You are here

Bibliography

Export 13 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is pseudonym  [Clear All Filters]
2008
Zander S, Murdoch SJ. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of the 17th USENIX Security Symposium. Proceedings of the 17th USENIX Security Symposium. San Jose, CA, US: USENIX Association Berkeley, CA, USA; 2008. Available from: http://portal.acm.org/citation.cfm?id=1496726
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation Systems for Anonymous Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 202–218. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428272
2006
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
2005
Sassaman L, Cohen B, Mathewson N. The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Arlington, VA, USA: ACM New York, NY, USA; 2005. Available from: http://portal.acm.org/citation.cfm?id=1102199.1102201
2001
Stubblebine S, Syverson P. Authentic Attributes with Fine-Grained Anonymity Protection. In: Frankel Y Proceedings of Financial Cryptography (FC 2000). Proceedings of Financial Cryptography (FC 2000). Springer-Verlag, LNCS 1962; 2001. pp. 276–294. Available from: http://portal.acm.org/citation.cfm?id=728483
Clayton R, Danezis G, Kuhn MG. Real World Patterns of Failure in Anonymity Systems. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. pp. 230–244. Available from: http://portal.acm.org/citation.cfm?id=731864
Friedman E, Resnick P. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy [Internet]. 2001 ;10(2):173–199. Available from: http://www3.interscience.wiley.com/journal/119023370/abstract?CRETRY=1&SRETRY=0
Benes T. The Strong Eternity Service. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. Available from: http://portal.acm.org/citation.cfm?id=731726
2000
Rao JR, Rohatgi P. Can Pseudonymity Really Guarantee Privacy?. In: Proceedings of the 9th USENIX Security Symposium. Proceedings of the 9th USENIX Security Symposium. USENIX; 2000. pp. 85–96. Available from: http://portal.acm.org/citation.cfm?id=1251313
Goldberg I. A Pseudonymous Communications Infrastructure for the Internet. [Internet]. 2000 . Available from: http://portal.acm.org/citation.cfm?id=933285