What people are saying - Write a review
We haven't found any reviews in the usual places.
A Structured Approach to LargeScale Anonymity
Revealing Hidden Services by Their Clock Skew
23 other sections not shown
Other editions - View all
access control adversary aggregation algorithm Alice analysis anonymity approach asker assume attack graph attributes authentication bilinear map broadcast browser bytes ciphertext Computer constraints construction cookies credential cryptographic DBSpam decryption defined deniability denote detection distributed Doppelganger e-token efficient encryption scheme EUROCRYPT evaluation example exploit Figure function hash IEEE implementation IND-CCA input Lemma LNCS malicious normal NP-complete NP-hard OBDD oblivious transfer operation output packet parameters party path peer peer-to-peer performance permissions plaintext pollster polynomial private key problem Proceedings proof protocol protomatcher proxy public key puppetnets query random oracle regular expression replay requires roles satisfies secret key Section semantics sensor nodes separation of duty server signature simulator SMTP spam subset synchronization techniques term tion trace traffic traitor tracing tree trust negotiation update USENIX userset valid variables verifier