-
2
-
-
84957085257
-
An Efficient Public Key Traitor Tracing Scheme
-
M. Wiener (ed.), Springer- Verlag, LNCS
-
Dan Boneh and Matthew Franklin. “An Efficient Public Key Traitor Tracing Scheme”, in Advances in Cryptology - CRYPTO’99, M. Wiener (ed.), Springer- Verlag, LNCS vol. 1666, pp. 338-353, 1999.
-
(1999)
Advances in Cryptology - CRYPTO’99
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0022145479
-
Security without Identification: Transaction Systems to Make Big Brother Obsolete
-
(28,10), October
-
David Chaum “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, CACM (28,10), October 1985, pp. 1030-1044.
-
(1985)
CACM
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
84944343461
-
-
CyberGold
-
CyberGold. www.cybergold.com
-
-
-
-
9
-
-
84944343462
-
-
DoubleClick
-
DoubleClick. www.doubleclick.com
-
-
-
-
11
-
-
3142747919
-
Auditable Metering with Lightweight Security
-
R. Hirschfeld (ed.)Springer-Verlag, LNCS
-
Matthew K. Eranklin and Dahlia Malkhi. “Auditable Metering with Lightweight Security”, in Financial Cryptography: FC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 151-160, 1998.
-
(1998)
Financial Cryptography: FC ‘97, Proceedings
, vol.1318
, pp. 151-160
-
-
Eranklin, M.K.1
Malkhi, D.2
-
12
-
-
84944343464
-
-
Free PC
-
Free PC. www.free-pc.com
-
-
-
-
13
-
-
0012207557
-
Consistent, Yet Anonymous, Web Access with LPWA
-
February
-
Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, and Alain Mayer. “Consistent, Yet Anonymous, Web Access with LPWA”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 42-47.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.B.2
Kristol, D.M.3
Matias, Y.4
Mayer, A.5
-
14
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connection
-
February, (More information and further publications at
-
David Goldschlag, Michael Reed and Paul Syverson. “Onion Routing for Anonymous and Private Internet Connection”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 39-41. (More information and further publications at www.onion-router.net)
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
15
-
-
84957649548
-
Identity Escrow
-
H. Krawczyk (ed.), Springer-Verlag, LNCS
-
Joe Kilian and Erez Petrank. “Identity Escrow”, in Advances in Cryptology— CRYPTO’98, H. Krawczyk (ed.), Springer-Verlag, LNCS vol. 1462, pp. 169-185, 1998.
-
(1998)
Advances in Cryptology— CRYPTO’98
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
17
-
-
84944343466
-
Big Brother, Big ‘Fun’ at Amazon
-
Aug. 25
-
Declan McCullagh. “Big Brother, Big ‘Fun’ at Amazon”, Wired News, Aug. 25, www.wired.com/news/news/business/story/21417.html
-
Wired News
-
-
McCullagh, D.1
-
18
-
-
0032218236
-
The Design, Implementation and Operation of an Email Pseudonym Server
-
ACM Press, November
-
David Mazieres and M. Frans Kaashoek. “The Design, Implementation and Operation of an Email Pseudonym Server”, in CCS’98 - 5th ACM Conference on Computer and Communications Security, ACM Press, pp. 27-36, November 1998.
-
(1998)
CCS’98 - 5Th ACM Conference on Computer and Communications Security
, pp. 27-36
-
-
Mazieres, D.1
Frans Kaashoek, M.2
-
19
-
-
84944343467
-
-
NetZero.www.netzero.com
-
-
-
-
21
-
-
84944343469
-
-
Passport from Microsoft
-
Passport from Microsoft, www.passport.com.
-
-
-
-
23
-
-
84957030837
-
Protocols using Anonymous Connections: Mobile Applications
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.)Springer-Verlag, LNCS
-
Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: 5th Inter International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.), Springer-Verlag, LNCS vol. 1361, pp. 13-23, 1997.
-
(1997)
Security Protocols: 5Th Inter International Workshop
, vol.1361
, pp. 13-23
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
24
-
-
0029210673
-
Recent-Secure Authentication: Enforcing Revocation in Distributed Systems
-
IEEE CS Press, May
-
Stuart Stubblebine. “Recent-Secure Authentication: Enforcing Revocation in Distributed Systems” in Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE CS Press, pp. 224-234, May 1995.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 224-234
-
-
Stubblebine, S.1
-
25
-
-
0005072366
-
Unlinkable Serial Transactions: Protocols and Applications
-
A preliminary version of this paper appears in [26]
-
Stuart G. Stubblebine, Paul F. Syverson, and David M. Goldschlag. “Unlinkable Serial Transactions: Protocols and Applications”, ACM Transaction on Information and Systems Security, Vol. 2, No 4, 1999. A preliminary version of this paper appears in [26].
-
(1999)
ACM Transaction on Information and Systems Security
, vol.2
, Issue.4
-
-
Stubblebine, S.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
26
-
-
69949120749
-
Unlinkable Serial Transactions
-
R. Hirschfeld (ed.), Springer-Verlag, LNCS
-
Paul F. Syverson, Stuart G. Stubblebine, and David M. Goldschlag. “Unlinkable Serial Transactions”, in Financial Cryptography: PC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 39-55, 1998.
-
(1998)
Financial Cryptography: PC ‘97, Proceedings
, vol.1318
, pp. 39-55
-
-
Syverson, P.F.1
Stubblebine, S.G.2
Goldschlag, D.M.3
-
27
-
-
84924758404
-
Group Principals and the Formalization of Anonymity
-
J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS
-
Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99 - Formal Methods, Vol. 1, J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp. 814-833, 1999.
-
(1999)
FM’99 - Formal Methods
, vol.1708
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
28
-
-
85084160265
-
Building Intrusion Tolerant Applications
-
The USENIX Association, August
-
Thomas Wu, Michael Malkin, and Dan Boneh. “Building Intrusion Tolerant Applications”, in Proceedings of the Eighth USENIX Security Symposium (Security’99), The USENIX Association, pp. 79-91, August 1999.
-
(1999)
Proceedings of the Eighth USENIX Security Symposium (Security’99)
-
-
Thomas, W.1
Malkin, M.2
Boneh, D.3
-
29
-
-
84944343471
-
-
Zero-Knowledge Systems
-
Zero-Knowledge Systems, www.zeroknowledge.com
-
-
-
|