Privacy Enhancing Technologies
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[2] Poorvi L. Vora,et al. Towards a theory of variable privacy , 2003 .
[3] Birgit Pfitzmann,et al. Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.
[4] Ari Juels,et al. Targeted Advertising ... And Privacy Too , 2001, CT-RSA.
[5] R. Sokal,et al. Principles of numerical taxonomy , 1965 .
[6] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Kazue Sako,et al. Fault tolerant anonymous channel , 1997, ICICS.
[8] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.
[9] Markus Jakobsson,et al. Flash mixing , 1999, PODC '99.
[10] Markus Jakobsson,et al. A Practical Mix , 1998, EUROCRYPT.
[11] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Masayuki Abe,et al. Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers , 1998, EUROCRYPT.
[13] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[14] Patrick Horster,et al. Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme , 1996, ASIACRYPT.
[15] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[16] Kazue Sako,et al. An Efficient Scheme for Proving a Shuffle , 2001, CRYPTO.
[17] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[18] Alex Pentland,et al. Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[19] Kaoru Kurosawa,et al. Attack for Flash MIX , 2000, ASIACRYPT.
[20] Masayuki Abe,et al. Remarks on Mix-Network Based on Permutation Networks , 2001, Public Key Cryptography.
[21] Alice J. O'Toole,et al. Connectionist models of face processing: A survey , 1994, Pattern Recognit..
[22] Alice J. O'Toole,et al. CATEGORIZATION AND IDENTIFICATION OF HUMAN FACE IMAGES BY NEURAL NETWORKS: A REVIEW OF THE LINEAR AUTOASSOCIATIVE AND PRINCIPAL COMPONENT APPROACHES , 1994 .
[23] Yvo Desmedt,et al. How to Break a Practical MIX and Design a New One , 2000, EUROCRYPT.
[24] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[25] Masayuki Abe,et al. A Length-Invariant Hybrid Mix , 2000, ASIACRYPT.
[26] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[27] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[28] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[29] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.