The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Cryptographic defense against traffic analysis
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
PGP source code and internals
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Efficient Anonymous Multicast and Reception (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Crowds: Anonymity for Web Transactions
Crowds: Anonymity for Web Transactions
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Privacy Engineering for Digital Rights Management Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
k-anonymous message transmission
Proceedings of the 10th ACM conference on Computer and communications security
The pynchon gate: a secure method of pseudonymous mail retrieval
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Eluding carnivores: file sharing with strong anonymity
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A new k-anonymous message transmission protocol
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Adaptive semi-private email aliases
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |