Cryptography Reference
In-Depth Information
[Rob62]
L. G. Roberts. Picture coding using pseudo-random
noise. IRE Trans. on Information Theory , IT-8, Feb 1962.
[RP04]
M. Rennhard and B. Plattner. Practical anonymity for
the masses with morphmix, 2004.
[RR98] MichaelK.Re terandAvielD.Rubin. Crowds:
anonymity for Web transactions. ACM Transactions on
Information and System Security , 1(1):66-92, 1998.
[RR08]
Christian Rechberger and Vincent Rijmen. New re-
sults on nmac/hmac when instantiated with popular
hash functions. Journal of Universal Computer Science ,
14(3):347-376, feb 2008.
[RSG98] M.G.Reed,P.F.Syverson,andD.M.Goldschlag.Anony-
mous connections and onion routing. IEEE Journal on
Selected Areas in Communications , 16(4):482-494, May
1998.
[Rut06]
Joanna Rutkowska. Subverting vista kernel for fun and
profit. In Black Hat Briefings , 2006.
[SA00]
Frank Stajano and Ross J. Anderson. The cocaine auc-
tion protocol: On the power of anonymous broadcast.
In IH '99: Proceedings of the Third International Work-
shop on Information Hiding , pages 434-447, London,
UK, 2000. Springer-Verlag.
[Say00]
Khalid Sayood. Introduction to data compression (2nd
ed.) . Morgan Kaufmann Publishers Inc., San Francisco,
CA, USA, 2000.
[Sch94]
Bruce Schneier. Applied Cryptography .JohnWileyand
Sons, New York, 1994.
[Sei08]
Jacob Seidelin. Compression using canvas and png-
embedded data. nihilogic , April 2008.
[Ser07]
Andrei Serjantov. A fresh look at the generalised mix
framework. In Borisov and Golle [BG07], pages 17-29.
[SGR97]
P.F.Syverson,D.M.Goldschlag,andM.G.Reed.Anony-
mous connections and onion routing. In IEEE, editor,
Proceedings / 1997 IEEE Symposium on Security and Pri-
vacy, May 4-7, 1997, Oakland, California , pages 44-54,
1109 Spring Street, Suite 300, Silver Spring, MD 20910,
USA, 1997. IEEE Computer Society Press.
Search WWH ::




Custom Search