Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The disadvantages of free MIX routes and how to overcome them
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Web MIXes: a system for anonymous and unobservable Internet access
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Priced Oblivious Transfer: How to Sell Digital Goods
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Selective Receipt in Certified E-mail
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
CoSMo: An Approach Towards Conceptual Security Modeling
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Practical Anonymity for the Masses with Mix-Networks
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Towards Pseudonymous e-Commerce
Electronic Commerce Research
The cost of becoming anonymous: on the participant payload in crowds
Information Processing Letters
Analysis of an incentives-based secrets protection system
Proceedings of the 4th ACM workshop on Digital rights management
Proceedings of the 11th ACM conference on Computer and communications security
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Anonymity, accountability & John Doe
Proceedings of the 1st annual conference on Information security curriculum development
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Time-space tradeoffs for implementations of snapshots
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
Salsa: a structured approach to large-scale anonymity
Proceedings of the 13th ACM conference on Computer and communications security
Passive-Logging Attacks Against Anonymous Communications Systems
ACM Transactions on Information and System Security (TISSEC)
A mechanism to enforce privacy in vehicle-to-infrastructure communication
Computer Communications
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Universally Composable Adaptive Priced Oblivious Transfer
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
A conceptual framework for specification, analysis, and design of anonymity services
Proceedings of the 2009 EDBT/ICDT Workshops
Toward a software development methodology for anonymity applications
Proceedings of the 2010 EDBT/ICDT Workshops
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Proceedings of the 18th ACM conference on Computer and communications security
Economic incentives for protecting digital rights online
Electronic Commerce Research and Applications
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
What can be implemented anonymously?
DISC'05 Proceedings of the 19th international conference on Distributed Computing
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
Understanding new anonymity networks from a user's perspective
Proceedings of the 2012 ACM conference on Computer and communications security
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
The design and implementation of the A3 application-aware anonymity platform
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |