-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
2
-
-
33646038920
-
Sybil-resistant DHT routing
-
S. D. C. di Vimercati, F. Syverson, and D. Gollmann, editors, Springer
-
G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-resistant DHT routing. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 305-318. Springer, 2005.
-
(2005)
ESORICS, Volume 3679 of Lecture Notes in Computer Science
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
4
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Atluri, editor, Washington, DC, November ACM
-
M. J. Freedman and R. Morris. Tarzan: A Peer-to-Peer Anonymizing Network Layer. In V. Atluri, editor, ACM Conference on Computer and Communications Security (CCS 2002), pages 193-206, Washington, DC, November 2002. ACM.
-
(2002)
ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
5
-
-
84910595881
-
Introducing tarzan, a peer-to-peer anonymizing network layer
-
Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, Cambridge, MA, March Springer
-
M. J. Freedman, E. Sit, J. Cates, and R. Morris. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, International workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 121-129, Cambridge, MA, March 2002. Springer.
-
(2002)
International Workshop on Peer-to-Peer Systems (IPTPS), Volume 2429 of Lecture Notes in Computer Science
, pp. 121-129
-
-
Freedman, M.J.1
Sit, E.2
Cates, J.3
Morris, R.4
-
6
-
-
33746886700
-
Performance analysis of wongoo system
-
IEEE Computer Society
-
T. Lu, B. Fang, Y. Sun, and X. Cheng. Performance Analysis of WonGoo System. In CIT, pages 716-723. IEEE Computer Society, 2005.
-
(2005)
CIT
, pp. 716-723
-
-
Lu, T.1
Fang, B.2
Sun, Y.3
Cheng, X.4
-
7
-
-
26444586033
-
Some remarks on universal re-encryption and a novel practical anonymous Tunnel
-
X. Lu and W. Zhao, editors, Springer
-
T. Lu, B. Fang, Y. Sun, and L. Guo. Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. In X. Lu and W. Zhao, editors, ICCNMC, volume 3619 of Lecture Notes in Computer Science, pages 853-862. Springer, 2005.
-
(2005)
ICCNMC, Volume 3619 of Lecture Notes in Computer Science
, pp. 853-862
-
-
Lu, T.1
Fang, B.2
Sun, Y.3
Guo, L.4
-
8
-
-
77951462266
-
AP3: Cooperative, decentralized anonymous communication
-
Leuven, Belgium, September
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In Proc. SIGOPS-EW, Leuven, Belgium, September 2004.
-
(2004)
Proc. SIGOPS-EW
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
9
-
-
85092066558
-
An infrastructure for anonymous internet services
-
Chiba/Tokyo, Japan, May
-
O. Landsiedel, H. Niedermayer, and K. Wehrle. An Infrastructure for Anonymous Internet Services. In IWI2005, Chiba/Tokyo, Japan, May 2005.
-
(2005)
IWI2005
-
-
Landsiedel, O.1
Niedermayer, H.2
Wehrle, K.3
-
10
-
-
20444437836
-
Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
-
Washington, DC, USA, November
-
M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, November 2002.
-
(2002)
Workshop on Privacy in the Electronic Society (WPES 2002)
-
-
Rennhard, M.1
Plattner, B.2
-
11
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, USA, 27-31 August ACM Press
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM 2001), pages 149-160, San Diego, CA, USA, 27-31 August 2001. ACM Press.
-
(2001)
Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM 2001)
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
12
-
-
0142103246
-
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
-
L. Xiao, Z. Xu, and X. Zhang. Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems, 14(9):829-840, 2003.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 829-840
-
-
Xiao, L.1
Xu, Z.2
Zhang, X.3
-
13
-
-
26444589144
-
SAS: A scalar anonymous communication system
-
H. Xu, X. Fu, Y. Zhu, R. Bettati, J. Chen, and W. Zhao. SAS: A Scalar Anonymous Communication System. In Proceedings of ICCNMC, pages 452-461, 2005.
-
(2005)
Proceedings of ICCNMC
, pp. 452-461
-
-
Xu, H.1
Fu, X.2
Zhu, Y.3
Bettati, R.4
Chen, J.5
Zhao, W.6
|