Author:
Kesdogan Dogan,Egner Jan,Büschkes Roland
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. D.L. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Comm. ACM, Feb. 1981, Vol. 24, No. 2, pp. 84–88.
2. D.L. Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability”, J. Cryptology, Vol. 1, No. 1, Springer-Verlag, 1988, pp. 65–75.
3. D.A. Cooper and K.P. Birman, “Preserving Privacy in a Network of Mobile Computers”, 1995 Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1995, pp. 26–38.
4. W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22 (1976), pp. 644–654.
5. D.J. Farber and K.C. Larson, “Network Security Via Dynamic Process Renaming”, Fourth Data Communication Symp., Quebec City, Canada, Oct. 1975, pp. 8–18.
Cited by
93 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献