暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[2] Ida Sofie Gebhardt Stenerud,et al. When Reality Comes Knocking Norwegian Experiences with Verifiable Electronic Voting , 2012, Electronic Voting.
[3] Josh Benaloh. Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.
[4] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Andrei Serjantov,et al. Nonesuch: a mix network with sender unobservability , 2006, WPES '06.
[6] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[8] Robert Tappan Morris,et al. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.
[9] Nicholas Hopper,et al. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation , 2011, NDSS.
[10] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[11] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Ülle Madise,et al. E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.
[14] Urs Gasser,et al. Three Case Studies from Switzerland : E-Voting , 2009 .
[15] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.