-
2
-
-
0030172012
-
Analyzing and comparing montgomery multiplication algorithms
-
June
-
T. Acar, B. S. Kaliski Jr., and Ç. Koç, "Analyzing and comparing montgomery multiplication algorithms," IEEE Micro., vol. 16, no. 3, pp. 26-33, June 1996.
-
(1996)
IEEE Micro.
, vol.16
, Issue.3
, pp. 26-33
-
-
Acar, T.1
Kaliski Jr., B.S.2
Koç, Ç.3
-
4
-
-
0002755459
-
Anonymous Atomic Transactions
-
Oakland, CA, Nov.
-
L. J. Camp, M. Harkavey, B. Yee, and J. D. Tygar, "Anonymous Atomic Transactions," Second USENIX Workshop on Electronic Commerce, Oakland, CA, Nov. 1996.
-
(1996)
Second USENIX Workshop on Electronic Commerce
-
-
Camp, L.J.1
Harkavey, M.2
Yee, B.3
Tygar, J.D.4
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
0003527984
-
-
Engelwood Cliffs, NJ: Prentice-Hall
-
D. E. Comer, Internetworking with TCP/IP, Vol. 1: Principles, Protocols, and Architecture. Engelwood Cliffs, NJ: Prentice-Hall, 1995.
-
(1995)
Internetworking with TCP/IP, Vol. 1: Principles, Protocols, and Architecture
, vol.1
-
-
Comer, D.E.1
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Designs, Codes, and Cryptography, vol. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
9
-
-
0029705080
-
Variable and scalable security: Protection of location information in mobile IP
-
Atlanta, GA, Mar.
-
A. Fasbender, D. Kesdogan, and O. Kubitz, "Variable and scalable security: Protection of location information in mobile IP," presented at the 46th IEEE Vehicular Technology Society Conf., Atlanta, GA, Mar. 1996.
-
(1996)
46th IEEE Vehicular Technology Society Conf.
-
-
Fasbender, A.1
Kesdogan, D.2
Kubitz, O.3
-
12
-
-
0003317098
-
How to make personalized web browsing simple, secure and anonymous
-
LNCS R. Hirschfeld, Ed. Berlin: Springer-Verlag
-
E. Gabber, P. Gibbons, Y. Matias, and A. Mayer, "How to make personalized web browsing simple, secure and anonymous," Financial Cryptography'97, (LNCS vol. 1318) R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1997, pp. 17-31.
-
(1997)
Financial Cryptography'97
, vol.1318
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
Mayer, A.4
-
13
-
-
84956975181
-
Privacy on the Internet
-
Kuala Lumpur, Indonesia, June
-
D. Goldschlag, M. Reed, and P. Syverson, "Privacy on the Internet," INET'97, Kuala Lumpur, Indonesia, June, 1997.
-
(1997)
INET'97
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
14
-
-
84955557456
-
Hiding routing information
-
R. Anderson, Ed., LNCS New York: Springer-Verlag
-
D. Goldschlag, M. Reed, and P. Syverson, "Hiding routing information," in Information Hiding, R. Anderson, Ed., (LNCS vol. 1174). New York: Springer-Verlag, pp. 1996, 137-150.
-
Information Hiding
, vol.1174
, pp. 1996
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
17
-
-
0011702966
-
ISDN-Mixes: Untraceable communication with very small bandwidth overhead
-
Mannheim, Germany, Feb.
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner, "ISDN-Mixes: Untraceable communication with very small bandwidth overhead," in Proc. GI/ITG Conf.: Communication in Distributed Systems, Mannheim, Germany, Feb., 1991, pp. 451-463.
-
(1991)
Proc. GI/ITG Conf.: Communication in Distributed Systems
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
18
-
-
85031633867
-
Proxies for anonymous routing
-
San Diego, CA
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Proxies for anonymous routing," in Proc. 12th An. Computer Security Applications Conf., San Diego, CA, 1996, pp. 95-104.
-
(1996)
Proc. 12th An. Computer Security Applications Conf.
, pp. 95-104
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
19
-
-
84938811530
-
Protocols using anonymous connections: Mobile applications
-
Paris, France, Apr.
-
M. Reed, P. Syverson, and D. Goldschlag, "Protocols using anonymous connections: Mobile applications," presented at the 1997 Security Protocols Workshop, Paris, France, Apr. 1997.
-
(1997)
1997 Security Protocols Workshop
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
22
-
-
24344440124
-
Anonymous communication and anonymous cash
-
LNCS N. Koblitz Ed. New York: Springer-Verlag, 1996
-
D. Simon, "Anonymous communication and anonymous cash," in Advances in Cryptology - CRYPTO'96, (LNCS vol. 1109), N. Koblitz Ed. New York: Springer-Verlag, 1996, pp. 61-73, 1996.
-
(1996)
Advances in Cryptology - CRYPTO'96
, vol.1109
, pp. 61-73
-
-
Simon, D.1
-
23
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, CA, May
-
P. Syverson, D. Goldschlag, and M. Reed, "Anonymous connections and onion routing," in Proc. 1997 IEEE Symp. on Security and Privacy, Oakland, CA, May 1997, pp. 44-54.
-
(1997)
Proc. 1997 IEEE Symp. on Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
|