-
2
-
-
84984842401
-
Maintaining Security in the Presence of Transient Faults
-
LNCS, Springer-Verlag,
-
R. Canetti and A. Herzberg. “Maintaining Security in the Presence of Transient Faults”, Advances in Cryptology—CRYPTO’94, LNCS vol. 839, Springer-Verlag, 1994, pp. 425–438.
-
(1994)
Advances in Cryptology—CRYPTO’94
, vol.839
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
3
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”
-
D. Chaum. “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Communications of the ACM, vol. 24, no. 2, Feb. 1981, pages 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability”
-
D. Chaum. “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability”, Journal of Cryptology, vol. 1, no. 1, 1988, pages 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
7
-
-
0003317098
-
How to Make Personalized Web Browsing Simple, Secure, and Anonymous”
-
R. Hirschfeld (ed.), Springer-Verlag, LNCS
-
E. Gabber, P. Gibbons, Y. Matias, and A. Mayer. “How to Make Personalized Web Browsing Simple, Secure, and Anonymous”, in Financial Cryptography: FC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 17–31, 1998.
-
(1998)
Financial Cryptography: FC ‘97, Proceedings
, vol.1318
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
Mayer, A.4
-
8
-
-
54649083230
-
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web”
-
I. Goldberg and D. Wagner. “TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web”, First Monday, vol. 3 no. 4, April 1998.
-
(1998)
First Monday, Vol
, vol.4
, pp. 3
-
-
Goldberg, I.1
Wagner, D.2
-
9
-
-
84955557456
-
Hiding Routing Information”
-
R. Anderson, ed., LNCS, Springer-Verlag,
-
D. Goldschlag, M. Reed, P. Syverson. “Hiding Routing Information”, in Information Hiding, R. Anderson, ed., LNCS vol. 1174, Springer-Verlag, 1996, pp. 137–150.
-
(1996)
In InformaTion Hiding
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
10
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
February
-
D. Goldschlag, M. Reed, P. Syverson. “Onion Routing for Anonymous and Private Internet Connections,” Communications of the ACM, vol. 42, num. 2, February 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
14
-
-
0011702966
-
ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead
-
Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heidelberg
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner. “ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead”, GI/ITG Conference: Communication in Distributed Systems, Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heidelberg 1991, pp. 451-463.
-
(1991)
GI/ITG Conference: Communication in Distributed Systems
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
15
-
-
84957030837
-
Protocols using Anonymous Connections: Mobile Applications
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds., LNCS, Springer-, Verlag,
-
M. Reed, P. Syverson, and D. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: Fifth International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds., LNCS vol. 1361, Springer-Verlag, 1997, pp. 13–23.
-
(1997)
In Security Protocols: Fifth International Workshop
, vol.1361
, pp. 13-23
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
16
-
-
0032074579
-
Anonymous Connections and Onion Routing
-
May, A preliminary version of this paper appeared in [19].)
-
M. Reed, P. Syverson, and D. Goldschlag. “Anonymous Connections and Onion Routing”, IEEE Journal on Selected Areas in Communications, vol. 16 no. 4, May 1998, pp. 482–494. (A preliminary version of this paper appeared in [19].)
-
(1998)
IEEE Journal on Selected Areas in Communications,
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
17
-
-
0002054934
-
Crowds: Anonymity for Web Transactions
-
November, A preliminary version of this paper appeared in [18].)
-
M. Reiter and A. Rubin. “Crowds: Anonymity for Web Transactions”, ACM Transactions on Information System Security, vol. 1, no. 1, November 1998, pp. 66–92. (A preliminary version of this paper appeared in [18].)
-
(1998)
ACM TranSactions on Information System Security,
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
19
-
-
0030676973
-
Anonymous Connections and Onion Routing
-
Oakland, CA, IEEE CS Press, May
-
P. Syverson, D. Goldschlag, and M. Reed. “Anonymous Connections and Onion Routing”, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, IEEE CS Press, May 1997, pp. 44–54.
-
(1997)
In Proceedings of the IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
20
-
-
84961707899
-
Onion Routing Access Configurations
-
Hilton Head, SC, IEEE CS Press
-
P. Syverson, M. Reed, and D. Goldschlag. “Onion Routing Access Configurations”, in DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, SC, IEEE CS Press, January 2000, pp. 34–40.
-
(2000)
In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 34-40
-
-
Syverson, P.1
Reed, M.2
Goldschlag, D.3
-
21
-
-
69949120749
-
Unlinkable Serial Transactions”
-
R. Hirschfeld (ed.), Springer-Verlag, LNCS
-
P. Syverson, S. Stubblebine, and D. Goldschlag, “Unlinkable Serial Transactions”, in Financial Cryptography: FC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 39–55, 1998.
-
(1998)
Financial Cryptography: FC ‘97, Proceedings
, vol.1318
, pp. 39-55
-
-
Syverson, P.1
Stubblebine, S.2
Goldschlag, D.3
-
22
-
-
0023331864
-
Networks without User Observability”
-
A. Pfitzmann and M. Waidner, “Networks without User Observability”, Computers & Security, vol. 6 (1987), pp. 158–166.
-
(1987)
Computers & Security
, vol.6
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
|