-
1
-
-
0038148419
-
-
Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 16-27 (2003)
-
Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 16-27 (2003)
-
-
-
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
4
-
-
32344446687
-
Understanding the metropolis-hastings algorithm
-
Chib, S., Greenberg, E.: Understanding the metropolis-hastings algorithm. The American Statistician 49(4), 327-335 (1995)
-
(1995)
The American Statistician
, vol.49
, Issue.4
, pp. 327-335
-
-
Chib, S.1
Greenberg, E.2
-
5
-
-
84904332394
-
-
Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), Athens, IFIP TC11, May 2003, pp. 421-426. Kluwer, Dordrecht (2003)
-
Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), Athens, IFIP TC11, May 2003, pp. 421-426. Kluwer, Dordrecht (2003)
-
-
-
-
6
-
-
50249171823
-
A survey of anonymous communication channels
-
Technical Report MSR-TR-2008-35, Microsoft Research January
-
Danezis, G., Diaz, C.: A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research (January 2008)
-
(2008)
-
-
Danezis, G.1
Diaz, C.2
-
7
-
-
38149040070
-
-
Danezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 30-44. Springer, Heidelberg (2007)
-
Danezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 30-44. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
35048895319
-
-
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 293-308. Springer, Heidelberg (2004)
-
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293-308. Springer, Heidelberg (2004)
-
-
-
-
9
-
-
84957800033
-
-
Diáz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
-
Diáz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
50249117750
-
-
Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 44-62. Springer, Heidelberg (2008)
-
Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44-62. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
0004012196
-
-
2nd edn. Chapman and Hall, Boca Raton
-
Gelman, A., Carlin, J.B., Stern, H.S., Rubin, D.B.: Bayesian Data Analysis, 2nd edn. Chapman and Hall, Boca Raton (2003)
-
(2003)
Bayesian Data Analysis
-
-
Gelman, A.1
Carlin, J.B.2
Stern, H.S.3
Rubin, D.B.4
-
12
-
-
35248900308
-
-
Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 53-69. Springer, Heidelberg (2003)
-
Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 53-69. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
35048865346
-
-
Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 326-339. Springer, Heidelberg (2004)
-
Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 326-339. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
24344478834
-
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
IEEE Computer Society Press, Los Alamitos
-
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111-125. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
17
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
19
-
-
84957802536
-
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
-
-
-
20
-
-
3042662497
-
Probabilistic analysis of an anonymity system
-
Shmatikov, V.: Probabilistic analysis of an anonymity system. Journal of Computer Security 12(3-4), 355-377 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
21
-
-
50249128196
-
-
Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 2-23. Springer, Heidelberg (2008)
-
Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 2-23. Springer, Heidelberg (2008)
-
-
-
|