-
1
-
-
84947242344
-
Traffic Analysis Attacks and Tradeoffs in Anonymity Providing Systems
-
I. S. Moskowitz, editor, Fourth International Workshop on Information Hiding IH'01
-
A. Back, U. Möller, and A. Stiglic. Traffic Analysis Attacks and Tradeoffs in Anonymity Providing Systems. In I. S. Moskowitz, editor, Fourth International Workshop on Information Hiding (IH'01), Lecture Notes in Computer Science, 2137, pages 245-257, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, DIAU'00
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 115-129, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
4
-
-
84957805506
-
Dummy Traffic against Long Term Intersection Attacks
-
R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
-
O. Berthold and H. Langos. Dummy Traffic against Long Term Intersection Attacks. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 110-128, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 110-128
-
-
Berthold, O.1
Langos, H.2
-
5
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
D. L. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, 1(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.L.1
-
7
-
-
1542376949
-
Analyzing and Modeling Encryption Overhead for Sensor Network Nodes
-
Sept
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu. Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA), Sept. 2003.
-
(2003)
the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA)
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
8
-
-
84957796461
-
Fingerprinting Websites Using Traffic Analysis
-
R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
-
A. Hintz. Fingerprinting Websites Using Traffic Analysis. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 171-178, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 171-178
-
-
Hintz, A.1
-
10
-
-
84890010554
-
Stop-and-go MIXes Providing Probabilistic Security in an Open System
-
Second International Workshop on Information Hiding IH'98
-
D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go MIXes Providing Probabilistic Security in an Open System. Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science 1525, pages 83-98, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
11
-
-
0242696170
-
ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
-
J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
-
(2003)
ACM MOBIHOC'03
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
12
-
-
14844303406
-
Source-Location Privacy in Energy-Constrained Sensor Network Routing
-
C. Ozturk, Y. Zhang, and W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In ACM SASN, pages 88-93, 2004.
-
(2004)
ACM SASN
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
13
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
H. Federrath, editor, DIAU'00
-
A. Pfitzmann and M. Köhntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 1-9, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
15
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, DIAU'00
-
J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 10-29, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
16
-
-
84957802536
-
Towards an Information Theoretic Metric for Anonymity
-
R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
-
A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 41-53, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
17
-
-
35248841429
-
From a Trickle to a Flood: Active Attacks on Several Mix Types
-
F. A. P. Petitcolas, editor, Fifth International Workshop on Information Hiding IH'02
-
A. Serjantov, R. Dingledine, and P. F. Syverson. From a Trickle to a Flood: Active Attacks on Several Mix Types. In F. A. P. Petitcolas, editor, Fifth International Workshop on Information Hiding (IH'02), Lecture Notes in Computer Science, 2578, pages 36-52, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.F.3
|