Anonymity and privacy: a guide for the perplexed
暂无分享,去创建一个
[1] Joseph Y. Halpern,et al. Knowledge, probability, and adversaries , 1993, JACM.
[2] Samson Abramsky,et al. Domain theory , 1995, LICS 1995.
[3] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[4] John C. Mitchell,et al. Probabilistic Polynomial-Time Equivalence and Security Analysis , 1999, World Congress on Formal Methods.
[5] Benjamin C. Pierce,et al. Logical relations for encryption , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[6] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[7] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[8] Rocco De Nicola,et al. Proof Techniques for Cryptographic Processes , 2001, SIAM J. Comput..
[9] Joseph E. Stoy,et al. Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory , 1981 .
[10] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[11] Carl A. Gunter. Semantics of programming languages: structures and techniques , 1993, Choice Reviews Online.
[12] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[13] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[14] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[15] David A. Cooper,et al. Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[16] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[17] J. Hintikka. Knowledge and belief , 1962 .
[18] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[19] E. Hughes. A cypherpunk's manifesto , 1997 .
[20] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[21] Paul F. Syverson,et al. Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.
[22] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[23] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[24] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[25] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[26] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.