메뉴 건너뛰기




Volumn 1174, Issue , 1996, Pages 137-150

Hiding routing information

Author keywords

[No Author keywords available]

Indexed keywords

HTTP; NETWORK ARCHITECTURE; NETWORK SECURITY;

EID: 84955557456     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61996-8_37     Document Type: Conference Paper
Times cited : (309)

References (12)
  • 1
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Feb
    • D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, v. 24, n. 2, Feb. 1981, pages 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 2
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Reciplent Untraceability
    • D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Reciplent Untraceability, Journal of Cryptology, 1/1, 1988, pages 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 4
    • 85037299547 scopus 로고
    • Principles, Protocols, and Architecture, Prentice-Hall, Engelwood Cliffs, New Jersey
    • D. E. Comer. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architecture, Prentice-Hall, Engelwood Cliffs, New Jersey, 1995.
    • (1995) Internetworking with TCP/IP , vol.1
    • Comer, D.E.1
  • 8
    • 0011702966 scopus 로고
    • ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead
    • Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg
    • A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, GI/ITG Conference: Communication in Distributed Systems, Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg 1991, pages 451-463.
    • (1991) GI/ITG Conference: Communication in Distributed Systems , pp. 451-463
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 0023331864 scopus 로고
    • Networks Without User Observability
    • A. Pfitzmann and M. Waidner. Networks Without User Observability, Computers Security, 6/2 1987, pages 158-166.
    • (1987) Computers Security , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 10
    • 33747419291 scopus 로고
    • Algorithms and Source Code in C, John Wiley and Sons
    • B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, John Wiley and Sons, 1994.
    • (1994) Applied Cryptography: Protocols
    • Schneier, B.1
  • 11
    • 0003428414 scopus 로고    scopus 로고
    • TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols, Addison-Wesley, Reading, Mass.
    • W. R. Stevens. TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols, Addison-Wesley, Reading, Mass., 1996.
    • (1996) TCP/IP Illustrated , vol.3
    • Stevens, W.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.