-
2
-
-
33745840780
-
Silent cascade: Enhancing location privacy without communication QoS degradation
-
Lecture Notes Computer Science (LNCS). Springer-Verlag: York, UK
-
Huang L, Matsuura K, Yamane H, Sezaki K. Silent cascade: Enhancing location privacy without communication QoS degradation. In Proceedings of the International Conference on Security in Pervasive Computing (SPC), vol.3934, Lecture Notes Computer Science (LNCS). Springer-Verlag: York, UK, 2006; 165-180.
-
(2006)
Proceedings of the International Conference on Security in Pervasive Computing (SPC)
, vol.3934
, pp. 165-180
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
3
-
-
26444589144
-
A scalar anonymous communication system
-
Lecture Notes Computer Science (LNCS). Springer-Verlag: Zhangjiajie, China
-
Xu H, Fu X, Zhu Y, Bettati R, Chen J, Zhao W. A scalar anonymous communication system. In Proceedings of the International Conference on Networking and Mobile Computing (ICCNMC), vol.3619, Lecture Notes Computer Science (LNCS). Springer-Verlag: Zhangjiajie, China, 2005; 452-461.
-
(2005)
Proceedings of the International Conference on Networking and Mobile Computing (ICCNMC)
, vol.3619
, pp. 452-461
-
-
Xu, H.1
Fu, X.2
Zhu, Y.3
Bettati, R.4
Chen, J.5
Zhao, W.6
-
4
-
-
51049117550
-
On performance bottleneck of anonymous communication networks
-
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), Miami, FL, April
-
Pries R, Yu W, Graham S, Fu X. On performance bottleneck of anonymous communication networks, Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), Miami, FL, April 2008; 1-11.
-
(2008)
, pp. 1-11
-
-
Pries, R.1
Yu, W.2
Graham, S.3
Fu, X.4
-
5
-
-
79951818797
-
Evaluating the QoS impact of Web service anonymity
-
Proceedings of the IEEE European Conference on Web Services (ECOWS), Ayia Napa, Cyprus, Dec.
-
Miede A, Lampe U, Schuller D, Eckert J, Steinmetz R. Evaluating the QoS impact of Web service anonymity, Proceedings of the IEEE European Conference on Web Services (ECOWS), Ayia Napa, Cyprus, Dec. 2010; 75-82.
-
(2010)
, pp. 75-82
-
-
Miede, A.1
Lampe, U.2
Schuller, D.3
Eckert, J.4
Steinmetz, R.5
-
6
-
-
50249106959
-
Preserving caller anonymity in voice-over-IP networks
-
Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, May
-
Srivatsa M, Liu L, Iyengar A. Preserving caller anonymity in voice-over-IP networks, Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, May 2008; 50-63.
-
(2008)
, pp. 50-63
-
-
Srivatsa, M.1
Liu, L.2
Iyengar, A.3
-
7
-
-
84911940243
-
-
Free Haven's anonymity bibliography [Accessed date: 19 April 2013].
-
Dingledine R. Free Haven's anonymity bibliography, 2009. Available at: www.freehaven.net/anonbib/ [Accessed date: 19 April 2013].
-
(2009)
-
-
Dingledine, R.1
-
8
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 1985; 28(10): 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
56349111434
-
The SPARTA pseudonym and authorization system
-
Bianchi G, Bonola M, Falletta V, Proto FS, Teofili S. The SPARTA pseudonym and authorization system. Science of Computer Programming 2008; 74(1-2): 23-33.
-
(2008)
Science of Computer Programming
, vol.74
, Issue.1-2
, pp. 23-33
-
-
Bianchi, G.1
Bonola, M.2
Falletta, V.3
Proto, F.S.4
Teofili, S.5
-
10
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
Springer-Verlag: London, UK
-
Levine BN, Reiter MK, Wang C, Wright M. Timing attacks in low-latency mix systems. In Proceedings of the International Conference on Financial Cryptography. Springer-Verlag: London, UK, 2004; 251-265.
-
(2004)
Proceedings of the International Conference on Financial Cryptography
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
11
-
-
27544454707
-
Low-cost traffic analysis of Tor
-
Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA
-
Murdoch Steven J, Danezis George. Low-cost traffic analysis of Tor, Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, 2005; 183-195.
-
(2005)
, pp. 183-195
-
-
Murdoch Steven, J.1
Danezis, G.2
-
12
-
-
38149140661
-
Low-resource routing attacks against anonymous systems
-
Technicl Report, University of Colorado
-
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-resource routing attacks against anonymous systems. Technicl Report, University of Colorado, 2007.
-
(2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
13
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2): 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
14
-
-
78649989557
-
A terminology for talking about privacy by data minimization: Anonymity
-
unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 [Accessed date: 19 April 2013].
-
Pfitzmann A, Hansen M. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010. v0.34. Available at: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf [Accessed date: 19 April 2013].
-
(2010)
-
-
Pfitzmann, A.1
Hansen, M.2
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
Proceedings of the USENIX Security Symposium, Berkeley, CA
-
Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router, Proceedings of the USENIX Security Symposium, Berkeley, CA, 2004; 21-21.
-
(2004)
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
14544273666
-
The predecessor attack: an analysis of a threat to anonymous communications systems
-
Wrigh MK, Adler M, Levine B, Shields C. The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security 2004; 7(4): 489-522.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 489-522
-
-
Wrigh, M.K.1
Adler, M.2
Levine, B.3
Shields, C.4
-
20
-
-
84911936992
-
Crowds revisited: practically effective predecessor attack
-
Proceedings of the Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland
-
Panchenko A, Pimenidis L. Crowds revisited: practically effective predecessor attack, Proceedings of the Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 2007; 1-6.
-
(2007)
, pp. 1-6
-
-
Panchenko, A.1
Pimenidis, L.2
-
21
-
-
0038729392
-
An analysis of forwarding mechanism in Crowds
-
Proceedings of the International Conference on Communication (ICC), Anchorage, AK, May
-
Sui H, Wang J, Chen J, Chen S. An analysis of forwarding mechanism in Crowds, Proceedings of the International Conference on Communication (ICC), Anchorage, AK, May 2003; 261-265.
-
(2003)
, pp. 261-265
-
-
Sui, H.1
Wang, J.2
Chen, J.3
Chen, S.4
-
22
-
-
27544436703
-
BT-Crowds: Crowds-style anonymity with bluetooth and Java
-
Proceedings of the IEEE Annual Hawaii International Conference On System Sciences (HICSS)
-
Vaha-Sipila A, Virtanen T. BT-Crowds: Crowds-style anonymity with bluetooth and Java, Proceedings of the IEEE Annual Hawaii International Conference On System Sciences (HICSS), 2005; 1-11.
-
(2005)
, pp. 1-11
-
-
Vaha-Sipila, A.1
Virtanen, T.2
-
23
-
-
84911915324
-
Wireless Crowds based on NTRU
-
Technical Report, Iowa State University
-
Xu G. Wireless Crowds based on NTRU. Technical Report, Iowa State University, 2001.
-
(2001)
-
-
Xu, G.1
-
24
-
-
50249107905
-
VIPER: a vehicle-to-infrastructure communication privacy enforcementprotocol
-
Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS), Pisa, Italy
-
Cencioni P, Piertro R.D. VIPER: a vehicle-to-infrastructure communication privacy enforcementprotocol, Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS), Pisa, Italy, 2007; 1-6.
-
(2007)
, pp. 1-6
-
-
Cencioni, P.1
Piertro, R.2
-
25
-
-
76049114679
-
Private location-based information retrieval through user collaboration
-
[Accessed date: 19 April 2013].
-
Rebollo-Monedero D, Forné J, Solanas A, Martínez-Ballesté T. Private location-based information retrieval through user collaboration. Computer Communications 2010; 33(6): 762-774. Available at: http://dx.doi.org/10.1016/j.comcom.2009.11.024 [Accessed date: 19 April 2013].
-
(2010)
Computer Communications
, vol.33
, Issue.6
, pp. 762-774
-
-
Rebollo-Monedero, D.1
Forné, J.2
Solanas, A.3
Martínez-Ballesté, T.4
-
26
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1988; 1(1): 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
29
-
-
84957800033
-
Towards measuring anonymity
-
Lecture Notes Computer Science (LNCS). Springer-Verlag: Berlin, Germany, April
-
Díaz C, Seys S, Claessens J, Preneel B. Towards measuring anonymity. In Proceedings of the international conference on Privacy enhancing technologies (PET), vol.2482, Lecture Notes Computer Science (LNCS). Springer-Verlag: Berlin, Germany, April 2002; 54-68.
-
(2002)
Proceedings of the international conference on Privacy enhancing technologies (PET)
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
30
-
-
84874801689
-
On the measurement of privacy as an attacker's estimation error
-
Rebollo-Monedero D, Parra-Arnau J, Diaz C, Forné J. On the measurement of privacy as an attacker's estimation error. International Journal of Information Security 2013; 12(2): 129-149.
-
(2013)
International Journal of Information Security
, vol.12
, Issue.2
, pp. 129-149
-
-
Rebollo-Monedero, D.1
Parra-Arnau, J.2
Diaz, C.3
Forné, J.4
-
31
-
-
84868100937
-
Measuring anonymity by profiling probability distributions
-
Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communication (TRUSTCOM), Liverpool, UK, Jun.
-
Bagai R, Jiang N. Measuring anonymity by profiling probability distributions, Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communication (TRUSTCOM), Liverpool, UK, Jun. 2012; 366-374.
-
(2012)
, pp. 366-374
-
-
Bagai, R.1
Jiang, N.2
-
32
-
-
0031618385
-
On finding multi-constrained paths
-
Atlanta, GA, Jun.
-
Chen S, Nahrstedt K. On finding multi-constrained paths, Proceedings of the International Conference on Communication (ICC), Atlanta, GA, Jun. 1998; 874-879.
-
(1998)
Proceedings of the International Conference on Communication (ICC)
, pp. 874-879
-
-
Chen, S.1
Nahrstedt, K.2
|