-
2
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
LNCS 2009, Springer-Verlag
-
A. Pfitzmann and M. Köhntopp, "Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology," Designing Privacy Enhancing Technologies: Proc. Int'l Workshop Design Issues in Anonymity and Observability, LNCS 2009, Springer-Verlag, 2000, pp. 1-9.
-
(2000)
Designing Privacy Enhancing Technologies: Proc. Int'l Workshop Design Issues in Anonymity and Observability
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, 1981, pp. 84-88.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
IEEE CS Press
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2003, pp. 28-41.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 28-41
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
5
-
-
17144388792
-
Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes
-
(experiences with the Operation of an Anonymity Service) (in German)
-
S. Köpsell, H. Federrath, and M. Hansen, "Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes," (Experiences with the Operation of an Anonymity Service) Datenschutz und Datensicherheit, vol. 27, no. 3, 2003 (in German).
-
(2003)
Datenschutz und Datensicherheit
, vol.27
, Issue.3
-
-
Köpsell, S.1
Federrath, H.2
Hansen, M.3
-
7
-
-
3042766830
-
-
tech. report, Computer Science Dept. Informatik IV (Communication and Distributed Systems), Technical Univ. of Aachen
-
D. Kesdogan and D. Rautenbach, Towards Optimal Disclosure Attack, tech. report, Computer Science Dept. Informatik IV (Communication and Distributed Systems), Technical Univ. of Aachen, 2003.
-
(2003)
Towards Optimal Disclosure Attack
-
-
Kesdogan, D.1
Rautenbach, D.2
-
8
-
-
1642380665
-
Limits of anonymity in open environments
-
LNCS, Springer-Verlag
-
D. Kesdogan, D. Agrawal, and S. Penz, "Limits of Anonymity in Open Environments," Proc. 5th Int'l Workshop Information Hiding, LNCS 2578, Springer-Verlag, 2002.
-
(2002)
Proc. 5th Int'l Workshop Information Hiding
, vol.2578
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
9
-
-
3042846362
-
-
master's thesis, Computer Science Dept. Informatik IV (Communication and Distributed Systems), Technical Univ. of Aachen (in German)
-
S. Penz, Security Analysis and Evaluation of Anonymity Techniques in Open Environments, master's thesis, Computer Science Dept. Informatik IV (Communication and Distributed Systems), Technical Univ. of Aachen, 2002 (in German).
-
(2002)
Security Analysis and Evaluation of Anonymity Techniques in Open Environments
-
-
Penz, S.1
-
10
-
-
0038148419
-
Probabilistic treatment of mixes to hamper traffic analysis
-
IEEE CS Press
-
D. Agrawal, D. Kesdogan, and S. Penz, "Probabilistic Treatment of Mixes to Hamper Traffic Analysis," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2003, pp. 16-27.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 16-27
-
-
Agrawal, D.1
Kesdogan, D.2
Penz, S.3
-
12
-
-
0008452404
-
-
tech. report, Information and Computer Science (ICS) Dept., Univ. of Calif., Irvine, Sept.
-
R. Dechter and D. Frost, Backtracking Algorithms for Constraint Satisfaction Problems, tech. report, Information and Computer Science (ICS) Dept., Univ. of Calif., Irvine, Sept. 1999.
-
(1999)
Backtracking Algorithms for Constraint Satisfaction Problems
-
-
Dechter, R.1
Frost, D.2
-
13
-
-
0003972427
-
-
Addison-Wesley
-
B. Krishnamurthy and j. Rexford, Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement, Addison-Wesley, 2001.
-
(2001)
Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement
-
-
Krishnamurthy, B.1
Rexford, J.2
|