12.12.2012 Views

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

172 J.O. Oberender and H. de Meer<br />

References<br />

[1] Pfitzmann, A., Hansen, M.: Anonymity, unl<strong>in</strong>kability, undetectability, unobservability,<br />

pseudonymity, and identity management - a consolidated proposal for<br />

term<strong>in</strong>ology (2008) http://dud.<strong>in</strong>f.tu-dresden.de/Anon Term<strong>in</strong>ology.shtml<br />

[2] Serjantov, A., Newman, R.E.: On the anonymity of timed pool mixes. In: SEC<br />

– Workshop on Privacy and Anonymity Issues, vol. 250, pp. 427–434. Kluwer,<br />

Dordrecht (2003)<br />

[3] Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measur<strong>in</strong>g anonymity. In:<br />

D<strong>in</strong>gled<strong>in</strong>e, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68.<br />

Spr<strong>in</strong>ger, Heidelberg (2003)<br />

[4] Tóth, G., Hornák, Z., Vajda, F.: Measur<strong>in</strong>g Anonymity Revisited. In: Nordic<br />

Workshop on Secure IT Systems, pp. 85–90 (2004)<br />

[5] D<strong>in</strong>gled<strong>in</strong>e, R., Mathewson, N.: Anonymity loves company: Usability and the<br />

network effect. In: Workshop on the Economics of Information Security (2006)<br />

[6] Acquisti, A., D<strong>in</strong>gled<strong>in</strong>e, R., Syverson, P.: On the economics of anonymity. In:<br />

Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84–102. Spr<strong>in</strong>ger, Heidelberg<br />

(2003)<br />

[7] Chaum, D.: The d<strong>in</strong><strong>in</strong>g cryptographers problem: unconditional sender and recipient<br />

untraceability. Journal of Cryptology 1, 65–75 (1988)<br />

[8] Delahaye, J.P., Mathieu, P.: The iterated lift dilemma or how to establish metacooperation<br />

with your opponent. Chaos & Society (1996)<br />

[9] Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Experiences apply<strong>in</strong>g game<br />

theory to system design. In: ACM SIGCOMM workshop on Practice and theory<br />

of <strong>in</strong>centives <strong>in</strong> networked systems (PINS), pp. 183–190. ACM, New York (2004)<br />

[10] Golle, P., Juels, A.: D<strong>in</strong><strong>in</strong>g cryptographers revisited. In: Cach<strong>in</strong>, C., Camenisch,<br />

J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 456–473. Spr<strong>in</strong>ger, Heidelberg<br />

(2004)<br />

[11] Bos, J.N., den Boer, B.: Detection of Disrupters <strong>in</strong> the DC Protocol. In: Workshop<br />

on the theory and application of cryptographic techniques on Advances <strong>in</strong><br />

cryptology, pp. 320–327 (1989)<br />

[12] Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A system for anonymous and<br />

unobservable Internet access. In: Federrath, H. (ed.) Design<strong>in</strong>g Privacy Enhanc<strong>in</strong>g<br />

Technologies. LNCS, vol. 2009, pp. 115–129. Spr<strong>in</strong>ger, Heidelberg (2001)<br />

[13] Rennhard, M., Plattner, B.: Introduc<strong>in</strong>g MorphMix: peer-to-peer based anonymous<br />

<strong>in</strong>ternet usage with collusion detection. In: ACM workshop on Privacy <strong>in</strong><br />

the Electronic Society (WPES), pp. 91–102 (2002)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!