Anonymous communication
Mix-nets
- David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2):84-90, 1981.
- Andreas Pfitzmann, Michael Waidner. Networks without user observability — design options. Advances in Cryptology - EUROCRYPT '85, LNCS 219, pp. 245-253, 1986.
- Simone Fischer-Hübner. Sec. 4.1-4.2 of IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Habilitation thesis, University of Hamburg, 1999. Updated version published as LNCS 1958, 2001.
- Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of Anonymity in Open Environments. Proceedings of 5th Information Hiding workshop, LNCS 2578, pp. 53-69, 2002.
- Andrei Serjantov, George Danezis. Towards an Information Theoretic Metric for Anonymity. Proceedings of PETS 2002, LNCS 2482, pp. 41-53, 2003.
- Bodo Möller. Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. Topics in Cryptology – CT-RSA 2003, LNCS 2612, pp. 244-262, 2003.
- George Danezis. Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. Proceedings of IFIP TC11 18th International Conference on Information Security (SEC), IFIP Conference Proceedings 250, pp. 421-426, 2003.
- George Danezis. Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. Proceedings of WPES 2003, Workshop on Privacy in Electronic Society, pp. 89-93, 2003.
- Luke O'Connor. On Blending Attacks for Mixes with Memory. Proceedings of the 8th Information Hiding workshop, LNCS 3727, pp. 39-52, 2005.
- George Danezis, Ian Goldberg. Sphinx: A Compact and Provably Secure Mix Format. Proceedings of 30th IEEE Symposium on Security and Privacy, pp. 269-282, 2009.
DC-nets
- David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1):65-75, 1988.
- Michael Waidner. Unconditional sender and recipient untraceability in spite of active attacks. Advances in Cryptology - EUROCRYPT '89, LNCS 434, pp. 302-319, 1990.
- Christian Franck. New directions for dining cryptographers. Master's thesis, University of Luxembourg, 2008.
- Henry Corrigan-Gibbs, Dan Boneh, and David Mazières. Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE Symposium on Security and Privacy 2015, pp. 321-338.
Low-latency systems
- David M. Goldschlag, Michael G. Reed, Paul F. Syverson. Hiding Routing Information. Proceedings of the 1st Information Hiding workshop, LNCS 1174, pp. 137-150, 1996.
- Michael K. Reiter, Aviel D. Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1):66-92, 1998.
- Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr. Towards an Analysis of Onion Routing Security. Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, pp. 96-14, 2000.
- Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation Onion Router. Proceedings of the 13th USENIX Security Symposium, pp. 303-320, 2004.
- Steven J. Murdoch, George Danezis. Low-Cost Traffic Analysis of Tor. Proceedings of 2005 IEEE Symposium on Security and Privacy, pp. 183-195, 2005.
- Lasse Øverlier, Paul F. Syverson. Locating Hidden Servers. Proceedings of 2006 IEEE Symposium on Security and Privacy, pp. 100-114, 2006.
- Joan Feigenbaum, Aaron Johnson, Paul Syverson. A Model of Onion Routing with Provable Anonymity. Proceedings of 2007 Financial Cryptography conference, LNCS 4886, pp 57-71, 2007.
- Joan Feigenbaum, Aaron Johnson, Paul F. Syverson. Probabilistic analysis of onion routing in a black-box model. ACM Transactions on Information System Security 15(3):14:1-14:28, 2012.
- Nick Mathewson / Steven J. Murdoch. Top changes in Tor since the 2004 design paper - Part 1, Part 2, Part 3. 2012.
- Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. Proceedings of 2013 IEEE Symposium on Security and Privacy, pp. 80-94, 2013.
- Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor. Evaluation of the Anonymous I2P Network’s Design Choices Against Performance and Security. Proceedings of the 1st International Conference on Information Systems Security and Privacy, SciTePress, pp. 46-55, 2015.
- Felipe Astolfi, Jelger Kroese, Jeroen van Oorschot. I2P - The Invisible Internet Project. Web Technology Report, 2015.
- Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel. Analysis of Fingerprinting Techniques for Tor Hidden Services. Proceedings of 2017 Workshop on Privacy in Electronic Society, pp. 165-175, 2017.
- Milad Nasr, Alireza Bahramali, Amir Houmansadr. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1962-1976, 2018.
Privacy in key-exchange protocols
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold. Just fast keying: Key agreement in a hostile internet. ACM Transactions on Information System Security 7(2):242-273, 2004.
- Martín Abadi, Bruno Blanchet, Cédric Fournet. Just fast keying in the pi calculus. ACM Transactions on Information System Security 10(3):9, 2007.
- Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete. The privacy of the TLS 1.3 protocol. Proceedings on Privacy Enhancing Technologies 2019(4):190-210, 2019.
Surveys
- Matthew Edman and Bülent Yener. On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems. ACM Computing Surveys 42(1):5:1-5:35, 2009.
- George Danezis, Claudia Diaz, and Paul Syverson. Systems for Anonymous Communication. Handbook of Financial Cryptography and Security. Chapman and Hall/CRC 2010. pp 341-389.
Analyses applying to several techniques
- Matthew Wright, Micah Adler, Brian N. Levine, Clay Shields. An Analysis of the Degradation of Anonymous Protocols. Proceedings of the Network and Distributed System Security Symposium, NDSS 2002.
- Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two. Proceedings of 2018 IEEE Symposium on Security and Privacy, pp. 108-126, 2018.
Differential Privacy
- Cynthia Dwork, Aaron Roth. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, Volume 9 (3-4), pp. 211-407 (2014)