-
1
-
-
84976845043
-
End-to-end arguments in system design
-
J.H. Saltzer, D.P. Reed, D.D. Clark: 'End-to-end arguments in system design' ACM Tocs 2, 1984, pp.277-288.
-
(1984)
ACM Tocs
, vol.2
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
2
-
-
4944253372
-
Protection in Mobile Communication
-
Addison-Wesely-Longmann
-
H. Fedderath: 'Protection in Mobile Communication', Multilateral Security in Communications, Addison-Wesely-Longmann 1999, pp. 349-364.
-
(1999)
Multilateral Security in Communications
, pp. 349-364
-
-
Fedderath, H.1
-
3
-
-
84958743343
-
Secure Location Information Management in Cellular Radio Systems
-
Long Island
-
D. Kesdogan, X. Fouletier: 'Secure Location Information Management in Cellular Radio Systems', IEEE Wireless Communication System Symposium 95, Proceedings, Long Island, 1995, pp.35-46.
-
(1995)
IEEE Wireless Communication System Symposium 95, Proceedings
, pp. 35-46
-
-
Kesdogan, D.1
Fouletier, X.2
-
4
-
-
84955605258
-
Mixes in mobile communication systems: Location management with privacy
-
Information Hiding, Proceedings, Springer Verlag
-
H. Federrath, A. Jerichow, A. Pfitzmann: 'Mixes in mobile communication systems: Location management with privacy', Information Hiding, Proceedings, Springer Verlag, LNCS 1174, 1996, pp.121-135.
-
(1996)
LNCS
, vol.1174
, pp. 121-135
-
-
Federrath, H.1
Jerichow, A.2
Pfitzmann, A.3
-
5
-
-
84950246822
-
-
Anonymizer, http://www.anonymizer.com/ 2000.
-
(2000)
-
-
-
6
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms
-
D. Chaum: 'Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms', Communications of the ACM, Vol. 24, No. 2, 1981, pp.-84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
84955557456
-
Hiding Routing Information
-
Information Hiding, Proceedings, Springer Verlag
-
D. Goldschlag, M. Reed, P. Syverson: 'Hiding Routing Information', Information Hiding, Proceedings, Springer Verlag, LNCS 1174, 1996, pp. 137-150.
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
8
-
-
84957030837
-
Protocols Using Anonymous Connections: Mobile Applications
-
Security Protocols, Proceedings, Springer Verlag
-
M. Reed, P. Syverson, D. Goldschlag: 'Protocols Using Anonymous Connections: Mobile Applications', Security Protocols, Proceedings, Springer Verlag, LNCS 1361, 1998, pp.13-23.
-
(1998)
LNCS
, vol.1361
, pp. 13-23
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
10
-
-
84948149704
-
Methods for Protecting a Mobile Agent's Route
-
Information Security, Proceedings, Springer Verlag
-
D. Westhoff, M. Schneider, C. Unger, F. Kaderali: 'Methods for Protecting a Mobile Agent's Route', Information Security, Proceedings, Springer Verlag, LNCS 1729, 1999, pp.57-71.
-
(1999)
LNCS
, vol.1729
, pp. 57-71
-
-
Westhoff, D.1
Schneider, M.2
Unger, C.3
Kaderali, F.4
-
11
-
-
0032631694
-
Virtual private networks: Joint resource allocation and routing design
-
D. Mitra, J.A. Morrison, K.G. Ramakrishnan: 'Virtual private networks: joint resource allocation and routing design', IEEE INFOCOM 99, 1999, pp.480-490.
-
(1999)
IEEE INFOCOM 99
, pp. 480-490
-
-
Mitra, D.1
Morrison, J.A.2
Ramakrishnan, K.G.3
-
17
-
-
0006810624
-
The Data Encryption Standard in Perspective
-
National Bureau of Standards Special Publication 500-27
-
R.M. Davis: 'The Data Encryption Standard in Perspective', Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publication 500-27, 1978.
-
(1978)
Computer Security and the Data Encryption Standard
-
-
Davis, R.M.1
-
19
-
-
0017018484
-
New Direction in Cryptography
-
W. Diffie, M.E. Hellmann: 'New Direction in Cryptography', IEEE Transactions on Information Theory, Vol. IT22, No 6, 1976, pp.644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellmann, M.E.2
|