-
4
-
-
23144444378
-
Defining authentication in a trace model
-
T. Dimitrakos and F. Martinelli, editors, Proc. FAST 2003, Pisa, IITT-CNR technical report
-
C.J.F. Cremers, S. Mauw, and E.P. de Vink. Defining authentication in a trace model. In T. Dimitrakos and F. Martinelli, editors, Proc. FAST 2003, 1st International Workshop on Formal Aspects in Security and Trust, pages 131-145, Pisa, 2003. IITT-CNR technical report.
-
(2003)
1st International Workshop on Formal Aspects in Security and Trust
, pp. 131-145
-
-
Cremers, C.J.F.1
Mauw, S.2
De Vink, E.P.3
-
5
-
-
33746634961
-
Information theory and anonymity
-
B. Macq and J.-J. Quisquater, editors, Université Catholique de Louvain
-
C. Díaz, J. Claessens, S. Seys, and B. Preneel. Information theory and anonymity. In B. Macq and J.-J. Quisquater, editors, Proc. 23rd Symposium on Information Theory in the Benelux, pages 179-186. Université Catholique de Louvain, 2002.
-
(2002)
Proc. 23rd Symposium on Information Theory in the Benelux
, pp. 179-186
-
-
Díaz, C.1
Claessens, J.2
Seys, S.3
Preneel, B.4
-
6
-
-
35048850656
-
-
EPIC. Comments of the Electronic Privacy Information Center. www.epic.org/privacy/drm/, 2002.
-
(2002)
-
-
-
8
-
-
35048852808
-
-
Association for Automatic Identification and Mobility. Rfid.org. www.aimglobal.org/technologies/rfid/, 2004.
-
(2004)
-
-
-
9
-
-
84955557456
-
Hiding routing information
-
R.J. Anderson, editor, Proc. 1st International Workshop on Information Hiding, Cambridge
-
D.M. Goldschlag, M.G. Reed, and P.F. Syverson. Hiding routing information. In R.J. Anderson, editor, Proc. 1st International Workshop on Information Hiding, pages 137-150, Cambridge, 1996. LNCS 1174.
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
11
-
-
35048813770
-
Anonymity and privacy in the electronic world
-
Helsinki University of Technology
-
M. Korkea-aho. Anonymity and privacy in the electronic world, 1999. Seminar on Network Security, Helsinki University of Technology.
-
(1999)
Seminar on Network Security
-
-
Korkea-Aho, M.1
-
12
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity
-
H. Federrath, editor, Designing Privacy Enhancing Technologies
-
A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity. In H. Federrath, editor, Designing Privacy Enhancing Technologies, pages 1-9. LNCS 2009, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
14
-
-
84949756689
-
CSP and anonymity
-
Proc. ESORICS'96
-
S. Schneider and A. Sidiroupoulos. CSP and anonymity. In Proc. ESORICS'96, pages 198-218. LNCS 1146, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiroupoulos, A.2
-
15
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
H. Federrath, editor, Proc. PET 2002
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In H. Federrath, editor, Proc. PET 2002, pages 41-53. LNCS 2482, 2003.
-
(2003)
LNCS
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
16
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, editor, Designing Privacy Enhancing Technologies
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Designing Privacy Enhancing Technologies, pages 96-114. LNCS 2009, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
17
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
|