Dining cryptographers problem

Results: 17



#Item
1Defining	
  “Anonymity”	
  in	
  Networked	
   Communication,	
  version	
  1	
   Joan	
  Feigenbaum1	
   Technical	
  Report	
  YALEU/DCS/TR-­‐1448	
   December	
  2011	
   	
  

Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-01-20 15:00:46
2page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16
3Design and Analysis of Efficient Anonymous-Communication Protocols

Design and Analysis of Efficient Anonymous-Communication Protocols

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-07 16:37:34
4J. Cryptology:Journal of CryptologyInternational Association for  Cryptologic Research

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
5Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

Add to Reading List

Source URL: ohmygodel.com

Language: English - Date: 2014-08-17 14:48:08
6Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA  Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-06-25 13:47:28
7Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-03-13 12:26:53
8On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-10 13:39:42
9Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-27 09:31:40
10CS255: Cryptography and Computer Security  Winter 1998 Final Exam

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42