You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Author is Chenxi Wang  [Clear All Filters]
2005
Perng G, Reiter MK, Wang C. Censorship Resistance Revisited. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 62–76. Available from: http://www.springerlink.com/content/f08707qw34614340/
2004
Perng G, Wang C, Reiter MK. Providing content-based services in a peer-to-peer environment. In: in Proceedings of the third International Workshop on Distributed Event-Based Systems (DEBS. in Proceedings of the third International Workshop on Distributed Event-Based Systems (DEBS. ; 2004. pp. 74–79. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.4393&rep=rep1&type=pdf
Levine BN, Reiter MK, Wang C, Wright M. Timing Attacks in Low-Latency Mix-Based Systems. In: Juels A Proceedings of Financial Cryptography (FC '04). Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110; 2004. pp. 251–265. Available from: http://www.springerlink.com/content/n4khdtwk7dqvj0u0/