You are here

Bibliography

Export 19 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is mix  [Clear All Filters]
2008
Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect Matching Statistical Disclosure Attacks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 2–23. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
2007
Diaz C, Troncoso C, Danezis G. Does additional information always reduce anonymity?. In: Yu T Proceedings of the Workshop on Privacy in the Electronic Society 2007. Proceedings of the Workshop on Privacy in the Electronic Society 2007. Alexandria,VA,USA: ACM New York, NY, USA; 2007. pp. 72–75. Available from: http://portal.acm.org/citation.cfm?id=1314333.1314347
2005
Borisov N. An Analysis of Parallel Mixing with Attacker-Controlled Inputs. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 12–25. Available from: http://www.springerlink.com/content/b0t0714165846m42/
O'Connor L. On Blending Attacks For Mixes with Memory. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 39–52. Available from: http://www.springerlink.com/index/y78350424h77u578.pdf
Danezis G, Clulow J. Compulsion Resistant Anonymous Communications. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 11–25. Available from: http://www.springerlink.com/content/74461772r675l828/
2004
Reiter MK, Wang XF. Fragile Mixing. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Washington DC, USA: ACM Press; 2004. Available from: http://portal.acm.org/citation.cfm?id=1030114
Köpsell S, Hilling U. How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA: ACM New York, NY, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029179.1029197
Diaz C, Preneel B. Taxonomy of Mixes and Dummy Traffic. In: Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems. Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems. Toulouse, France; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.9855
2003
Serjantov A, Newman RE. On the Anonymity of Timed Pool Mixes. In: Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems. Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems. Athens, Greece: Kluwer; 2003. pp. 427–434. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5699
Diaz C, Serjantov A. Generalising Mixes. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 18–31. Available from: http://www.springerlink.com/content/jvuk0exyqxvcyhvy/
Agrawal D, Kesdogan D, Penz S. Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2003. pp. 16–27. Available from: http://portal.acm.org/citation.cfm?id=829515.830557
2002
Danezis G. Forward Secure Mixes. In: Fisher-Hubner J Proceedings of 7th Nordic Workshop on Secure IT Systems. Proceedings of 7th Nordic Workshop on Secure IT Systems. Karlstad, Sweden; 2002. pp. 195–207. Available from: http://citeseer.ist.psu.edu/533725.html
Kesdogan D, Agrawal D, Penz S. Limits of Anonymity in Open Environments. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://portal.acm.org/citation.cfm?id=731881
2001
Jakobsson M, Juels A. An Optimally Robust Hybrid Mix Network (Extended Abstract). In: Proceedings of Principles of Distributed Computing - {PODC} '01. Proceedings of Principles of Distributed Computing - {PODC} '01. ACM Press; 2001. Available from: http://portal.acm.org/citation.cfm?id=383962.384046
2000
Desmedt Y, Kurosawa K. How To Break a Practical MIX and Design a New One. In: Proceedings of EUROCRYPT 2000. Proceedings of EUROCRYPT 2000. Springer-Verlag, LNCS 1803; 2000. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1814
Ohkubo M, Abe M. A Length-Invariant Hybrid MIX. In: Proceedings of ASIACRYPT 2000. Proceedings of ASIACRYPT 2000. Springer-Verlag, LNCS 1976; 2000. Available from: http://portal.acm.org/citation.cfm?id=647096.716874
1998
Abe M. Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers. In: Proceedings of EUROCRYPT 1998. Proceedings of EUROCRYPT 1998. Springer-Verlag, LNCS 1403; 1998. Available from: http://www.springerlink.com/content/hl8838u4l9354544/
1985
Pfitzmann A, Waidner M. Networks Without User Observability – Design Options. In: Proceedings of EUROCRYPT 1985. Proceedings of EUROCRYPT 1985. Linz, Austria: Springer-Verlag New York, Inc.; 1985. Available from: http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html