-
1
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Designing Privacy Enhancing Technologies, Springer-Verlag
-
Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In Designing Privacy Enhancing Technologies, LNCS Vol. 2009, pages 115-129. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
2
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
Designing Privacy Enhancing Technologies, Springer-Verlag
-
Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvantages of free MIX routes and how to overcome them. In Designing Privacy Enhancing Technologies, LNCS Vol. 2009, pages 30-45. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2009
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
5
-
-
35248875897
-
Statistical disclosure attacks
-
May
-
George Danezis. Statistical disclosure attacks. In Sec 2003, May 2003. http://www.cl.cam.ac.uk/∼gd216/StatDisclosure.pdf.
-
(2003)
Sec 2003
-
-
Danezis, G.1
-
8
-
-
84947287486
-
A reputation system to increase MIX-net reliability
-
Roger Dingledine, Michael J. Freedman, David Hopwood, and David Molnar. A reputation system to increase MIX-net reliability. Lecture Notes in Computer Science, 2137:126-141, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 126-141
-
-
Dingledine, R.1
Freedman, M.J.2
Hopwood, D.3
Molnar, D.4
-
12
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39-41, 1999.
-
(1999)
Communications of the ACM (USA)
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
14
-
-
0032074980
-
Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol
-
Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol. IEEE Journal on Selected Areas in Communications, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
-
-
Jerichow, A.1
Müller, J.2
Pfitzmann, A.3
Pfitzmann, B.4
Waidner, M.5
-
15
-
-
1642380665
-
Limits of anonymity in open environments
-
Noordwijkerhout, The Netherlands, October Springer Verlag
-
Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Information Hiding, 5th International Workshop, Noordwijkerhout, The Netherlands, October 2002. Springer Verlag.
-
(2002)
Information Hiding, 5th International Workshop
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
16
-
-
9744259670
-
Expander graphs and their applications
-
January
-
Nati Linial and Avi Wigderson. Expander graphs and their applications. Collection of Lecture Notes http://www.math.ias.edu/∼avi/TALKS/expander_course.pdf, January 2003.
-
(2003)
Collection of Lecture Notes
-
-
Linial, N.1
Wigderson, A.2
-
17
-
-
35248871744
-
-
Austria
-
Christian Mock. Mixmaster stats (Austria). http://www.tahina.priv.at/∼cm/stats/mlist2.html.
-
Mixmaster Stats
-
-
Mock, C.1
-
18
-
-
20444447364
-
-
Unfinished draft, January
-
Ulf Möller and Lance Cottrell. Mixmaster Protocol-Version 2. Unfinished draft, January 2000. http://www.eskimo.com/∼rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol- 00.txt.
-
(2000)
Mixmaster Protocol-Version 2
-
-
Möller, U.1
Cottrell, L.2
-
21
-
-
84937564790
-
Anonymity, unobservability and pseudonymity - A proposal for terminology
-
Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, number 2009 Springer-Verlag, July
-
Andreas Pfitzmann and Marit Kohntopp. Anonymity, unobservability and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, number 2009 in LNCS, pages 1-9. Springer-Verlag, July 2000.
-
(2000)
LNCS
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
23
-
-
0034503724
-
Entropy waves, the zigzag graph product, and new constant-degree expanders and extractors
-
Omer Reingold, Salil P. Vadhan, and Avi Wigderson. Entropy waves, the zigzag graph product, and new constant-degree expanders and extractors. In IEEE Symposium on Foundations of Computer Science, pages 3-13, 2000.
-
(2000)
IEEE Symposium on Foundations of Computer Science
, pp. 3-13
-
-
Reingold, O.1
Vadhan, S.P.2
Wigderson, A.3
-
25
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
Fabien A.P. Petitcolas, editor, Information Hiding Workshop, number 2578 Springer-Verlag
-
Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In Fabien A.P. Petitcolas, editor, Information Hiding Workshop, number 2578 in LNCS, pages 36-52. Springer-Verlag, 2002.
-
(2002)
LNCS
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
26
-
-
0031380297
-
Private web browsing
-
P. Syverson, M. Reed, and D. Goldschlag. Private web browsing. Journal of Computer Security, 5(3):237-248, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.3
, pp. 237-248
-
-
Syverson, P.1
Reed, M.2
Goldschlag, D.3
|