Bibliography of thesis
Bibliography
[1] N. Tufnell. 21 tips and tricks to stay anonymous online. http://www.theguardian.com/technology/2015/mar/06/tips-tricks-anonymous-privacy, 2015.
[2] E. MacAskill and S. Ackerman. NSA collecting phone records of millions of Verizon customers daily. http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order, 2013.
[3] J. Naughton. Attempts to stay anonymous on the web will only put the NSA on your trail. http://www.theguardian.com/world/2014/may/11/anonymous-web-nsa-trail-janet-vertesi, 2014.
[4] R. Mac. EBay Announces First Foray Into Bitcoin With Brain-tree Unit. http://www.forbes.com/sites/ryanmac/2014/09/08/ebay-announces-first-foray-into-bitcoin-with-braintree-unit/, 2014.
[5] N. Anderson and C. Farivar. How the feds took down the Dread Pirate Roberts. http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-pirate-roberts/, 2013.
[6] OpenBazaar Developers. OpenBazaar. https://www.openbazaar.org, 2014.
[7] Ethereum Developers. Ethereum. https://www.ethereum.org/, 2015.
[8] Y. Heisler. Want to hack a car? Don’t try hacking a Tesla. https://bgr.com/2015/08/14/tesla-hacking-model-s/, 2015.
[9] Q. Li, A. Malip, and S.-L. Ng. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks Vol. 7, no. 3, pages pp. 588 – 601, 2014.
[10] NCTA. Infographic: The growth of the Internet of things. https://www.ncta.com/platform/industry-news/infographic-the-growth-of-the-internet-of-things/, 2015.
[11] J. Leydon. NSA: Here’s $300,000, people. Go build us a safer Internet of Things. http://www.theregister.co.uk/2015/08/13/nsa_funds_iot_research_alabama/, 2015.
[12] M. Farrell. The internet of things: who wins, who loses? theguardian.com/technology/2015/aug/14/internet-of-things-winners-and-losers-privacy-autonomy-capitalism, 2015.
[13] J. Palme and M. Berglund. Anonymity on the Internet. http://people.dsv.su.se/~jpalme/society/anonymity.html, 2002.
[14] K. A. Wallace. Anonymity. Ethics and Information Technology, pages 1 (1), 23–35., 1999.
[15] H. Morio and C. Buchholz. How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. AI and Society 23, pages (2):297–307, 2009.
[16] B. Blunden. When strong encryption isn’t enough. http://www.alternet.org/print/news-amp-politics/when-strong-encryption-isnt-enough-protect-our-privacy, 2015.
[17] K. M. Martin. Everyday Cryptography: Section 3.2.2 Cover time. Oxford University Press, 2012.
[18] D. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, pages 1:65–75, 1998.
[19] A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), 2482, April 2002.
[20] S. Diaz, C. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), 2482, April 2002.
[21] M. Edman, F. Sivrikaya, and B. Yener. A Combinatorial Approach to Measuring Anonymity. 2007.
[22] L. Valiant. The Complexity of Computing the Permanent. Theoretical Computer Science, pages 189–201, 1979.
[23] C. Dwork. Differential Privacy: A Survey of Results. Theory and Applications of Models of Computation, pages 1–19, 2008.
[24] L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, pages 557–570, 2004.
[25] S. Garfinkel. PGP: Pretty Good Privacy. O’Rielly and Associates Inc, 1995.
[26] GNU Project Developers. GNU Privacy Guard. https://www.gnupg.org/, 2015.
[27] M. Lee. Ed Snowden taught me to smuggle secrets past incredible danger. Now I teach you. https://firstlook.org/theintercept/2014/10/28/smuggling-snowden-secrets/, 2014.
[28] R. Dingledine. The Onion Router. https://www.torproject.org/, 2015.
[29] J. Applebaum. The Amnesic Incognito Live System. https://tails.boum.org/, 2015.
[30] Network Working Group. Internet Message Format (RFC5322). http://tools.ietf.org/html/rfc5322, 2008.
[31] DMOZ. Temporary Email Addresses. 2015.
[32] G. F. du Pont. The Time Has Come for Limited Liability for Operators of True Anonymity Remailers in Cyberspace: An Examination of the Possibilities and Perils. Journal of Technology Law and Policy, 2001.
[33] L. Peterson and B. Davie. Computer Networks a systems approach, Fifth Edition. Morgan Kaufmann, 2012.
[34] N. Minar and M. Hedlund. A Network of Peers: Peer-to-Peer Model Through the History of the Internet. Peer-to-Peer: Harnessing the power of Disruptive Technologies, 2001.
[35] J. Crowcroft, T. Moreton, I. Pratt, and A. Twigg. Peer-to-Peer Systems and the Grid. http://www.cl.cam.ac.uk/teaching/2003/AdvSysTop/grid-p2p-paper.pdf, 2003.
[36] The Free Dictionary. Steganography. http://www.thefreedictionary.com/ steganography, 2015.
[37] P. Wayner. Disappearing Cryptography (Information Hiding: steganography and watermarking). 2002.
[38] K. M. Martin. Everyday Cryptography: Section 1.4.5 Steganography. Oxford University Press, 2012.
[39] B. W. Lampson. A Note on the Confinement Problem. http://research.microsoft.com/en-us/um/people/blampson/11-Confinement/Acrobat.pdf, 2015.
[40] National Computing Security Center. A guide to understanding covert channel analysis of trusted systems. http://fas.org/irp/nsa/rainbow/tg030.htm, 1993.
[41] M. O. Rabin. How to exchange secrets by oblivious transfer. http://eprint.iacr.org/2005/187.pdf, 1981.
[42] B. Chor, E. Goldreich, O. Kushilevitz, and M. Sudan. Private Information Retrieval. http://www.tau.ac.il/~bchor/PIR.pdf, 1995.
[43] K. M. Martin. Everyday Cryptography: Section 1.5.3 Knowledge of the encryption algorithm. Oxford University Press, 2012.
[44] T. Wu. The SRP Authentication and Key Exchange System (RFC2945), http://tools.ietf.org/html/rf2945, 2000.
[45] K. M. Martin. Everyday Cryptography: Table 1.1 Mapping of primitives. Oxford University Press, 2012.
[46] Craig Gentry. A fully homomorphic encryption scheme (PhD Thesis). Stanford University, 2009.
[47] I2P Team. Invisible Internet Project. https://www.torproject.org/, 2015.
[48] I. Clarke. A Distributed Anonymous Information Storage and Retrieval System. https://freenetproject.org/papers/ddisrs.pdf, 1999.
[49] C. Chen, D. E. Asoni, D. Barrera, G. Danezis, and A. Perrig. HORNET: High-speed Onion Routing at the Network Layer. http://arxiv.org/pdf/1507.05724v1.pdf, 2012.
[50] Netsukuku Developers. Netsukuku. http://netsukuku.freaknet.org/, 2012.
[51] OpenBSD Developers. OpenBSD. http://www.openbsd.org/, 2015.
[52] Whonix Developers. Whonix. https://www.whonix.org/, 2015.
[53] Microsoft. BitLocker. https://technet.microsoft.com/en-us/library/cc732774.aspx, 2015.
[54] IDRIX. VeraCrypt. https://veracrypt.codeplex.com/, 2015.
[55] TrueCrypt Foundation. TrueCrypt. http://truecrypt.sourceforge.net/, 2015.
[56] Trust Computing Group. Storage Work Group Storage Security Subsystem Class: Opal. Version 2.01. https://www.trustedcomputinggroup.org/resources/storage_work_group_storage_security_subsystem_class_opal, 2015.
[57] Trust Computing Group. Storage Work Group Storage Security Subsystem Class: Enterprise. Version 1.01. https://www.trustedcomputinggroup.org/resources/storage_work_group_storage_security_subsystem_class_enterprise_specification, 2015.
[58] T. Hudson and L. Rudolph. Thunderstrike: EFI firmware bootkits for Apple MacBooks. https://dl.acm.org/citation.cfm?id=2757673, 2015.
[59] C. Kallenberg and X. Kovah. How Many Million BIOSes Would You Like To Infect. https://www.navixia.com/images/pdf/newsletter/2015/HowManyMillionBIOSWouldYouLikeToInfect_Full2_.pdf3, 2015.
[60] K. Zetter. Researchers Create First Firmware Worm That Attacks Macs. http://www.wired.com/2015/08/researchers-create-first-firmware-worm-attacks-macs/, 2015.
[61] J. Warren. BitMessage. https://bitmessage.org/bitmessage.pdf, 2012.
[62] Kalix Ltd. BeePip. http://beepip.com/, 2014.
[63] A. Langley. Pond. https://pond.imperialviolet.org/, 2012.
[64] A. Langley. Pond: Repository on GitHub. https://github.com/agl/pond, 2012.
[65] TorChat Developers. TorChat. https://github.com/prof7bit/TorChat, 2012.
[66] I. Goldberg and N. Borisov. Off-the-Record Communication, or, Why Not to Use
PGP. https://otr.cypherpunks.ca/people.php, 2004.
[67] RetroShare Developers. RetroShare. http://retroshare.sourceforge.net/, 2015.
[68] Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf, 2008.
[69] Map of Coins Developers. Map of Coins. http://mapofcoins.com/, 2015.
[70] CoinMarketCap Developers. CoinMarketCap. http://www.coinmarketcap.com/, 2015.
[71] E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and Virza. M. Zerocash: Decentralized Anonymous Payments from Bitcoin. http://zerocash-project.org/, 2014.
[72] I. Miers, C. Garman, M. Green, and A. D. Rubin. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. http://zerocoin.org/media/pdf/ZerocoinOakland.pdf, 2013.
[73] A. Shamir. Quantitative Analysis of the Full Bitcoin Transaction Graph. https://eprint.iacr.org/2012/584.pdf, 2012.
[74] M. Green. Zerocash presentation at Real World Cryptography Workshop. http://pastebin.com/q3rgh5ZY.
[75] N. van Saberhagen. CryptoNote V1.0. https://cryptonote.org/whitepaper_v1.pdf, 2012.
[76] BitXBay Developers. BitXBay. https://github.com/bitxbay/BitXBay, 2014.
[77] BitMessage Developers. BitMessage on GitHub. https://github.com/Bitmessage/PyBitmessage, 2015.
[78] BitMessage Developers. BitMessage Wiki. https://bitmessage.org/wiki/, 2015.
[79] BitMessage Developers. BitMessage Wiki: Protocol Specification. https://bitmessage.org/wiki/Protocol_specification, 2015.
[80] D. Giry. ECRYPT II Recommendations (2012). http://www.keylength.com/en/3, 2015.
[81] A. K. Lenstra, J. P. Hughes, M. Augier, J. W. Bos, T. Kleinjung, and C. Wachter. Ron was wrong, Whit is right. https://eprint.iacr.org/2012/064.pdf, 2012.
[82] BitMessage Developers. BitMessage Wiki: Public key to BitMessage address. https://bitmessage.org/wiki/Public_key_to_bitmessage_address, 2015.
[83] Bitcoin Wiki Team. Bitcoin Wiki: Base58Check encoding . https://en.bitcoin.it/wiki/Base58Check_encoding, 2015.
[84] Ayra. BitDNS. http://bitm.sg/?menu=bitdns, 2015.
[85] Namecoin Developers. Namecoin Website. https://namecoin.info/, 2015.
[86] BitMessage Developers. BitMessage Wiki: Encryption. https://bitmessage.org/wiki/Encryption, 2015.
[87] BitMessage Developers. BitMessage GitHub: Encryption. https://github.com/Bitmessage/PyBitmessage/blob/master/src/highlevelcrypto.py, 2015.
[88] K. M. Martin. Everyday Cryptography: Section 10.6.1 Key separation. Oxford University Press, 2012.
[89] D. R. L. Brown. SEC 2: Recommended Elliptic Curve Domain Parameters. http://www.secg.org/sec2-v2.pdf, 2010.
[90] D. Giry. NIST Recommendations (2012). http://www.keylength.com/en/4, 2015.
[91] BitMessage Developers. BitMessage Wiki: Proof of Work. https://bitmessage.org/wiki/Proof_of_work, 2015.
[92] BitMessage Developers. BitMessage GitHub: Proof of Work. https://github.com/Bitmessage/PyBitmessage/blob/master/src/proofofwork.py, 2015.
[93] BitMessage Developers. BitMessage Wiki: Subscriptions. https://bitmessage.org/wiki/Subscriptions, 2015.
[94] BitMessage Developers. BitMessage Wiki: Decentralised Mailing List. https://bitmessage.org/wiki/DML, 2015.
[95] Ayra. BitCrypt. http://bitm.sg/?menu=bitcrypt, 2015.
[96] Ayra. BitMarket. http://bitm.sg/?menu=bitmarket, 2015.
[97] National Security Agency. NSA Suite B Cryptography. https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml, 2015.