-
1
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Comm. ACM, Feb. 1981, Vol. 24, No. 2, pp. 84-88.
-
(1981)
Comm. ACM, Feb
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
2
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
Springer-Verlag
-
D. L. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", J. Cryptology, Vol. 1, No. 1, Springer-Verlag, 1988, pp. 65-75.
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.L.1
-
3
-
-
0029237418
-
Preserving Privacy in a Network of Mobile Computers
-
IEEE Computer Society Press, Los Alamitos
-
D. A. Cooper and K. P. Birman, "Preserving Privacy in a Network of Mobile Computers", 1995 Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1995, pp. 26-38.
-
(1995)
1995 Symposium on Research in Security and Privacy
, pp. 26-38
-
-
Cooper, D.A.1
Birman, K.P.2
-
5
-
-
0016867208
-
Network Security Via Dynamic Process Renaming
-
Quebec City, Canada, Oct
-
D. J. Farber and K. C. Larson, "Network Security Via Dynamic Process Renaming", Fourth Data Communication Symp., Quebec City, Canada, Oct. 1975, pp. 8-18.
-
(1975)
Fourth Data Communication Symp
, pp. 8-18
-
-
Farber, D.J.1
Larson, K.C.2
-
6
-
-
0008875233
-
Analysis of Security and Privacy in Mobile IP
-
Nashville
-
A. Fasbender, D. Kesdogan, and O. Kubitz, "Analysis of Security and Privacy in Mobile IP", 4th International Conference on Telecommunication Systems, Modelling and Analysis, Nashville, 1996.
-
(1996)
4th International Conference on Telecommunication Systems, Modelling and Analysis
-
-
Fasbender, A.1
Kesdogan, D.2
Kubitz, O.3
-
7
-
-
0029705080
-
Variable and Scalable Security: Protection of Location Information in Mobile IP
-
Atlanta
-
A. Fasbender, D. Kesdogan, and O. Kubitz, "Variable and Scalable Security: Protection of Location Information in Mobile IP", VTC'96, Atlanta, 1996.
-
(1996)
VTC'96
-
-
Fasbender, A.1
Kesdogan, D.2
Kubitz, O.3
-
8
-
-
0030709854
-
Minimizing the Average Cost of Paging on the Air Interface-An Approach Considering Privacy
-
May, Phoenix, Arizona
-
H. Federrath, A. Jerichow, D. Kesdogan, A. Pfitzmann, and D. Trossen, "Minimizing the Average Cost of Paging on the Air Interface-An Approach Considering Privacy", IEEE VTC' 97, May 1997, Phoenix, Arizona.
-
(1997)
IEEE VTC' 97
-
-
Federrath, H.1
Jerichow, A.2
Kesdogan, D.3
Pfitzmann, A.4
Trossen, D.5
-
10
-
-
84955557456
-
Hiding Routing Information
-
Springer-Verlag LNCS
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Hiding Routing Information", Information Hiding, Springer-Verlag LNCS 1174, 1996, pp. 137-150.
-
(1996)
Information Hiding
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
11
-
-
85031542311
-
Mixing Email with Babel
-
San Diego, IEEE Comput. Soc. Press
-
C. Gülcü and G. Tsudik, "Mixing Email with Babel", Proc. Symposium on Network and Distributed System Security, San Diego, IEEE Comput. Soc. Press, 1996, pp. 2-16.
-
(1996)
Proc. Symposium on Network and Distributed System Security
, pp. 2-16
-
-
Gülcü, C.1
Tsudik, G.2
-
12
-
-
84957925226
-
Secure Location Management in UMTS
-
Germany, September, Chapman & Hall, ISBN 0-412-79780-1
-
S. Hoff, K. Jakobs, and D. Kesdogan, "Secure Location Management in UMTS", Communications and Multimedia Security, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, September 1996, Chapman & Hall, ISBN 0-412-79780-1.
-
(1996)
Communications and Multimedia Security, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen
-
-
Hoff, S.1
Jakobs, K.2
Kesdogan, D.3
-
13
-
-
0343023009
-
Location Management Strategies increasing Privacy in Mobile Communication Systems
-
May
-
D. Kesdogan, H. Federrath, A. Jerichow, and A. Pfitzmann, "Location Management Strategies increasing Privacy in Mobile Communication Systems", IFIP SEC 96, 12th International Information Security Conference, May 1996, pp. 3948.
-
(1996)
IFIP SEC 96, 12th International Information Security Conference
-
-
Kesdogan, D.1
Federrath, H.2
Jerichow, A.3
Pfitzmann, A.4
-
14
-
-
84958743343
-
Secure Location Information Management in Cellular Radio Systems
-
New York
-
D. Kesdogan and X. Fouletier, "Secure Location Information Management in Cellular Radio Systems", IEEE Wireless Communication Systems Symposium WCSS 95, Wireless Trends in 21st Century", New York, 1995, pp. 35-40.
-
(1995)
IEEE Wireless Communication Systems Symposium WCSS 95, Wireless Trends in 21st Century
, pp. 35-40
-
-
Kesdogan, D.1
Fouletier, X.2
-
16
-
-
4243995024
-
-
Master Thesis, MIT, Laboratory for Computer Science, Report MIT/LCS/TR-179
-
P. A. Karger, "Non-Discretionary Access Control for decentralized Computing Systems", Master Thesis, MIT, Laboratory for Computer Science, Report MIT/LCS/TR-179, 1977.
-
(1977)
Non-Discretionary Access Control for decentralized Computing Systems
-
-
Karger, P.A.1
-
18
-
-
0023331864
-
Networks without User Observability
-
A. Pfitzmann and M. Waidner, "Networks without User Observability", Computers & Security 6, 1987, pp. 158-166.
-
(1987)
Computers & Security
, vol.6
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
19
-
-
0003056522
-
ISDN-MIXes: Untraceable Communication wit Very Small Bandwidth Overhead
-
Brighton, UK, 15-17 May, D, T. Lindsay, W. L. Price (eds.), North-Holland, Amsterdam 1991
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner, "ISDN-MIXes: Untraceable Communication wit Very Small Bandwidth Overhead", Information Security, Proc. IFIP/SEC 91, Brighton, UK, 15-17 May 1991, D, T. Lindsay, W. L. Price (eds.), North-Holland, Amsterdam 1991, pp. 245-258.
-
(1991)
Information Security, Proc. IFIP/SEC 91
, pp. 245-258
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
21
-
-
84957925228
-
-
Workshop on Security Protocols, Paris, France, April 1997
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Protocols using Anonymous Connections: Mobile Applications", 1997 Workshop on Security Protocols, Paris, France, April 1997.
-
(1997)
Protocols using Anonymous Connections: Mobile Applications
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
23
-
-
0017930809
-
-
Communications of the ACM
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, 21 (1978), pp. 96-99.
-
(1978)
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
, vol.21
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|