-
1
-
-
84957715741
-
Universally verifiable Mix-net with verification work indendent of the number of Mix-servers
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Abe, M.: Universally verifiable Mix-net with verification work indendent of the number of Mix-servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437-447. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 437-447
-
-
Abe, M.1
-
2
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
77955437955
-
Anonymous webs of trust
-
10th Privacy Enhancing Technologies Symposium, PETS 2010. Springer, Heidelberg to appear
-
Backes, M., Lorenz, S., Maffei, M., Pecina, K.: Anonymous webs of trust. In: 10th Privacy Enhancing Technologies Symposium, PETS 2010. LNCS. Springer, Heidelberg (to appear, 2010)
-
(2010)
LNCS
-
-
Backes, M.1
Lorenz, S.2
Maffei, M.3
Pecina, K.4
-
4
-
-
50249119735
-
Denial of service or denial of security?
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM, New York
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 92-102. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
78249276599
-
Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems
-
Wagenknecht, M., Hampel, R. (eds.)
-
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Pesenti, M., Samarati, P., Zara, S.: Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. In: Wagenknecht, M., Hampel, R. (eds.) Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, pp. 43-48 (2003)
-
(2003)
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology
, pp. 43-48
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Pesenti, M.4
Samarati, P.5
Zara, S.6
-
8
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Atluri, V. (ed.) ACM, New York
-
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 207-216. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
9
-
-
84947287486
-
A reputation system to increase mix-net reliability
-
Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
-
Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase mix-net reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 126-141. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 126-141
-
-
Dingledine, R.1
Freedman, M.J.2
Hopwood, D.3
Molnar, D.4
-
10
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX
-
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303-320. USENIX (2004)
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
11
-
-
84957023357
-
Reliable MIX cascade networks through reputation
-
Blaze, M. (ed.) FC Springer, Heidelberg
-
Dingledine, R., Syverson, P.F.: Reliable MIX cascade networks through reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 253-268. Springer, Heidelberg (2003)
-
(2002)
LNCS
, vol.2357
, pp. 253-268
-
-
Dingledine, R.1
Syverson, P.F.2
-
12
-
-
68949206252
-
An analysis of the exponential decay principle in probabilistic trust models
-
ElSalamouny, E., Krukow, K.T., Sassone, V.: An analysis of the exponential decay principle in probabilistic trust models. Theor. Comput. Sci. 410(41), 4067-4084 (2009)
-
(2009)
Theor. Comput. Sci.
, vol.410
, Issue.41
, pp. 4067-4084
-
-
ElSalamouny, E.1
Krukow, K.T.2
Sassone, V.3
-
13
-
-
77953245932
-
HMM-based trust model
-
Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. Springer, Heidelberg
-
ElSalamouny, E., Sassone, V., Nielsen, M.: HMM-based trust model. In: Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. LNCS, vol. 5983, pp. 21-35. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5983
, pp. 21-35
-
-
ElSalamouny, E.1
Sassone, V.2
Nielsen, M.3
-
15
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Atluri, V. (ed.) ACM, New York
-
Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 193-206. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
16
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
17
-
-
77953244874
-
Probable innocence in the presence of independent knowledge
-
Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. Springer, Heidelberg
-
Hamadou, S., Palamidessi, C., Sassone, V., ElSalamouny, E.: Probable innocence in the presence of independent knowledge. In: Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. LNCS, vol. 5983, pp. 141-156. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5983
, pp. 141-156
-
-
Hamadou, S.1
Palamidessi, C.2
Sassone, V.3
ElSalamouny, E.4
-
18
-
-
77949464624
-
How much anonymity does network latency leak?
-
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2) (2010)
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.2
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
20
-
-
37249031542
-
A logical framework for history-based access control and reputation systems
-
Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security 16(1), 63-101 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.1
, pp. 63-101
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
-
21
-
-
54249091264
-
Don't clog the queue! circuit clogging and mitigation in P2P anonymity schemes
-
Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
-
McLachlan, J., Hopper, N.: Don't clog the queue! circuit clogging and mitigation in P2P anonymity schemes. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5143
, pp. 31-46
-
-
McLachlan, J.1
Hopper, N.2
-
22
-
-
74049096125
-
Scalable onion routing with Torsk
-
Al- Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM, New York
-
McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with Torsk. In: Al- Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 590-599. ACM, New York (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
23
-
-
27544454707
-
Low-cost traffic analysis of tor
-
IEEE Computer Society, Los Alamitos
-
Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
24
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM, New York
-
Nambiar, A., Wright, M.: Salsa: a structured approach to large-scale anonymity. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 17-26. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
26
-
-
84937415944
-
A length-invariant hybrid mix
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Ohkubo, M., Abe, M.: A length-invariant hybrid mix. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 178-191. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 178-191
-
-
Ohkubo, M.1
Abe, M.2
-
27
-
-
56649123231
-
Compromising anonymity using packet spinning
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Pappas, V., Athanasopoulos, E., Ioannidis, S., Markatos, E.P.: Compromising anonymity using packet spinning. In:Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 161-174. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 161-174
-
-
Pappas, V.1
Athanasopoulos, E.2
Ioannidis, S.3
Markatos, E.P.4
-
29
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
-
Jajodia, S., Samarati, P. (eds.) ACM, New York
-
Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Jajodia, S., Samarati, P. (eds.) Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, WPES, pp. 91-102. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
30
-
-
77958025455
-
Trust in Crowds: Probabilistic behaviour in anonymity protocols. Symposium on Trustworthy Global Computing, TGC 2010
-
Springer, Heidelberg
-
Sassone, V., ElSalamouny, E., Hamadou, S.: Trust in Crowds: probabilistic behaviour in anonymity protocols. In: Symposium on Trustworthy Global Computing, TGC 2010. LNCS, vol. 6084. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6084
-
-
Sassone, V.1
ElSalamouny, E.2
Hamadou, S.3
-
31
-
-
84943806344
-
Trustme: Anonymous management of trust relationships in decentralized P2P systems
-
Shahmehri, N., Graham, R.L., Caronni, G. (eds.) IEEE Computer Society, Los Alamitos
-
Singh, A., Liu, L.: Trustme: Anonymous management of trust relationships in decentralized P2P systems. In: Shahmehri, N., Graham, R.L., Caronni, G. (eds.) Peer-to-Peer Computing, pp. 142-149. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Peer-to-Peer Computing
, pp. 142-149
-
-
Singh, A.1
Liu, L.2
-
32
-
-
0030676973
-
Anonymous connections and onion routing
-
IEEE Computer Society, Los Alamitos
-
Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, pp. 44-54. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
33
-
-
84943784070
-
Trust and reputation model in peer-to-peer networks
-
Shahmehri, N., Graham, R.L., Caronni, G. (eds.) IEEE Computer Society, Los Alamitos
-
Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: Shahmehri, N., Graham, R.L., Caronni, G. (eds.) Peer-to-Peer Computing. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Peer-to-Peer Computing
-
-
Wang, Y.1
Vassileva, J.2
-
34
-
-
84871199341
-
Design principles for low latency anonymous network systems secure against timing attacks
-
Brankovic, L., Coddington, P.D., Roddick, J.F., Steketee, C., Warren, J.R., Wendelborn, A.L. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies), AISW 2007 Australian Computer Society
-
Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Brankovic, L., Coddington, P.D., Roddick, J.F., Steketee, C., Warren, J.R., Wendelborn, A.L. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies), AISW 2007. CRPIT, vol. 68, pp. 183-191. Australian Computer Society (2007)
-
(2007)
CRPIT
, vol.68
, pp. 183-191
-
-
Wiangsripanawan, R.1
Susilo, W.2
Safavi-Naini, R.3
|