-
2
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Back A, Müller U, Stiglic A (2001) Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information hiding workshop. Lecture notes in computer science, vol 2137. Springer, Berlin Heidelberg New York, pp 245-257
-
(2001)
Information Hiding Workshop
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
0037974466
-
The disadvantages of free MIX routes and how to overcome them
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Berthold O, Pfitzmann A, Standtke R (2000) The disadvantages of free MIX routes and how to overcome them. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp 10-29
-
(2000)
Workshop on the Design Issues in Anonymity and Observability
, vol.2009
, pp. 10-29
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Chaum D (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84-88
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
35248866624
-
Mix-networks with restricted routes
-
Dresden, Germany, Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Danezis G (2003) Mix-networks with restricted routes. In: Workshop on privacy enhancing technologies, Dresden, Germany. Lecture notes in computer science, vol 2760. Springer, Berlin Heidelberg New York
-
(2003)
Workshop on Privacy Enhancing Technologies
, vol.2760
-
-
Danezis, G.1
-
11
-
-
19744368424
-
The JAP project
-
The JAP project. http://anon.inf.tu-dresden.de/index_en.html
-
-
-
-
12
-
-
84890010554
-
Stop-and-go MIXes: Providing probabilistic anonymity in an open system
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Kesdogan D, Egner J, Büschkes R (1998) Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Information hiding workshop. Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York
-
(1998)
Information Hiding Workshop
, vol.1525
-
-
Kesdogan, D.1
Egner, J.2
Büschkes, R.3
-
14
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Raymond J (2000) Traffic analysis: Protocols, attacks, design issues, and open problems. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp 10-29
-
(2000)
Workshop on the Design Issues in Anonymity and Observability
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
15
-
-
19744377678
-
Practical anonymity for the masses with mix-networks
-
Technical Report 157, ETH Zurich, Switzerland
-
Rennhard M (2003) Practical anonymity for the masses with mix-networks. Technical Report 157, ETH Zurich, Switzerland
-
(2003)
-
-
Rennhard, M.1
-
16
-
-
20444437836
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
Washington DC
-
Rennhard M, Plattner B (2002) Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In: Workshop on privacy in the electronic society (WPES), Washington DC
-
(2002)
Workshop on Privacy in the Electronic Society (WPES)
-
-
Rennhard, M.1
Plattner, B.2
-
18
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
San Francisco. Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Workshop on privacy enhancing technologies, San Francisco. Lecture notes in computer science, vol 2482. Springer, Berlin Heidelberg New York
-
(2002)
Workshop on Privacy Enhancing Technologies
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
19
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Serjantov A, Dingledine R, Syverson P (2002) From a trickle to a flood: active attacks on several mix types. In: Information hiding workshop. Lecture notes in computer science, vol 2578. Springer, Berlin Heidelberg New York
-
(2002)
Information Hiding Workshop
, vol.2578
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
21
-
-
0038311861
-
Towards an analysis of Onion Routing security
-
Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Syverson PF, Tsudik G, Reed MG, Landwehr CE (2000) Towards an analysis of Onion Routing security. In: Workshop on design issues in anonymity and unobservability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
, vol.2009
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
|