Buses for Anonymous Message Delivery
暂无分享,去创建一个
[1] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[2] David Peleg,et al. Bubbles: adaptive routing scheme for high-speed dynamic networks , 1995, STOC '95.
[3] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[4] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Joseph Cheriyan,et al. Approximating minimum-size k-connected spanning subgraphs via matching , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[7] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[8] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[9] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[10] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Daniel R. Simon,et al. Cryptographic defense against traffic analysis , 1993, STOC.
[12] Birgit Pfitzmann,et al. The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract) , 1990, EUROCRYPT.
[13] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[14] Richard J. Lipton,et al. Random walks, universal traversal sequences, and the complexity of maze problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[15] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[16] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[17] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[18] Rafail Ostrovsky,et al. Xor-trees for efficient anonymous multicast and reception , 2000, TSEC.
[19] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[20] Andreas Pfitzmann. How to implement ISDNs without user observability---Someremarks , 1987, SGSC.