Roger Dingledine
#185,539
Most Influential Person Now
Roger Dingledine's AcademicInfluence.com Rankings
Roger Dingledinecomputer-science Degrees
Computer Science
#11989
World Rank
#12765
Historical Rank
Database
#9069
World Rank
#9533
Historical Rank

Download Badge
Computer Science
Why Is Roger Dingledine Influential?
(Suggest an Edit or Addition)Roger Dingledine's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Tor: The Second-Generation Onion Router (2004) (3906)
- Mixminion: design of a type III anonymous remailer protocol (2003) (777)
- The Free Haven Project: Distributed Anonymous Storage Service (2000) (441)
- From a Trickle to a Flood: Active Attacks on Several Mix Types (2002) (251)
- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure (2004) (196)
- A Practical Congestion Attack on Tor Using Long Paths (2009) (194)
- Anonymity Loves Company: Usability and the Network Effect (2006) (192)
- On the Economics of Anonymity (2003) (182)
- Location diversity in anonymity networks (2004) (130)
- Reliable MIX Cascade Networks through Reputation (2002) (125)
- Reputation in P2P Anonymity Systems (2003) (109)
- A Reputation System to Increase MIX-Net Reliability (2001) (103)
- Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it (2009) (101)
- A Case Study on Measuring Statistical Data in the Tor Anonymity Network (2010) (96)
- Survivable key compromise in software update systems (2010) (92)
- Changing of the guards: a framework for understanding and improving entry guard selection in tor (2012) (90)
- Building Incentives into Tor (2010) (89)
- Design of a blocking-resistant anonymity system (2006) (85)
- Evading Censorship with Browser-Based Proxies (2012) (81)
- Methodically Modeling the Tor Network (2012) (72)
- Synchronous Batching: From Cascades to Free Routes (2004) (71)
- One Fast Guard for Life ( or 9 months ) (2014) (61)
- Trust-based anonymous communication: adversary models and routing algorithms (2011) (51)
- Deploying Low-Latency Anonymity: Design Challenges and Social Factors (2007) (48)
- The Free Haven Project : design and deployment of an anonymous secure data haven (2000) (44)
- Challenges in deploying low-latency anonymity (2005) (28)
- Reputation in privacy enhancing technologies (2002) (23)
- Blending Different Latency Traffic with Alpha-mixing (2006) (20)
- Tor: The Second-Generation Onion Router (2014 DRAFT v1) (2012) (16)
- Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk) (2011) (16)
- Privacy enhancing technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002 : revised papers (2003) (12)
- Challenges in deploying low-latency anonymity ( DRAFT ) (2005) (11)
- Reputation in P 2 P Anonymity Systems (2003) (10)
- Adaptive throttling of Tor clients by entry guards (2010) (9)
- Mixminion: Strong Anonymity for Financial Cryptography (2004) (7)
- Five ways to test bridge reachability (2011) (7)
- Financial Cryptography and Data Security (2009) (6)
- Tor : The Second-Generation Onion Router ( 2012 DRAFT ) (2012) (5)
- Tor Development Roadmap, 2008-2011 (2011) (5)
- Attacks on Anonymity Systems: Theory and Practice (2003) (5)
- Open Issues in the Economics of Anonymity (2002) (5)
- Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers (2009) (4)
- WPES '05 : proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society : November 7, 2005, Alexandria, Virginia, USA (co-located with CCS 2005) (2005) (2)
- Privacy Enhancing Technologies: Third International Workshop, Pet 2003, Dresden, Germany, March 2003: Revisd Papers (Lecture Notes in Computer Science, 2760) (2004) (2)
- Privacy Enhancing Technologies (2003) (1)
- Proceedings of the 2nd international conference on Privacy enhancing technologies (2002) (1)
- Measuring the safety of the Tor network (2011) (1)
- Tor and the Censorship Arms Race: Lessons Learned (2011) (1)
- Privacy Enhancing Technologies (2003) (1)
- Resisting Traffic Analysis on Unclassified Networks (2004) (1)
- Privacy Enhancing Technologies: Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers (2004) (1)
- Session details: Internet security (2007) (0)
- Tools of the Trade (2010) (0)
- Privacy Enhancing Technologies 2003 Dresden, Germany March 26-28, 2003 (2003) (0)
- Session details: Cryptographic solutions for privacy (2011) (0)
- Session details: Anonymity networks (2010) (0)
- Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs (2022) (0)
- Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005 (2005) (0)
- Panel: Future Anonymity Systems (2005) (0)
- Session details: Privacy preserving services and human factors (2007) (0)
- Lo ation Diversity in Anonymity (2007) (0)
This paper list is powered by the following services: