gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 7e98ebd0b4cc70038f1c64941f16596b57554ce4
parent 0d638abe313759a18cbed171c0e1f1358d0fad1d
Author: George Danezis <gdane@microsoft.com>
Date:   Sun,  8 Jul 2007 20:59:53 +0000

svn:r232

Diffstat:
Manonbib.bib | 35+++++++++++++----------------------
1 file changed, 13 insertions(+), 22 deletions(-)

diff --git a/anonbib.bib b/anonbib.bib @@ -148,8 +148,8 @@ @InProceedings{abe, author = {Masayuki Abe}, - title = {Universally Verifiable {MIX} With Verification Work Independent of - The Number of {MIX} Servers}, + title = {Universally Verifiable mix-net With Verification Work Independent of + The Number of mix Servers}, booktitle = {Proceedings of {EUROCRYPT} 1998}, year = {1998}, publisher = {Springer-Verlag, LNCS 1403}, @@ -159,7 +159,7 @@ @InProceedings{disco, author = {Michael Waidner and Birgit Pfitzmann}, - title = {The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure servicability}, + title = {The dining cryptographers in the disco: Unconditional Sender and Recipient Untraceability}, booktitle = {Proceedings of {EUROCRYPT} 1989}, year = {1990}, publisher = {Springer-Verlag, LNCS 434}, @@ -2677,8 +2677,7 @@ Distributed Computing Systems (ICDCS)}, @article{beimel01informationtheoretic, author = {Amos Beimel and Yuval Ishai}, - title = {Information-Theoretic Private Information Retrieval: {A} -Unified Construction}, + title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, journal = {Lecture Notes in Computer Science}, volume = {2076}, pages = {89--98}, @@ -2743,7 +2742,7 @@ Sudan}, @article{kissner04private, author = {L. Kissner and A. Oprea and M. Reiter and D. Song and K. Yang}, - title = {Private keywordbased push and pull with applications to anonymous communication (Extended Abstract)}, + title = {Private keyword-based push and pull with applications to anonymous communication}, journal = {Applied Cryptography and Network Security}, year = {2004}, www_pdf_url = {http://www.cs.cmu.edu/~alina/papers/p3.pdf}, @@ -3179,8 +3178,7 @@ conference on Advances in computer science and technology (ACST '06)}, @inproceedings{Huang06, author = {Dijiang Huang}, - title = {Traffic analysis-based unlinkability measure for IEEE -802.11b-based communication systems}, + title = {Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems}, booktitle = {Proceedings of the 5th ACM workshop on Wireless security (WiSe '06)}, year = {2006}, @@ -3221,8 +3219,7 @@ of Computer Science (FOCS'06)-Volume 00}, } @misc{wang2006sam, - title={{System and method for protecting privacy and anonymity of -parties of network communications}}, + title={{System and method for protecting privacy and anonymity of parties of network communications}}, author={Y.M. Wang and Q. Sun and D.R. Simon and W. Russell}, year={2006}, publisher={Google Patents}, @@ -3254,8 +3251,7 @@ Security-ETRICS, LNCS}, } @article{huang2006sce, - title={{Silent cascade: Enhancing location privacy without -communication qos degradation}}, + title={{Silent cascade: Enhancing location privacy without communication qos degradation}}, author={L. Huang and K. Matsuura and H. Yamane and K. Sezaki}, journal={Proc. of Security in Pervasive Computing (SPC)}, pages={165--180}, @@ -3264,8 +3260,7 @@ communication qos degradation}}, } @article{melchor2006dnp, - title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous -Communications}}, + title={{From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications}}, author={C.A. Melchor and Y. Deswarte}, journal={Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications}, @@ -3343,8 +3338,7 @@ society}, } @article{toth11aca, - title={{The {APROB} Channel: adaptive semi-real-time anonymous -communication}}, + title={{The {APROB} Channel: adaptive semi-real-time anonymous communication}}, author={G. Toth and Z. Hornak}, journal={Security and Privacy in Dynamic Environments--Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC @@ -3379,8 +3373,7 @@ www_tags = {selected}, } @article{boukerche2005esd, - title={{An efficient secure distributed anonymous routing protocol for -mobile and wireless ad hoc networks}}, + title={{An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks}}, author={A. Boukerche and K. El-Khatib and L. Xu and L. Korba}, journal={Computer Communications}, volume={28}, @@ -3415,8 +3408,7 @@ Peer-to-Peer Computing}, } @article{gupta2006uns, - title={{Utilizing node's selfishness for providing complete anonymity -in peer-to-peer based grids}}, + title={{Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids}}, author={R. Gupta and S. Ray and A.K. Somani and Z. Zhang}, journal={Multiagent and Grid Systems}, volume={2}, @@ -3428,8 +3420,7 @@ in peer-to-peer based grids}}, } @article{nguyen2006vsf, - title={{Verifiable shuffles: a formal model and a Paillier-based -three-round construction with provable security}}, + title={{Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}}, author={L. Nguyen and R. Safavi-Naini and K. Kurosawa}, journal={International Journal of Information Security}, volume={5},