Asymmetric DCnets for Effective and Efficient Sender Anonymity
暂无分享,去创建一个
[1] Nickolai Zeldovich,et al. Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.
[2] Srinivas Devadas,et al. Riffle: An Efficient Communication System With Strong Anonymity , 2016, Proc. Priv. Enhancing Technol..
[3] Pascal Felber,et al. Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering , 2017, IEEE Transactions on Dependable and Secure Computing.
[4] Kurt Rothermel,et al. Dynamic Publish/Subscribe to Meet Subscriber-Defined Delay and Bandwidth Constraints , 2010, Euro-Par.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Alexander L. Wolf,et al. Security issues and requirements for Internet-scale publish-subscribe systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[7] Max Mühlhäuser,et al. Cover Traffic: A Trade of Anonymity and Efficiency , 2017, STM.
[8] George Danezis,et al. Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Ari Juels,et al. Dining Cryptographers Revisited , 2004, EUROCRYPT.
[11] Refik Molva,et al. Privacy-Preserving Content-Based Publish/Subscribe Networks , 2009, SEC.
[12] Carmela Troncoso,et al. You cannot hide for long: de-anonymization of real-world dynamic behaviour , 2013, WPES.
[13] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[14] Bryan Ford,et al. Dissent: accountable anonymous group messaging , 2010, CCS '10.
[15] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[16] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[17] Max Mühlhäuser,et al. AnonPubSub: Anonymous publish-subscribe overlays , 2016, Comput. Commun..
[18] Carmela Troncoso,et al. Perfect Matching Disclosure Attacks , 2008, Privacy Enhancing Technologies.
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[20] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[21] Emin Gün Sirer,et al. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .
[22] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[23] Max Mühlhäuser,et al. Introducing asymmetric DC-Nets , 2014, 2014 IEEE Conference on Communications and Network Security.
[24] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[25] Dan Boneh,et al. Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.
[26] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[27] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[28] Miguel Castro,et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure , 2001, Networked Group Communication.
[29] Elisa Bertino,et al. Privacy Preserving Context Aware Publish Subscribe Systems , 2013, NSS.