-
1
-
-
1942475932
-
-
The Anonymizer [Online]
-
The Anonymizer [Online]. Available: http:/www.anonymizer.com/
-
-
-
-
2
-
-
1942508061
-
-
Anonymous Remailer [Online]
-
Anonymous Remailer [Online]. Available: http://www.lcs.mit.edu/research/anonymous.html
-
-
-
-
3
-
-
84963503600
-
Project anonymity and unobservability in the Internet
-
O. Berthold, H. Federrath, and M. Köhntopp, "Project anonymity and unobservability in the Internet," in Proc. 10th Conf. on Computers, Freedom Privacy: Challenging the Assumptions, 2000, pp. 57-65.
-
Proc. 10th Conf. on Computers, Freedom Privacy: Challenging the Assumptions, 2000
, pp. 57-65
-
-
Berthold, O.1
Federrath, H.2
Köhntopp, M.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
____, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
84976841221
-
Generating beta variatew with nonintegral shape parameters
-
R. C. H. Cheng, "Generating beta variatew with nonintegral shape parameters," Communications of the ACM, vol. 21, no. 4, pp. 317-322, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 317-322
-
-
Cheng, R.C.H.1
-
7
-
-
0033358751
-
Solutions for anonymous communication on the Internet
-
J. Claessens, B. Preneel, and J. Vandewalle, "Solutions for anonymous communication on the Internet," in Proc. IEEE 33rd Annual Conf. on Security Technology, 1999, pp. 298-303.
-
Proc. IEEE 33rd Annual Conf. on Security Technology, 1999
, pp. 298-303
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
10
-
-
84948946447
-
How to make personalized web browsing simple, secure, and anonymous
-
E. Gabber, P. B. Gibbons, Y. Matias, and A. Mayer, "How to make personalized web browsing simple, secure, and anonymous," in Proc. Financial Cryptography'1997, LNCS 1318, 1997, pp. 17-31.
-
Proc. Financial Cryptography'1997, LNCS 1318, 1997
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.4
-
13
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Communications of the ACM, vol. 42, no. 2, pp. 39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
14
-
-
0033282985
-
Preventing traffic analysis for real-time communication networks
-
Nov.
-
Y. Guan et al., "Preventing traffic analysis for real-time communication networks," in Proc. IEEE MILCOM1999, vol. 1, Nov. 1999, pp. 744-750.
-
(1999)
Proc. IEEE MILCOM1999
, vol.1
, pp. 744-750
-
-
Guan, Y.1
-
15
-
-
0006890169
-
Efficient traffic camouflaging in mission-critical QoS-guaranteed networks
-
Y. Guan, X. Fu, R. Bettati, and W. Zhao, "Efficient traffic camouflaging in mission-critical QoS-guaranteed networks," in Proc. IEEE Information Assurance and Security Workshop, June 2000, pp. 143-149.
-
Proc. IEEE Information Assurance and Security Workshop, June 2000
, pp. 143-149
-
-
Guan, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
16
-
-
0035402083
-
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
-
July; Special Issue on Information Assurance
-
Y. Guan et al., NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications, in IEEE Trans, System, Man, and Cybernetics, vol. 31, no. 4, pp. 253-266, July 2001. Special Issue on Information Assurance.
-
(2001)
IEEE Trans, System, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 253-266
-
-
Guan, Y.1
-
17
-
-
1942508055
-
A quantitative analysis of anonymous communications
-
Dept. of Computer Science, Texas A&M University, Technical Report TR01-016, July
-
Y. Guan, X. Fu, R. Bettati, and W. Zhao, "A Quantitative Analysis of Anonymous Communications," Dept. of Computer Science, Texas A&M University, Technical Report TR01-016, July 2001.
-
(2001)
-
-
Guan, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
20
-
-
0032074980
-
Real-time mixes: A bandwidth-efficient anonymity protocol
-
A. Jerichow et al., "Real-time mixes: A bandwidth-efficient anonymity protocol," IEEE J. Selected Areas in Communications, vol. 16, no. 4, pp. 495-509, 1998.
-
(1998)
IEEE J. Selected Areas in Communications
, vol.16
, Issue.4
, pp. 495-509
-
-
Jerichow, A.1
-
21
-
-
1942475930
-
-
Lucent Personalized Web Assistant
-
Lucent Personalized Web Assistant (2001). [Online]. Available: http://www.bell-labs.com/projects/lpwa
-
(2001)
-
-
-
22
-
-
0003470642
-
Security architecture for the internet protocol
-
RFC2401
-
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol,", RFC2401, 1998.
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
25
-
-
0032074579
-
Anonymous connections and Onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and Onion routing," in IEEE J. Selected Areas in Communications, vol. 16, 1998, pp. 482-494.
-
(1998)
IEEE J. Selected Areas in Communications
, vol.16
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
26
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: Anonymity for web transactions," ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
27
-
-
84949756689
-
ESORICS'96
-
E. Kurth, G. Martella, and E. Montolivio, Eds: Springer-Verlag; LNCS
-
S. Schneider and A. Sidiropoulos, "ESORICS'96," in CSP and Anonymity, E. Kurth, G. Martella, and E. Montolivio, Eds: Springer-Verlag, 1996, vol. 1146, pp. 198-218. LNCS.
-
(1996)
CSP and Anonymity
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
28
-
-
0034447260
-
A protocol for anonymous communication over the Internet
-
C. Shields and B. N. Levine, "A protocol for anonymous communication over the Internet," in Proc. 7th ACM Conf. Computer & Communication Security, Nov. 1-4, 2000, pp. 33-42.
-
Proc. 7th ACM Conf. Computer & Communication Security, Nov. 1-4, 2000
, pp. 33-42
-
-
Shields, C.1
Levine, B.N.2
-
31
-
-
0030676973
-
Anonymous connections and Onion routing
-
P. Syverson, D. Goldschlag, and M. Reed, "Anonymous connections and Onion routing," in Proc. IEEE Symp. Security and Privacy, 1997, pp. 44-54.
-
Proc. IEEE Symp. Security and Privacy, 1997
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
32
-
-
84924758404
-
Group principles and the formalization of anonymity
-
Springer-Verlag, LNCS 1708
-
P. Syverson and S. Stubblebine, "Group principles and the formalization of anonymity," in World Congress on Formal Methods' 1999: Springer-Verlag, LNCS 1708, pp. 814-833.
-
World Congress on Formal Methods' 1999
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
33
-
-
0038311861
-
Toward an analysis of Onion routing security
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Toward an analysis of Onion routing security," in Proc. Workshop on Design Issues in Anonymity and Unobservability, 2000, pp. 83-100.
-
Proc. Workshop on Design Issues in Anonymity and Unobservability, 2000
, pp. 83-100
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
35
-
-
1942443750
-
-
in Personal Communication, Zero-Knowledge Systems Inc., May
-
Anton stiglic, in Personal Communication, Zero-Knowledge Systems Inc., May 2001.
-
(2001)
Anton Stiglic
-
-
-
36
-
-
0033244305
-
Anonymous communication policies for the internet: Results and recommendations of the AAAS conference
-
A. Teich, M. Frankel, R. Kling, and Y.-C. Lee, "Anonymous communication policies for the internet: Results and recommendations of the AAAS conference," The Information Society, vol. 15, no. 2, 1999.
-
(1999)
The Information Society
, vol.15
, Issue.2
-
-
Teich, A.1
Frankel, M.2
Kling, R.3
Lee, Y.-C.4
-
38
-
-
1942508057
-
-
Report from the national workshop on internet voting released. presented at National Workshop on Internet Voting
-
Report from the national workshop on internet voting released. presented at National Workshop on Internet Voting. [Online]. Available: http://www.netvoting.org/Resources/InternetVotingReport.pdf
-
-
-
-
39
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
M. Waidner, "Unconditional sender and recipient untraceability in spite of active attacks," in Proc. Eurocrypt, 1989, pp. 302-319.
-
Proc. Eurocrypt, 1989
, pp. 302-319
-
-
Waidner, M.1
-
40
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
M. Wright, M. Adler, B. N. Levine, and C. Shields, "An analysis of the degradation of anonymous protocols," in Proc. ISOC Network and Distributed System Security Symp, NDSS 2002, 2002.
-
(2002)
Proc. ISOC Network and Distributed System Security Symp, NDSS 2002
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
41
-
-
1942539898
-
-
Zero-knowledge Systems
-
Zero-knowledge Systems (2001). [Online]. Available: http://www.zero-knowledge.com/
-
(2001)
-
-
|