-
1
-
-
84956860489
-
-
Anonymizer, Inc
-
Anonymizer, Inc., http://www.anonymizer.com.
-
-
-
-
2
-
-
84949995981
-
An Efficient Probabilistic Public-Key Encryption Scheme which Hides All Partial Information
-
Springer-Verlag
-
M. Blum and S. Goldwasser, “An Efficient Probabilistic Public-Key Encryption Scheme which Hides All Partial Information,” Advances of Cryptology - CRYPTO '84 Proceedings, Springer-Verlag, pp. 289-299.
-
Advances of Cryptology - CRYPTO '84 Proceedings
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
4
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Feb
-
D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, v. 24, n. 2, Feb 1981, pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0022145479
-
Security without Identification: Card Computers to make Big Brother Obsolete
-
Oct
-
D. Chaum, “Security without Identification: Card Computers to make Big Brother Obsolete,” Communications of the ACM, v. 28, n. 10, Oct 1985, pp. 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
6
-
-
0002391080
-
Untraceable Electronic Cash
-
Springer-Verlag
-
D. Chaum, A. Fiat, and M. Naor, “Untraceable Electronic Cash,” Advances in Cryptology - CRYPTO ’88 Proceedings, Springer-Verlag, pp. 319-327.
-
Advances in Cryptology - CRYPTO ’88 Proceedings
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
8
-
-
0001494997
-
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
-
Autumn
-
D. Coppersmith, “Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities,” Journal of Cryptography, v. 10 n. 4, Autumn 1997, pp. 233-260.
-
(1997)
Journal of Cryptography
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
10
-
-
0032218230
-
“Communication-efficient anonymous group identification
-
November
-
A. De Santis, G. Di Crescenzo, G. Persiano, “Communication-efficient anonymous group identification,” 5th ACM Conference on Computer and Communications Security, November 1998, pp. 73-82.
-
(1998)
5Th ACM Conference on Computer and Communications Security
, pp. 73-82
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
-
12
-
-
0021409284
-
Probabilistic Encryption
-
Apr
-
S. Goldwasser and S. Micali, “Probabilistic Encryption,” Journal of Computer and Systems Sciences, v. 28 n. 2, Apr 1984, pp. 270-299.
-
(1984)
Journal of Computer and Systems Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
14
-
-
0023985175
-
Solving Simultaneous Modular Equations of Low Degree
-
Apr
-
J. Hastad, “Solving Simultaneous Modular Equations of Low Degree,” SIAM Journal on Computing, v. 17 no. 2, Apr 1988, pp. 336-341.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 336-341
-
-
Hastad, J.1
-
17
-
-
0003611111
-
Crowds: Anonymity for Web Transactions
-
Apr
-
M. Reiter and A. Rubin, “Crowds: Anonymity for Web Transactions” DIMACS Technical Report 97-15, Apr 1997.
-
(1997)
DIMACS Technical Report
, pp. 15-97
-
-
Reiter, M.1
Rubin, A.2
-
19
-
-
84956856161
-
-
The Wall Street Journal Online
-
The Wall Street Journal Online, http://www.wsj.com.
-
-
-
|