-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and receipient untraceability
-
CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and receipient untraceability. J. Cryptography 1, 1, 65-75.
-
(1988)
J. Cryptography
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
77950583078
-
On the analysis of the predecessor attack on anonymous protocols
-
(July), University of Massachusetts CMPSCI
-
FIGUEIREDO, D. R., NAIN, P., AND TOWSLEY, D. 2004. On the analysis of the predecessor attack on anonymous protocols. Technical Report 04-65 (July), University of Massachusetts CMPSCI.
-
(2004)
Technical Report
, vol.4
, Issue.65
-
-
Figueiredo, D.R.1
Nain, P.2
Towsley, D.3
-
7
-
-
54649083230
-
Taz servers and the rewebber network: Enabling anonymous publishing on the world wide web
-
GOLDBERG, I. AND WAGNER, D. 1998. Taz servers and the rewebber network: Enabling anonymous publishing on the world wide web. First Monday.
-
(1998)
First Monday
-
-
Goldberg, I.1
Wagner, D.2
-
8
-
-
14544301505
-
Exploration of the world wide web tilts from eclectic to mundane
-
(Aug. 26). National Desk
-
HARMON, A. 1998. Exploration of the world wide web tilts from eclectic to mundane. New York Times (Aug. 26). National Desk.
-
(1998)
New York Times
-
-
Harmon, A.1
-
9
-
-
0006913907
-
Stop-and-go-mixes providing probabilistic anonymity in an open system
-
KESDOGAN, D., EGNER, J., AND BUSCHKES, R. 1998. Stop-and-go-mixes providing probabilistic anonymity in an open system. In Information Hiding.
-
(1998)
Information Hiding
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
11
-
-
33745798251
-
Stopping timing attacks in low-latency mix-based systems
-
LEVINE, B. N., REITER, M., WANG, C., AND WRIGHT, M. 2004. Stopping timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography.
-
(2004)
Proceedings of Financial Cryptography
-
-
Levine, B.N.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
13
-
-
0004168557
-
-
Cambridge University Press, Cambridge, UK, chap. 4
-
MOTAWANI, R. AND RAGHAVAN, P. 1995. Randomized Algorithms. Cambridge University Press, Cambridge, UK, chap. 4.
-
(1995)
Randomized Algorithms
-
-
Motawani, R.1
Raghavan, P.2
-
24
-
-
84924758404
-
Group principals and the formalization of anonymity
-
J. Wing, J. Woodcock, and J. Davies, Eds. Lecture Notes in Computer Science, vol. 1708. Springer, Berlin
-
SYVERSON, P. AND STUBBLEBINE, S. 1999. Group principals and the formalization of anonymity. In FM'99 - Formal Methods, vol. I, J. Wing, J. Woodcock, and J. Davies, Eds. Lecture Notes in Computer Science, vol. 1708. Springer, Berlin, 814-833.
-
(1999)
FM'99 - Formal Methods
, vol.1
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
25
-
-
0038311861
-
Towards an analysis of onion routing security
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. 2000. Towards an analysis of onion routing security. In Workshop on Design Issues in Anonymity and Unobservability.
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
26
-
-
6244294214
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
-
WAIDNER, M. AND PFITZMANN, B. 1989a. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Eurocrypt '89.
-
(1989)
Eurocrypt '89
-
-
Waidner, M.1
Pfitzmann, B.2
-
27
-
-
0011653195
-
Unconditional sender and recipient untraceability in spite of active attacks - Some remarks
-
Fakultat fur Informatik, Universitat Karlsruhe
-
WAIDNER, M. AND PFITZMANN, B. 1989b. Unconditional sender and recipient untraceability in spite of active attacks - Some remarks. Technical Report, Fakultat fur Informatik, Universitat Karlsruhe.
-
(1989)
Technical Report
-
-
Waidner, M.1
Pfitzmann, B.2
-
28
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
WRIGHT, M., ADLER, M., LEVINE, B., AND SHIELDS, C. 2002. An analysis of the degradation of anonymous protocols. In ISOC Symposium on Network and Distributed System Security.
-
(2002)
ISOC Symposium on Network and Distributed System Security
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
-
29
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
WRIGHT, M., ADLER, M., LEVINE, B., AND SHIELDS, C. 2003. Defending anonymous communications against passive logging attacks. In IEEE Symposium on Security and Privacy.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
-
30
-
-
0038311823
-
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
-
(Aug.), Hewlett Packard Laboratories
-
XIAO, L., XU, Z., AND ZHANG, X. 2001. Low-cost and reliable mutual anonymity protocols in peer-to-peer networks. Technical Report HPL-2001-204 (Aug.), Hewlett Packard Laboratories.
-
(2001)
Technical Report
, vol.HPL-2001-204
-
-
Xiao, L.1
Xu, Z.2
Zhang, X.3
-
32
-
-
0013294761
-
Stepping stone detection
-
New Areas of Research
-
ZHANG, Y. AND PAXSON, V. 1999. Stepping stone detection. A Presentation at SIGCOMM'99, New Areas of Research.
-
(1999)
SIGCOMM'99
-
-
Zhang, Y.1
Paxson, V.2
|