The architecture of robust publishing systems
暂无分享,去创建一个
[1] Madhu Sudan,et al. Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..
[2] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Paul F. Syverson,et al. Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[5] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[6] John Beidler,et al. Data Structures and Algorithms , 1996, Wiley Encyclopedia of Computer Science and Engineering.
[7] R. Anderson. The Eternity Service , 1996 .
[8] Andrew V. Goldberg,et al. Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[9] Nathaniel S. Borenstein,et al. MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.
[10] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Robert Ellis Smith,et al. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .
[13] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[14] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .
[15] Andrew V. Goldberg,et al. A prototype implementation of archival Intermemory , 1999, DL '99.
[16] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[17] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[18] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[19] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[20] James F. Doyle,et al. Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.
[21] David A. Wagner,et al. TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web , 1998, First Monday.
[22] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[23] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[24] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[25] Andreas Rieke,et al. Securing the anonymity of content providers in the World Wide Web , 1999, Electronic Imaging.
[26] Andy Oram,et al. Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.