-
1
-
-
1542591507
-
-
Thesis (M.S. in Computer Science), University of California, Berkeley, Berkeley, CA, USA
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Thesis (M.S. in Computer Science), University of California, Berkeley, Berkeley, CA, USA (1979)
-
(1979)
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
-
Chaum, D.1
-
3
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16 (1998) 482-494
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
6
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
84956854310
-
Mix-networks on permutation networks
-
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings.
-
Abe, M.: Mix-networks on permutation networks. In: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings. Volume 1716 of Lecture Notes in Computer Science. (1999) 258-273
-
(1999)
Lecture Notes in Computer Science
, vol.1716
, pp. 258-273
-
-
Abe, M.1
-
9
-
-
84937409147
-
Remarks on mix-network based on permutation networks
-
Abe, M., Hoshino, F.: Remarks on mix-network based on permutation networks. Lecture Notes in Computer Science 1992 (2001) 317-324
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 317-324
-
-
Abe, M.1
Hoshino, F.2
-
12
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. Lecture Notes in Computer Science 2009 (2001) 10-29
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 10-29
-
-
Raymond, J.F.1
-
15
-
-
35048849742
-
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability
-
Federrath, H., ed.: Berkeley, CA, USA, July 25-26, 2000, Proceedings. In Federrath, H., ed.: International Workshop on Design Issues in Anonymity and Unobservability. Springer
-
Federrath, H., ed.: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings. In Federrath, H., ed.: International Workshop on Design Issues in Anonymity and Unobservability. Volume 2009 of Lecture Notes in Computer Science., Springer (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2009
-
-
-
17
-
-
0004188848
-
-
John Wiley & Sons, New York, NY, USA
-
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley Series in Telecommunications. John Wiley & Sons, New York, NY, USA (1991)
-
(1991)
Elements of Information Theory. Wiley Series in Telecommunications
-
-
Cover, T.M.1
Thomas, J.A.2
|