You are here

Bibliography

Export 13 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is public key cryptography  [Clear All Filters]
2007
Adida B, Wikström D. How to Shuffle in Public. In: Proceedings of the Theory of Cryptography 2007. Proceedings of the Theory of Cryptography 2007. Springer Berlin / Heidelberg; 2007. Available from: http://www.springerlink.com/content/j6p730488x602r28/
Øverlier L, Syverson P. Improving Efficiency and Simplicity of Tor circuit establishment and hidden services. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://www.springerlink.com/content/j68v312681l8v874/
2006
Serjantov A, Defend B. Nonesuch: a mix network with sender unobservability. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). New York, NY, USA: ACM Press; 2006. pp. 1–8. Available from: http://portal.acm.org/citation.cfm?id=1179601.1179603
2003
Möller U, Cottrell L, Palfrader P, Sassaman L. Mixmaster Protocol –- Version 2. 2003 .
Camenisch J, Shoup V. Practical Verifiable Encryption and Decryption of Discrete Logarithms. In: Proceedings of CRYPTO 2003. Proceedings of CRYPTO 2003. Springer Verlag, LNCS 2729; 2003. pp. 126–144. Available from: http://www.springerlink.com/content/wjbh5579hdfd66ed/
Möller B. Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. In: Proceedings of CT-RSA 2003. Proceedings of CT-RSA 2003. Springer-Verlag, LNCS 2612; 2003. Available from: http://eprints.kfupm.edu.sa/59837/
Waters BR, Felten EW, Sahai A. Receiver Anonymity via Incomparable Public Keys. In: Atluri V, Liu P Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). ACM Press; 2003. pp. 112–121. Available from: http://portal.acm.org/citation.cfm?id=948127
Anon. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing [Internet]. 2003 ;2:52–64. Available from: http://portal.acm.org/citation.cfm?id=766655.766661#
2001
Jakobsson M, Juels A. An Optimally Robust Hybrid Mix Network (Extended Abstract). In: Proceedings of Principles of Distributed Computing - {PODC} '01. Proceedings of Principles of Distributed Computing - {PODC} '01. ACM Press; 2001. Available from: http://portal.acm.org/citation.cfm?id=383962.384046
1996
Ellison CM. Establishing identity without certification authorities. In: SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography. SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography. Berkeley, CA, USA: USENIX Association; 1996. pp. 7–7. Available from: http://portal.acm.org/citation.cfm?id=1267576#