The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A quantitative comparison of graph-based models for Internet topology
IEEE/ACM Transactions on Networking (TON)
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
The Case for Cooperative Networking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Eluding carnivores: file sharing with strong anonymity
Proceedings of the 11th workshop on ACM SIGOPS European workshop
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Specification of a framework for the anonymous use of privileges
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Support for resilient Peer-to-Peer gaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anonymity analysis in credentials-based systems: A formal framework
Computer Standards & Interfaces
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Information and Computer Security
Acimn protocol: a protocol for anonymous communication in multi hop wireless networks
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Slotted packet counting attacks on anonymity protocols
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Anonymous Communication in Ubiquitous Computing Environments
Wireless Personal Communications: An International Journal
Resilient P2P anonymous routing by using redundancy
International Journal of High Performance Computing and Networking
A pairing based cryptographic anonymous authentication scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
"Super nodes" in Tor: existence and security implication
Proceedings of the 27th Annual Computer Security Applications Conference
Secure anonymous communication with conditional traceability
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Towards an analysis of source-rewriting anonymous systems in a lossy environment
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A random walk based anonymous peer-to-peer protocol design
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A new k-anonymous message transmission protocol
WISA'04 Proceedings of the 5th international conference on Information Security Applications
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
PPINA – a forensic investigation protocol for privacy enhancing technologies
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Anonymity and security in mobile ad hoc networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Performance modelling of anonymity protocols
Performance Evaluation
On the centrality of off-line e-cash to concrete partial information games
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
International Journal of Mobile Computing and Multimedia Communications
The dangers of composing anonymous channels
IH'12 Proceedings of the 14th international conference on Information Hiding
The design and implementation of the A3 application-aware anonymity platform
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |