A Conceptual Model for Mobility in Anonymity Mechanisms
暂无分享,去创建一个
[1] Pekka Savola,et al. RFC 3041 Considered Harmful , 2004 .
[2] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[3] Günter Müller,et al. Benutzbare Sicherheit — Der Identitätsmanager als universelles Sicherheitswerkzeug , 2001 .
[4] Otto Spaniol,et al. Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet) , 2001, Informationstechnik Tech. Inform..
[5] Daniela Gerd tom Markotten,et al. Usability meets security - the Identity-Manager as your personal security assistant for the Internet , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[6] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[7] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[8] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[9] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[10] Dogan Kesdogan,et al. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.
[11] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[12] Kai Rannenberg,et al. Sicherheit, insbesondere mehrseitige IT-Sicherheit , 1996, Informationstechnik Tech. Inform..
[13] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.