Funder
Sichuan Science and Technology Program
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Greene, D., & Rodriguez, K. (2014). Nsa mass surveillance programs: Unnecessary and disproportionate. Electronic Frontier Foundation.
2. Rusbridger, A. (2013). The snowden leaks and the public. The New York Review of Books.
3. Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90. https://doi.org/10.1145/358549.358563
4. Chaum, D. (1988). The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of cryptology, 1(1), 65–75. https://doi.org/10.1007/BF00206326
5. Jiang, P., Wang, Q., Wu, Y., & Wang, C. (2023). Poster: Metadata-private messaging without coordination. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 3615–3617. https://doi.org/10.1145/3576915.3624385.