메뉴 건너뛰기




Volumn 2357, Issue , 2003, Pages 253-268

Reliable mix cascade networks through reputation

Author keywords

Atnonymity; Communal randomness; Peer to peer; Reputation

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84957023357     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36504-4_18     Document Type: Conference Paper
Times cited : (34)

References (28)
  • 1
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable MIX with verification work independent of the number of MIX servers
    • Springer-Verlag
    • Masayuki Abe. Universally verifiable MIX with verification work independent of the number of MIX servers. In Advances in Cryptology - EUROCRYPT 1998, LNCS Vol. 1403. Springer-Verlag, 1998.
    • (1998) In Advances in Cryptology - EUROCRYPT 1998, LNCS Vol. 1403
    • Abe, M.1
  • 5
    • 0008157272 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.
    • (1982) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 10
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • A preliminary version appeared in Crypto '92
    • Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. Technical Report CS95-20, Weizmann Institute, 1995. A preliminary version appeared in Crypto '92, pp. 129-147.
    • (1995) Technical Report CS95-20, Weizmann Institute , pp. 129-147
    • Dwork, C.1    Naor, M.2
  • 11
    • 84958038323 scopus 로고    scopus 로고
    • Goldschlag and Stuart G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions
    • Springer-Verlag
    • David M. Goldschlag and Stuart G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. In Financial Cryptography, FC'98, LNCS Vol. 1465, pages 214-226. Springer-Verlag, 1998.
    • (1998) In Financial Cryptography, FC'98, LNCS Vol. 1465 , pp. 214-226
    • David, M.1
  • 22
    • 0035754862 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • In P. Samarati, editor, ACM Press, November
    • C. Andrew Neff. A verifiable secret shuffle and its application to e-voting. In P. Samarati, editor, 8th ACM Conference on Computer and Communications Security (CCS-8), pages 116-125. ACM Press, November 2001.
    • (2001) 8Th ACM Conference on Computer and Communications Security (CCS-8) , pp. 116-125
    • Andrew Neff, C.1
  • 27
    • 0031621739 scopus 로고    scopus 로고
    • Weakly secret bit commitment: Applications to lotteries and fair exchange
    • Rockport Massachusetts, June, IEEE CS Press
    • Paul Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. In Computer Security Foundations Workshop (CSFWll), pages 2-13, Rockport Massachusetts, June 1998. IEEE CS Press.
    • (1998) In Computer Security Foundations Workshop (Csfwll) , pp. 2-13
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.