Traac analysis aaacks and trade-oos in anonymity providing systems, Information Hiding, pp.245-257, 2001. ,
DOI : 10.1007/3-540-45496-9_18
Sharemind: A Framework for Fast Privacy-Preserving Computations, Computer Security-ESORICS 2008, pp.192-206, 2008. ,
DOI : 10.1007/s001459910003
URL : http://www.math.ut.ee/%7Eswen/publications/articles/bogdanov-laur-willemson-2008.pdf
Abstract, Proceedings on Privacy Enhancing Technologies 2015, pp.4-24, 2015. ,
DOI : 10.1109/TIT.1976.1055638
OO-the-record communication , or, why not to use PGP, pp.77-84, 2004. ,
DOI : 10.1145/1029179.1029200
URL : http://hatswitch.org/~nikita/papers/otr-wpes.pdf
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
Walking the Web of trust, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp.153-158, 2000. ,
DOI : 10.1109/ENABL.2000.883720
Algebraic MACs and keyed-veriication anonymous credentials, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp.1205-1216, 2014. ,
DOI : 10.1145/2660267.2660328
URL : https://eprint.iacr.org/2013/516.pdf
Certificate chain discovery in SPKI/SDSI, Journal of Computer Security, vol.9, issue.4, pp.285-322, 2001. ,
DOI : 10.3233/JCS-2001-9402
Practical Covertly Secure MPC for Dishonest Majority ??? Or: Breaking the SPDZ Limits, Computer Security?ESORICS 2013, pp.1-18, 2013. ,
DOI : 10.1007/978-3-642-40203-6_1
$\text{Drac}$ : An Architecture for Anonymous Low-Volume Communications, Lecture Notes in Computer Science, vol.393, issue.2, pp.202-219, 2010. ,
DOI : 10.1038/30918
ClaimChains: A Decentralized Identity System based on hash chains, 2016. ,
SybilInfer: Detecting Sybil Nodes using Social Networks, NDSS, 2009. ,
Statistical Disclosure or Intersection AAacks on Anonymity Systems, 6th International Workshop on Information Hiding (Lecture Notes in Computer Science), pp.293-308, 2004. ,
DOI : 10.1007/978-3-540-30114-1_21
New directions in cryptography. Information eory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976. ,
Tor: e Second- Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
DOI : 10.21236/ADA465464
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf
e Sybil AAack, IPTPS (Lecture Notes in Computer Science), pp.251-260, 2002. ,
Diierential privacy: A survey of results. In eory and applications of models of computation, pp.1-19, 2008. ,
PrivEx, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1068-1079, 2014. ,
DOI : 10.1007/978-3-642-03356-8_8
UnlimitID, Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES'16, pp.139-142, 2016. ,
DOI : 10.1145/2857705.2857725
URL : https://hal.archives-ouvertes.fr/hal-01426847
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, 1978. ,
DOI : 10.1145/359545.359563
CONIKS: Bringing Key Transparency to End Users USENIX Association, 24th USENIX Security Symposium, USENIX Security 15, pp.383-398, 2015. ,
EEcient U-Prove implementation for anonymous credentials on smart cards, Security and Privacy in Communication Networks, pp.243-260, 2011. ,
DOI : 10.1007/978-3-642-31909-9_14
URL : http://www.cs.ru.nl/%7Epim/publications/2011_securecomm.pdf
A Critical Look at Decentralized Personal Data Architectures, p.4503, 2012. ,
Privacy-preserving queries over relational databases, Privacy enhancing technologies, pp.75-92, 2010. ,
Anonymity, unobservability, and pseudeonymity -a proposal for terminology. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability table of contents, pp.1-9, 2001. ,
Oblivious RAM Revisited, Advances in Cryptology?CRYPTO 2010, pp.502-519, 2010. ,
DOI : 10.1007/978-3-642-14623-7_27
URL : http://eprint.iacr.org/2010/366.pdf
Secure/multipurpose internet mail extensions (S/MIME) version 3.1 message speciication, 2004. ,
SDSI-A Simple Distributed Security Infrastructure. CRYPTO, 1996. ,
The pynchon gate, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.1-9, 2005. ,
DOI : 10.1145/1102199.1102201
Towards an Information eoretic Metric for Anonymity, Designing Privacy Enhancing Technologies, Proceedings of PET'02, pp.41-53, 2002. ,
DOI : 10.1007/3-540-36467-6_4
URL : http://www.cl.cam.ac.uk/users/aas23/papers_aas/set.ps
LEAP: A Next-Generation Client VPN and Encrypted Email Provider, International Conference on Cryptology and Network Security, pp.176-191, 2016. ,
DOI : 10.1109/SP.2015.22
URL : https://hal.archives-ouvertes.fr/hal-01426850
Abstract, Proceedings on Privacy Enhancing Technologies, vol.57, issue.4, 2017. ,
DOI : 10.1515/popets-2017-0056
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Usenix Security, 1999. ,
Do you need a Blockchain? Cryptology ePrint Archive, 2017. ,
Sybillimit: A near-optimal social network defense against sybil aaacks, Security and Privacy, pp.3-17, 2008. ,
DOI : 10.1109/sp.2008.13
URL : http://www.comp.nus.edu.sg/~yuhf/yuh-sybillimit.pdf
SybilGuard, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.267-278, 2006. ,
DOI : 10.1145/1151659.1159945
Preey good privacy: public key encryption for the masses, Building in big brother, pp.93-107, 1995. ,