Author:
Diaz Claudia,Preneel Bart
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, B. Schneier (1997) The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption. World Wide Web Journal 2(3):241–257.
2. Anonymizer, http://www.anonymizer.com/
3. O. Berthold, H. Federrath, S. Kopsell (2000) Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 115–129. Springer-Verlag.
4. O. Berthold, A. Pfitzmann, R. Standtke (2000) The disadvantages of free MIX routes and how to overcome them. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 30–45. Springer-Verlag.
5. D. Boneh, M. Franklin (1999) An Efficient Public Key Traitor Tracing Scheme. In: Wiener M (ed.) Advances in Cryptology-CRYPTO’99, LNCS 1666, pp. 338–353. Springer-Verlag.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust;Cyber Security, Cryptology, and Machine Learning;2022
2. A-Tor: Accountable Anonymity in Tor;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018
3. Digital arbitration for trusted communication;Journal of Trust Management;2016-06-08
4. Privacy-preserving, user-centric VoIP CAPTCHA challenges;Information & Computer Security;2016-03-14
5. BackRef: Accountability in Anonymous Communication Networks;Applied Cryptography and Network Security;2014