-
1
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
In: ICSI TR-00-011, 25-26 July
-
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues and open problems. In: Proc. Workshop on Design Issues in Anonymity and Unobservability, ICSI TR-00-011, 25-26 July 2000, pp. 7-26
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 7-26
-
-
Raymond, J.F.1
-
2
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptogUaphers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65-75 (1988)
-
(1988)
J. Cryptol.
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
3
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
In: Berkeley, CA, 11-14 May
-
DanezDs, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy, Berkeley, CA, 11-14 May 2003
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
4
-
-
20444447364
-
-
Technical report, Network Working Group, Internet-Draft, 25 May
-
Moeller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol version 2, Technical report, Network Working Group, Internet-Draft, 25 May 2004
-
(2004)
Mixmaster Protocol Version 2
-
-
Moeller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
5
-
-
85031542311
-
Mixing e-mail with babel
-
In: San Diego, California, February
-
Gülcü, C., Tsudik, G.: Mixing e-mail with babel. In: Proc. Of Network and Distributed Security Symposium IEEE-NDSS '96, San Diego, California, February 1996, pp. 2-16
-
(1996)
Proc. Of Network and Distributed Security Symposium IEEE-NDSS '96
, pp. 2-16
-
-
Gülcü, C.1
Tsudik, G.2
-
6
-
-
85032863028
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
-
In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology - EUROCRYPT 89, 10-13 Apr. 1989. Springer-Verlag, Berlin
-
Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology - EUROCRYPT 89, 10-13 Apr. 1989. Lecture Notes in Computer Science, vol. 434, p. 690. Springer-Verlag, Berlin (1990)
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 690
-
-
Waidner, M.1
Pfitzmann, B.2
-
8
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology - EUROCRYPT 89. Springer-Verlag, Berlin
-
Waidner, M.: Unconditional sender and recipient untraceability in spite of active attacks. In: Quisquater, J.-J., Vandewalle, J. (eds.) Advances in Cryptology - EUROCRYPT 89. Lecture Notes in Computer Science, pp. 302-319. Springer-Verlag, Berlin (1990)
-
(1990)
Lecture Notes in Computer Science
, pp. 302-319
-
-
Waidner, M.1
-
9
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
In: Helleseth, T. (ed.) Lofthus, Norway, 23-27 May. LNCS Springer-Verlag, Secausus
-
Park, C., Itoh, K., Kurosawa, K.: Efficient anonymous channel and all/ nothing election scheme. In: Helleseth, T. (ed.) Advances in Cryptology (Eurocrypt '93), Lofthus, Norway, 23-27 May. LNCS, vol. 765, pp. 248-259. Springer-Verlag, Secausus (1993)
-
(1993)
Advances in Cryptology (Eurocrypt '93)
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31 (4), 469-472 (1985)
-
(1985)
IEEE Trans. Inf. Theory IT-31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
12
-
-
20444507015
-
Universal reencryption for mixnets
-
In: San Francisco, USA, February
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal reencryption for mixnets. In: Proceedings of the 2004 RSA Conference, Cryptographer's track, San Francisco, USA, February 2004
-
(2004)
Proceedings of the 2004 RSA Conference, Cryptographer's Track
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
13
-
-
33947394540
-
Breaking Four Mix-related Schemes Based on Universal Re-encryption
-
In: Samos, Greece, 30 August-2 September
-
Danezis, G.: Breaking Four Mix-related Schemes Based on Universal Re-encryption. In: Proceedings of Information Security Conference 2006, Samos, Greece, 30 August-2 September 2006
-
(2006)
Proceedings of Information Security Conference 2006
-
-
Danezis, G.1
-
14
-
-
24344479280
-
An improved construction for universal re-encryption
-
In: Martin, D., Serjantov, A. (eds.) Springer, Berlin
-
Fairbrother, P.: An improved construction for universal re-encryption. In: Martin, D., Serjantov, A. (eds.) Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol. 3424, pp. 79-87. Springer, Berlin (2004)
-
(2004)
Privacy Enhancing Technologies. Lecture Notes in Computer Science
, vol.3424
, pp. 79-87
-
-
Fairbrother, P.1
-
15
-
-
33750235771
-
Universal re-encryption of signatures and controlling anonymous information flow
-
In: Bedlewo/Poznan, 1-3 July
-
Klonowski, M., Kutylowski, M., Lauks, A., Zagorski, F.: Universal re-encryption of signatures and controlling anonymous information flow. In: WARTACRYPT '04 Conference on Cryptology, Bedlewo/Poznan, 1-3 July 2004
-
(2004)
WARTACRYPT '04 Conference on Cryptology
-
-
Klonowski, M.1
Kutylowski, M.2
Lauks, A.3
Zagorski, F.4
-
16
-
-
24144437120
-
Anonymous communication with on-line and o-line onion encoding
-
In: Vojts, P., Bielikov, M., Charron-Bost, B., Skora, O. (eds.) SOFSEM 2005: Theory and Practice of Computer Science, 31st Conference on Current Trends in Theory and Practice of Computer Science. Liptovsk Jn, Slovakia, 22-28 January
-
Klonowski, M., Kutylowski, M., Zagrski, F.: Anonymous communication with on-line and o-line onion encoding. In: Vojts, P., Bielikov, M., Charron-Bost, B., Skora, O. (eds.) SOFSEM 2005: Theory and Practice of Computer Science, 31st Conference on Current Trends in Theory and Practice of Computer Science. Lecture Notes in Computer Science, Liptovsk Jn, Slovakia, 22-28 January 2005, pp. 229-238
-
(2005)
Lecture Notes in Computer Science
, pp. 229-238
-
-
Klonowski, M.1
Kutylowski, M.2
Zagrski, F.3
-
17
-
-
23944473131
-
Onions based on universal re-encryption - Anonymous communication immune against repetitive attack
-
In: Lim, C.H., Yung, M. (eds.) Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, 23-25 August. Springer, Berlin
-
Gomulkiewicz, M., Klonowski, M., Kutylowski, M.: Onions based on universal re-encryption - anonymous communication immune against repetitive attack. In: Lim, C.H., Yung, M. (eds.) Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, 23-25 August. Lecture Notes in Computer Science, vol. 3325, pp. 400-410. Springer, Berlin (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 400-410
-
-
Gomulkiewicz, M.1
Klonowski, M.2
Kutylowski, M.3
-
18
-
-
26444586033
-
Some remarks on universal re-encryption and a novel practical anonymous tunnel
-
In: Lu, X., Zhao, W. (eds.) ICCNMC. Springer, Berlin
-
Lu, T., Fang, B., Sun, Y., Guo, L.: Some remarks on universal re-encryption and a novel practical anonymous tunnel. In: Lu, X., Zhao, W. (eds.) ICCNMC. Lecture Notes in Computer Science, vol. 3619, pp. 853-862. Springer, Berlin (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 853-862
-
-
Lu, T.1
Fang, B.2
Sun, Y.3
Guo, L.4
-
19
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
In: New York City, 25-27 May ACM, New York
-
Goldreich, O., Micali, S., Wigdreson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: Proceedings of the nineteenth annual ACM Symposium on Theory of Computing, New York City, 25-27 May, pp. 218-229. ACM, New York (1987)
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigdreson, A.3
-
21
-
-
34147177181
-
A. Multiparty computation unconditionally secure against adversary structures
-
School of Computer Science, McGill University, Montreal, Canada
-
Smith, A., Stiglic, A.: A. Multiparty computation unconditionally secure against adversary structures. Cryptology SOCS-98.2, School of Computer Science, McGill University, Montreal, Canada, 1998
-
(1998)
Cryptology SOCS-98.2
-
-
Smith, A.1
Stiglic, A.2
-
22
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
In: Springer-Verlag, Berlin
-
Cramer, R., Damgård, I., Ard, S., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Advances in Cryptology - EUROCRYPT 99, March 1999. Lecture Notes in Computer Science, vol. 1592, pp. 311-326. Springer-Verlag, Berlin
-
Advances in Cryptology - EUROCRYPT 99, March 1999. Lecture Notes in Computer Science
, vol.592
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Ard, S.3
Dziembowski, S.4
Hirt, M.5
Rabin, T.6
-
23
-
-
0027224328
-
Cryptographic defense against traffic analysis
-
In: San Diego, California, 16-18 May
-
Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, San Diego, California, 16-18 May 1993, pp. 672-681
-
(1993)
Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing
, pp. 672-681
-
-
Rackoff, C.1
Simon, D.R.2
-
24
-
-
0342880858
-
Studies in secure multiparty computation and applications
-
PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June revised version
-
Canetti, R.: Studies in secure multiparty computation and applications. PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June 1995, revised version
-
(1995)
-
-
Canetti, R.1
-
25
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. Assoc. Comput. Mach. 24(2), 84-88 (1981)
-
(1981)
Commun. Assoc. Comput. Mach.
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
26
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Park, C., Itoh, K., Kurasawa, K.: Efficient anonymous channel and all/ nothing election scheme. In: Lecture Notes in Computer Science, vol. 765 (1994)
-
(1994)
Lecture Notes in Computer Science
, vol.765
-
-
Park, C.1
Itoh, K.2
Kurasawa, K.3
-
27
-
-
0037974466
-
The disadvantages of free mix routes and how to overcome them
-
In: ICSI TR-00-011, 25-26 July
-
Berthold, O., Pfitzman, A., Standtke, R.: The disadvantages of free mix routes and how to overcome them. In: Proc. Workshop on Design Issues in Anonymity and Unobservability, ICSI TR-00-011, 25-26 July 2000, pp. 27-42
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 27-42
-
-
Berthold, O.1
Pfitzman, A.2
Standtke, R.3
-
30
-
-
0002919433
-
Millimix: Mixing in small batches
-
DIMACS, 10 June
-
JakoMsson, M., Juels, A.: Millimix: mixing in small batches. Tech. Rep. 99-33, DIMACS, 10 June 1999
-
(1999)
Tech. Rep. 99-33
-
-
Jakobsson, M.1
Juels, A.2
-
31
-
-
84937415944
-
A length-invariant hybrid mix
-
In: Advances in Cryptology-ASIACRYPT '2000. Springer-Verlag, Berlin
-
Ohkubo, M., Abe, M.: A length-invariant hybrid mix. In: Advances in Cryptology-ASIACRYPT '2000. Lecture Notes in Computer Science, pp. 178-191. Springer-Verlag, Berlin (2000)
-
(2000)
Lecture Notes in Computer Science
, pp. 178-191
-
-
Ohkubo, M.1
Abe, M.2
-
32
-
-
84948958135
-
How to break a practical mix and design a new one
-
In: Advances in Cryptology-EUROCRYPT '2000. Springer-Verlag, Berlin
-
Desmedt, Y., Kurosawa, K.: How to break a practical mix and design a new one. In: Advances in Cryptology-EUROCRYPT '2000. Lecture Notes in Computer Science, pp. 557-572. Springer-Verlag, Berlin (2000)
-
(2000)
Lecture Notes in Computer Science
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
33
-
-
34147128245
-
-
The anonymizer, anonymizer.com
-
The anonymizer, anonymizer.com
-
-
-
-
34
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M.K., Rubin, D.A.: Anonymous web transactions with crowds. Commun. ACM 42(2), 32-48 (1999)
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, D.A.2
-
35
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldshlag, D., Reed, R., Syverson, P.: Onion routing for anonymous and private internet connections. Commun. ACM (USA) 42(2), 39-41 (1999)
-
(1999)
Commun. ACM (USA)
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldshlag, D.1
Reed, R.2
Syverson, P.3
-
36
-
-
0038311861
-
Towards an analysis of onion routing security
-
In: ICSI RR-00-011, 25-26 July
-
Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Proc. Workshop on Design Issues in Anonymity and Unobservability, ICSI RR-00-011, 25-26 July 2000, pp. 83-100
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 83-100
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
-
37
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
In: Moskowitz, I.S. (ed.) IH 2001. Springer-Verlag, Berlin
-
Back, A., Moller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. Lecture Notes in Computer Science, vol. 2137, pp. 245-257. Springer-Verlag, Berlin (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
40
-
-
0003056522
-
ISDN-MIXes: Untraceable communication with very small bandwidth overhead
-
PfitzmUnn, A., Pfitzmann, B., Waidner, M.: ISDN-MIXes: untraceable communication with very small bandwidth overhead. In: Information Security, Proc. IFIP/Sec '91, 1991, pp. 245-258
-
(1991)
Information Security, Proc. IFIP/Sec '91
, pp. 245-258
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
41
-
-
24944449752
-
Buses for anonymous message delivery
-
In: Elba, Italy, May
-
Beimel, A., Dolev, S.: Buses for anonymous message delivery. In: Second International Conference on FUN with Algorithms, Elba, Italy, May 2001, pp. 1-13
-
(2001)
Second International Conference on FUN With Algorithms
, pp. 1-13
-
-
Beimel, A.1
Dolev, S.2
|