共 32 条
[1]
Chaum D(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun ACM 24 84-90
[2]
Chaum D(1988)The dining cryptographers problem: unconditional sender and recipient intractability J Cryptol 1 65-75
[3]
Dingledine R(2004)Tor: The second-generation onion router J Franklin Inst 239 135-139
[4]
Mathewson N(1984)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans Inf Theory 31 469-472
[5]
Syverson P(2020)A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud J Ambient Intell Human Comput 2016 115-134
[6]
Elgamal T(2018)Anonymous communication via anonymous identity-based encryption and its application in IoT Wirel Commun Mobile Comput 10 952-963
[7]
Jayaraman I(2015)Riffle: an efficient communication system with strong anonymity Privacy Enhanc Technol 75 51-62
[8]
Panneerselvam AS(2009)Distributed anonymous data perturbation method for privacy-preserving data mining J Zhejiang Univ Sci A 72 1-12
[9]
Jiang L(2018)Distance metric optimization driven convolutional neural network for age invariant face recognition Pattern Recogn 196 47-53
[10]
Li T(2018)Secure attribute-based data sharing for resource-limited users in cloud computing Comput Secur 1 188-1562