-
2
-
-
4944255012
-
Multiparty quantum coin flipping
-
A. Ambainis, H. Buhrman, H. Röhrig, and Y. Dodis. Multiparty quantum coin flipping. In Proceedings of CCC '03, pages 250-259, 2003.
-
(2003)
Proceedings of CCC '03
, pp. 250-259
-
-
Ambainis, A.1
Buhrman, H.2
Röhrig, H.3
Dodis, Y.4
-
3
-
-
33646797996
-
-
Anonymizer. Anonymizing proxy. http://www.anonymizer.com.
-
Anonymizing Proxy
-
-
-
4
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
-
C. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. Wootters. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters, 70:1895-1899, 1993.
-
(1993)
Physical Review Letters
, vol.70
, pp. 1895-1899
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.6
-
9
-
-
0030416397
-
Incoercible multiparty computation (extended abstract)
-
R. Canetti, and R. Gennaro. Incoercible Multiparty Computation (extended abstract). In Proceedings of 37th IEEE FOCS, pages 504-513, 1996
-
(1996)
Proceedings of 37th IEEE FOCS
, pp. 504-513
-
-
Canetti, R.1
Gennaro, R.2
-
10
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
14
-
-
33646779085
-
-
Pipenet
-
W. Dei. Pipenet. http://www.eskimo.com/weidai/pipenet.txt.
-
-
-
Dei, W.1
-
17
-
-
84947209216
-
Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch
-
Proceedings of Eurocrypt '02
-
M. Fitzi, N. Gisin, U. Maurer, and O. von Rotz. Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch. In Proceedings of Eurocrypt '02, volume 2332 of Lecture Notes in Computer Science, pages 482-501, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 482-501
-
-
Fitzi, M.1
Gisin, N.2
Maurer, U.3
Von Rotz, O.4
-
18
-
-
40249092538
-
Privacy-enhancing technologies for the internet, ii: Five years later
-
Proceedings of Privacy Enhancing Technologies, Second International Workshop (PET 2002)
-
I. Goldberg. Privacy-enhancing technologies for the internet, ii: Five years later. In Proceedings of Privacy Enhancing Technologies, Second International Workshop (PET 2002), volume 2482 of Lecture Notes in Computer Science, pages 1-12, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 1-12
-
-
Goldberg, I.1
-
20
-
-
0023545076
-
How to play any mental game - Or - A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proceedings of 19th ACM STOC, pages 218-229, 1987
-
(1987)
Proceedings of 19th ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
0004048824
-
-
Dordrecht: Kluwer
-
D. M. Greenberger, M. A. Home, and A. Zeilinger. Bell's Theorem, Quantum Theory, and Conceptions of the Universe. Dordrecht: Kluwer, 1989.
-
(1989)
Bell's Theorem, Quantum Theory, and Conceptions of the Universe
-
-
Greenberger, D.M.1
Home, M.A.2
Zeilinger, A.3
-
27
-
-
0011583205
-
How to implement isdns without user observability - Some remarks
-
Universität Karlsruhe
-
A. Pfitzmann. How to implement isdns without user observability - some remarks. Technical report, Universität Karlsruhe, 1985.
-
(1985)
Technical Report
-
-
Pfitzmann, A.1
-
31
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379-423, 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
32
-
-
84947916257
-
The cocaine auction protocol: On the power of anonymous broadcast
-
F. Stajano and R. J. Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In Information Hiding, pages 434-447, 1999.
-
(1999)
Information Hiding
, pp. 434-447
-
-
Stajano, F.1
Anderson, R.J.2
-
37
-
-
0011653195
-
Unconditional sender and recipient untraceability in spite of active attacks - Some remarks
-
Universität Karlsruhe
-
M. Waidner and B. Pfitzmann. Unconditional sender and recipient untraceability in spite of active attacks - some remarks. Technical report, Universität Karlsruhe, 1989.
-
(1989)
Technical Report
-
-
Waidner, M.1
Pfitzmann, B.2
|