-
1
-
-
17644411480
-
-
Abadi, M. and C. Fournet, Mobile values, new names, and secure communication, in: Proc. POPL '01 (2001), pp. 104-115
-
-
-
-
3
-
-
33846629619
-
-
Adithia, M., "Probabilistic Analysis of Network Anonymity using PRISM," Master's thesis, Eindhoven University of Technology (2006)
-
-
-
-
6
-
-
0028087488
-
-
Benaloh, J. and D. Tuinstra, Receipt-free secret-ballot elections (extended abstract), in: Proc. STOC '94, Montreal (1994), pp. 544-553
-
-
-
-
8
-
-
0034822279
-
-
Blanchet, B., An efficient cryptographic protocol verifier based on Prolog rules., in: 14th Computer Security Foundations Workshop, Cape Breton, Nova Scotia (2001), pp. 82-96
-
-
-
-
9
-
-
26844508455
-
-
Blanchet, B., M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols., in: 20th IEEE Symposium on Logic in Computer Science, Chicago (2005), pp. 331-340
-
-
-
-
10
-
-
84942246406
-
-
Bodei, C., M. Buchholtz, P. Degano, F. Nielson and H. Nielson, Automatic validation of protocol narration, in: Proc. CSFW 2003, Pacific Grove (2003), pp. 126-140
-
-
-
-
11
-
-
33846588528
-
-
Boyd, C., A new multiple key cipher and an improved voting scheme, in: Proc. Eurocrypt '89 (1989), pp. 617-625
-
-
-
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84-88
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
13
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28 (1985) 1030-1044
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
85034632918
-
-
Chaum, D., Elections with unconditionally secret ballots and disruption equivalent to breaking rsa, in: Proc. Eurocrypt '88 (1988), pp. 177-182
-
-
-
-
15
-
-
85024290278
-
-
Chaum, D. and E. van Heyst, Group signatures, in: D. Davies, editor, Proc. EUROCRYPT '91 (1991), pp. 257-265
-
-
-
-
17
-
-
77951106449
-
-
Cramer, R., M. Franklin, B. Schoenmakers and M. Yung, Multi-autority secret-ballot elections with linear work., in: U. Maurer, editor, Proc. Eurocrypt '96 (1996), pp. 72-83
-
-
-
-
18
-
-
84957375076
-
-
Cramer, R., R. Gennaro and B. Schoenmakers, A secure and optimally efficient multi-authority election scheme., in: W. Fumy, editor, Proc. Eurocrypt '97 (1997), pp. 103-118
-
-
-
-
20
-
-
33846585117
-
-
Cranor, L. and R. Cytron., Design and implementation of a practical security-conscious electronic polling system, Technical Report WUCS-96-02, Dept. of Computer Science, Washington University (1996)
-
-
-
-
21
-
-
84948958135
-
-
Desmedt, Y. and K. Kurosawa, How to break a practical mix and design a new one, in: B. Preneel, editor, Proc. Eurocrypt 2000 (2000), pp. 557-572
-
-
-
-
22
-
-
84957800033
-
-
Díaz, C., S. Seys, J. Claessens and B. Preneel, Towards measuring anonymity, in: R. Dingledine and P. Syverson, editors, Proc. PET 2002 (2003), pp. 54-68
-
-
-
-
24
-
-
0038349207
-
-
Freedman, M. and R. Morris, Tarzan: a peer-to-peer anonymizing network layer., in: V. Atluri, editor, ACM Conference on Computer and Communications Security, 2002, pp. 193-206
-
-
-
-
25
-
-
33846568537
-
-
Fujioka, A., T. Okamoto and K. Ohta, A practical secret voting scheme for large scale elections, in: J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT'92 (1992), pp. 244-251
-
-
-
-
26
-
-
84955557456
-
-
Goldschlag, D., M. Reed and P. Syverson, Hiding routing information, in: R. Anderson, editor, Proc. 1st International Workshop on Information Hiding (1996), pp. 137-150
-
-
-
-
27
-
-
0032047481
-
A logical approach to multilevel security of probabilistic systems
-
Gray J., and Syverson P. A logical approach to multilevel security of probabilistic systems. Distributed Computing 11 (1998) 73-90
-
(1998)
Distributed Computing
, vol.11
, pp. 73-90
-
-
Gray, J.1
Syverson, P.2
-
29
-
-
84948969982
-
-
Hirt, M. and K. Sako, Efficient receipt-free voting based on homomorphic encryption., in: B. Preneel, editor, Proc. Eurocrypt 2000 (2000), pp. 539-556
-
-
-
-
30
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security (2002) 3-36
-
(2002)
Journal of Computer Security
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
31
-
-
33846570561
-
-
ISO, Common Criteria-ISO/IEC/15408
-
ISO, Common Criteria-ISO/IEC/15408 (1999). http://csrc.nist.gov/cc/
-
(1999)
-
-
-
32
-
-
84957709438
-
-
Jakobsson, M., A practical mix, in: K. Nyberg, editor, Proc. Eurocrypt '98 (1998), pp. 448-461
-
-
-
-
33
-
-
33646018220
-
-
J.Y. Halpern, K. O., Anonymity and information hiding in multiagent systems, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, 2003, pp. 75-88
-
-
-
-
34
-
-
33846602832
-
-
Korkea-Aho, M., Anonymity and privacy in the electronic world (1999), seminar on Network Security, Helsinki University of Technology
-
-
-
-
35
-
-
23144432349
-
-
Kremer, S. and M. Ryan, Analysis of an electronic voting protocol in the applied pi calculus, in: S. Sagiv, editor, Proc. ESOP 2005, 2005, pp. 186-200
-
-
-
-
37
-
-
31844446595
-
-
Mauw, S., J. Verschuren and E. de Vink, A formalization of anonymity and onion routing, in: P. Samarati, P. Ryan, D. Gollmann and R. Molva, editors, ESORICS'04 (2004), pp. 109-124
-
-
-
-
39
-
-
23144444779
-
-
Nielsen, C., E. Andersen and H. Nielson, Static validation of a voting protocol, in: P. Degano and L. Viganó, editors, Proc. ARSPA 2005) (2005), pp. 115-134
-
-
-
-
40
-
-
84956974327
-
-
Okamoto, T., Receipt-free electronic voting schemes for large scale elections, in: B. Christianson, B. Crispo, T. Lomas and M. Roe, editors, Proc. Security Protocols Workshop '97 (1998), pp. 25-35
-
-
-
-
41
-
-
85027158725
-
-
Park, C., K. Itoh and K. Kurosawa, Efficient anonymous channel and all/nothing election scheme, in: T. Helleseth, editor, Proc. Eurocrypt '93 (1993), pp. 248-259
-
-
-
-
43
-
-
84948967487
-
-
Pfitzmann, B., Breaking an efficient anonymous channel, in: L. Guillou and J.-J. Quisquater, editors, Proc. Eurocrypt '94 (1995), pp. 332-340
-
-
-
-
46
-
-
84949756689
-
-
Schneider, S. and A. Sidiropoulos, CSP and anonymity, in: Proc. ESORICS'96 (1996), pp. 198-218
-
-
-
-
47
-
-
84957802536
-
-
Serjantov, A. and G. Danezis, Towards an information theoretic metric for anonymity, in: H. Federrath, editor, Proc. PET 2002 (2003), pp. 41-53
-
-
-
-
48
-
-
3042662497
-
Probabilistic analysis of an anonymity system
-
Shmatikov V. Probabilistic analysis of an anonymity system. Journal of Computer Security 12 (2004) 355-377
-
(2004)
Journal of Computer Security
, vol.12
, pp. 355-377
-
-
Shmatikov, V.1
-
49
-
-
35248849922
-
-
Steinbrecher, S. and S. Köpsell, Modelling unlinkability, in: R. Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (2003), pp. 32-47
-
-
-
-
50
-
-
0030676973
-
-
Syverson, P., D. Goldschlag and M. Reed, Anonymous connections and onion routing, in: IEEE Symposium on Security and Privacy, Oakland, California, 1997, pp. 44-54
-
-
-
-
51
-
-
84924758404
-
-
Syverson, P. and S. Stubblebine, Group principals and the formalization of anonymity, in: J. Wing, J. Woodcock and J. Davies, editors, Proc. FM'99 (1999), pp. 814-833
-
-
-
|