-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
Chaum, D. (1981) 'Untraceable electronic mail, return addresses, and digital pseudonyms', Communications of the ACM, Vol. 24, No. 2, February, pp.84-88. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
2
-
-
0023861309
-
Dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D. (1988) 'The dining cryptographers problem: unconditional sender and recipient untraceability', Journal of Cryptology, Vol. 1, pp.65-75. (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum David1
-
3
-
-
85084161366
-
Tor: The second-generation onion router
-
August, San Diego, CA
-
Dingledine, R., Mathewson, N. and Syverson, P. (2004) 'Tor: The second-generation onion router', Proceedings of the 13th USENIX Security Symposium, August, San Diego, CA, pp.303-320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
5
-
-
84957796461
-
Fingerprinting Websites Using Traffic Analysis
-
Privacy Enhancing Technologies
-
Hintz, A. (2003) 'Fingerprinting websites using traffic analysis', Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, ser. PET'02, Springer-Verlag, Berlin, Heidelberg, 2003, pp.171-178, [Online]. Available: http://portal.acm.org/citation.cfm?id=1765299. 1765312 (Pubitemid 36309887)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 171-178
-
-
Hintz, A.1
-
6
-
-
77951462266
-
Ap3: Cooperative, decentralized anonymous communication
-
ACM, New York, NY, USA, 2004
-
Mislove, A., Oberoi, G., Post, A., Reis, C., Druschel, P. and Wallach, D.S. (2004) 'Ap3: cooperative, decentralized anonymous communication', EW 11: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, ACM, New York, NY, USA, 2004, p.30.
-
(2004)
EW 11: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 30
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
7
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication systems
-
ACM, New York, NY, USA, 2008
-
Mittal, P. and Borisov, N. (2008) 'Information leaks in structured peer-to-peer anonymous communication systems', CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, 2008, pp.267-278.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 267-278
-
-
Mittal, P.1
Borisov, N.2
-
8
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
DOI 10.1145/1180405.1180409, 1180409, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Nambiar, A. and Wright, M. (2006) 'Salsa: a structured approach to large-scale anonymity', Proceedings of CCS 2006, October, Alexandria, VA, pp.17-26. (Pubitemid 47131352)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
9
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
June
-
Reiter, M. and Rubin, A. (1988) 'Crowds: anonymity for web transactions', ACM Transactions on Information and System Security, Vol. 1, No. 1, June, pp.66-92.
-
(1988)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
10
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York, NY, USA, 2009 [Online]
-
Ristenpart, T., Tromer, E., Shacham, H. and Savage, S. (2009) 'Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds', Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS '09, ACM, New York, NY, USA, 2009, pp.199-212, [Online]. Available: http://doi.acm.org/10.1145/1653662.1653687
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, Ser. CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
11
-
-
0035701330
-
Responder anonymity and anonymous peer-to-peer file sharing
-
IEEE Computer Society, Washington DC, USA [Online]
-
Shields, C. (2001) 'Responder anonymity and anonymous peer-to-peer file sharing', Proceedings of the Ninth International Conference on Network Protocols, IEEE Computer Society, Washington DC, USA, p.272, [Online]. Available: http://portal.acm.org/citation.cfm?id=876907.881583
-
(2001)
Proceedings of the Ninth International Conference on Network Protocols
, pp. 272
-
-
Shields, C.1
-
12
-
-
0030676973
-
Anonymous connections and onion routing
-
IEEE Computer Society, Washington DC, USA [Online]
-
Syverson, P.F., Goldschlag, D.M. and Reed, M.G. (1997) 'Anonymous connections and onion routing', Proceedings of the 1997 IEEE Symposium on Security and Privacy, ser. SP '97, IEEE Computer Society, Washington DC, USA, p.44, [Online]. Available: http://portal.acm.org/citation.cfm?id=882493.884368
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy, Ser. SP '97
, pp. 44
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
14
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
Boston, MA
-
Zhuang, L., Zhou, F., Zhao, B.Y. and Rowstron, A.I.T. (2005) 'Cashmere: Resilient anonymous routing', NSDI, Proceedings of 2nd Networked Systems Design and Implementation 2005, Boston, MA, pp.301-314.
-
(2005)
NSDI, Proceedings of 2nd Networked Systems Design and Implementation 2005
, pp. 301-314
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.I.T.4
|