Probabilistic anonymity INRIA Futurs and LIX Submitted for publication, 2005. ,
Probable innocence revisited INRIA Futurs and LIX, 2005. ,
DOI : 10.1007/11679219_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.6479
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Weak probabilistic anonymity INRIA Futurs and LIX, 2005. ,
DOI : 10.1016/j.entcs.2005.05.047
URL : http://doi.org/10.1016/j.entcs.2005.05.047
Anonymity and information hiding in multiagent systems, Proc. of the 16th IEEE Computer Security Foundations Workshop, pp.75-88, 2003. ,
Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004. ,
DOI : 10.3233/JCS-2004-12102
URL : http://doi.org/10.3233/jcs-2004-12102
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
Modelling and Analysis of Security Protocols, 2001. ,
CSP and anonymity, Proc. of the European Symposium on Research in Computer Security (ESORICS), pp.198-218, 1996. ,
DOI : 10.1007/3-540-61770-1_38
Probabilistic simulations for probabilistic processes An extended abstract, Proceedings of CONCUR '94, pp.250-273, 1995. ,
Group principals and the formalization of anonymity, World Congress on Formal Methods, pp.814-833, 1999. ,
Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997. ,
DOI : 10.1109/SECPRI.1997.601314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883