:161447},
  Www_Pdf_Url = {https://researchbank.rmit.edu.au/eserv/rmit:161447/Madani.pdf},
  Year = {2015},
  Bdsk-Url-1 = {https://researchbank.rmit.edu.au/view/rmit:161447},
}
@inproceedings{brickell2006efficient,
  author = {Justin Brickell and Vitaly Shmatikov},
  Booktitle = {Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining},
  Title = {Efficient anonymity-preserving data collection},
  Url = {http://www.cs.cornell.edu/~shmat/shmat_kdd06.pdf},
  Year = {2006},
  Bdsk-Url-1 = {http://www.cs.cornell.edu/~shmat/shmat_kdd06.pdf},
}
@inproceedings{neff2001verifiable,
  author = {C Andrew Neff},
  Booktitle = {Proceedings of the 8th ACM conference on Computer and Communications Security},
  Title = {A verifiable secret shuffle and its application to e-voting},
  Url = {http://people.csail.mit.edu/rivest/voting/papers/Neff-2001-08-17-AVerifiableSecretShuffleAndItsApplicationToEVoting.pdf},
  Year = {2001},
  Bdsk-Url-1 = {http://people.csail.mit.edu/rivest/voting/papers/Neff-2001-08-17-AVerifiableSecretShuffleAndItsApplicationToEVoting.pdf},
}
@techreport{chaum2016cmix,
  author = {David Chaum and Farid Javani and Aniket Kate and Anna Krasnova and Joeri Ruiter and Alan T Sherman and Debajyoti Das},
  Institution = {Technical report},
  Title = {cMix: Anonymization by high-performance scalable mixing},
  Url = {http://www.cs.bham.ac.uk/~deruitej/papers/cmix.pdf},
  Year = {2016},
  Bdsk-Url-1 = {http://www.cs.bham.ac.uk/~deruitej/papers/cmix.pdf},
}
@article{galtelandattacks,
  author = {Herman Galteland and Stig F Mj{\o}lsnes and Ruxandra F Olimid},
  Title = {Attacks on cMix-Some Small Overlooked Details},
  Url = {https://eprint.iacr.org/2016/729.pdf},
  Year = {2016},
  Bdsk-Url-1 = {https://eprint.iacr.org/2016/729.pdf},
}
@inproceedings{van2015vuvuzela,
  author = {Jelle Van Den Hooff and David Lazar and Matei Zaharia and Nickolai Zeldovich},
  Booktitle = {Proceedings of the 25th Symposium on Operating Systems Principles},
  Title = {Vuvuzela: Scalable private messaging resistant to traffic analysis},
  Url = {https://people.csail.mit.edu/nickolai/papers/vandenhooff-vuvuzela.pdf},
  Year = {2015},
  Bdsk-Url-1 = {https://people.csail.mit.edu/nickolai/papers/vandenhooff-vuvuzela.pdf},
}
@inproceedings{lazar2016alpenhorn,
  author = {David Lazar and Nickolai Zeldovich},
  Booktitle = {Proceedings of the 12th Symposium on Operating Systems Design and Implementation (OSDI), Savannah, GA},
  Title = {Alpenhorn: Bootstrapping secure communication without leaking metadata},
  Url = {https://www.usenix.org/system/files/conference/osdi16/osdi16-lazar.pdf},
  Year = {2016},
  Bdsk-Url-1 = {https://www.usenix.org/system/files/conference/osdi16/osdi16-lazar.pdf},
}
@article{tyagistadium,
  author = {Nirvan Tyagi and Yossi Gilad and Matei Zaharia and Nickolai Zeldovich},
  Title = {Stadium: A Distributed Metadata-Private Messaging System},
  Url = {https://www.cs.cornell.edu/~tyagi/papers/stadium.pdf},
  Year = {2016},
  Bdsk-Url-1 = {https://www.cs.cornell.edu/~tyagi/papers/stadium.pdf},
}
@inproceedings{serjantov2002towards,
  author = {Andrei Serjantov and George Danezis},
  Booktitle = {International Workshop on Privacy Enhancing Technologies},
  Organization = {Springer},
  Pages = {41--53},
  Title = {Towards an information theoretic metric for anonymity},
  Url = {https://pdfs.semanticscholar.org/7454/49bd7ad5d32224685e9188591e53395f376e.pdf},
  Year = {2002},
  Bdsk-Url-1 = {https://pdfs.semanticscholar.org/7454/49bd7ad5d32224685e9188591e53395f376e.pdf},
}
@inproceedings{borisov2007denial,
  author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz},
  Booktitle = {{Proceedings of the 14th ACM conference on Computer and Communications Security (CCS)}},
  Organization = {ACM},
  Pages = {92--102},
  Title = {Denial of service or denial of security?},
  Url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/ccs0255-borisov.pdf},
  Year = {2007},
  Bdsk-Url-1 = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/ccs0255-borisov.pdf},
}
@article{piotrowska2017loopix,
  author = {Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis},
  Journal = {arXiv preprint arXiv:1703.00536},
  Title = {The Loopix Anonymity System},
  Url = {https://arxiv.org/pdf/1703.00536},
  Year = {2017},
  Bdsk-Url-1 = {https://arxiv.org/pdf/1703.00536},
}
@inproceedings{beato2016improving,
  author = {Filipe Beato and Kimmo Halunen and Bart Mennink},
  Booktitle = {International Conference on Cryptology and Network Security},
  Organization = {Springer},
  Pages = {681--691},
  Title = {Improving the Sphinx Mix Network},
  Url = {http://www.cs.ru.nl/%7Ebmennink/pubs/16cans.pdf},
  Year = {2016},
  Bdsk-Url-1 = {http://www.cs.ru.nl/%7Ebmennink/pubs/16cans.pdf},
}
@inproceedings{kwon2017atom,
  author = {Albert Kwon and Henry Corrigan-Gibbs and Srinivas Devadas and Bryan Ford},
  title = {Atom: Horizontally scaling strong anonymity},
  booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles},
  pages = {406--422},
  year = {2017},
  url = {https://arxiv.org/pdf/1612.07841},
  organization = {ACM},
}
@article{kwon2019xrd,
  author = {Albert Kwon and David Lu and Srinivas Devadas},
  title = {XRD: Scalable Messaging System with Cryptographic Privacy},
  journal = {arXiv preprint arXiv:1901.04368},
  url = {https://arxiv.org/pdf/1901.04368},
  year = {2019},
}
@inproceedings{lazar2018karaoke,
  author = {David Lazar and Yossi Gilad and Nickolai Zeldovich},
  title = {Karaoke: Distributed private messaging immune to passive traffic analysis},
  Booktitle = {Proceedings of the 13th Symposium on Operating Systems Design and Implementation (OSDI)},
  pages = {711--725},
  url = {https://www.usenix.org/system/files/osdi18-lazar.pdf},
  year = {2018},
}
@inproceedings{lazaryodel,
  author = {David Lazar and Yossi Gilad and Nickolai Zeldovich},
  title = {Yodel: Strong Metadata Security for Real-Time Voice Calls},
  year = {2019},
  url = {https://petsymposium.org/2019/files/hotpets/yodel-final.pdf},
  booktitle = {12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2019)},
}
@inproceedings{smyth2018verifiability,
  author = {Ben Smyth},
  title = {Verifiability of helios mixnet},
  booktitle = {International Conference on Financial Cryptography and Data Security},
  year = {2018},
  organization = {Springer},
  url = {http://orbilu.uni.lu/bitstream/10993/35919/1/Smyth18-Verifiability-Helios-Mixnet.pdf},
}
@inproceedings{topology-pet2010,
  author = {Claudia Diaz and Steven J. Murdoch and Carmela Troncoso},
  title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks},
  booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)},
  year = {2010},
  url = {http://www.cosic.esat.kuleuven.be/publications/article-1230.pdf},
}
@inproceedings{le2015herd,
  author = {Stevens Le Blond and David Choffnes and William Caldwell and Peter Druschel and Nicholas Merritt},
  title = {Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems},
  booktitle = {ACM SIGCOMM Computer Communication Review},
  volume = {45},
  number = {4},
  year = {2015},
  organization = {ACM},
  url = {https://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p639.pdf},
}
@inproceedings{corrigan2015riposte,
  author = {Henry Corrigan-Gibbs and Dan Boneh and David Mazi{\`e}res},
  title = {Riposte: An anonymous messaging system handling millions of users},
  booktitle = {2015 IEEE Symposium on Security and Privacy},
  pages = {321--338},
  year = {2015},
  organization = {IEEE},
  url = {https://arxiv.org/pdf/1503.06115.pdf},
}
@inproceedings{wolinsky2012dissent,
  author = {David Isaac Wolinsky and Henry Corrigan-Gibbs and Bryan Ford and Aaron Johnson},
  title = {Dissent in numbers: Making strong anonymity scale},
  booktitle = {USENIX OSDI},
  pages = {179--182},
  year = {2012},
  url = {https://www.usenix.org/system/files/conference/osdi12/osdi12-final-115.pdf},
}
@article{kwon2016riffle,
  author = {Albert Kwon and David Lazar and Srinivas Devadas and Bryan Ford},
  title = {Riffle},
  journal = {Proceedings on Privacy Enhancing Technologies},
  volume = {2016},
  number = {2},
  pages = {115--134},
  year = {2016},
  publisher = {De Gruyter Open},
  url = {https://people.csail.mit.edu/devadas/pubs/riffle.pdf},
}