-
1
-
-
0038289901
-
-
The Anonymizer
-
The Anonymizer. http://anonymizer.com.
-
-
-
-
2
-
-
84937578170
-
Web mixes: A system for anonymous and unobservable internet access
-
vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag
-
Berthold, O., Federrath, H., and Köspell, S. Web mixes: A system for anonymous and unobservable internet access. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001), vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag. pp. 115-129.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köspell, S.3
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
(Februray)
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (Februray 1981).
-
(1981)
Communications of the ACM
, vol.24
, pp. 2
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988), 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag
-
Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W. Freenet: A distributed anonymous information storage and retrieval system. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001) vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag. pp. 46-66. http://freenet.sourceforge.net.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
6
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
(Banff, Canada)
-
Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., and Stoica, I. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01) (Banff, Canada, 2001).
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01)
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
7
-
-
0037614403
-
-
Pipenet
-
Dai, W. Pipenet. http://www.eskomo.com/~weidai/pipent.txt.
-
-
-
Dai, W.1
-
8
-
-
33645240198
-
The free haven project: Distributed anonymous storage service
-
vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag
-
Dingledine, R., Freedman, M.J., and Molnar, D. The Free Haven Project: Distributed anonymous storage service. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001) vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag. pp. 67-95. http://freehaven.net.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
10
-
-
0038628601
-
-
Electronic Frontiers Georgia (EFGA). Anonymous Remailer information
-
Electronic Frontiers Georgia (EFGA). Anonymous Remailer information. http://anon.efga.org/Remailers/.
-
-
-
-
11
-
-
4243553525
-
Carnivore diagnostic tool
-
Federal Bureau of Investigations
-
Federal Bureau of Investigations. Carnivore diagnostic tool. http://www.fbi.gov/hq.lab/carnivore/carnivore.htm.
-
-
-
-
13
-
-
4243552572
-
Freedom network 1.0 architecture
-
November
-
Goldberg, I., and Shostack, A. Freedom network 1.0 architecture, November 1999.
-
(1999)
-
-
Goldberg, I.1
Shostack, A.2
-
14
-
-
54649083230
-
TAZ servers and the Rewebber network: Enabling anonymous publishing on the World Wide Web
-
Goldberg, I., and Wagner, D. TAZ servers and the Rewebber network: Enabling anonymous publishing on the World Wide Web. First Monday 3, 4 (1998).
-
(1998)
First Monday
, vol.3
, pp. 4
-
-
Goldberg, I.1
Wagner, D.2
-
15
-
-
0033282985
-
Preventing traffic analysis for real-time communication networks
-
(November)
-
Guan, Y., Li, C., Xuan,D., Bettati, R., and Zhao, W. Preventing traffic analysis for real-time communication networks. In Proceedings of Milcom '99 (November 1999).
-
(1999)
Proceedings of Milcom '99
-
-
Guan, Y.1
Li, C.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
-
16
-
-
0032633299
-
Resource discovery in distributed networks
-
(Atlanta, Georgia, 1999)
-
Harchol-Balter, M., Leighton, T., and Lewin, D. Resource discovery in distributed networks. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC '99) (Atlanta, Georgia, 1999).
-
(1999)
Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC '99)
-
-
Harchol-Balter, M.1
Leighton, T.2
Lewin, D.3
-
17
-
-
0141650502
-
Observed structure of addresses in IP traffic
-
(Marseille, France, November)
-
Kohler, E., Li, J., Paxson, V., and Shenker, S. Observed structure of addresses in IP traffic. In Proceedings of the SIGCOMM Internet Measurement Workshop 2002 (Marseille, France, November 2002).
-
(2002)
Proceedings of the SIGCOMM Internet Measurement Workshop 2002
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
18
-
-
85084162493
-
Deanonymizing users of the safeweb anonymizing service
-
(San Francisco, California, August)
-
Martin, D., and Schulman, A. Deanonymizing users of the safeweb anonymizing service. In Proceedings of the 11th USENIX Security Symposium (San Francisco, California, August 2002).
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Martin, D.1
Schulman, A.2
-
19
-
-
0042352260
-
Separating key management from file system security
-
(Kiawah Island, South Carolina. Dec.)
-
Mazières, D., Kaminsky, M., Kaashoek, M.F., and Witchel, E. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (Kiawah Island, South Carolina. Dec. 1999), pp. 124-139.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
20
-
-
84937564790
-
Anonymity, unobservability and pseudonymity - a proposal for terminology
-
vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag
-
Pfitzmann, A., and Köhntopp, M. Anonymity, unobservability and pseudonymity - a proposal for terminology. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001) vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag. pp. 1-9.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
21
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
Reiter, M.K., and Rubin, A.D. Crowds: Anonymity for Web transactions. ACM Transactions on Information and System Security 1, 1 (1998), 66-92.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
22
-
-
0037614407
-
-
Motion to enforce July 24, 2002 subpoena. U.S. Distinct Court, District of Columbia, August 20, 2002, Case No. 1: 02MS00323
-
Riaa V. Verizon. Motion to enforce July 24, 2002 subpoena. U.S. Distinct Court, District of Columbia, August 20, 2002, Case No. 1: 02MS00323.
-
-
-
Verizon, R.V.1
-
23
-
-
0003497264
-
-
January; RFC 3031
-
Rosen, E., Viswanathan, A., and Callon, R. Multiprotocol Label Switching Architecture, January 2001, RFC 3031.
-
(2001)
Multiprotocol Label Switching Architecture
-
-
Rosen, E.1
Viswanathan, A.2
Callon, R.3
-
24
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
Schneier, B. Description of a new variable-length key, 64-bit block cipher (Blowfish). Lecture Notes in Computer Science 809 (1994). 191-204.
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
25
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
(San Diego, California, August)
-
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., and Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM '01 Conference (San Diego, California, August 2001).
-
(2001)
Proceedings of the ACM SIGCOMM '01 Conference
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
26
-
-
0030676973
-
Anonymous connections and onion routing
-
(Oakland, California, May)
-
Syverson, P., Goldschlag, D.M., and Reed, M.G. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California, May 1997), 44-54.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.M.2
Reed, M.G.3
-
27
-
-
84937565289
-
Towards an analysis of onion routing security
-
vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag
-
Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. Towards an analysis of onion routing security. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001) vol. 2009 of Lecture Notes in Computer Science, Springer-Verlag. pp. 96-114.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
29
-
-
85084163931
-
Publius: A robust, tamper-evident, censorhip-resistant, web publishing system
-
(Denver, Colorado, August)
-
Waldman, M., Rubin, A.D., and Cranor, L.F. Publius: A robust, tamper-evident, censorhip-resistant, web publishing system. In Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, August 2000), pp. 59-72.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 59-72
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
30
-
-
15944409677
-
China's golden shield: Corporations and the development of surveillance technology in the People's Republic of China
-
Walton, G. China's Golden Shield: Corporations and the development of surveillance technology in the People's Republic of China, 2001. http://go.openflows.org/.
-
(2001)
-
-
Walton, G.1
-
31
-
-
27944460736
-
An analysis of the degradation of anonymous protocols
-
(San Diego, California, February)
-
Wright, M., Adler, M., Levine, B.N., and Shields, C. An analysis of the degradation of anonymous protocols. In Network and Distributed System Security Symposium (San Diego, California, February 2002).
-
(2002)
Network and Distributed System Security Symposium
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|