Local anonymity in the internet
暂无分享,去创建一个
[1] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[2] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[3] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[4] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[5] Azer Bestavros,et al. Distributed packet rewriting and its application to scalable server architectures , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[6] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[7] Suresh C. Kothari,et al. Generalized Linear Threshold Scheme , 1985, CRYPTO.
[8] Todd A. Proebsting,et al. USC: A Universal Stub Compiler , 1994, SIGCOMM.
[9] Perry Metzger,et al. The ESP DES-CBC Transform , 1995, RFC.
[10] David C. Plummer,et al. Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware , 1982, RFC.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[14] Dogan Kesdogan,et al. Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.
[15] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[16] 조국현,et al. [서평]Internetworking with TCP/IP , 1996 .
[17] Dogan Kesdogan,et al. Analysis of Security and Privacy in Mobile-IP , 1996 .
[18] Bert den Boer,et al. Detection of Disrupters in the DC Protocol , 1990, EUROCRYPT.
[19] David R. Butenhof. Programming with POSIX threads , 1993 .
[20] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[21] T. J. Shepard,et al. TCP PACKET TRACE ANALYSIS , 1991 .
[22] Rafail Ostrovsky,et al. Efficient anonymous multicast and reception , 1997 .
[23] Ian Goldberg,et al. TAZ servers and the rewebber network , 1998 .
[24] Gia B. Lee. Addressing Anonymous Messages in Cyberspace , 1996, J. Comput. Mediat. Commun..
[25] Yossi Matias,et al. On secure and pseudonymous client-relationships with multiple servers , 1998, TSEC.
[26] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[27] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[28] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[29] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[30] Perry Metzger,et al. IP Authentication using Keyed MD5 , 1995, RFC.
[31] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[32] Jon Postel,et al. Assigned Numbers , 1979, RFC.
[33] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[34] Bil Lewis,et al. Multithreaded Programming With PThreads , 1997 .
[35] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1989, RFC.
[36] Michael Waidner,et al. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.
[37] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[38] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[39] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[40] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[41] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[42] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[43] Adi Shamir,et al. How to share a secret , 1979, CACM.
[44] Ieee Standards Board. Fiber optic active and passive star-based segments, type 10BASE-F (section 15-18) : IEEE standards for local and metropolitan area networks : supplement to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications , 1993 .