Unlinkable Communication
暂无分享,去创建一个
Thomas Engel | Ulrich K. Sorger | Eugen Staab | Volker Fusenig | T. Engel | U. Sorger | Eugen Staab | Volker Fusenig
[1] Thomas Engel,et al. Acimn protocol: A protocol for anonymous communication in multi hop wireless networks , 2007, 2007 Wireless Telecommunications Symposium.
[2] Hannes Federrath,et al. Revocable Anonymity , 2006, Emerging Trends in Information and Communication Security.
[3] Bernd Meyer,et al. Attacking Unlinkability: The Importance of Context , 2007, Privacy Enhancing Technologies.
[4] Stefan Köpsell,et al. Modelling Unlinkability , 2003, Privacy Enhancing Technologies.
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[7] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[8] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[9] Thomas Engel,et al. Acimn: A protocol for Anonymous Communication In Multi hop wireless networks , 2008, AISC.
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[12] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[13] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[14] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.