2010
DOI: 10.1016/j.comcom.2009.11.009
|View full text |Cite
|
Sign up to set email alerts
|

Survey on anonymous communications in computer networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 94 publications
(69 citation statements)
references
References 88 publications
(124 reference statements)
0
69
0
Order By: Relevance
“…More details and analysis of Tor can be found in a wide number of references in the literature since this protocol has been deeply analysed (Murdoch and Danezis, 2005;Abou-Tair et al, 2009;Danezis et al, 2009;Behl and Lilien, 2009;Edman and Yener, 2009;Chaabane et al, 2010;Fabian et al, 2010;Ren and Wu, 2010;Mulazzani et al, 2010;Hopper et al, 2010).…”
Section: Tormentioning
confidence: 99%
See 4 more Smart Citations
“…More details and analysis of Tor can be found in a wide number of references in the literature since this protocol has been deeply analysed (Murdoch and Danezis, 2005;Abou-Tair et al, 2009;Danezis et al, 2009;Behl and Lilien, 2009;Edman and Yener, 2009;Chaabane et al, 2010;Fabian et al, 2010;Ren and Wu, 2010;Mulazzani et al, 2010;Hopper et al, 2010).…”
Section: Tormentioning
confidence: 99%
“…More details and analysis of Web MIXes can be found in (Danezis et al, 2009;Edman and Yener, 2009;Ren and Wu, 2010;Westermann et al, 2010;Westermann and Kesdogan, 2011).…”
Section: Web Mixes/anon Projectmentioning
confidence: 99%
See 3 more Smart Citations