Uncontrollable Privacy - The right that every attacker desires
暂无分享,去创建一个
[1] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[2] Ari Juels,et al. Parallel mixing , 2004, CCS '04.
[3] Bernhard Plattner,et al. Practical Anonymity for the Masses with MorphMix , 2004, Financial Cryptography.
[4] Stefanos Gritzalis,et al. Privacy Enhancing Technologies: A Review , 2003, EGOV.
[5] Stefanos Gritzalis,et al. Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..
[6] S. Gritzalis,et al. RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies , 2006, 2006 International Symposium on Communications and Information Technologies.
[7] Nicholas Hopper,et al. Selectively Traceable Anonymity , 2006, Privacy Enhancing Technologies.
[8] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[9] Philippe Golle,et al. Reputable Mix Networks , 2004, Privacy Enhancing Technologies.
[10] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[11] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[12] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[13] Dimitris Geneiatakis,et al. PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies , 2006, Communications and Multimedia Security.