共 54 条
[22]
Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques
[J].
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024,
2024,
[23]
Mitigating Intersection Attacks in Anonymous Microblogging
[J].
18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023,
2023,
[25]
Cover Traffic: A Trade of Anonymity and Efficiency
[J].
SECURITY AND TRUST MANAGEMENT (STM 2017),
2017, 10547
:213-223
[26]
Guirat I., 2020, P PRIV ENH TECHN S H
[27]
TASP: Towards Anonymity Sets that Persist
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16),
2016,
:177-180
[28]
Hugenroth D, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P5431
[29]
Hugenroth D, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3433
[30]
Jiang P, 2023, PROCEEDINGS OF THE 20TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, NSDI 2023, P877