-
5
-
-
54049153176
-
Low-resource routing attacks against anonymous systems
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against anonymous systems. In The 2007 Workshop on Privacy in the Electronic Society, 2007.
-
(2007)
The 2007 Workshop on Privacy in the Electronic Society
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
6
-
-
4043050062
-
Keyprivacy in public-key encryption
-
B. A., D. A., and
-
M. Bellare, B. A., D. A., and D. Pointcheval. Keyprivacy in public-key encryption. In ASIACRYPT, 2001.
-
(2001)
ASIACRYPT
-
-
Bellare, M.1
Pointcheval, D.2
-
7
-
-
0002757750
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, 1996.
-
(1996)
CRYPTO
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
0001229355
-
A forward-secure digital signature scheme
-
M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO, 1999.
-
(1999)
CRYPTO
-
-
Bellare, M.1
Miner, S.2
-
9
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21(4), 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
-
-
Chaum, D.1
-
22
-
-
0012207557
-
Consistent, yet anonymous, web access with lpwa
-
E. Gabber, P. Gibbons, D. Kristol, Y. Matias, and A. Mayer. Consistent, yet anonymous, web access with lpwa. Communications of the ACM, 42(2), 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Gabber, E.1
Gibbons, P.2
Kristol, D.3
Matias, Y.4
Mayer, A.5
-
27
-
-
78149463621
-
Networking named content
-
V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard. Networking named content. The 5th international conference on Emerging networking experiments and technologies, 2009.
-
(2009)
The 5th international conference on Emerging networking experiments and technologies
-
-
Jacobson, V.1
Smetters, D.2
Thornton, J.3
Plass, M.4
Briggs, N.5
Braynard, R.6
-
28
-
-
78049392515
-
A data-oriented (and beyond) network architecture
-
T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, K. Kim, S. Shenker, and I. Stoica. A data-oriented (and beyond) network architecture. ACM SIGCOMM Computer Communication Review, 37(4):181-192, 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.4
, pp. 181-192
-
-
Koponen, T.1
Chawla, M.2
Chun, B.3
Ermolinskiy, A.4
Kim, K.5
Shenker, S.6
Stoica, I.7
-
29
-
-
80755187817
-
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
-
P. Mittal, A. Khurshid, J. Juen, M. Caesar, and N. Borisov. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In The 18th ACM Conference on Computer and communications security, 2011.
-
(2011)
The 18th ACM Conference on Computer and communications security
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
38
-
-
20444437836
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
Washington, DC, USA
-
M. Rennhard and B. Plattner. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In Workshop on Privacy in the Electronic Society, Washington, DC, USA, 2002.
-
(2002)
Workshop on Privacy in the Electronic Society
-
-
Rennhard, M.1
Plattner, B.2
-
43
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
M. Wright, M. Adler, B. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security (TISSEC), 7(4), 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.4
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
|