Anonymity protocols as noisy channels
Top Cited Papers
- 1 February 2008
- journal article
- conference paper
- Published by Elsevier in Information and Computation
- Vol. 206 (2-4) , 378-401
- https://doi.org/10.1016/j.ic.2007.07.003
Abstract
No abstract availableThis publication has 23 references indexed in Scilit:
- Probable innocence revisitedTheoretical Computer Science, 2006
- Anonymity and information hiding in multiagent systemsJournal of Computer Security, 2005
- Information hiding, anonymity and privacy: a modular approachJournal of Computer Security, 2004
- Covert channels and anonymizing networksPublished by Association for Computing Machinery (ACM) ,2003
- Quasi-Anonymous ChannelsPublished by Defense Technical Information Center (DTIC) ,2003
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Group Principals and the Formalization of AnonymityPublished by Springer Nature ,1999
- CrowdsACM Transactions on Information and System Security, 1998
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988