-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Pittsburgh, PA, USA
-
A. Backm U. M̈oller and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proceedings of Information Hiding Work-shop (IH'01), pp. 245-257, Pittsburgh, PA, USA, 2001.
-
(2001)
Proceedings of Information Hiding Work-shop (IH'01)
, pp. 245-257
-
-
Backm, A.1
M̈oller, U.2
Stiglic, A.3
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Communications of ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
6
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Washington, DC, USA
-
M. J. Freedman and R. Morris, "Tarzan: A peer-to-peer anonymizing network layer," in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), pp. 193-206, Washington, DC, USA, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
7
-
-
85031542311
-
Mixing e-mail with babel
-
San Diego, CA, USA
-
C. G̈ulc̈u and G. Tsudik, "Mixing e-mail with babel," in Proceedings of the Network and Distributed Security Symposium, pp. 2-16, San Diego, CA, USA, 1996.
-
(1996)
Proceedings of the Network and Distributed Security Symposium
, pp. 2-16
-
-
G̈ulc̈u, C.1
Tsudik, G.2
-
8
-
-
84890010554
-
Stop-andgo mixes: Providing probabilistic anonymity in an open system
-
Portland, OR, USA
-
D. Kesdogan, J. Egner, and R. B̈uschkes, "Stop-andgo mixes: Providing probabilistic anonymity in an open system," in Proceedings of Information Hiding Workshop (IH'98), pp. 83-98, Portland, OR, USA, 1998.
-
(1998)
Proceedings of Information Hiding Workshop (IH'98)
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
B̈uschkes, R.3
-
9
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
Key West, FL, USA
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright, "Timing attacks in low-latency mix-based systems," in Proceedings of Financial Cryptography, pp. 251-265, Key West, FL, USA, 2004.
-
(2004)
Proceedings of Financial Cryptography
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
10
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
M. Reiter and A. Rubin, "Crowds: anonymity for Web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
11
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
Noordwijkerhout, The Netherlands
-
A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several mix types," in Proceedings of Information Hiding Workshop (IH'02), pp. 36-52, Noordwijkerhout, The Netherlands, 2002.
-
(2002)
Proceedings of Information Hiding Workshop (IH'02)
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
12
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Gjøvik, Norway
-
A. Serjantov and P. Sewell, "Passive attack analysis for connection-based anonymity systems," in Proceedings of 8th European Symposium on Research in Computer Security, pp. 116-131, Gjøvik, Norway, 2003.
-
(2003)
Proceedings of 8th European Symposium on Research in Computer Security
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
13
-
-
0036086129
-
Statistical identification of encrypted Web browsing traffic
-
Oakland, CA, USA
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical identification of encrypted Web browsing traffic," in IEEE Symposium on Security and Privacy, pp. 19-30, Oakland, CA, USA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
14
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, CA, USA
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed, "Anonymous connections and onion routing," in IEEE Symposium on Security and Privacy, pp. 44-54, Oakland, CA, USA, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
15
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Toronto, Canada
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Privacy Enhancing Technologies workshop (PET'04), pp. 207-225, Toronto, Canada, 2004.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop (PET'04)
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|