-
2
-
-
79251645890
-
Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies
-
Brekne, T., Årnes, A., Øslebø, A.: Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). (2005)
-
(2005)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2005)
-
-
Brekne, T.1
Årnes, A.2
Øslebø, A.3
-
4
-
-
85086053727
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B., ed.: Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Springer-Verlag
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Pfitzmann, B., ed.: Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Springer-Verlag, LNCS 2045 (2003)
-
(2003)
LNCS
, vol.2045
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4 (1981)
-
(1981)
Communications of the ACM
, vol.4
-
-
Chaum, D.1
-
7
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
-
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, LNCS 2009 (2000)
-
(2000)
LNCS
, vol.2009
-
-
Raymond, J.F.1
-
9
-
-
84862620665
-
On pseudonymization of audit data for intrusion detection
-
Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
-
Biskup, J., Flegel, U.: On pseudonymization of audit data for intrusion detection. In: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, LNCS 2009 (2000)
-
(2000)
LNCS
, vol.2009
-
-
Biskup, J.1
Flegel, U.2
-
10
-
-
0343472295
-
Pseudonymous audit for privacy enhanced intrusion detection
-
Sobirey, M., Fischer-Hübner, S., Rannenberg, K.: Pseudonymous audit for privacy enhanced intrusion detection. In: SEC. (1997) 151-163
-
(1997)
SEC
, pp. 151-163
-
-
Sobirey, M.1
Fischer-Hübner, S.2
Rannenberg, K.3
-
11
-
-
1242308060
-
On the design and performance of prefix-preserving ip traffic trace anonymization
-
Xu, J., Fan, J., Ammar, M., Moon, S.B.: On the design and performance of prefix-preserving ip traffic trace anonymization. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2001. (2001)
-
(2001)
Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2001
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.B.4
-
12
-
-
24344436696
-
Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Xu, J., Fan, J., Ammar, M., Moon, S.B.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. ICNP 2002 (2002)
-
(2002)
ICNP 2002
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.B.4
-
14
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
New York, NY, USA, ACM Press
-
Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, New York, NY, USA, ACM Press (2003) 339-351
-
(2003)
SIGCOMM '03: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 339-351
-
-
Pang, R.1
Paxson, V.2
-
16
-
-
67651053584
-
Pseudonym systems
-
Keys, H., Adams, C., eds.: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Springer-Verlag
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In Keys, H., Adams, C., eds.: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Springer-Verlag, LNCS 1758 (1999)
-
(1999)
LNCS
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
17
-
-
33744781066
-
An efficient and usable multi-show non-transferable anonymous credential system
-
Financial Cryptography: 8th International Conference, Springer-Verlag
-
Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Financial Cryptography: 8th International Conference, Springer-Verlag, LNCS 3110 (2004) 196-211
-
(2004)
LNCS
, vol.3110
, pp. 196-211
-
-
Persiano, G.1
Visconti, I.2
-
19
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
Diffie, W., Hellman, M.E.: Privacy and authentication: An introduction to cryptography. In: Proceedings of the IEEE. Volume 67. (1979) 297-427
-
(1979)
Proceedings of the IEEE
, vol.67
, pp. 297-427
-
-
Diffie, W.1
Hellman, M.E.2
|