Ссылки на использованные материалы (2)
[161] Birgit Pfitzmann and Andreas Pfitzmann. How to break the direct RSA-
implementation of MIXes. In Jean-Jacques Quisquater and Joos Vande-
walle, editors, Advances in Cryptology EUROCRYPT '89, pages 373
381, Houthalen, Belgium, April 1990. Springer-Verlag, LNCS 434.
walle, editors, Advances in Cryptology EUROCRYPT '89, pages 373
381, Houthalen, Belgium, April 1990. Springer-Verlag, LNCS 434.
traffic analysis. In STOC '93: Proceedings of the twenty-fifth annual ACM
symposium on Theory of computing, pages 672681, New York, NY, USA,
1993. ACM.
symposium on Theory of computing, pages 672681, New York, NY, USA,
1993. ACM.
privacy? In Proceedings of the 9th USENIX Security Symposium, pages
8596. USENIX Association, August 2000.
8596. USENIX Association, August 2000.
sues, and open problems. In Hannes Federrath, editor, Designing Privacy
Enhancing Technologies: International Workshop on Design Issues in An-
onymity and Unobservability, pages 1029. Springer-Verlag, LNCS 2009,
July 2000.
Enhancing Technologies: International Workshop on Design Issues in An-
onymity and Unobservability, pages 1029. Springer-Verlag, LNCS 2009,
July 2000.
mous connections and onion routing. IEEE Journal on Selected Areas in
Communications, 16(4):482494, May 1998.
Communications, 16(4):482494, May 1998.
tions. ACM Transactions on Information and System Security (TISSEC),
1(1):6692, 1998.
1(1):6692, 1998.
and Peng Liu, editors, CCS 2004: Proceedings of the 11th ACM Confer-
ence on Computer and Communications Security, pages 227235. ACM
Press, October 2004.
ence on Computer and Communications Security, pages 227235. ACM
Press, October 2004.
peer based anonymous internet usage with collusion detection. In Sabrina
De Capitani di Vimercati and Pierangela Samarati, editors, Proceedings
of the ACM Workshop on Privacy in the Electronic Society, WPES 2002,
pages 91102. ACM Press, 2002.
De Capitani di Vimercati and Pierangela Samarati, editors, Proceedings
of the ACM Workshop on Privacy in the Electronic Society, WPES 2002,
pages 91102. ACM Press, 2002.
A secure method of pseudonymous mail retrieval. In Sabrina De Capitani
di Vimercati and Roger Dingledine, editors, WPES'05: Proceedings of the
2005 ACM Workshop on Privacy in the Electronic Society, pages 19.
ACM Press, October 2005.
di Vimercati and Roger Dingledine, editors, WPES'05: Proceedings of the
2005 ACM Workshop on Privacy in the Electronic Society, pages 19.
ACM Press, October 2005.
Druschel, M. Frans Kaashoek, and Antony I. T. Rowstron, editors, Peer-
To-Peer Systems: First International Workshop, IPTPS 2002, pages 111
120, Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
To-Peer Systems: First International Workshop, IPTPS 2002, pages 111
120, Cambridge, MA, USA, 2002. Springer-Verlag, LNCS 2429.
University of Cambridge, 2004.
metric for anonymity. In Roger Dingledine and Paul Syverson, editors,
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 4153, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
Privacy Enhancing Technologies: Second International Workshop, PET
2002, pages 4153, San Francisco, CA, USA, April 2002. Springer-Verlag,
LNCS 2482.
to a flood: Active attacks on several mix types. In Fabien A.P. Petitcolas,
editor, Information Hiding: 5th International Workshop, IH 2002, pages
3652. Springer-Verlag, LNCS 2578, 2002.
editor, Information Hiding: 5th International Workshop, IH 2002, pages
3652. Springer-Verlag, LNCS 2578, 2002.
based anonymity systems. In Einar Snekkenes and Dieter Gollmann, ed-
itors, Computer Security ESORICS 2003, 8th European Symposium on
Research in Computer Security, pages 141159, Gjшvik, Norway, October
2003. Springer-Verlag, LNCS 2808.
itors, Computer Security ESORICS 2003, 8th European Symposium on
Research in Computer Security, pages 141159, Gjшvik, Norway, October
2003. Springer-Verlag, LNCS 2808.
System Technical Journal, 27:379423 and 623656, July and October
1948.
1948.
tocol for scalable anonymous communication. In Proceedings, 2002 IEEE
Symposium on Security and Privacy, pages 5872, Berkeley, California,
USA, May 2002. IEEE Computer Society.
Symposium on Security and Privacy, pages 5872, Berkeley, California,
USA, May 2002. IEEE Computer Society.
fixing minx. In Nikita Borisov and Ian Goldberg, editors, Privacy Enhanc-
ing Technologies: Eighth International Symposium, PETS 2008, pages
99114. Springer-Verlag, LNCS 5134, July 2008.
ing Technologies: Eighth International Symposium, PETS 2008, pages
99114. Springer-Verlag, LNCS 5134, July 2008.
puter Security Foundations Workshop, CSFW-15, pages 119128, Cape
Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society.
Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society.
net News. http://siliconvalley.internet.com/news/article.php/
3531_926921, November 20 2001.
3531_926921, November 20 2001.
Padmanabhan, and Lili Qiu. Statistical identification of encrypted web
browsing traffic. In Proceedings, IEEE Symposium on Security and Pri-
vacy, pages 1930. IEEE Computer Society, 2002.
browsing traffic. In Proceedings, IEEE Symposium on Security and Pri-
vacy, pages 1930. IEEE Computer Society, 2002.
Workshop on Security Protocols. Springer-Verlag, LNCS, 2009. Forthcom-
ing.
ing.
access configurations. In Proceedings DARPA Information Survivability
Conference & Exposition, DISCEX'00, volume 1, pages 3440. IEEE CS
Press, 1999.
Conference & Exposition, DISCEX'00, volume 1, pages 3440. IEEE CS
Press, 1999.
an analysis of onion routing security. In Hannes Federrath, editor, Design-
ing Privacy Enhancing Technologies: International Workshop on Design
Issues in Anonymity and Unobservability, pages 96114. Springer-Verlag,
LNCS 2009, July 2000.
ing Privacy Enhancing Technologies: International Workshop on Design
Issues in Anonymity and Unobservability, pages 96114. Springer-Verlag,
LNCS 2009, July 2000.
connections and onion routing. In Proceedings, 1997 IEEE Symposium on
Security and Privacy, pages 4454. IEEE CS Press, May 1997.
Security and Privacy, pages 4454. IEEE CS Press, May 1997.
formalization of anonymity. In Jeannette M. Wing, Jim Woodcock, and
Jim Davies, editors, FM'99 Formal Methods, Vol. I, pages 814833.
Springer-Verlag, LNCS 1708, September 1999.
Jim Davies, editors, FM'99 Formal Methods, Vol. I, pages 814833.
Springer-Verlag, LNCS 1708, September 1999.
nism of morphmix. In George Danezis and Philippe Golle, editors, Privacy
Enhancing Technologies: 6th International Workshop, PET 2006, pages
368383. Springer-Verlag, LNCS 4258, 2006.
Enhancing Technologies: 6th International Workshop, PET 2006, pages
368383. Springer-Verlag, LNCS 4258, 2006.
ing. In NSPW '97: Proceedings of the 1997 workshop on New security
paradigms, pages 107116, New York, NY, USA, 1997. ACM.
paradigms, pages 107116, New York, NY, USA, 1997. ACM.
'99: Proceedings of the 1999 workshop on New security paradigms, pages
1324, New York, NY, USA, 2000. ACM.
1324, New York, NY, USA, 2000. ACM.
bauwhede. Perfect matching disclosure attacks. In Nikita Borisov and
Ian Goldberg, editors, Privacy Enhancing Technologies: Eighth Interna-
tional Symposium, PETS 2008, pages 223. Springer-Verlag, LNCS 5134,
July 2008.
Ian Goldberg, editors, Privacy Enhancing Technologies: Eighth Interna-
tional Symposium, PETS 2008, pages 223. Springer-Verlag, LNCS 5134,
July 2008.
of a method for high level prevention of traffic analysis using measurements
from a campus network. In Tenth Annual Computer Security Applications
Conference, pages 288297, Orlando, FL, December 1994. IEEE CS Press.
from a campus network. In Tenth Annual Computer Security Applications
Conference, pages 288297, Orlando, FL, December 1994. IEEE CS Press.
the disco — underconditional sender and recipient untraceability with
computationally secure serviceability. In Jean-Jacques Quisquater and
Joos Vandewalle, editors, Advances in Cryptology EUROCRYPT '89,
page 690. Springer-Verlag, LNCS 434, 1990.
computationally secure serviceability. In Jean-Jacques Quisquater and
Joos Vandewalle, editors, Advances in Cryptology EUROCRYPT '89,
page 690. Springer-Verlag, LNCS 434, 1990.
surveillance technology in the Peoples Republic of China. Montreal: In-
ternational Centre for Human Rights and Democratic Development, URL
(consulted 29 October 2001): http: // www. ichrdd. ca/ frame. iphtml ,
2001.
ternational Centre for Human Rights and Democratic Development, URL
(consulted 29 October 2001): http: // www. ichrdd. ca/ frame. iphtml ,
2001.
peer-to-peer voip calls on the internet. In Catherine Meadows and Paul
Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 8191. ACM Press,
November 2005.
Syverson, editors, CCS'05: Proceedings of the 12th ACM Conference
on Computer and Communications Security, pages 8191. ACM Press,
November 2005.
attack traffic through stepping stones by manipulation of interpacket de-
lays. In Vijay Atluri and Peng Liu, editors, CCS 2003: Proceedings of the
10th ACM Conference on Computer and Communications Security, pages
2029, Washington, DC, USA, 2003.
lays. In Vijay Atluri and Peng Liu, editors, CCS 2003: Proceedings of the
10th ACM Conference on Computer and Communications Security, pages
2029, Washington, DC, USA, 2003.
exit-polls". Technical Report T2002-24, Swedish Institute of Computer
Science, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2002.
Science, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2002.
T2003-05, Swedish Institute of Computer Science, SICS, Box 1263, SE-164
29 Kista, SWEDEN, 2003.
29 Kista, SWEDEN, 2003.
polls". Technical Report T2003-04, Swedish Institute of Computer Sci-
ence, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2003.
ence, SICS, Box 1263, SE-164 29 Kista, SWEDEN, 2003.
analysis of the degradation of anonymous protocols. In Network and
Distributed Security Symposium (NDSS '02), San Diego, California, 6-8
February 2002. Internet Society.
Distributed Security Symposium (NDSS '02), San Diego, California, 6-8
February 2002. Internet Society.
fending anonymous communication against passive logging attacks. In
Proceedings, 2003 IEEE Symposium on Security and Privacy, pages 28
Proceedings, 2003 IEEE Symposium on Security and Privacy, pages 28
- IEEE Computer Society, May 2003.
and David Martin, editors, Privacy Enhancing Technologies: 5th Inter-
national Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag,
LNCS 3856.
national Workshop, PET 2005, Cavtat Croatia, 2005. Springer-Verlag,
LNCS 3856.
On flow correlation attacks and countermeasures in mix networks. In
David Martin and Andrei Serjantov, editors, Privacy Enhancing Tech-
nologies: 4th International Workshop, PET 2004. Springer-Verlag, LNCS
3424, May 2005.
David Martin and Andrei Serjantov, editors, Privacy Enhancing Tech-
nologies: 4th International Workshop, PET 2004. Springer-Verlag, LNCS
3424, May 2005.
Назад[link1] | Оглавление[link2]
[link2] https://www.pgpru.com/biblioteka/statji/sac