-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
3
-
-
0030676973
-
Anonymous connections and onion routing
-
Washington, DC, USA. IEEE Computer Society, Los Alamitos
-
Syverson, P., Goldschlag, D., Reed, M.: Anonymous connections and onion routing. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (SP 1997), Washington, DC, USA. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy (SP 1997)
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untrace-ability
-
Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untrace-ability. Journal of Cryptology 1(1), 65-75 (1988) (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
84957802536
-
Towards an Information Theoretic Metric for Anonymity
-
Privacy Enhancing Technologies
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003) (Pubitemid 36309878)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
7
-
-
84957800033
-
Towards Measuring Anonymity
-
Privacy Enhancing Technologies
-
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003) (Pubitemid 36309879)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
8
-
-
27944454436
-
Anonymity vs. information leakage in anonymity systems
-
Columbus, Ohio
-
Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, pp. 514-524 (2005)
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005)
, pp. 514-524
-
-
Zhu, Y.1
Bettati, R.2
-
9
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation 206(2-4), 378-401 (2008)
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
10
-
-
1642355346
-
Covert channels and anonymizing networks
-
ACM, New York
-
Moskowitz, I., Newman, R., Crepeau, D., Miller, A.: Covert channels and anonymizing networks. In: WPES 2003: Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pp. 79-88. ACM, New York (2003)
-
(2003)
WPES 2003: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 79-88
-
-
Moskowitz, I.1
Newman, R.2
Crepeau, D.3
Miller, A.4
-
12
-
-
68549087948
-
On the foundations of quantitative information flow
-
de Alfaro, L. (ed.) LNCS Springer, Heidelberg
-
Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
FOSSACS 2009
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
14
-
-
2642560372
-
Quasi-anonymous channels
-
Moskowitz, I., Newman, R., Syverson, P.: Quasi-anonymous channels. In: IASTED CNIS, pp. 126-131 (2003)
-
(2003)
IASTED CNIS
, pp. 126-131
-
-
Moskowitz, I.1
Newman, R.2
Syverson, P.3
-
15
-
-
35248877248
-
Metrics for traffic analysis prevention
-
Dingledine, R. (ed.) LNCS Springer, Heidelberg
-
Newman, R., Moskowitz, I., Syverson, P., Serjantov, A.: Metrics for traffic analysis prevention. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 48-65. Springer, Heidelberg (2003)
-
(2003)
PET 2003
, vol.2760
, pp. 48-65
-
-
Newman, R.1
Moskowitz, I.2
Syverson, P.3
Serjantov, A.4
-
16
-
-
33845537887
-
Measuring anonymity revisited
-
Liimatainen, S., Virtanen, T. (eds.) Espoo, Finland November
-
Tóth, G., Hornák, Z., Vajda, F.: Measuring anonymity revisited. In: Liimatainen, S., Virtanen, T. (eds.) Proceedings of the Ninth Nordic Workshop on Secure IT Systems, Espoo, Finland, pp. 85-90 (November 2004)
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
-
17
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
Edman, M., Sivrikaya, F., Yener, B.: A combinatorial approach to measuring anonymity. In: 2007 IEEE Intelligence and Security Informatics, pp. 356-363 (2007)
-
(2007)
2007 IEEE Intelligence and Security Informatics
, pp. 356-363
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
18
-
-
54349091549
-
On the bayes risk in information-hiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the bayes risk in information-hiding protocols. Journal of Computer Security 16(5), 531-571 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
19
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electrical Notes in Theoretical Computer Science 59, 238-251 (2001)
-
(2001)
Electrical Notes in Theoretical Computer Science
, vol.59
, pp. 238-251
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
20
-
-
84885892297
-
-
University of Oxford: Prism, http://www.prismmodelchecker.org
-
-
-
-
23
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
IEEE Computer Society, Los Alamitos
-
Wright, M., Adler, M., Levine, B., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the Network and Distributed Security Symposium (NDSS 2002). IEEE Computer Society, Los Alamitos (2001)
-
(2001)
Proceedings of the Network and Distributed Security Symposium (NDSS 2002)
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
-
24
-
-
84937565289
-
Towards an Analysis of Onion Routing Security
-
Designing Privacy Enhancing Technologies
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Proceedings of the international workshop on Designing privacy enhancing technologies, pp. 96-114. Springer, New York (2001) (Pubitemid 33241789)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
25
-
-
0036896227
-
On choosing and bounding probability metrics
-
Gibbs, A., Su, F.: On choosing and bounding probability metrics. International Statistical Institute 70, 418-435 (2002)
-
(2002)
International Statistical Institute
, vol.70
, pp. 418-435
-
-
Gibbs, A.1
Su, F.2
|