An optimal strategy for anonymous communication protocols
暂无分享,去创建一个
Riccardo Bettati | Xinwen Fu | Yong Guan | Wei Zhao | Y. Guan | Wei Zhao | R. Bettati | Xinwen Fu
[1] Richard E. Newman,et al. Performance analysis of a method for high level prevention of traffic analysis , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[2] Riccardo Bettati,et al. Preventing traffic analysis for real-time communication networks , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).
[3] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[4] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[5] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[6] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[7] Riccardo Bettati,et al. A quantitative analysis of anonymous communications , 2004, IEEE Transactions on Reliability.
[8] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[9] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[10] Joos Vandewalle,et al. Solutions for anonymous communication on the Internet , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[11] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[12] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[13] Birgit Pfitzmann,et al. Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..
[14] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[15] Paul Syverson,et al. Onion routing access configurations , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[16] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[17] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[18] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[19] Richard E. Newman,et al. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network , 1994, Tenth Annual Computer Security Applications Conference.
[20] Richard E. Newman,et al. High level prevention of traffic analysis , 1991, Proceedings Seventh Annual Computer Security Applications Conference.
[21] Michael Waidner,et al. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.
[22] Russell C. H. Cheng. Generating beta variates with nonintegral shape parameters , 1978, CACM.
[23] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[24] Rob Kling,et al. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference , 1999, Inf. Soc..
[25] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[26] Riccardo Bettati,et al. IEEE TRANSACTIONS ON SYSTEMS , MAN , AND CYBERNETICS — PART A : SYSTEMS AND HUMANS , 2001 .
[27] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[28] Åke Björck,et al. Numerical Methods , 1995, Handbook of Marine Craft Hydrodynamics and Motion Control.
[29] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.