-
1
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A. C. M., 24(2):84-88, February 1981.
-
(1981)
Communications of the A. C. M.
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0016867208
-
Network Security Via Dynamic Process Renaming
-
7-9 October Quebec City, Canada
-
D. J. Farber, K. C. Larson: Network Security Via Dynamic Process Renaming. Fourth Data Communication Symposium, 7-9 October 1975, Quebec City, Canada.
-
(1975)
Fourth Data Communication Symposium
-
-
Farber, D.J.1
Larson, K.C.2
-
4
-
-
4243995024
-
-
Master Thesis, Massachusetts Institute of Technology. Laboratory for Computer Science, 545 Technology Square, Camebridge, Massachusetts 02139, Mai Report MIT/LCS/TR-179
-
P. A. Karger: Non-Discretionary Access Control for Decentralized Computing Systems. Master Thesis, Massachusetts Institute of Technology. Laboratory for Computer Science, 545 Technology Square, Camebridge, Massachusetts 02139, Mai 1977, Report MIT/LCS/TR-179.
-
(1977)
Non-Discretionary Access Control for Decentralized Computing Systems
-
-
Karger, P.A.1
-
5
-
-
84937555451
-
Networks without user observability, design options
-
Advances in Cryptology. Eurocrypt '85, Spinger-Verlag
-
A. Pfitzmann, M. Waidner, Networks without user observability, design options. In: Advances in Cryptology. Eurocrypt '85, volume 219 of Lecture Notes in Computer Science. Spinger-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.219
-
-
Pfitzmann, A.1
Waidner, M.2
-
6
-
-
0029541045
-
Private information retrieval
-
IEEE Computer Society Press
-
B. Chor, O. Goldreich, E. Kushilevitz, M. Sudan: Private information retrieval. In: 36th IEEE Conference on the Foundations of Computer Science, pages 41-50. IEEE Computer Society Press, 1995.
-
(1995)
36th IEEE Conference on the Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
9
-
-
84955605258
-
MIXes in Mobile Communication Systems: Location Management with Privacy
-
Information Hiding, Springer-Verlag, Berlin
-
H. Federrath, A. Jerichow, A. Pfitzmann: MIXes in Mobile Communication Systems: Location Management with Privacy. Information Hiding, LNCS 1174. Springer-Verlag, Berlin 1996, 121-135.
-
(1996)
LNCS
, vol.1174
, pp. 121-135
-
-
Federrath, H.1
Jerichow, A.2
Pfitzmann, A.3
-
11
-
-
0032074980
-
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol
-
A. Jerichow, J. Müller, A. Pfitzmann, B. Pfitzmann, M. Waidner: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol. IEEE Journal on Selected Areas in Communications, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
-
-
Jerichow, A.1
Müller, J.2
Pfitzmann, A.3
Pfitzmann, B.4
Waidner, M.5
-
12
-
-
0011702966
-
ISDN-mixes: Untraceable communication with very small bandwidth overhead
-
Springer-Verlag, Heidelberg, February
-
A. Pfitzmann, B. Pfitzmann, M. Waidner: ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: GI/ITG Conference: Communication in Distributed Systems, pages 451-463. Springer-Verlag, Heidelberg, February 1991.
-
(1991)
GI/ITG Conference: Communication in Distributed Systems
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, D. M. Goldschlag: Anonymous connections and onion routing. IEEE Journal on Special Areas in Communications, 16(4):482-494, May 1998.
-
(1998)
IEEE Journal on Special Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
14
-
-
84957030837
-
Protocols using Anonymous Connections: Mobile Applications, Security Protocols
-
5th International Workshop Proceedings B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.).
-
M. G. Reed, P. F. Syverson, D. M. Goldschlag: Protocols using Anonymous Connections: Mobile Applications, Security Protocols. 5th International Workshop Proceedings. B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.). Springer-Verlag LNCS 1361, 1998, pp. 13-23.
-
(1998)
Springer-Verlag LNCS
, vol.1361
, pp. 13-23
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
15
-
-
84890010554
-
Stop-and-go mixes providing probabilistic security in an open system
-
David Aucsmith (ed.): Information Hiding: Second International Workshop, Springer-Verlag, Berlin, Germany
-
D. Kesdogan, J. Egner, R. Büschkes: Stop-and-go mixes providing probabilistic security in an open system. In: David Aucsmith (ed.): Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 83-98. Springer-Verlag, Berlin, Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Büschkes, R.3
-
16
-
-
85032859691
-
How to Break the Direct RSA-Implementation of MIXes
-
Eurocrypt '89, Springer-Verlag, Berlin
-
B. Pfitzmann, A. Pfitzmann: How to Break the Direct RSA-Implementation of MIXes. Eurocrypt '89, LNCS 434. Springer-Verlag, Berlin 1990, pp. 373-381.
-
(1990)
LNCS
, vol.434
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
17
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
International Workshop on Design Issues in Anonymity and Unobservability, Berkley, Springer-Verlag
-
J. F. Raymond: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. International Workshop on Design Issues in Anonymity and Unobservability, Berkley, LNCS 2009. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
-
-
Raymond, J.F.1
-
18
-
-
0037974470
-
Dummy Traffic Against Long Term Intersection Attacks
-
San Francisco, CA, USA, April 14-15
-
O. Berthold, H. Langos: Dummy Traffic Against Long Term Intersection Attacks. Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, April 14-15, 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Berthold, O.1
Langos, H.2
-
22
-
-
2642543760
-
Towards an Information Theoretic Metric for Anonymity
-
San Francisco, CA, USA, April 14-15
-
A. Serjantov, G. Danezis: Towards an Information Theoretic Metric for Anonymity. Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, April 14-15, 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Serjantov, A.1
Danezis, G.2
-
23
-
-
3242815149
-
Towards Measuring Anonymity
-
San Francisco, CA, USA, April 14-15
-
C. Diaz, S. Seys, J. Claessens, B. Preneel: Towards Measuring Anonymity, Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, April 14-15, 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
24
-
-
0008452404
-
Backtracking algorithms for constraint satisfaction problems
-
September
-
R. Dechter, D. Frost: Backtracking algorithms for constraint satisfaction problems. An ICS technical report, September 1999.
-
(1999)
An ICS Technical Report
-
-
Dechter, R.1
Frost, D.2
-
26
-
-
0002514541
-
Algorithms for Constraint Satisfaction Problems, a Survey
-
V. Kumar: Algorithms for Constraint Satisfaction Problems, A Survey. AI magazine, 13(1):32-44, 1992.
-
(1992)
AI Magazine
, vol.13
, Issue.1
, pp. 32-44
-
-
Kumar, V.1
-
27
-
-
84937578170
-
Web MIXes: A System for Anonymous and Unobservable Internet Access
-
International Workshop on Design Issues in Anonymity and Unobservability, Berkley, Springer-Verlag
-
O. Berthold, H. Federrath, S. Köpsell: Web MIXes: A System for Anonymous and Unobservable Internet Access. International Workshop on Design Issues in Anonymity and Unobservability, Berkley, 2009 LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
29
-
-
0027224328
-
Cryptographic defence against traffic analysis
-
San Diego, California, 16-18 May
-
C. Rackoff, D. R. Simon: Cryptographic defence against traffic analysis. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, pages 672-681, San Diego, California, 16-18 May 1993.
-
(1993)
Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing
, pp. 672-681
-
-
Rackoff, C.1
Simon, D.R.2
|