-
1
-
-
13644250069
-
Buses for anonymous message delivery
-
A. Beimel and S. Dolev. Buses for anonymous message delivery. Journal of Cryptology, 16(1):25-39, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.1
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
2
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor . Springer-Verlag, LNCS 2009, July
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
4
-
-
0010275933
-
-
Usenet post, August
-
W. Dai. Pipenet 1.1. Usenet post, August 1996.
-
(1996)
Pipenet 1.1
-
-
Dai, W.1
-
9
-
-
24344483559
-
Panel discussion - Mix cascades versus peer-to-peer: Is one concept superior?
-
C. Díaz, G. Danezis, C. Grothoff, A. Pfitzmann, and P. F. Syverson. Panel discussion - mix cascades versus peer-to-peer: Is one concept superior? In Privacy Enhancing Technologies, pages 242-242, 2004.
-
(2004)
Privacy Enhancing Technologies
, pp. 242-242
-
-
Díaz, C.1
Danezis, G.2
Grothoff, C.3
Pfitzmann, A.4
Syverson, P.F.5
-
12
-
-
84955557456
-
Hiding Routing Information
-
R. Anderson, editor . Springer-Verlag, LNCS 1174, May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
-
(1996)
Proceedings of Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
16
-
-
0008128972
-
Networks without user observability - Design options
-
Springer-Verlag, LNCS 219
-
A. Pfitzmann and M. Waidner. Networks without user observability - design options. In Proceedings of EUROCRYPT 1985. Springer-Verlag, LNCS 219, 1985.
-
(1985)
Proceedings of EUROCRYPT 1985
-
-
Pfitzmann, A.1
Waidner, M.2
-
17
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Springer-Verlag, LNCS 2009, July
-
J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 10-29
-
-
Raymond, J.-F.1
-
19
-
-
27944452198
-
Passive attack analysis for connection-based anonymity systems
-
October
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.
-
(2003)
Proceedings of ESORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
|