-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
2
-
-
1642367651
-
Mixmaster and Remailer Attacks,
-
L. Cottrell, "Mixmaster and Remailer Attacks," tech. rep., 1994.
-
(1994)
tech. rep
-
-
Cottrell, L.1
-
3
-
-
84860028109
-
Generalizing mixes
-
Proceedings of Privacy Enhancing Technologies Workshop PET 2003, Springer-Verlag, April
-
C. Díaz and A. Serjantov, "Generalizing mixes," in Proceedings of Privacy Enhancing Technologies Workshop (PET 2003), Springer-Verlag, LNCS 2760, April 2003.
-
(2003)
LNCS
, vol.2760
-
-
Díaz, C.1
Serjantov, A.2
-
4
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May 26-28
-
Y. Zhu, X. Fu, B. Graham, R.Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Privacy Enhancing Technologies workshop, May 26-28 2004.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
5
-
-
0011702966
-
ISDN-MIXes: Untraceable communication with very small bandwidth overhead
-
Mannheim, Germany, pp, February
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner, "ISDN-MIXes: Untraceable communication with very small bandwidth overhead," in Proceedings of the GI/ITG Conference: Communication in Distributed Systems, Informatik-Fachberichte, vol. 267, (Mannheim, Germany), pp. 451-463, February 1991.
-
(1991)
Proceedings of the GI/ITG Conference: Communication in Distributed Systems, Informatik-Fachberichte
, vol.267
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Berkeley, CA, pp, July
-
O. Berthold, H. Federrath, and S. Kopsell, "Web MIXes: A system for anonymous and unobservable Internet access," in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, vol. 2009, (Berkeley, CA), pp. 115-129, July 2000.
-
(2000)
Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Kopsell, S.3
-
8
-
-
84957800033
-
Towards measuring anonymity
-
Proceedings of Privacy Enhancing Technologies Workshop PET 2002, R. Dingledine and P. Syverson, eds, Springer-Verlag, April
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proceedings of Privacy Enhancing Technologies Workshop (PET 2002) (R. Dingledine and P. Syverson, eds.), Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
9
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Proceedings of Privacy Enhancing Technologies Workshop PET 2002, R. Dingledine and P. Syverson, eds, Springer-Verlag, April
-
A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Proceedings of Privacy Enhancing Technologies Workshop (PET 2002) (R. Dingledine and P. Syverson, eds.), Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
11
-
-
0016562514
-
The wiretap channel
-
A.Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
12
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
13
-
-
45249083605
-
Anonymous Networking amidst Eavesdroppers
-
to appear Special Issue on Information-Thoeretic Security
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous Networking amidst Eavesdroppers," to appear IEEE Transactions on Information Theory: Special Issue on Information-Thoeretic Security, 2008.
-
(2008)
IEEE Transactions on Information Theory
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
14
-
-
84954409133
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: design of a type iii anonymous remailer protocol," in Proceedings of 2003 Symposium on Security and Privacy, pp. 2-15, May 2003.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
15
-
-
85084161366
-
Tor: The Second-generation Onion Router
-
San Diego, CA
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-generation Onion Router," in Proc. USENIX Security Symposium., (San Diego, CA), 2004.
-
(2004)
Proc. USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
16
-
-
50249129266
-
Reliable MIX Cascade Networks through Reputation, Financial Cryptography. Springer-Verlag
-
R. Dingledine and P. Syverson, "Reliable MIX Cascade Networks through Reputation," Financial Cryptography. Springer-Verlag, LNCS, vol. 2357, 2002.
-
(2002)
LNCS
, vol.2357
-
-
Dingledine, R.1
Syverson, P.2
-
17
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A distributed anonymous information storage and retrieval system,," in Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001), pp. 46-66. http://freenet.sourceforge. net.
-
Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability (2001)
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
19
-
-
27544431592
-
Mix cascades vs. peer-to-peer: Is one concept superior?,
-
Toronto, Canada, May
-
R. Bohme, G. Danezis, C. Diaz, S. Kopsell, and A. Pfitzmann, "Mix cascades vs. peer-to-peer: Is one concept superior?, " in Privacy Enhancing Technologies (PET 2004), (Toronto, Canada), May 2004.
-
(2004)
Privacy Enhancing Technologies (PET 2004)
-
-
Bohme, R.1
Danezis, G.2
Diaz, C.3
Kopsell, S.4
Pfitzmann, A.5
-
20
-
-
0023861309
-
The dining cryptographers problem : Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem : Unconditional sender and recipient untraceability," Journal of Cryptography, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptography
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
21
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: anonymity for Web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
23
-
-
0015376113
-
Computation of Channel Capacity and Rate-Distortion Functions
-
July
-
R. Blahut, "Computation of Channel Capacity and Rate-Distortion Functions," IEEE Trans. Infor. Theory, vol. IT-18, July 1972.
-
(1972)
IEEE Trans. Infor. Theory
, vol.IT-18
-
-
Blahut, R.1
-
25
-
-
50249131380
-
Detecting Information Flows: Fundamental Limits and Optimal Algorithms
-
submitted to IEEE Trans. on Information Theory
-
T. He and L. Tong, "Detecting Information Flows: Fundamental Limits and Optimal Algorithms." submitted to IEEE Trans. on Information Theory, 2007.
-
(2007)
-
-
He, T.1
Tong, L.2
|