default search action
Roger Dingledine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j2]Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr:
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. Proc. Priv. Enhancing Technol. 2022(3): 179-199 (2022)
2010 – 2019
- 2012
- [c24]David Fifield, Nate Hardison, Jonathan D. Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phillip A. Porras:
Evading Censorship with Browser-Based Proxies. Privacy Enhancing Technologies 2012: 239-258 - [c23]Rob Jansen, Kevin S. Bauer, Nicholas Hopper, Roger Dingledine:
Methodically Modeling the Tor Network. CSET 2012 - [c22]Tariq Elahi, Kevin S. Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg:
Changing of the guards: a framework for understanding and improving entry guard selection in tor. WPES 2012: 43-54 - [e5]Roger Dingledine, Joss Wright:
2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI '12, Bellevue, WA, USA, August 6, 2012. USENIX Association 2012 [contents] - 2011
- [c21]Aaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson:
Trust-based anonymous communication: adversary models and routing algorithms. CCS 2011: 175-186 - [c20]Roger Dingledine:
Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk). CRYPTO 2011: 485-486 - [c19]Roger Dingledine:
Tor and the Censorship Arms Race: Lessons Learned. INDOCRYPT 2011: 1 - 2010
- [c18]Justin Samuel, Nick Mathewson, Justin Cappos, Roger Dingledine:
Survivable key compromise in software update systems. CCS 2010: 61-72 - [c17]Karsten Loesing, Steven J. Murdoch, Roger Dingledine:
A Case Study on Measuring Statistical Data in the Tor Anonymity Network. Financial Cryptography Workshops 2010: 203-215 - [c16]Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach:
Building Incentives into Tor. Financial Cryptography 2010: 238-256
2000 – 2009
- 2009
- [c15]Nathan S. Evans, Roger Dingledine, Christian Grothoff:
A Practical Congestion Attack on Tor Using Long Paths. USENIX Security Symposium 2009: 33-50 - [e4]Roger Dingledine, Philippe Golle:
Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers. Lecture Notes in Computer Science 5628, Springer 2009 [contents] - 2007
- [j1]Roger Dingledine, Nick Mathewson, Paul F. Syverson:
Deploying Low-Latency Anonymity: Design Challenges and Social Factors. IEEE Secur. Priv. 5(5): 83-87 (2007) - 2006
- [c14]Roger Dingledine, Andrei Serjantov, Paul F. Syverson:
Blending Different Latency Traffic with Alpha-mixing. Privacy Enhancing Technologies 2006: 245-257 - [c13]Roger Dingledine, Nick Mathewson:
Anonymity Loves Company: Usability and the Network Effect. WEIS 2006 - 2005
- [e3]Vijay Atluri, Sabrina De Capitani di Vimercati, Roger Dingledine:
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-228-3 [contents] - 2004
- [c12]Nick Mathewson, Roger Dingledine:
Mixminion: Strong Anonymity for Financial Cryptography. Financial Cryptography 2004: 227-232 - [c11]Nick Mathewson, Roger Dingledine:
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. Privacy Enhancing Technologies 2004: 17-34 - [c10]Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson:
Synchronous Batching: From Cascades to Free Routes. Privacy Enhancing Technologies 2004: 186-206 - [c9]Roger Dingledine, Nick Mathewson, Paul F. Syverson:
Tor: The Second-Generation Onion Router. USENIX Security Symposium 2004: 303-320 - [c8]Nick Feamster, Roger Dingledine:
Location diversity in anonymity networks. WPES 2004: 66-76 - 2003
- [c7]Alessandro Acquisti, Roger Dingledine, Paul F. Syverson:
On the Economics of Anonymity. Financial Cryptography 2003: 84-102 - [c6]George Danezis, Roger Dingledine, Nick Mathewson:
Mixminion: Design of a Type III Anonymous Remailer Protocol. S&P 2003: 2-15 - [e2]Roger Dingledine, Paul F. Syverson:
Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers. Lecture Notes in Computer Science 2482, Springer 2003, ISBN 3-540-00565-X [contents] - [e1]Roger Dingledine:
Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers. Lecture Notes in Computer Science 2760, Springer 2003, ISBN 3-540-20610-8 [contents] - 2002
- [c5]Roger Dingledine, Nick Mathewson, Paul Syverson:
Reputation in privacy enhancing technologies. CFP 2002: 2:1-2:6 - [c4]Roger Dingledine, Paul F. Syverson:
Reliable MIX Cascade Networks through Reputation. Financial Cryptography 2002: 253-268 - [c3]Andrei Serjantov, Roger Dingledine, Paul F. Syverson:
From a Trickle to a Flood: Active Attacks on Several Mix Types. Information Hiding 2002: 36-52 - 2001
- [c2]Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar:
A Reputation System to Increase MIX-Net Reliability. Information Hiding 2001: 126-141 - 2000
- [c1]Roger Dingledine, Michael J. Freedman, David Molnar:
The Free Haven Project: Distributed Anonymous Storage Service. Workshop on Design Issues in Anonymity and Unobservability 2000: 67-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint