-
1
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
H. Federrath, editor. Springer-Verlag, LNCS 2009, July
-
O. Berthold, A. Pfitzmann, and R. Standtke. The disadvantages of free MIX routes and how to overcome them. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30-45. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
3
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
4
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
July
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46-66, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
8
-
-
3242815149
-
Towards measuring anonymity
-
R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
12
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39-41, 1999.
-
(1999)
Communications of the ACM (USA)
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
16
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
A. Juels, editor. Springer-Verlag, LNCS 3110, February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110, February 2004.
-
(2004)
Proceedings of Financial Cryptography (FC '04)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
19
-
-
1642355346
-
Covert channels and anonymizing networks
-
Washington, DC, USA, October
-
I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller. Covert channels and anonymizing networks. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003.
-
(2003)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003)
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
23
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Serjantov, A.1
Danezis, G.2
-
24
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
F. Petitcolas, editor. Springer-Verlag, LNCS 2578, October
-
A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
-
(2002)
Proceedings of Information Hiding Workshop (IH 2002)
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
25
-
-
20444435333
-
Passive attack analysis for connection-based anonymity systems
-
October
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.
-
(2003)
Proceedings of ESORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
-
26
-
-
27944457902
-
Anonymity v.s. information leakage in a anonymity systems
-
Texas A&M University, Computer Science Department, October
-
Y. Zhu and R. Bettati. Anonymity v.s. information leakage in a anonymity systems. Technical Report 2004-10-3, Texas A&M University, Computer Science Department, October 2004.
-
(2004)
Technical Report 2004-10-3
-
-
Zhu, Y.1
Bettati, R.2
-
27
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May 2004.
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May 2004.
-
Proceedings of Privacy Enhancing Technologies Workshop (PET 2004)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|