Practical Homomorphic MACs for Arithmetic Circuits, Advances in Cryptology ? EUROCRYPT 2013, pp.336-352, 2013. ,
DOI : 10.1007/978-3-642-38348-9_21
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Mobile ad hoc networking: imperatives and challenges, Ad Hoc Networks, vol.1, issue.1, pp.13-64, 2003. ,
DOI : 10.1016/S1570-8705(03)00013-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4069
Yahoo's china defense, The New Presence, vol.9, issue.3, pp.30-33, 2007. ,
A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, Public Key Cryptography, pp.119-136, 1992. ,
DOI : 10.7146/brics.v7i45.20212
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
Taxonomy of Mixes and Dummy Traffic, Information Security Management, Education and Privacy, IFIP International Federation for Information Processing, pp.217-232, 2004. ,
DOI : 10.1007/1-4020-8145-6_18
Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium. SSYM'04, pp.21-21, 2004. ,