-
1
-
-
37149011422
-
A survey on the technology of anonymity
-
J. Wang, Q. Wu, D. Chen, and Y. Wang. A survey on the technology of anonymity. Journal of China Institute of Communications, vol.26, no.2, pp.112-118, 2005.
-
(2005)
Journal of China Institute of Communications
, vol.26
, Issue.2
, pp. 112-118
-
-
Wang, J.1
Wu, Q.2
Chen, D.3
Wang, Y.4
-
2
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-a proposal for terminology
-
Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, F. Hannes, Ed, Springer-Verlag, pp
-
A. Pfitzmann, M. Kohntopp, Anonymity, unobservability, and pseudonymity-a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, F. Hannes, Ed., LNCS 2009, Springer-Verlag, pp.1-9, 2001.
-
(2001)
LNCS
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
3
-
-
84937578170
-
-
O. Berthold, H. Federrath and S. Köpsell. Web MIXes: A system for anonymous and unobservable internet access. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed., Designing Privacy Enhancing Technologies, LNCS 2009, Springer-Verlag, pp.115-129, 2001.
-
O. Berthold, H. Federrath and S. Köpsell. Web MIXes: A system for anonymous and unobservable internet access. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed., Designing Privacy Enhancing Technologies, LNCS 2009, Springer-Verlag, pp.115-129, 2001.
-
-
-
-
4
-
-
14544273666
-
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.(TISSEC), 7,no.4, pp.489-522, 2004.
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.(TISSEC), vol.7,no.4, pp.489-522, 2004.
-
-
-
-
5
-
-
33746634961
-
Information theory and anonymity
-
B. Macq and J. Quisquater, Eds, Werkgemeenschap voor Information Communicatietheorie, pp
-
C. Díaz, J. Claessens, S. Seys, and B. Preneel. Information theory and anonymity. In Proceedings of the 23rd Symposium on Information Theory in the Benelux, B. Macq and J. Quisquater, Eds., Werkgemeenschap voor Information Communicatietheorie, pp.179-186, 2002.
-
(2002)
Proceedings of the 23rd Symposium on Information Theory in the Benelux
, pp. 179-186
-
-
Díaz, C.1
Claessens, J.2
Seys, S.3
Preneel, B.4
-
6
-
-
51249093215
-
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.54-68, 2002.
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.54-68, 2002.
-
-
-
-
7
-
-
51249084522
-
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.41-53, 2002.
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.41-53, 2002.
-
-
-
-
8
-
-
33845537887
-
Measuring anonymity revisited
-
S. Liimatainen and T. Virtanen, Eds, Epsoo, Finland, pp
-
G. Tóth, Z. Hornák, F. Vajda. Measuring anonymity revisited. In Proceedings of the 9th Nordic Workshop on Secure IT Systems(Nordsec'04), S. Liimatainen and T. Virtanen, Eds., Epsoo, Finland, pp.85-90, 2004.
-
(2004)
Proceedings of the 9th Nordic Workshop on Secure IT Systems(Nordsec'04)
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
-
9
-
-
35248900308
-
Limits of anonymity in open environments
-
Proceedings of Information Hiding Workshop IH'02, F. Petitcolas, Ed, Springer-Verlag, pp
-
D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In Proceedings of Information Hiding Workshop (IH'02), F. Petitcolas, Ed., LNCS 2578, Springer-Verlag, pp.53-69, 2002.
-
(2002)
LNCS
, vol.2578
, pp. 53-69
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
10
-
-
33846288517
-
Stopping timing attacks in low-latency mix-based systems
-
Proceedings of Financial Cryptography FC'04, A. Juels, Ed, Springer-Verlag, pp
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Stopping timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC'04), A. Juels, Ed., LNCS 3110, Springer-Verlag, pp.251-265, 2004.
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
11
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
M. Wright, M. Adler, B.N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed Security Symposium (NDSS'02), pp.38-50, 2002
-
(2002)
Proceedings of the Network and Distributed Security Symposium (NDSS'02)
, pp. 38-50
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|