You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is anonymity service  [Clear All Filters]
2008
Wang W, Motani M, Srinivasan V. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
2002
Berthold O, Langos H. Dummy Traffic Against Long Term Intersection Attacks. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/66ybualwu5hmh563/
2001
Benes T. The Strong Eternity Service. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. Available from: http://portal.acm.org/citation.cfm?id=731726
1999
Syverson P, Stubblebine S. Group Principals and the Formalization of Anonymity. In: Proceedings of the World Congress on Formal Methods (1). Proceedings of the World Congress on Formal Methods (1). ; 1999. pp. 814–833. Available from: http://portal.acm.org/citation.cfm?id=730472