You are here

Bibliography

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Author is Michael K. Reiter  [Clear All Filters]
2005
Perng G, Reiter MK, Wang C. Censorship Resistance Revisited. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 62–76. Available from: http://www.springerlink.com/content/f08707qw34614340/
2004
Reiter MK, Wang XF. Fragile Mixing. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Washington DC, USA: ACM Press; 2004. Available from: http://portal.acm.org/citation.cfm?id=1030114
Kissner L, Oprea A, Reiter MK, Song DX, Yang K. Private keyword-based push and pull with applications to anonymous communication. Applied Cryptography and Network Security [Internet]. 2004 . Available from: http://cat.inist.fr/?aModele=afficheN&cpsidt=15852065
Perng G, Wang C, Reiter MK. Providing content-based services in a peer-to-peer environment. In: in Proceedings of the third International Workshop on Distributed Event-Based Systems (DEBS. in Proceedings of the third International Workshop on Distributed Event-Based Systems (DEBS. ; 2004. pp. 74–79. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.4393&rep=rep1&type=pdf
Levine BN, Reiter MK, Wang C, Wright M. Timing Attacks in Low-Latency Mix-Based Systems. In: Juels A Proceedings of Financial Cryptography (FC '04). Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110; 2004. pp. 251–265. Available from: http://www.springerlink.com/content/n4khdtwk7dqvj0u0/
1998
Reiter MK, Rubin AD. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security [Internet]. 1998 ;1:66–92. Available from: http://avirubin.com/crowds.pdf