-
1
-
-
84937578170
-
Web mixes: A system for anonymous and unobservable internet access
-
Springer, Berlin
-
Berthold O., Federrath H., and Köpsell S. Web mixes: A system for anonymous and unobservable internet access. Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science Vol. 2009 (2000), Springer, Berlin 115-129
-
(2000)
Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
2
-
-
27244455746
-
Probabilistic anonymity
-
Abadi M., and de Alfaro L. (Eds), Springer, Berlin
-
Bhargava M., and Palamidessi C. Probabilistic anonymity. In: Abadi M., and de Alfaro L. (Eds). Proc. CONCUR 2005, Lecture Notes in Computer Science Vol. 3653 (2005), Springer, Berlin 171-185
-
(2005)
Proc. CONCUR 2005, Lecture Notes in Computer Science
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
3
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptology 1 (1988) 65-75
-
(1988)
J. Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
4
-
-
33744479345
-
Freenet: a distributed anonymous information storage and retrieval system
-
Springer, Berlin
-
Clarke I., Sandberg O., Wiley B., and Hong T.W. Freenet: a distributed anonymous information storage and retrieval system. Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science Vol. 2009 (2000), Springer, Berlin 44-66
-
(2000)
Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science
, vol.2009
, pp. 44-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
5
-
-
33750437620
-
-
Y. Deng, C. Palamidessi, J. Pang, Weak probabilistic anonymity, in: Proc. of the International Workshop on Security Issues in Concurrency (SecCo), 2005. Electronic Notes in Theoretical Computer Science, Elsevier Science Publishers, 2005, to appear.
-
-
-
-
6
-
-
84957800033
-
-
C. Díaz, S. Seys, J. Claessens, B. Preneel, Towards measuring anonymity, in: Proc. of the International Workshop on Privacy Enhancing Technologies (PET), Lecture Notes in Computer Science, Vol. 2482, Springer, 2002. pp. 54-68.
-
-
-
-
7
-
-
33645240198
-
The free haven project: distributed anonymous storage service
-
Springer, Berlin
-
Dingledine R., Freedman M.J., and Molnar D. The free haven project: distributed anonymous storage service. Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science Vol. 2009 (2000), Springer, Berlin 67-95
-
(2000)
Designing Privacy Enhancing Technologies, Internat. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science
, vol.2009
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
8
-
-
1142263341
-
-
A.V. Evfimievski, J. Gehrke, R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proc. PODS 2003, 2003, pp. 211-222.
-
-
-
-
9
-
-
33646018220
-
-
J.Y. Halpern, K.R. O'Neill, Anonymity and information hiding in multiagent systems, in: Proc. 16th IEEE Computer Security Foundations Workshop, 2003, pp. 75-88.
-
-
-
-
10
-
-
24144492346
-
-
J.Y. Halpern, K.R. O'Neill, Anonymity and information hiding in multiagent systems, J. Comput. Security 13 (3) (2005) 483-512.
-
-
-
-
11
-
-
84878650387
-
Probabilistic asynchronous π-calculus
-
Tiuryn J. (Ed), Springer, Berlin
-
Herescu O.M., and Palamidessi C. Probabilistic asynchronous π-calculus. In: Tiuryn J. (Ed). Proc. FOSSACS 2000 (Part of ETAPS 2000), Lecture Notes in Computer Science Vol. 1784 (2000), Springer, Berlin 146-160
-
(2000)
Proc. FOSSACS 2000 (Part of ETAPS 2000), Lecture Notes in Computer Science
, vol.1784
, pp. 146-160
-
-
Herescu, O.M.1
Palamidessi, C.2
-
12
-
-
0344875575
-
Information hiding, anonymity and privacy: a modular approach
-
Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: a modular approach. J. Comput. Security 12 1 (2004) 3-36
-
(2004)
J. Comput. Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
13
-
-
16244397718
-
-
M.Z. Kwiatkowska, G. Norman, D. Parker, PRISM 2.0: a tool for probabilistic model checking, in: Proc. First Internat. Conf. on Quantitative Evaluation of Systems (QEST), 2004, IEEE Computer Society, pp. 322-323.
-
-
-
-
14
-
-
17944377470
-
A randomized encoding of the π-calculus with mixed choice
-
Palamidessi C., and Herescu O.M. A randomized encoding of the π-calculus with mixed choice. Theoret. Comput. Sci. 335 2-3 (2005) 73-404
-
(2005)
Theoret. Comput. Sci.
, vol.335
, Issue.2-3
, pp. 73-404
-
-
Palamidessi, C.1
Herescu, O.M.2
-
17
-
-
84949756689
-
CSP and anonymity
-
Springer, Berlin
-
Schneider S., and Sidiropoulos A. CSP and anonymity. in: Proc. European Symp. on Research in Computer Security (ESORICS), Lecture Notes in Computer Science Vol. 1146 (1996), Springer, Berlin 198-218
-
(1996)
in: Proc. European Symp. on Research in Computer Security (ESORICS), Lecture Notes in Computer Science
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
18
-
-
84937444411
-
Probabilistic simulations for probabilistic processes
-
An extended abstract appeared in Proc. CONCUR '94, Lecture Notes in Computer Science, Vol. 836, Springer, Berlin, pp. 481-496
-
Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Nordic J. Computing 2 2 (1995) 250-273 An extended abstract appeared in Proc. CONCUR '94, Lecture Notes in Computer Science, Vol. 836, Springer, Berlin, pp. 481-496
-
(1995)
Nordic J. Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
-
19
-
-
84957802536
-
-
A. Serjantov, G. Danezis, Towards an information theoretic metric for anonymity, in: Proc. of the International Workshop on Privacy Enhancing Technologies (PET), Lecture Notes in Computer Science, Vol. 2482, Springer, 2002, pp. 41-53.
-
-
-
-
20
-
-
84948775332
-
-
V. Shmatikov, Probabilistic analysis of anonymity, in: Proc. of the IEEE Computer Security Foundations Workshop (CSFW), 2002, pp. 119-128.
-
-
-
-
21
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
Shmatikov V. Probabilistic model checking of an anonymity system. J. Comput. Security 12 3/4 (2004) 355-377
-
(2004)
J. Comput. Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
22
-
-
0030676973
-
-
P.F. Syverson, D.M. Goldschlag, M.G. Reed, Anonymous connections and onion routing, in: IEEE Symp. on Security and Privacy, Oakland, CA, 1997, pp. 44-54.
-
-
-
-
23
-
-
84924758404
-
-
P.F. Syverson, S.G. Stubblebine, Group principals and the formalization of anonymity, in: World Cong. on Formal Methods (1), 1999, pp. 814-833.
-
-
-
-
24
-
-
33750456400
-
-
M. Wright, M. Adler, B. Levine, C. Shields, An analysis of the degradation of anonymous protocols, in: ISOC Network and Distributed System Security Symp. (NDSS), 2002.
-
-
-
|