-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpaper.bib
576 lines (498 loc) · 16.1 KB
/
paper.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
@inproceedings{post-2011-bazaar,
author = {Ansley Post and Vijit Shah and Alan Mislove},
title = {{Bazaar: Strengthening user reputations in online marketplaces}},
booktitle = {{Proceedings of USENIX/ACM NSDI}},
year = {{2011}}
}
@inproceedings{isdal2010privacy,
title={{Privacy-preserving P2P data sharing with OneSwarm}},
author={Isdal, Tomas and Piatek, Michael and Krishnamurthy, Arvind and Anderson, Thomas},
booktitle={{Proceedings of ACM SIGCOMM}},
year={2010},
}
@inproceedings{diaz-pet2008,
title = {On the Impact of Social Network Profiling on Anonymity},
author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov},
booktitle = {{Proceedings of PETS}},
year = {2008},
}
@inproceedings{garmandecentralized,
title = {Decentralized Anonymous Credentials},
author = {Christina Garman and Matthew Green and Ian Miers},
booktitle = {{Proceedings of ISOC NDSS}},
year = {2014},
}
@inproceedings{wolinsky2013hang,
title={Hang with your buddies to resist intersection attacks},
author={Wolinsky, David Isaac and Syta, Ewa and Ford, Bryan},
booktitle={{Proceedings of ACM CCS}},
year={2013},
}
@inproceedings{viswanath2011analysis,
title={An analysis of social network-based sybil defenses},
author={Viswanath, Bimal and Post, Ansley and Gummadi, Krishna P and Mislove, Alan},
booktitle={{Proceedings of ACM SIGCOMM}},
year={2011},
}
@inproceedings{ford2006persistent,
title={Persistent personal names for globally connected mobile devices},
author={Ford, Bryan and Strauss, Jacob and Lesniewski-Laas, Chris and Rhea, Sean and Kaashoek, Frans and Morris, Robert},
booktitle={{Proceedings of USENIX/ACM OSDI}},
year={2006},
}
@inproceedings{yu2006sybilguard,
title={Sybilguard: defending against sybil attacks via social networks},
author={Yu, Haifeng and Kaminsky, Michael and Gibbons, Phillip B and Flaxman, Abraham},
booktitle={{Proceedings of ACM SIGCOMM}},
year={2006},
}
@book{koehler1999stasi,
title={{STASI: The untold story of the East German secret police}},
author={Koehler, John O},
year={1999},
publisher={Basic Books}
}
@inproceedings{geddes13covert,
title={{Cover your ACKs: pitfalls of covert channel censorship circumvention}},
author={Geddes, John and Schuchard, Max and Hopper, Nicholas},
booktitle={{Proceedings of ACM CCS}},
year={2013},
}
@inproceedings{hasan13foci,
title={Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts},
author={Hasan, Shaddi and Ben-David, Yahel and Fanti, Giulia and Brewer, Eric and Shenker, Scott},
booktitle={{Proceedings of the USENIX FOCI Workshop}},
year=2013,
}
@article{albert2002statistical,
title={Statistical mechanics of complex networks},
author={Albert, R{\'e}ka and Barab{\'a}si, Albert-L{\'a}szl{\'o}},
journal={Reviews of modern physics},
volume={74},
number={1},
pages={47},
year={2002},
}
@inproceedings{bauckhage2013weibull,
title={The Weibull as a Model of Shortest Path Distributions in Random Networks},
author={Bauckhage, Christian and Kersting, Kristian and Rastegarpanah, Bashir},
booktitle={Proc. Int. Workshop on Mining and Learning with Graphs},
year={2013}
}
@article{bbcGreece,
journal={BBC News},
title={{Greece protest against austerity package turns violent}},
year={June 28, 2011}
}
@article{dehmer2011history,
title={A history of graph entropy measures},
author={Dehmer, Matthias and Mowshowitz, Abbe},
journal={Information Sciences},
volume={181},
number={1},
year={2011},
}
@article{walker,
author={Walker, Shaun and Grytsenko, Oksana},
title={{Text messages warn Ukraine protesters they are `participants in mass riot'}},
journal={The Guardian},
year={January 21, 2014},
}
@article{fassihi,
author={Fassihi, Farnaz},
title={{Iranian Crackdown Goes Global}},
journal={Wall Street Journal},
year={December 3, 2009}
}
@article{krupsky,
author={Krupsky, Sefi},
title={{Israel's military censor to monitor Facebook, Twitter, blogs}},
journal={Haaretz},
year={May 2, 2012}
}
@article{fahim,
author={Fahim, Kareem},
title={{Violent Clashes Mark Protests Against Mubarak's Rule}},
journal={New York Times},
year={January 26, 2011}
}
@article{bbcUkraine,
journal={BBC News},
title={{Why is Ukraine in turmoil?}},
year={February 22, 2014}
}
@article{bbcLibya,
journal={BBC News},
title={{Libya protests: 84 killed in growing unrest, says HRW}},
year={February 19, 2011},
}
@article{worth,
author={Worth, Robert and Fathi, Nazila},
title={{Violent Clashes Mark Protests Against Mubarak's Rule}},
journal={New York Times},
year={June 14, 2009}
}
@article{tenner,
author={Tenner, Edward},
title={{Imagining the Internet: A History and Forecast}},
howpublished={Elon School of Communication},
note={\url{http://www.elon.edu/e-web/predictions/early90s/infohighwaypredictions.xhtml}},
year={1994}
}
@article{cyberspace-manifesto,
author={Barlow, John},
title={{A Declaration of the Independence of Cyberspace}},
note={\url{https://projects.eff.org/~barlow/Declaration-Final.html}},
month={February},
year={1996}
}
@article{schneier,
author={Schneier, Bruce},
title={{The Battle for Power on the Internet}},
journal={The Atlantic},
year={October 24, 2013}
}
@article{rhoads,
author={Rhoads, Christopher and Fowler, Geoffrey},
title={{Egypt Shuts Down Internet, Cellphone Services}},
journal={The Wall Street Journal},
year={January 29, 2011}
}
@article{chulov,
author={Chulov, Martin},
title={{Syria shuts off internet access across the country}},
journal={The Guardian},
year={November 29, 2012}
}
@article{diaz,
author={Diaz, Jesus},
title={{Iran Shuts Down Google, Will Completely Cut Citizens Off the Internet}},
journal={Gizmodo},
year={September 24, 2012}
}
@article{shachtman,
author={Shachtman, Noah},
title={{Syria's internet blackout explained}},
journal={Wired},
year={November 30, 2012}
}
@article{cowie,
author={Cowie, Jim},
title={{Egypt Leaves the Internet}},
journal={Renesys},
note={\url{http://www.renesys.com/2011/01/egypt-leaves-the-internet/}},
month={January},
year={2011}
}
@article{factionsSyria,
journal={BBC News},
title={{Syria crisis: Guide to armed and political opposition}},
year={December 13, 2013}
}
@inproceedings{canetti1997deniable,
title={Deniable encryption},
author={Canetti, Rein and Dwork, Cynthia and Naor, Moni and Ostrovsky, Rafail},
booktitle={{Proceedings of CRYPTO}},
year={1997},
}
@article{chaum1988dining,
title={The dining cryptographers problem: Unconditional sender and recipient untraceability},
author={Chaum, David},
journal={Journal of cryptology},
volume={1},
number={1},
year={1988},
}
@inproceedings{gowalla,
author={Cho, Eunjoon and Myers, Seth and Leskovec, Jure},
title={{Friendship and Mobility: Friendship and Mobility: User Movement in Location-Based Social Networks}},
booktitle={{ACM KDD}},
year=2011,
}
@inproceedings{corrigan2010dissent,
title={Dissent: accountable anonymous group messaging},
author={Corrigan-Gibbs, Henry and Ford, Bryan},
booktitle={{Proceedings of ACM CCS}},
year={2010},
}
@article{crowds,
title={Crowds: Anonymity for web transactions},
author={Reiter, Michael K and Rubin, Aviel D},
journal={{ACM TISSEC}},
volume={1},
number={1},
year={1998},
}
@inproceedings{dong2013private,
title={When private set intersection meets big data: An efficient and scalable protocol},
author={Dong, Changyu and Chen, Liqun and Wen, Zikai},
booktitle={{Proceedings of ACM CCS}},
year={2013},
}
@inproceedings{douceur2002sybil,
title={The sybil attack},
author={Douceur, John R},
booktitle={{Proceedings of IPTPS}},
year={2002},
}
@MISC{st_andrews-sassy-2011-06-03,
author = {Greg Bigwood and Devan Rehunathan and Martin Bateman and Saleem Bhatti},
title = {{CRAWDAD} data set st\_andrews/sassy (v. 2011-06-03)},
howpublished = {Downloaded from \url{http://crawdad.org/st_andrews/sassy/}},
month = jun,
year = 2011
}
@inproceedings{wang2011human,
title={Human mobility, social ties, and link prediction},
author={Wang, Dashun and Pedreschi, Dino and Song, Chaoming and Giannotti, Fosca and Barabasi, Albert-Laszlo},
booktitle={{Proceedings of ACM KDD}},
year={2011},
organization={ACM}
}
@article{clauset2009power,
title={Power-law distributions in empirical data},
author={Clauset, Aaron and Shalizi, Cosma Rohilla and Newman, Mark EJ},
journal={SIAM review},
volume={51},
number={4},
year={2009},
publisher={SIAM}
}
@article{chaum1981untraceable,
title={Untraceable electronic mail, return addresses, and digital pseudonyms},
author={Chaum, David L},
journal={{Communications of the ACM}},
volume={24},
number={2},
pages={84--90},
year={1981},
}
@inproceedings{de2010practical,
title={Practical private set intersection protocols with linear complexity},
author={De Cristofaro, Emiliano and Tsudik, Gene},
booktitle={{Proceedings of Financial Cryptography}},
year={2010},
}
@inproceedings{dingledine2004tor,
title={Tor: The second-generation onion router},
author={Dingledine, Roger and Mathewson, Nick and Syverson, Paul},
year={2004},
booktitle={{Proceedings of USENIX Security}},
}
@inproceedings{dingledine2001free,
title={The free haven project: Distributed anonymous storage service},
author={Dingledine, Roger and Freedman, Michael J and Molnar, David},
booktitle={Designing Privacy Enhancing Technologies},
year={2001},
}
@MISC{epfl-mobility-2009-02-24,
author = {Michal Piorkowski and Natasa Sarafijanovic-Djukic and Matthias Grossglauser},
title = {{CRAWDAD} data set epfl/mobility (v. 2009-02-24)},
howpublished = {Downloaded from http://crawdad.org/epfl/mobility/},
month = feb,
year = 2009
}
@inproceedings{grossglauser2001mobility,
title={Mobility increases the capacity of ad-hoc wireless networks},
author={Grossglauser, Matthias and Tse, David},
booktitle={{IEEE INFOCOM}},
year={2001},
}
@article{iranSon,
author={Fantz, Ashley},
title={Son: Iranian dad arrested for my Facebook posts},
journal={{CNN}},
year={July 12, 2012}
}
@article{mobility,
author={Mathotho, Malachia},
title={Critical analysis of human mobility as a constraint to municipal planning and service delivery},
journal={Afesis-Corplan},
note={\url{http://www.afesis.org.za/}}
}
@inproceedings{freedman2002tarzan,
title={Tarzan: A peer-to-peer anonymizing network layer},
author={Freedman, Michael J and Morris, Robert},
booktitle={{Proceedings of ACM CCS}},
year={2002},
}
@inproceedings{gilbert2009predicting,
title={Predicting tie strength with social media},
author={Gilbert, Eric and Karahalios, Karrie},
booktitle={{Proceedings of ACM CHI}},
year={2009},
}
@inproceedings{jansen2010toward,
title={Toward anonymity in delay tolerant networks: threshold pivot scheme},
author={Jansen, Rob and Beverly, Robert},
booktitle={{IEEE MILCOM}},
year={2010},
}
@article{buckley,
author={Buckley, Cara and Donadio, Rachel},
title={{Buoyed by Wall St. Protests, Rallies Sweep the Globe}},
journal={New York Times},
year={October 16, 2011},
}
@article{eisenberg2008expectation,
title={On the expectation of the maximum of IID geometric random variables},
author={Eisenberg, Bennett},
journal={Statistics \& Probability Letters},
volume={78},
number={2},
year={2008},
}
@inproceedings{keung2010base,
title={The base station placement for delay-constrained information coverage in mobile wireless networks},
author={Keung, Gabriel Yik and Zhang, Qian and Li, Bo},
booktitle={{Proceedings of IEEE ICC}},
year={2010},
}
@article{kossinets2006empirical,
title={Empirical analysis of an evolving social network},
author={Kossinets, Gueorgi and Watts, Duncan J},
journal={Science},
volume={311},
number={5757},
pages={88--90},
year={2006},
}
@inproceedings{li2011findu,
title={Findu: Privacy-preserving personal profile matching in mobile social networks},
author={Li, Ming and Cao, Ning and Yu, Shucheng and Lou, Wenjing},
booktitle={{Proceedings of IEEE INFOCOM}},
year={2011},
}
@article{liang2013fully,
title={Fully anonymous profile matching in mobile social networks},
author={Liang, Xiaohui and Li, Xu and Zhang, Kuan and Lu, Rongxing and Lin, Xiaodong and Shen, Xuemin},
journal={{IEEE JSAC}},
year={2013},
}
@article{lu,
title={Anti-localization anonymous routing for Delay Tolerant Network},
author={Lu, Xiaofeng and Hui, Pan and Towsley, Don and Pu, Juahua and Xiong, Zhang},
journal={Computer Networks},
volume={54},
number={11},
year={2010},
}
@article{luke2005mason,
title={Mason: A multiagent simulation environment},
author={Luke, Sean and Cioffi-Revilla, Claudio and Panait, Liviu and Sullivan, Keith and Balan, Gabriel},
journal={Simulation},
volume={81},
number={7},
year={2005},
}
@inproceedings{mcauley,
author = {J. McAuley and J. Leskovec},
title = {Learning to Discover Social Circles in Ego Networks},
booktitle = {{Proceedings of NIPS}},
year = {2012}
}
@inproceedings{miers2013zerocoin,
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
booktitle={{Proceedings of IEEE Security and Privacy}},
year={2013},
}
@inproceedings{nagy2013know,
title={{Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications}},
author={Nagy, Marcin and De Cristofaro, Emiliano and Dmitrienko, Alexandra and Asokan, N and Sadeghi, Ahmad-Reza},
booktitle={Proceedings of ACM Computer Security Applications Conference},
year={2013}
}
@inproceedings{narayanan2009anonymizing,
title={De-anonymizing social networks},
author={Narayanan, Arvind and Shmatikov, Vitaly},
booktitle={{Proceedings of IEEE Security and Privacy}},
year={2009},
}
@incollection{noubir2004connectivity,
title={On connectivity in ad hoc networks under jamming using directional antennas and mobility},
author={Noubir, Guevara},
booktitle={Wired/Wireless Internet Communications},
year={2004},
}
@MISC{unimi-pmtr-2008-12-01,
author = {Paolo Meroni and Sabrina Gaito and Elena Pagani and Gian Paolo Rossi},
title = {{CRAWDAD} data set unimi/pmtr (v. 2008-12-01)},
howpublished = {Downloaded from \url{http://crawdad.org/unimi/pmtr/}},
month = dec,
year = 2008
}
@article{rashevsky1955life,
title={Life, information theory, and topology},
author={Rashevsky, Nicolas},
journal={The bulletin of mathematical biophysics},
volume={17},
number={3},
year={1955},
}
@incollection{reid2013analysis,
title={An analysis of anonymity in the bitcoin system},
author={Reid, Fergal and Harrigan, Martin},
booktitle={Security and Privacy in Social Networks},
year={2013},
}
@misc{anonymizer,
title="Anonymizer",
note={\url{https://www.anonymizer.com/}}
}
@misc{twitter,
title="Twitter",
note={\url{https://www.twitter.com/}}
}
@misc{privatevpn,
title={{Private Internet Access}},
note={\url{https://www.privateinternetaccess.com/}}
}
@misc{secret,
title="Secret",
note={\url{https://secret.ly/}}
}
@misc{tavern,
title="Tavern",
note={\url{https://tavern.com/}}
}
@article{firechat,
author={Needleman, Rafe},
title="FireChat Network-Free Chat Could Be Big. And Now It's on Android.",
journal={{Yahoo News}},
year= {April 3, 2014}
}
@article{tufekci,
author={Tufekci, Zeynep},
title={{After the Protests}},
journal={New York Times},
year={March 20, 2014}
}
@MISC{thlab-sigcomm2009-2012-07-15,
author = {Anna-Kaisa Pietilainen},
title = {{CRAWDAD} data set thlab/sigcomm2009 (v. 2012-07-15)},
howpublished = {Downloaded from \url{http://crawdad.org/thlab/sigcomm2009/}},
month = jul,
year = 2012
}
@inproceedings{viswanath-2009-activity,
author = {Bimal Viswanath and Alan Mislove and Meeyoung Cha and Krishna P. Gummadi},
title = {On the Evolution of User Interaction in Facebook},
booktitle = {{Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks}},
location = {Barcelona, Spain},
month = {August},
year = {2009}}
@article{zhang2007performance,
title={Performance modeling of epidemic routing},
author={Zhang, Xiaolan and Neglia, Giovanni and Kurose, Jim and Towsley, Don},
journal={Computer Networks},
volume={51},
number={10},
year={2007},
}
@book{hedges10,
title={Death of the liberal class},
author={Hedges, Chris},
year={2010},
publisher={Nation Books}
}