@inproceedings{freedman2002tarzan, title={Tarzan: A peer-to-peer anonymizing network layer}, author={Freedman, Michael J and Morris, Robert}, booktitle={Proceedings of the 9th ACM conference on Computer and communications security}, pages={193--206}, year={2002}, organization={ACM} } @techreport{dingledine2004tor, title={Tor: The second-generation onion router}, author={Dingledine, Roger and Mathewson, Nick and Syverson, Paul}, year={2004}, institution={DTIC Document} } @incollection{sit2002security, title={Security considerations for peer-to-peer distributed hash tables}, author={Sit, Emil and Morris, Robert}, booktitle={Peer-to-Peer Systems}, pages={261--269}, year={2002}, publisher={Springer} } @inproceedings{leblond2013towards, title={Towards efficient traffic-analysis resistant anonymity networks}, author={Le Blond, Stevens and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul}, booktitle={ACM SIGCOMM Computer Communication Review}, volume={43}, number={4}, pages={303--314}, year={2013}, organization={ACM} } @article{reed1998onionrouting, title={Anonymous connections and onion routing}, author={Reed, Michael G and Syverson, Paul F and Goldschlag, David M}, journal={Selected Areas in Communications, IEEE Journal on}, volume={16}, number={4}, pages={482--494}, year={1998}, publisher={IEEE} } @inproceedings{dingledine2006anonymity, title={Anonymity Loves Company: Usability and the Network Effect.}, author={Dingledine, Roger and Mathewson, Nick}, booktitle={WEIS}, year={2006} } @article{bernstein2009cryptography, title={Cryptography in NaCl}, author={Bernstein, Daniel J}, journal={Networking and Cryptography library}, year={2009} } @incollection{bernstein2014tweetnacl, title={TweetNaCl: A crypto library in 100 tweets}, author={Bernstein, Daniel J and van Gastel, Bernard and Janssen, Wesley and Lange, Tanja and Schwabe, Peter and Smetsers, Sjaak}, booktitle={Progress in Cryptology-LATINCRYPT 2014}, pages={64--83}, year={2014}, publisher={Springer} }