You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Author is Richard Clayton  [Clear All Filters]
2006
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/
2003
Clayton R. Improving Onion Notation. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 81–87. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965
2002
Clayton R, Danezis G. Chaffinch: Confidentiality in the Face of Legal Threats. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://portal.acm.org/citation.cfm?id=647598.732024
2001
Clayton R, Danezis G, Kuhn MG. Real World Patterns of Failure in Anonymity Systems. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. pp. 230–244. Available from: http://portal.acm.org/citation.cfm?id=731864