Author:
Kesdogan Dogan,Pimenidis Lexi
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Lecture Notes in Computer Science;O. Berthold,2001
2. Cooper, D.A., Birman, K.P.: Preserving privacy in a network of mobile computers. In: 1995 IEEE Symposium on Research in Security and Privacy, pp. 26–38. IEEE, Los Alamitos (1995)
3. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: 36th IEEE Conference on the Foundations of Computer Science, pp. 41–50. IEEE Computer Society Press, Los Alamitos (1995)
4. Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
5. Chaum, D.L.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology (1), 65–75 (1988)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Traffic Analysis by Adversaries with Partial Visibility;Lecture Notes in Computer Science;2024
2. Smart Noise Detection for Statistical Disclosure Attacks;Secure IT Systems;2023-11-08
3. Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29
4. Website Fingerprinting with Website Oracles;Proceedings on Privacy Enhancing Technologies;2020-01-01
5. What's a Little Leakage Between Friends?;Proceedings of the 2018 Workshop on Privacy in the Electronic Society;2018-01-15