The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Peter Palfrader,et al. Mixmaster protocol --- version 2 , 2000 .
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Destabilizing networks , 2002 .
[5] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] United Kingdom Parliament,et al. Regulation of Investigatory Powers Act 2000 , 2000, The United Kingdom's Legal Responses to Terrorism.
[8] Shishir Nagaraja,et al. The Topology of Covert Conflict , 2005, WEIS.
[9] Lada A. Adamic. Zipf, Power-laws, and Pareto-a ranking tutorial , 2000 .
[10] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.