Research on MIX-based anonymous communications

被引:0
|
作者
Lu, Tian-Bo [1 ]
Cheng, Xiao-Ming [1 ]
Zhang, Bing [1 ]
机构
[1] National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:108 / 115
相关论文
共 50 条
  • [1] Mix-based electronic payments
    Jakobsson, M
    M'Raihi, D
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 157 - 173
  • [2] A Least Squares Approach to User Profiling in Pool Mix-based Anonymous Communication Systems
    Perez-Gonzalez, Fernando
    Troncoso, Carmela
    [J]. 2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 115 - 120
  • [3] Workload modelling for mix-based anonymity services
    Fuchs, Karl-Peter
    Herrmann, Dominik
    Federrath, Hannes
    [J]. COMPUTERS & SECURITY, 2015, 52 : 221 - 233
  • [4] Identity-based mix: Anonymous communications without public key certificates
    Zhong, Sheng
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (05) : 705 - 711
  • [5] A Framework for the Analysis of Mix-Based Steganographic File Systems
    Diaz, Claudia
    Troncoso, Carmela
    Preneel, Bart
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 428 - 445
  • [6] Research of Ad Hoc Network Routing Protocol Mix-based on Topology and Location for Mobile Intelligent Terminal
    Kuang, Jian
    Yuan, Bo
    Bian, Jiali
    [J]. 2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 519 - 522
  • [7] Using Linkability Information to Attack Mix-Based Anonymity Services
    Schiffner, Stefan
    Clauss, Sebastian
    [J]. PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 94 - +
  • [8] A Survey of Mix-based Data Augmentation: Taxonomy, Methods, Applications, and Explainability
    Cao, Chengtai
    Zhou, Fan
    Dai, Yurou
    Wang, Jianping
    Zhang, Kunpeng
    [J]. ACM Computing Surveys, 2024, 57 (02)
  • [9] A general and efficient countermeasure to relation attacks in mix-based e-voting
    Kun Peng
    [J]. International Journal of Information Security, 2011, 10 : 49 - 60
  • [10] A general and efficient countermeasure to relation attacks in mix-based e-voting
    Peng, Kun
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 49 - 60