-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Adam Back, Ulf Moller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding, pages 245-257, 2001.
-
(2001)
Information Hiding
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
2
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Hannes Federrath, editor, volume 2009 of Lecture Notes in Computer Science, Berkeley, CA, USA, July, Springer-Verlag, Berlin Germany
-
Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes in Computer Science, pages 115-129, Berkeley, CA, USA, July 2000. Springer-Verlag, Berlin Germany.
-
(2000)
Designing Privacy Enhancing Technologies
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
3
-
-
84957796121
-
-
In Information Hiding. 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April, Proceedings, ISBN: 3540427333, LNCS 2137, Springer, Berlin, 2001
-
O. Berthold, S. Clauß, S. Köpsell, and A. Pfitzmann. Efficiency improvements of the private message service. In Information Hiding. 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, ISBN: 3540427333, LNCS 2137, Springer, Berlin, 2001.
-
(2001)
Efficiency improvements of the private message service
, pp. 25-27
-
-
Berthold, O.1
Clauß, S.2
Köpsell, S.3
Pfitzmann, A.4
-
4
-
-
0019532104
-
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
-
February
-
David L. Chaum. Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms. Communications of the ACM, 24(2), February 1981. Also availabel at http://world.std.com/~franl/crypto/chaum-acm-1981.html.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.L.1
-
5
-
-
0003062028
-
-
Advances in Cryptology - CRYPTO '83, International Association for Cryptologic Research, North-Holland/Elsevier
-
David L. Chaum. Blind signature systems. Advances in Cryptology - CRYPTO '83, International Association for Cryptologic Research, North-Holland/Elsevier, 1983.
-
(1983)
Blind signature systems
-
-
Chaum, D.L.1
-
6
-
-
0029237418
-
Preserving privacy in a network of mobile computers
-
May
-
David A. Cooper and Kenneth Birman. Preserving privacy in a network of mobile computers. In IEEE Symposium on Security and Privacy, pages 26-38, May 1995. Also available at http://cs-tr.cs.cornell.edu/Dienst/UI/1.0/Display/ncstrl.cornell/TR95-1/%490.
-
(1995)
IEEE Symposium on Security and Privacy
, pp. 26-38
-
-
Cooper, D.A.1
Birman, K.2
-
7
-
-
84890010554
-
Stop-and-Go-MIXes providing probabilistic anonymity in an open system
-
D. Kesdogan, J. Egner, and R. Bueschkes. Stop-and-Go-MIXes providing probabilistic anonymity in an open system. Lecture Notes in Computer Science, 1525: 83-98, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Bueschkes, R.3
|