-
1
-
-
35248878897
-
On the economics of anonymity
-
Rebecca N. Wright, editor, Springer-Verlag, LNCS 2742
-
Alessandro Acquisti, Roger Dingledine, and Paul Syverson. On the economics of anonymity. In Rebecca N. Wright, editor, Financial Cryptography. Springer-Verlag, LNCS 2742, 2003.
-
(2003)
Financial Cryptography
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
2
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
Ira S. Moskowitz, editor. Springer-Verlag, LNCS 2137
-
Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and tradeoffs in anonymity providing systems. In Ira S. Moskowitz, editor, Proceedings of Information Hiding Workshop (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
-
(2001)
Proceedings of Information Hiding Workshop (IH 2001)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
0038483826
-
Emergence of scaling in random networkds
-
October
-
Albert-Lázló Barábasi and Réka Albert. Emergence of scaling in random networkds. Science, 286:509-512, October 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barábasi, A.-L.1
Albert, R.2
-
4
-
-
18744421488
-
Mean-field theory for scale-free random networks
-
Albert-Lázló Barábasi, Réka Albert, and Hawoong Jeong. Mean-field theory for scale-free random networks. Physica A, 272:173-187, 2000.
-
(2000)
Physica A
, vol.272
, pp. 173-187
-
-
Barábasi, A.-L.1
Albert, R.2
Jeong, H.3
-
6
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
7
-
-
0037974470
-
Dummy traffic against long term intersection attacks
-
Roger Dingledine and Paul Syverson, editors. Springer-Verlag, LNCS 2482, April
-
Oliver Berthold and Heinrich Langos. Dummy traffic against long term intersection attacks. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Berthold, O.1
Langos, H.2
-
8
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvantages of free MIX routes and how to overcome them. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30-45. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
9
-
-
20444436625
-
Freedom systems 2.0 architecture
-
Zero Knowledge Systems, Inc., December
-
Philippe Boucher, Adam Shostack, and lan Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
White Paper
-
-
Boucher, P.1
Shostack, A.2
Goldberg, L.3
-
10
-
-
0008157272
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.
-
(1982)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
11
-
-
24344507136
-
-
August 1996. 〈 First mentioned to the cypherpunks list, Feb.
-
Wei Dai. Pipenet 1.1. Usenet post, August 1996. 〈http://www.eskimo.com/~weidai/pipenet.txt〉 First mentioned to the cypherpunks list, Feb. 1995.
-
(1995)
Pipenet 1.1. Usenet Post
-
-
Dai, W.1
-
13
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
Gritzalis, Vimercati, Samarati, and Katsikas, editors, Athens, May. IFIP TC11, Kluwer
-
George Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Gritzalis, Vimercati, Samarati, and Katsikas, editors, Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
Danezis, G.1
-
15
-
-
24344490151
-
Statistical disclosure or intersection attacks on anonymity systems
-
Springer-Verlag, (forthcoming)
-
George Danezis and Andrei Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Proceedings of Information Hiding Workshop (IH 2004). Springer-Verlag, 2004 (forthcoming).
-
(2004)
Proceedings of Information Hiding Workshop (IH 2004)
-
-
Danezis, G.1
Serjantov, A.2
-
22
-
-
1642380665
-
Limits of anonymity in open environments
-
Fabien Petitcolas, editor, Springer-Verlag, LNCS 2578, October
-
Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
-
(2002)
Proceedings of Information Hiding Workshop (IH 2002)
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
24
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
Ari Juels, editor, Springer-Verlag, LNCS (forthcoming)
-
Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew Wright. Timing attacks in low-latency mix-based systems. In Ari Juels, editor, Financial Cryptography. Springer-Verlag, LNCS (forthcoming), 2004.
-
(2004)
Financial Cryptography
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
27
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
J. F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability
, pp. 10-29
-
-
Raymond, J.F.1
-
28
-
-
0032074579
-
Goldschlag. anonymous connections and onion routing
-
May
-
Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
David, M.3
-
30
-
-
1642387170
-
From a trickle to a flood: Active attacks on several mix types
-
Fabien Petitcolas, editor. Springer-Ver lag, LNCS 2578, October
-
Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Ver lag, LNCS 2578, October 2002.
-
(2002)
Proceedings of Information Hiding Workshop (IH 2002)
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
31
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Springer-Verlag, LNCS (forthcoming), October
-
Andrei Serjantov and Peter Sewell. Passive attack analysis for connection-based anonymity systems. In Computer Security - ESORICS 2003. Springer-Verlag, LNCS (forthcoming), October 2003.
-
(2003)
Computer Security - ESORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
-
32
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
June
-
Duncan J. Watts and Steven H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440-442, June 1998.
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
34
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
IEEE CS, May
-
Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields. Defending anonymous communication against passive logging attacks. In IEEE Symposium on Security and Privacy, pages 28-41. IEEE CS, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|