You are here

Bibliography

Export 3 results:
Author Title Type [ Year(Asc)]
Filters: Author is Xiaolan Zhang  [Clear All Filters]
2008
Wang W, Motani M, Srinivasan V. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Tsang PP, Au MH, Kapadia A, Smith S. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 333–345. Available from: http://portal.acm.org/citation.cfm?id=1455813