BackRef: Accountability in Anonymous Communication Networks
暂无分享,去创建一个
Jeremy Clark | Peter Druschel | Aniket Kate | Michael Backes | Milivoj Simeonovski | P. Druschel | Jeremy Clark | M. Backes | Aniket Kate | Milivoj Simeonovski
[1] Ian Goldberg,et al. Using Sphinx to Improve Onion Routing Circuit Construction , 2010, Financial Cryptography.
[2] George Danezis,et al. How to Bypass Two Anonymity Revocation Schemes , 2008, Privacy Enhancing Technologies.
[3] Hannes Federrath,et al. Revocable Anonymity , 2006, Emerging Trends in Information and Communication Security.
[4] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[5] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[6] George Danezis,et al. Sphinx: A Compact and Provably Secure Mix Format , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Ian Goldberg,et al. Formalizing Anonymous Blacklisting Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[8] Aniket Kate,et al. Ace: an efficient key-exchange protocol for onion routing , 2012, WPES '12.
[9] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[10] Jan Camenisch,et al. A Formal Treatment of Onion Routing , 2005, CRYPTO.
[11] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[12] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[13] David Wolinsky,et al. Proactively Accountable Anonymous Messaging in Verdict , 2012, USENIX Security Symposium.
[14] Andreas Haeberlen,et al. Fighting Cybercrime with Packet Attestation , 2011 .
[15] Sean W. Smith,et al. Nymble: Anonymous IP-Address Blocking , 2007, Privacy Enhancing Technologies.
[16] Sabrina De Capitani di Vimercati,et al. Guest Editorial: Special Issue on Computer and Communications Security , 2008, TSEC.
[17] Peter Palfrader,et al. Mixmaster protocol --- version 2 , 2000 .
[18] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[19] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[20] Tanja Lange,et al. High-Speed High-Security Signatures , 2011, CHES.
[21] Nicholas Hopper,et al. Breaking and Provably Fixing Minx , 2008, Privacy Enhancing Technologies.
[22] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[23] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[24] Ian Goldberg,et al. Pairing-Based Onion Routing with Improved Forward Secrecy , 2010, TSEC.
[25] Tom Chothia,et al. Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus , 2006, FORTE.
[26] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[27] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[28] Günter Müller. Emerging Trends in Information and Communication Security , 2006, Lecture Notes in Computer Science.
[29] Ian Goldberg,et al. Anonymity and one-way authentication in key exchange protocols , 2012, Designs, Codes and Cryptography.
[30] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[31] Nicholas Hopper,et al. Selectively Traceable Anonymity , 2006, Privacy Enhancing Technologies.
[32] Bart Preneel,et al. Accountable Anonymous Communication , 2007, Security, Privacy, and Trust in Modern Data Management.
[33] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[34] Paul F. Syverson,et al. Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services , 2007, Privacy Enhancing Technologies.
[35] Carmela Troncoso,et al. Drac: An Architecture for Anonymous Low-Volume Communications , 2010, Privacy Enhancing Technologies.
[36] Allan Clark,et al. Semantic-Based Development of Service-Oriented Systems , 2006, FORTE.
[37] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[38] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[39] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[40] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[41] Philippe Golle,et al. Reputable Mix Networks , 2004, Privacy Enhancing Technologies.
[42] Bryan Ford,et al. Dissent: accountable anonymous group messaging , 2010, CCS '10.
[43] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[44] Rosario Gennaro,et al. Certificateless onion routing , 2009, CCS.
[45] David Wolinsky,et al. Dissent in Numbers: Making Strong Anonymity Scale , 2012, OSDI.
[46] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.