메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 217-235

Quantum anonymous transmissions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; DATA TRANSFER; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33646758210     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_12     Document Type: Conference Paper
Times cited : (148)

References (38)
  • 3
    • 33646797996 scopus 로고    scopus 로고
    • Anonymizer. Anonymizing proxy. http://www.anonymizer.com.
    • Anonymizing Proxy
  • 4
    • 4243059985 scopus 로고
    • Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
    • C. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. Wootters. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters, 70:1895-1899, 1993.
    • (1993) Physical Review Letters , vol.70 , pp. 1895-1899
    • Bennett, C.1    Brassard, G.2    Crépeau, C.3    Jozsa, R.4    Peres, A.5    Wootters, W.6
  • 9
    • 0030416397 scopus 로고    scopus 로고
    • Incoercible multiparty computation (extended abstract)
    • R. Canetti, and R. Gennaro. Incoercible Multiparty Computation (extended abstract). In Proceedings of 37th IEEE FOCS, pages 504-513, 1996
    • (1996) Proceedings of 37th IEEE FOCS , pp. 504-513
    • Canetti, R.1    Gennaro, R.2
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 11
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 14
    • 33646779085 scopus 로고    scopus 로고
    • Pipenet
    • W. Dei. Pipenet. http://www.eskimo.com/weidai/pipenet.txt.
    • Dei, W.1
  • 17
    • 84947209216 scopus 로고    scopus 로고
    • Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch
    • Proceedings of Eurocrypt '02
    • M. Fitzi, N. Gisin, U. Maurer, and O. von Rotz. Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch. In Proceedings of Eurocrypt '02, volume 2332 of Lecture Notes in Computer Science, pages 482-501, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 482-501
    • Fitzi, M.1    Gisin, N.2    Maurer, U.3    Von Rotz, O.4
  • 18
    • 40249092538 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the internet, ii: Five years later
    • Proceedings of Privacy Enhancing Technologies, Second International Workshop (PET 2002)
    • I. Goldberg. Privacy-enhancing technologies for the internet, ii: Five years later. In Proceedings of Privacy Enhancing Technologies, Second International Workshop (PET 2002), volume 2482 of Lecture Notes in Computer Science, pages 1-12, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 1-12
    • Goldberg, I.1
  • 20
    • 0023545076 scopus 로고
    • How to play any mental game - Or - A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proceedings of 19th ACM STOC, pages 218-229, 1987
    • (1987) Proceedings of 19th ACM STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 27
    • 0011583205 scopus 로고
    • How to implement isdns without user observability - Some remarks
    • Universität Karlsruhe
    • A. Pfitzmann. How to implement isdns without user observability - some remarks. Technical report, Universität Karlsruhe, 1985.
    • (1985) Technical Report
    • Pfitzmann, A.1
  • 31
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379-423, 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 32
    • 84947916257 scopus 로고    scopus 로고
    • The cocaine auction protocol: On the power of anonymous broadcast
    • F. Stajano and R. J. Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In Information Hiding, pages 434-447, 1999.
    • (1999) Information Hiding , pp. 434-447
    • Stajano, F.1    Anderson, R.J.2
  • 37
    • 0011653195 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks - Some remarks
    • Universität Karlsruhe
    • M. Waidner and B. Pfitzmann. Unconditional sender and recipient untraceability in spite of active attacks - some remarks. Technical report, Universität Karlsruhe, 1989.
    • (1989) Technical Report
    • Waidner, M.1    Pfitzmann, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.