Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
- 24 October 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 245-257
- https://doi.org/10.1007/3-540-45496-9_18
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- A Length-Invariant Hybrid MixLecture Notes in Computer Science, 2000
- How to Break a Practical MIX and Design a New OneLecture Notes in Computer Science, 2000
- Flash mixingPublished by Association for Computing Machinery (ACM) ,1999
- Efficient Multiparty Computations Secure Against an Adaptive AdversaryLecture Notes in Computer Science, 1999
- Onion routingCommunications of the ACM, 1999
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptographyPublished by Association for Computing Machinery (ACM) ,1998
- A practical mixPublished by Springer Science and Business Media LLC ,1998
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981