Hiding Routing Information
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. How to Break the Direct RSA-Implementation of Mixes , 1990, EUROCRYPT.
[2] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[3] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[4] W. Richard Stevens. TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocolls , 1996 .
[5] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[6] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[7] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[8] Andreas Pfitzmann,et al. Networks without user observability , 1987, Comput. Secur..
[9] Lincoln Stein. How to Set Up and Maintain a World Wide Web Site: The Guide for Information Providers , 1995 .
[10] J. Spragins. TCP/IP illustrated, volume 3: TCP for transactions, HTTP, NNTP and the UNIX Domain protocols , 1996, IEEE Network.