-
1
-
-
84957873374
-
-
Anderson, R.J., Needham, R.M., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, 1525, pp. 73-82. Springer, Heidelberg (1998)
-
Anderson, R.J., Needham, R.M., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73-82. Springer, Heidelberg (1998)
-
-
-
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239-248 (1983)
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0037810717
-
Mixminion: Design of a type iii anonymous remailer protocol
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type iii anonymous remailer protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 2-15 (2003)
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
5
-
-
35048831821
-
-
Diaz, C., Preneel, B.: Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 309-325. Springer, Heidelberg (2004)
-
Diaz, C., Preneel, B.: Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 309-325. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
49949112535
-
Mojitos: A distributed steganographic file system
-
Technical Report, University of Washington
-
Giefer, C., Letchner, J.: Mojitos: A distributed steganographic file system. Technical Report, University of Washington (2004)
-
(2004)
-
-
Giefer, C.1
Letchner, J.2
-
7
-
-
84947222165
-
Mnemosyne: Peer-to-peer steganographic storage
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Hand, S., Roscoe, T.: Mnemosyne: Peer-to-peer steganographic storage. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 130-140. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 130-140
-
-
Hand, S.1
Roscoe, T.2
-
9
-
-
84947944750
-
-
McDonald, A.D., Kuhn, M.G.: Stegfs: A steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, 1768, pp. 462-477. Springer, Heidelberg (2000)
-
McDonald, A.D., Kuhn, M.G.: Stegfs: A steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 462-477. Springer, Heidelberg (2000)
-
-
-
-
10
-
-
84937564790
-
Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Pfitzmann, A., Hansen, M.: Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Hansen, M.2
-
11
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin, M.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of ACM 36(2), 335-348 (1989)
-
(1989)
Journal of ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
12
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
Rizzo, L.: Effective erasure codes for reliable computer communication protocols. Computer Communication Review 27(2), 24-36 (1997)
-
(1997)
Computer Communication Review
, vol.27
, Issue.2
, pp. 24-36
-
-
Rizzo, L.1
-
13
-
-
49949108041
-
-
Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., et al. (eds.) IH 2007. LNCS, 4567, pp. 220-236. Springer, Heidelberg (2008)
-
Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., et al. (eds.) IH 2007. LNCS, vol. 4567, pp. 220-236. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
2442485674
-
Hiding data accesses in steganographic file system
-
IEEE Computer Society, Los Alamitos
-
Zhou, X., Pang, H., Tan, K.-L.: Hiding data accesses in steganographic file system. In: Proceedings of the 20th International Conference on Data Engineering, pp. 572-583. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the 20th International Conference on Data Engineering
, pp. 572-583
-
-
Zhou, X.1
Pang, H.2
Tan, K.-L.3
|