Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Lecture Notes in Computer Science;O. Berthold,2001
2. Lecture Notes in Computer Science;O. Berthold,2001
3. Boucher, P., Goldberg, I., Shostack, A.: Freedom system 2.0 architecture. Zero-Knowledge Sytems, Inc. (December 2000), http://www.freedom.net/info/whitepapers/
4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)
5. Danezis, G.: Statistical disclosure attacks. In: Sec 2003 (May 2003), http://www.cl.cam.ac.uk/~gd216/StatDisclosure.pdf
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering;Proceedings of the 38th Annual Computer Security Applications Conference;2022-12-05
3. References;Security in Vehicular Networks;2022-09-23
4. Quantifying unlinkability in multi-hop wireless networks;Computer Communications;2022-01
5. Fast hybrid-MixNet for security and privacy using NTRU algorithm;Journal of Information Security and Applications;2021-08