-
2
-
-
84888999400
-
-
Anonymizer. http://www.anonymizer.com/.
-
Anonymizer
-
-
-
4
-
-
36048954205
-
Towards a theory of data entanglement
-
DOI 10.1016/j.tcs.2007.07.021, PII S0304397507005002
-
J. Aspnes, J. Feigenbaum, A. Yampolskiy, and S. Zhong. Towards a Theory of Data Entanglement. Theoretical Computer Science, 389(1-2):26-43, 2007. (Pubitemid 350089976)
-
(2007)
Theoretical Computer Science
, vol.389
, Issue.1-2
, pp. 26-43
-
-
Aspnes, J.1
Feigenbaum, J.2
Yampolskiy, A.3
Zhong, S.4
-
6
-
-
20444490057
-
Off-the-record communication, or, why not to use PGP
-
N. Borisov, I. Goldberg, and E. Brewer. Off-the-record communication, or, why not to use PGP. In Proc. of Workshop on Privacy in the Electronic Society, pages 77-84, 2004.
-
(2004)
Proc. of Workshop on Privacy in the Electronic Society
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
7
-
-
1642602228
-
Computationally Private Information Retrieval with Polylogarithmic Communication
-
C. Cachin, S. Micali, and M. Stadler. Computationally Private Information Retrieval with Polylogarithmic Communication. Lecture Notes in Computer Science, 1592, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
9
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
11
-
-
0036184272
-
Protecting Free Expression Online with Freenet
-
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley. Protecting Free Expression Online with Freenet. IEEE Internet Computing, 6(1):40-49, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Hong, T.W.2
Miller, S.G.3
Sandberg, O.4
Wiley, B.5
-
12
-
-
33645240198
-
The Free Haven Project: Distributed Anonymous Storage Service
-
R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. LNCS, 2009, 2001.
-
(2001)
LNCS
, vol.2009
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
14
-
-
85084161295
-
Infranet: Circumventing Web Censorship and Surveillance
-
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing Web Censorship and Surveillance. In Proc. of USENIX Security Symposium, 2002.
-
Proc. of USENIX Security Symposium, 2002
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
17
-
-
0005063385
-
Onion Routing
-
D. Goldschlag, M. Reed, and P. Syverson. Onion Routing. Commun. ACM, 42(2):39-41, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
19
-
-
76749083002
-
Networking Named Content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In Proc. CoNEXT, Dec. 2009.
-
Proc. CoNEXT, Dec. 2009
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
20
-
-
36949039907
-
A Data-Oriented (and beyond) Network Architecture
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and beyond) Network Architecture. In Proc. of SIGCOMM, 2007.
-
Proc. of SIGCOMM, 2007
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
21
-
-
84883261388
-
Replication Is Not Needed: Single Database, Computationally-private Information Retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication Is Not Needed: Single Database, Computationally-private Information Retrieval. In Proc. 38th IEEE FOCS, 1997.
-
Proc. 38th IEEE FOCS, 1997
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
25
-
-
0003064824
-
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
-
M. Naor and O. Reingold. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. Journal of Cryptology, 12(1):29-66, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
84866611744
-
Arguments for an Information-centric Internetworking Architecture
-
Apr.
-
D. Trossen, M. Särelä, and K. Sollins. Arguments for an Information-centric Internetworking Architecture. SIGCOMM CCR, 40, Apr. 2010.
-
(2010)
SIGCOMM CCR
, pp. 40
-
-
Trossen, D.1
Särelä, M.2
Sollins, K.3
-
30
-
-
80053046145
-
-
TrueCrypt. http://www.truecrypt.org/.
-
-
-
-
32
-
-
0035754863
-
Tangler: A censorship-resistant publishing system based on document entanglements
-
M. Waldman and D. Mazieres. Tangler: a censorship-resistant publishing system based on document entanglements. In Proc. of ACM CCS, pages 126-135, 2001.
-
(2001)
Proc. of ACM CCS
, pp. 126-135
-
-
Waldman, M.1
Mazieres, D.2
-
33
-
-
80053043726
-
-
Zero Knowledge Systems Freedom Network. http://www.zks.net/.
-
-
-
|