-
1
-
-
84883875879
-
-
The anonymizer
-
The anonymizer. http://www. anonymizer. com.
-
-
-
-
2
-
-
84883864583
-
-
Anonymous remailer
-
Anonymous remailer. http:// www. lcs. mit. edu /research /anonymous. html.
-
-
-
-
3
-
-
0038419771
-
Hordes: A protocol for anonymous communication over the internet
-
B. N. L. C. Shields. Hordes: a protocol for anonymous communication over the internet. ACM Journal of Computer Security, 10-3, 2002.
-
(2002)
ACM Journal of Computer Security
, vol.10
, Issue.3
-
-
Shields, B.N.L.C.1
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24-2:84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0023861309
-
The dinning cryptographers problem: Unconditional sender and recipient untraceabilit
-
D. Chaum. The dinning cryptographers problem: Unconditional sender and recipient untraceabilit. Journal of Cryptology, 1/1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
84883863505
-
-
Pipenet 1. 1
-
W. Dai. Pipenet 1. 1. Http://www. eskimo. com /weidai /pipenet. txt.
-
-
-
Dai, W.1
-
7
-
-
84948946447
-
How to make personalized web browsing simple, secure, and anonymous
-
E. Gabber, P. Gibbons, Y. Matias, et al. How to make personalized web browsing simple, secure, and anonymous. Lecture Notes in Computer Science, 1318:17-31, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1318
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
-
9
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42-2:39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
12
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-A proposal for terminology
-
A. Pfitzmann and M. K?hntopp. Anonymity, unobservability, and pseudonymity-a proposal for terminology. Proc. Workshop on Design Issues in Anonymity and Unobservability. LNCS 2009, 99:1-9, 2001.
-
(2001)
Proc. Workshop on Design Issues in Anonymity and Unobservability. LNCS 2009
, vol.99
, pp. 1-9
-
-
Pfitzmann, A.1
Khntopp, M.2
-
14
-
-
0001777423
-
Anonymous web transactions with crowds
-
M. K. Reiter and A. D. Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32-38, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, M.K.1
Rubin, A.D.2
-
17
-
-
84961707899
-
Onion routing access configuration
-
Hilton Head, SC, IEEE CS Press
-
P. Syverson, M. Reed, and D. Goldschlag. Onion routing access configuration. DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, SC, IEEE CS Press, pages 34-40, 2000.
-
(2000)
DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 34-40
-
-
Syverson, P.1
Reed, M.2
Goldschlag, D.3
-
19
-
-
0011653195
-
Unconditional sender and recipient untraceability in spite of active attacks
-
April
-
M. Waidner. Unconditional sender and recipient untraceability in spite of active attacks. Eurocrypt89, (7), April 1989.
-
(1989)
Eurocrypt
, vol.89
, Issue.7
-
-
Waidner, M.1
-
20
-
-
84883890398
-
A anonymous communication protocol based on groups with definite route length
-
W. Wang, J. Chen, J. Wang, et al. A anonymous communication protocol based on groups with definite route length. Journal of computer research and development(In Chinese), 24(5):463-467, 2003.
-
(2003)
Journal of Computer Research and Development(In Chinese)
, vol.24
, Issue.5
, pp. 463-467
-
-
Wang, W.1
Chen, J.2
Wang, J.3
|