-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
2
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
New York: Springer-Verlag
-
M. Jakobsson, A. Juels, and R. Rivest, "Making mix nets robust for electronic voting by randomized partial checking," in Proc. USENIX' 02. New York: Springer-Verlag, 2002, pp. 339-353.
-
(2002)
Proc. USENIX' 02
, pp. 339-353
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.3
-
8
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a type III anonymous remailer protocol," in Proc. 2003 IEEE Symp. Security Privacy, 2003, pp. 2-15.
-
(2003)
Proc. 2003 IEEE Symp. Security Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
9
-
-
0011702966
-
ISDN-Mixes: Untraceable communication with very small bandwidth overhead
-
New York: Springer-Verlag
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner, "ISDN-Mixes: Untraceable communication with very small bandwidth overhead," in Proc. GI/ITG Conf. Communication Distributed Systems, Informatik-Fachberichte. New York: Springer-Verlag, 1991, pp. 451-463.
-
(1991)
Proc. GI/ITG Conf. Communication Distributed Systems, Informatik-Fachberichte
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
10
-
-
0032074980
-
Real-time mixes: A bandwidth-efficient anonymity protocol
-
Apr
-
A. Jerichow, J. Muller, A. Pfitzmann, B. Pfitzmann, and M. Waidner, "Real-time mixes: A bandwidth-efficient anonymity protocol," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 495-509, Apr. 1998.
-
(1998)
IEEE J. Select. Areas Commun
, vol.16
, Issue.4
, pp. 495-509
-
-
Jerichow, A.1
Muller, J.2
Pfitzmann, A.3
Pfitzmann, B.4
Waidner, M.5
-
11
-
-
84955557456
-
Hiding routing information
-
D. Goldschlag, M. Reed, and P. Syverson, "Hiding routing information," in Proc. Information Hiding, 1996, pp. 137-150.
-
(1996)
Proc. Information Hiding
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
12
-
-
0030676973
-
Anonymous connections and onion routing
-
P. Syverson, D. Goldschlag, and M. Reed, "Anonymous connections and onion routing," in Proc. IEEE Symp. Security Privacy, 1997, pp. 44-54.
-
(1997)
Proc. IEEE Symp. Security Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
13
-
-
0032074579
-
Anonymous connections and onion routing
-
Apr
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE J. Special Areas Commun., vol. 16, no. 4, pp. 482-494, Apr. 1998.
-
(1998)
IEEE J. Special Areas Commun
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
14
-
-
84890935025
-
-
Online, Available
-
Onion routing. [Online]. Available: http://www.onion-router.net/
-
Onion routing
-
-
-
16
-
-
84955605258
-
MIXes in mobile communication systems: Location management with privacy
-
H. Federrath, A. Jerichow, and A. Pfitzmann, "MIXes in mobile communication systems: Location management with privacy," in Proc. Information Hiding. 1996, pp. 121-135.
-
(1996)
Proc. Information Hiding
, pp. 121-135
-
-
Federrath, H.1
Jerichow, A.2
Pfitzmann, A.3
-
17
-
-
84938811530
-
Protocols using anonymous connections: Mobile applications
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Protocols using anonymous connections: Mobile applications," in Proc. Security Protocols, 1997, pp. 13-23.
-
(1997)
Proc. Security Protocols
, pp. 13-23
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
18
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proc. IEEE Wireless Communications Networking Conf., 2005.
-
(2005)
Proc. IEEE Wireless Communications Networking Conf
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
19
-
-
35048899238
-
Universal re-encryption for mixnets
-
P. Golle, M. Jakobsson, A. Juels, and P. Syverson, "Universal re-encryption for mixnets," in Proc. RSA Conf. Cryptographers' Track, 2004, pp. 163-178.
-
(2004)
Proc. RSA Conf. Cryptographers' Track
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
20
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
J. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Proc. Designing Privacy Enhancing Technologies Workshop, 2001, pp. 10-29.
-
(2001)
Proc. Designing Privacy Enhancing Technologies Workshop
, pp. 10-29
-
-
Raymond, J.1
-
21
-
-
33947399380
-
-
Online, Available
-
Free haven project bibliography. [Online]. Available: http://www.freehaven.net/anonbib/date.html
-
Free haven project bibliography
-
-
-
22
-
-
84937549115
-
The disadvantages of free mix routes and how to overcome them
-
O. Berthold, A. Pfitzmann, and R. Standtke, "The disadvantages of free mix routes and how to overcome them," in Proc. Anonymity, 2001, pp. 30-45.
-
(2001)
Proc. Anonymity
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
23
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several mix types," in Proc. Information Hiding Workshop, 2002, pp. 36-52.
-
(2002)
Proc. Information Hiding Workshop
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
25
-
-
84947287486
-
A reputation system to increase MIX-net reliability
-
R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar, "A reputation system to increase MIX-net reliability," in Proc. Information Hiding Workshop, 2001, pp. 126-141.
-
(2001)
Proc. Information Hiding Workshop
, pp. 126-141
-
-
Dingledine, R.1
Freedman, M.J.2
Hopwood, D.3
Molnar, D.4
-
30
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
31
-
-
35248844472
-
Provably secure public-key encryption for length-preserving Chaumian mixes
-
New York: Springer-Verlag
-
B. Möller, "Provably secure public-key encryption for length-preserving Chaumian mixes," in Proc. CT-RSA. New York: Springer-Verlag, 2003, pp. 244-262.
-
(2003)
Proc. CT-RSA
, pp. 244-262
-
-
Möller, B.1
-
32
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM J. Computing, vol. 18, pp. 186-208, 1989.
-
(1989)
SIAM J. Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
33
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
New York: Springer-Verlag
-
C. Park, K. Itoh, and K. Kurosawa, "Efficient anonymous channel and all/nothing election scheme," in Advances in Cryptology-Eurocrypt. New York: Springer-Verlag, 1994, pp. 248-259.
-
(1994)
Advances in Cryptology-Eurocrypt
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
34
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. Elgamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
35
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
M. Jakobsson, "On quorum controlled asymmetric proxy re-encryption," in Proc. PKC, 1999, pp. 112-121.
-
(1999)
Proc. PKC
, pp. 112-121
-
-
Jakobsson, M.1
-
39
-
-
0002986502
-
Fault-tolerant anonymous channel
-
W. Ogata, K. Kurosawa, K. Sako, and K. Takatani, "Fault-tolerant anonymous channel," in Proc. ICICS, 1997, pp. 440-444.
-
(1997)
Proc. ICICS
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
40
-
-
84957356080
-
Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth
-
K. Sako and J. Killian, "Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth," in Advances Cryptology-Eurocrypt, 1995, pp. 393-403.
-
(1995)
Advances Cryptology-Eurocrypt
, pp. 393-403
-
-
Sako, K.1
Killian, J.2
-
42
-
-
84948967487
-
Breaking an efficient anonymous channel
-
B. Pfitzmann, "Breaking an efficient anonymous channel," in Advances CrypJology-Eurocrypt, 1994, pp. 332-340.
-
(1994)
Advances CrypJology-Eurocrypt
, pp. 332-340
-
-
Pfitzmann, B.1
-
45
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Commun. ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
47
-
-
84948958135
-
How to break a practical mix and design a new one
-
Y. Desmedt and K. Kurosawa, "How to break a practical mix and design a new one," in Advances Cryptology-Eurocrypt, 2000, pp. 557-572.
-
(2000)
Advances Cryptology-Eurocrypt
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
50
-
-
63449118333
-
Flaws in some robust optimistic mixnets
-
M. Abe and H. Imai, "Flaws in some robust optimistic mixnets," in Proc. ACISP, 2003, pp. 39-50.
-
(2003)
Proc. ACISP
, pp. 39-50
-
-
Abe, M.1
Imai, H.2
-
51
-
-
84955592437
-
Some remarks on a receipt-free and universally verifiable mix-type voting scheme
-
M. Michels and P. Horster, "Some remarks on a receipt-free and universally verifiable mix-type voting scheme," in Advances Cryptology-Asiacrypt, 1996, pp. 125-132.
-
(1996)
Advances Cryptology-Asiacrypt
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
-
52
-
-
84957715741
-
Universally verifiable mix-net with verification work independent of the number of mix-centers
-
M. Abe, "Universally verifiable mix-net with verification work independent of the number of mix-centers," in Advances Cryptology-Eurocrypt, 1998, pp. 437-447.
-
(1998)
Advances Cryptology-Eurocrypt
, pp. 437-447
-
-
Abe, M.1
-
53
-
-
84956854310
-
Mix-networks on permutation networks
-
_, "Mix-networks on permutation networks," in Advances Cryptology-Asiacrypt, 1999, pp. 258-273.
-
(1999)
Advances Cryptology-Asiacrypt
, pp. 258-273
-
-
Abe, M.1
-
55
-
-
84937409147
-
Remarks on mix-networks based on permutation networks
-
M. Abe and F. Hoshino, "Remarks on mix-networks based on permutation networks," in Proc. PKC, 2001, pp. 317-324.
-
(2001)
Proc. PKC
, pp. 317-324
-
-
Abe, M.1
Hoshino, F.2
-
56
-
-
0000648555
-
A permutation network
-
A. Waksman, "A permutation network," J. ACM, vol. 15, no. 1, pp. 159-163, 1968.
-
(1968)
J. ACM
, vol.15
, Issue.1
, pp. 159-163
-
-
Waksman, A.1
-
57
-
-
84956996576
-
An implementation of a universally verifiable electronic voting scheme based on shuffling
-
J. Furukawa, H. Miyauchi, K. Mori, S. Obana, and K. Sako, "An implementation of a universally verifiable electronic voting scheme based on shuffling," in Proc. Financial Cryptography (FC 2002). 2003, pp. 16-30.
-
(2003)
Proc. Financial Cryptography (FC 2002)
, pp. 16-30
-
-
Furukawa, J.1
Miyauchi, H.2
Mori, K.3
Obana, S.4
Sako, K.5
-
60
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
J. Furukawa and K. Sako, "An efficient scheme for proving a shuffle," in Advances Cryptology-Crypto, 2001, pp. 368-387.
-
(2001)
Advances Cryptology-Crypto
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
61
-
-
24944556554
-
A verifiable secret shuffle of homomorphic encryptions
-
J. Groth, "A verifiable secret shuffle of homomorphic encryptions," in Proc. PKC, 2003, pp. 145-160.
-
(2003)
Proc. PKC
, pp. 145-160
-
-
Groth, J.1
-
63
-
-
84958742387
-
Optimistic mixing for exit-polls
-
P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels, "Optimistic mixing for exit-polls," in Advances Cryptology-Asiacrypt, 2002, pp. 451-465.
-
(2002)
Advances Cryptology-Asiacrypt
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
66
-
-
33947432527
-
-
Online, Available
-
Alixminion. [Online]. Available: http://mixminion.net/
-
Alixminion
-
-
-
67
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable internet access
-
O. Berthold, H. Federrath, and S. Kopsell, "Web MIXes: A system for anonymous and unobservable internet access," in Proc. Designing Privacy Enhancing Technologies Workshop, 2000, pp. 115-129.
-
(2000)
Proc. Designing Privacy Enhancing Technologies Workshop
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Kopsell, S.3
-
68
-
-
85084161366
-
Tor: The second generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second generation onion router," in Proc. 13th USENIX Security Symp., 2004, pp. 303-320.
-
(2004)
Proc. 13th USENIX Security Symp
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
69
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proc. Privacy Enhancing Technologies Workshop, 2004.
-
(2004)
Proc. Privacy Enhancing Technologies Workshop
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
71
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems," in Proc. Financial Cryptography (FC 2004), 2004, pp. 251-265.
-
(2004)
Proc. Financial Cryptography (FC 2004)
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
73
-
-
84890010554
-
Stop-and-go mixes providing probabilistic security in an open system
-
D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go mixes providing probabilistic security in an open system," in Proc. 2nd Int. Workshop Information Hiding, 1998, pp. 83-98.
-
(1998)
Proc. 2nd Int. Workshop Information Hiding
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
74
-
-
0038311861
-
Towards an analysis of onion routing security
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an analysis of onion routing security," in Proc. Designing Privacy Enhancing Technologies Workshop, 2000, pp. 96-114.
-
(2000)
Proc. Designing Privacy Enhancing Technologies Workshop
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
79
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Y. Desmedt and Y. Frankel, "Shared generation of authenticators and signatures," in Advances Cryptology-Crypto, 1992, pp. 457-469.
-
(1992)
Advances Cryptology-Crypto
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
80
-
-
84948954277
-
Practical threshold signatures
-
V. Shoup, "Practical threshold signatures," in Advances Cryptology-Eurocrypt, 2000, pp. 207-220.
-
(2000)
Advances Cryptology-Eurocrypt
, pp. 207-220
-
-
Shoup, V.1
-
81
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
83
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. K. Reiter and A. D. Rubing, "Crowds: Anonymity for web transactions," ACM Trans. Information Syst. Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Information Syst. Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubing, A.D.2
-
84
-
-
0038041177
-
Introducing Morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
M. Rennhard and B. Plattner, "Introducing Morphmix: Peer-to-peer based anonymous internet usage with collusion detection," in Proc. Workshop Privacy Electronic Soc., 2002, pp. 91-102.
-
(2002)
Proc. Workshop Privacy Electronic Soc
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
86
-
-
27544431592
-
Mix cascades vs. peer-to-peer: Is one concept superior?
-
R. Bohme, G. Danezis, C. Diaz, S. Kopsell, and A. Pfitzmann, "Mix cascades vs. peer-to-peer: Is one concept superior?" in Proc. Privacy Enhancing Technologies Workshop, 2004.
-
(2004)
Proc. Privacy Enhancing Technologies Workshop
-
-
Bohme, R.1
Danezis, G.2
Diaz, C.3
Kopsell, S.4
Pfitzmann, A.5
-
89
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority election scheme," in Advances in Cryptology-Eurocrypt, 1997, pp. 103-118.
-
(1997)
Advances in Cryptology-Eurocrypt
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
90
-
-
0003027707
-
Verifiable secret sharing and achieving simultaneous broadcast
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, "Verifiable secret sharing and achieving simultaneous broadcast," in Proc. IEEE Fund. Comp. Sci., 1985, pp. 335-344.
-
(1985)
Proc. IEEE Fund. Comp. Sci
, pp. 335-344
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
92
-
-
0000135789
-
A threshold cryptosystem without a trusted party
-
227 526
-
T. Pedersen, "A threshold cryptosystem without a trusted party," in Advances Cryptology-Eurocrypt, 1991, p. 5 227 526.
-
(1991)
Advances Cryptology-Eurocrypt
, pp. 5
-
-
Pedersen, T.1
-
94
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its applications to electronic voting
-
B. Schoenmakers, "A simple publicly verifiable secret sharing scheme and its applications to electronic voting," in Advances Cryptology-Crypto, 1999, pp. 148-164.
-
(1999)
Advances Cryptology-Crypto
, pp. 148-164
-
-
Schoenmakers, B.1
-
96
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Y. Desmedt, "Society and group oriented cryptography: A new concept," in Advances Cryptology-Crypto, 1987, pp. 120-127.
-
(1987)
Advances Cryptology-Crypto
, pp. 120-127
-
-
Desmedt, Y.1
-
97
-
-
0022914590
-
Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design
-
O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design," in Proc. 27th IEEE Symp. Found. Computer Sci., 1986, pp. 174-187.
-
(1986)
Proc. 27th IEEE Symp. Found. Computer Sci
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
98
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances Cryptology-Crypto, 1987, pp. 186-194.
-
(1987)
Advances Cryptology-Crypto
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
99
-
-
0026383119
-
Non-interactive zero-knowledge
-
M. Blum, A. D. Santis, S. Micali, and G. Persiano, "Non-interactive zero-knowledge," SIAM J. Computing, vol. 20, no. 6, pp. 1084-1118, 1991.
-
(1991)
SIAM J. Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
Santis, A.D.2
Micali, S.3
Persiano, G.4
-
100
-
-
33947422211
-
-
FIPS 180-1, Secure Hash Standard, Apr. 1995: U.S. Dept. Commerce/N.I.S.T., Nat. Tech. Information Service, Springfield, VA.
-
"FIPS 180-1, Secure Hash Standard," Apr. 1995: U.S. Dept. Commerce/N.I.S.T., Nat. Tech. Information Service, Springfield, VA.
-
-
-
-
101
-
-
33745883087
-
-
ver. v0.25, Dec
-
A. Pfitzmann and M. Hansen, Anonymity, unlinfcabilify, unobservability, pseudonymity, and identity management a consolidated proposal for terminology, ver. v0.25, Dec. 2005.
-
(2005)
Anonymity, unlinfcabilify, unobservability, pseudonymity, and identity management a consolidated proposal for terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
103
-
-
3242815149
-
Towards measuring anonymity
-
Apr
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proc. Workshop Privacy Enhancing Technologies, Apr. 2002, pp. 54-68.
-
(2002)
Proc. Workshop Privacy Enhancing Technologies
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
104
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
M. Waidner, "Unconditional sender and recipient untraceability in spite of active attacks," in Advances Cryptology - Eurocrypt, vol. 434, 1990, pp. 302-319.
-
(1990)
Advances Cryptology - Eurocrypt
, vol.434
, pp. 302-319
-
-
Waidner, M.1
-
105
-
-
33947405858
-
Comparison of commitment schemes used in mix-mediated anonymous communication for preventing' pool-mode attack
-
E. Franz, A. Graubner, A. Jerichow, and A. Pfitzmann, "Comparison of commitment schemes used in mix-mediated anonymous communication for preventing' pool-mode attack," in Proc. 3rd Australasian Conf. Information Security Privacy (ACISP'98), vol. 1438, 1990, pp. 111-122.
-
(1990)
Proc. 3rd Australasian Conf. Information Security Privacy (ACISP'98)
, vol.1438
, pp. 111-122
-
-
Franz, E.1
Graubner, A.2
Jerichow, A.3
Pfitzmann, A.4
-
106
-
-
33947394540
-
Breaking four mix-related schemes based on universal re-encryption
-
Sep
-
G. Danezis, "Breaking four mix-related schemes based on universal re-encryption," in Proc. Information Security Conf., Sep. 2006.
-
(2006)
Proc. Information Security Conf
-
-
Danezis, G.1
-
107
-
-
33947365689
-
Anonymity and privacy in electronic services,
-
Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, Dec
-
C. Díaz, "Anonymity and privacy in electronic services," Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, Dec. 2005.
-
(2005)
-
-
Díaz, C.1
|