Privacy-Enhancing Technologies for the Internet, II: Five Years Later
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[3] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[4] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[5] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[6] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[7] David M. Kristol,et al. HTTP State Management Mechanism , 1997, RFC.
[8] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[9] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[10] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[11] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[12] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[13] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[14] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[15] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[16] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[18] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[19] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[20] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[21] Sarah L. Nesbeitt. The Internet Archive Wayback Machine , 2002 .
[22] Axel Bruns. Stuff that matters: Slashdot and the emergence of open news , 2003 .
[23] Matt Ganis,et al. SOCKS Protocol Version 5 , 1996, RFC.
[24] David Burnham. Data protection , 1990 .
[25] David Mazières,et al. The design, implementation and operation of an email pseudonym server , 1998, CCS '98.
[26] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[27] R. Anderson. The Eternity Service , 1996 .
[28] Lorrie Faith Cranor,et al. Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.
[29] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .