-
1
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 1 (1998) 65-75
-
(1998)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
2
-
-
50849107044
-
-
Anonymizer, Available from: .
-
Anonymizer, Available from: .
-
-
-
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 2 (1981) 84-88
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag D., Reed M., and Syverson P. Onion routing for anonymous and private internet connections. Communications of the ACM 42 2 (1999) 39-41
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
5
-
-
0030676973
-
-
P. Syverson, D. Goldschlag, and M. Reed, Anonymous connections and onion routing, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, May 1997, pp. 44-54.
-
P. Syverson, D. Goldschlag, and M. Reed, Anonymous connections and onion routing, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, May 1997, pp. 44-54.
-
-
-
-
6
-
-
84961707899
-
-
P. Syverson, M. Reed, D. Goldschlag, Onion routing access configuration, in: Proceedings of the DARPA Information Survivability Conference and Exposition, ser., IEEE CS Press, January 2000, pp. 34-40.
-
P. Syverson, M. Reed, D. Goldschlag, Onion routing access configuration, in: Proceedings of the DARPA Information Survivability Conference and Exposition, ser., IEEE CS Press, January 2000, pp. 34-40.
-
-
-
-
7
-
-
50849124485
-
-
P. Syverson, G. Tsudik, M. Reed, C. Landwehr, Towards an analysis of onion routing security, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000.
-
P. Syverson, G. Tsudik, M. Reed, C. Landwehr, Towards an analysis of onion routing security, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000.
-
-
-
-
9
-
-
50849097872
-
-
R. Droms, Dynamic host configuration protocol, IETF RFC2131 March 1997.
-
R. Droms, Dynamic host configuration protocol, IETF RFC2131 March 1997.
-
-
-
-
10
-
-
50849137183
-
-
S. Shin, K. Kobara, H. Imai, An efficient anonymous password-authenticated key exchange protocol, in: Proceedings of the ISEC 54, IEICE, Ed., July 2006, pp. 107-114.
-
S. Shin, K. Kobara, H. Imai, An efficient anonymous password-authenticated key exchange protocol, in: Proceedings of the ISEC 54, IEICE, Ed., July 2006, pp. 107-114.
-
-
-
-
11
-
-
33646844820
-
-
D.Q. Viet, A. Yamamura, H. Tanaka, Anonymous password-based authenticated key exchange, in: Proceedings of the INDOCRYPT 2005, ser., LNCS 3797, Springer, Berlin, 2005, pp. 244-257.
-
D.Q. Viet, A. Yamamura, H. Tanaka, Anonymous password-based authenticated key exchange, in: Proceedings of the INDOCRYPT 2005, ser., LNCS 3797, Springer, Berlin, 2005, pp. 244-257.
-
-
-
-
12
-
-
0030648441
-
-
S. Patel, Number theoretic attacks on secure password schemes, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, 1997, pp. 236-247.
-
S. Patel, Number theoretic attacks on secure password schemes, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, 1997, pp. 236-247.
-
-
-
-
13
-
-
35048901616
-
-
Z. Wan and S. Wang, Cryptanalysis of two password-authenticated key exchange protocols, in: Proceedings of the ACISP 2004, ser. LNCS 3108, Springer, Berlin, 2004, pp. 164-175.
-
Z. Wan and S. Wang, Cryptanalysis of two password-authenticated key exchange protocols, in: Proceedings of the ACISP 2004, ser. LNCS 3108, Springer, Berlin, 2004, pp. 164-175.
-
-
-
-
15
-
-
84873466407
-
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proceedings of the EUROCRYPT 2000, ser. LNCS 1807, Springer, Berlin, 2000, pp. 139-155.
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proceedings of the EUROCRYPT 2000, ser. LNCS 1807, Springer, Berlin, 2000, pp. 139-155.
-
-
-
-
17
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
Knuth D.E. The Art of Computer Programming, vol. 2: Seminumerical Algorithms, Chapter 3: Random Numbers. 2nd ed. (1982), Addison-Wesley, Reading, MA
-
(1982)
The Art of Computer Programming, vol. 2: Seminumerical Algorithms, Chapter 3: Random Numbers. 2nd ed.
-
-
Knuth, D.E.1
-
18
-
-
33749515127
-
-
K. Chin, D. Lowe, W. Lau, Routing in MANETs with address conflicts, Mobile and ubiquitous systems: networking and services, Mobiquitous, 2005, pp. 225- 236.
-
K. Chin, D. Lowe, W. Lau, Routing in MANETs with address conflicts, Mobile and ubiquitous systems: networking and services, Mobiquitous, 2005, pp. 225- 236.
-
-
-
-
19
-
-
34248630807
-
An integrated security framework for open wireless networking architecture
-
April
-
Jeong J., and Haas Z.J. An integrated security framework for open wireless networking architecture. IEEE Wireless Communications Magazine 13 2 (2007) 10-18 April
-
(2007)
IEEE Wireless Communications Magazine
, vol.13
, Issue.2
, pp. 10-18
-
-
Jeong, J.1
Haas, Z.J.2
|