Roger Dingledine

According to our database1, Roger Dingledine authored at least 26 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs.
Proc. Priv. Enhancing Technol., 2022

2012
Changing of the guards: a framework for understanding and improving entry guard selection in tor.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Methodically Modeling the Tor Network.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Evading Censorship with Browser-Based Proxies.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Tor and the Censorship Arms Race: Lessons Learned.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk).
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Trust-based anonymous communication: adversary models and routing algorithms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Building Incentives into Tor.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Case Study on Measuring Statistical Data in the Tor Anonymity Network.
Proceedings of the Financial Cryptography and Data Security, 2010

Survivable key compromise in software update systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A Practical Congestion Attack on Tor Using Long Paths.
Proceedings of the 18th USENIX Security Symposium, 2009

2007
Deploying Low-Latency Anonymity: Design Challenges and Social Factors.
IEEE Secur. Priv., 2007

2006
Anonymity Loves Company: Usability and the Network Effect.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Blending Different Latency Traffic with Alpha-mixing.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2004
Location diversity in anonymity networks.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Tor: The Second-Generation Onion Router.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Practical Traffic Analysis: Extending and Resisting Statistical Disclosure.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Synchronous Batching: From Cascades to Free Routes.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Mixminion: Strong Anonymity for Financial Cryptography.
Proceedings of the Financial Cryptography, 2004

2003
Mixminion: Design of a Type III Anonymous Remailer Protocol.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

On the Economics of Anonymity.
Proceedings of the Financial Cryptography, 2003

2002
From a Trickle to a Flood: Active Attacks on Several Mix Types.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Reliable MIX Cascade Networks through Reputation.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Reputation in privacy enhancing technologies.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

2001
A Reputation System to Increase MIX-Net Reliability.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
The Free Haven Project: Distributed Anonymous Storage Service.
Proceedings of the Designing Privacy Enhancing Technologies, 2000


  Loading...