Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols
暂无分享,去创建一个
[1] Artur Czumaj,et al. Delayed path coupling and generating random permutations via distributed stochastic processes , 1999, SODA '99.
[2] Dogan Kesdogan,et al. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.
[3] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[5] Paul F. Syverson,et al. Private Web Browsing , 1997, J. Comput. Secur..
[6] Hannes Federrath,et al. Anonymity and Unobservability in the Internet , 1999 .
[7] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[8] Daniel R. Simon,et al. Cryptographic defense against traffic analysis , 1993, STOC.
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Noga Alon. Testing subgraphs in large graphs , 2002, Random Struct. Algorithms.
[11] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[12] Robert Tappan Morris,et al. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.
[13] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[14] Amos Fiat,et al. Provable Unlinkability against Traffic Analysis , 2004, Financial Cryptography.
[15] Marek Klonowski,et al. Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! , 2004, ISC.