-
2
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
David Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. J. Cryptography, 1(1):65-75, 1988.
-
(1988)
J. Cryptography
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
24944524538
-
Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002)
-
Roger Dingledine and Paul Syverson, editors, of, San Fransisco, CA, USA, Apr, Springer-Verlag
-
Roger Dingledine and Paul Syverson, editors. Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002), volume 2482 of LNCS, San Fransisco, CA, USA, Apr 2002. Springer-Verlag.
-
(2002)
LNCS
, vol.2482
-
-
-
6
-
-
84947273682
-
The Sybil Attack
-
P. Druschel, F. Kaashoek, and A. Rowstron, editors, Cambridge, MA, USA, 7-8 Mar, Springer-Verlag
-
John R. Douceur. The Sybil Attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS), volume 2429, pages 251-260, Cambridge, MA, USA, 7-8 Mar 2002. Springer-Verlag.
-
(2002)
Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS)
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
7
-
-
45949084136
-
-
Norman E. Fenton and Shari Lawrence Pfleeger. Software Metrics - A Rigorous & Practical Approach. PWS Publishing Company, 20 Park Plaza, Boston, MA 02116-4324, second edition, 1997.
-
Norman E. Fenton and Shari Lawrence Pfleeger. Software Metrics - A Rigorous & Practical Approach. PWS Publishing Company, 20 Park Plaza, Boston, MA 02116-4324, second edition, 1997.
-
-
-
-
8
-
-
33644968219
-
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
-
of, Springer-Verlag, May
-
Simone Fischer-Hübner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, volume 1958 of LNCS. Springer-Verlag, May 2001.
-
(2001)
LNCS
, vol.1958
-
-
Fischer-Hübner, S.1
-
9
-
-
33749452717
-
Entropy and Effective Support Size
-
Short note, Aug
-
Marian Grendar. Entropy and Effective Support Size. Entropy, 8(3):169-174, Aug 2006. Short note.
-
(2006)
Entropy
, vol.8
, Issue.3
, pp. 169-174
-
-
Grendar, M.1
-
10
-
-
84938015047
-
A Method for the Construction of Minimum-Redundancy Codes
-
Sep
-
David A. Huffman. A Method for the Construction of Minimum-Redundancy Codes. Proceedings of the Institute of Radio Engineers, 40(9):1098-1101, Sep 1952.
-
(1952)
Proceedings of the Institute of Radio Engineers
, vol.40
, Issue.9
, pp. 1098-1101
-
-
Huffman, D.A.1
-
11
-
-
45949109691
-
On the Relationship between Confidentiality Measures: Entropy and Guesswork
-
Madeira, Portugal, 12-13 Jun
-
Reine Lundin, This J. Holleboom, and Stefan Lindskog. On the Relationship between Confidentiality Measures: Entropy and Guesswork. In Proceedings of the 5th International Workshop on Security in Information System (WOSIS 2007), held in conjuction with 9th International Conference on Enterprise Information Systems, pages 135-144, Madeira, Portugal, 12-13 Jun 2007.
-
(2007)
Proceedings of the 5th International Workshop on Security in Information System (WOSIS 2007), held in conjuction with 9th International Conference on Enterprise Information Systems
, pp. 135-144
-
-
Lundin, R.1
Holleboom, T.J.2
Lindskog, S.3
-
12
-
-
45949087972
-
-
Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.29, 31 Jul 2007.
-
Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.29, 31 Jul 2007.
-
-
-
-
13
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, of, Springer-Verlag, July
-
Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
14
-
-
0003611111
-
Crowds: Anonymity for Web Transactions
-
Michael Reiter and Avi Rubin. Crowds: Anonymity for Web Transactions. In DIMACS Technical report, pages 97-115, 1997.
-
(1997)
DIMACS Technical report
, pp. 97-115
-
-
Reiter, M.1
Rubin, A.2
-
15
-
-
45949109214
-
Towards and Information Theoretic Metric for Anonymity
-
Andrei Serjantov and George Danezis. Towards and Information Theoretic Metric for Anonymity. In Dingledine and Syverson [5].
-
Dingledine and Syverson
, vol.5
-
-
Serjantov, A.1
Danezis, G.2
-
16
-
-
84940644968
-
-
Claude E. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, Jul 1948.
-
Claude E. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, Jul 1948.
-
-
-
-
17
-
-
24344501784
-
Measuring Anonymity in a Non-Adaptive, Real-Time System
-
David Martin and Andrei Serjantov, editors, Toronto, Canada, 26-28 May
-
Gergely Tóth and Zóltan Hornák. Measuring Anonymity in a Non-Adaptive, Real-Time System. In David Martin and Andrei Serjantov, editors, Proceedings of the 4th Workshop on Privacy Enhancing Technologies (PET 2004), pages 226-241, Toronto, Canada, 26-28 May 2004.
-
(2004)
Proceedings of the 4th Workshop on Privacy Enhancing Technologies (PET 2004)
, pp. 226-241
-
-
Tóth, G.1
Hornák, Z.2
-
18
-
-
14544273666
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communication Systems
-
Nov
-
Matthew K. Wright, Micah Adler, and Brian Neil Levine. The Predecessor Attack: An Analysis of a Threat to Anonymous Communication Systems. ACM Transactions on Information and System Security, 7(4):489-522, Nov 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.K.1
Adler, M.2
Neil Levine, B.3
|