pMIX : Untraceability for Small Hiding Groups, Fourth IEEE International Symposium on Network Computing and Applications, pp.29-40, 2005. ,
From DC-nets to pMIXes : multiple variants for anonymous communications, Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006. ,
On the Economics of Anonymity, Financial Cryptography, pp.84-102, 2003. ,
DOI : 10.1007/978-3-540-45126-6_7
An overview of single-database private information retrieval schemes and their performances, 2006. ,
Anonymous Communication on Local Area Networks, 2006. ,
Upper bound on the communication complexity of private information retrieval, ICALP, pp.401-407, 1997. ,
DOI : 10.1007/3-540-63165-8_196
Detection of Disrupters in the DC Protocol, Advances in Cryptology? EUROCRYPT 89, pp.320-328, 1990. ,
DOI : 10.1007/3-540-46885-4_33
Evaluating 2-DNF Formulas on Ciphertexts, TCC 2005, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., 2002. ,
DOI : 10.1109/SFCS.2002.1181949
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems, Proceedings of Information Hiding Workshop, pp.245-257, 2001. ,
DOI : 10.1007/3-540-45496-9_18
The Disadvantages of Free MIX Routes and How to Overcome Them, Workshop on Design Issues in Anonymity and Unobservability, pp.30-45, 2000. ,
DOI : 10.1007/3-540-44702-4_3
On Privacy Homomorphisms (Extended Abstract), Advances in Cryptology?EUROCRYPT, pp.117-125 ,
Preserving Privacy in a Network of Mobile computers, IEEE Symposium on Security and Privacy, pp.26-38, 1995. ,
Computationally private information retrieval (extended abstract), Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.304-313, 1997. ,
DOI : 10.1145/258533.258609
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.2905
Private Information Retrieval, FOCS : IEEE Symposium on Foundations of Computer Science (FOCS), 1995. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Single Database Private Information Retrieval with Logarithmic Communication, ACISP : Information Security and Privacy : Australasian Conference, 2004. ,
DOI : 10.1007/978-3-540-27800-9_5
Computationally Private Information Retrieval with Polylogarithmic Communication, EURO- CRYPT : Advances in Cryptology : Proceedings of EUROCRYPT, 1999. ,
Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006. ,
DOI : 10.1007/BF03219914
Protection de la vie privée sur Internet. Revue de l'Électricité et de l'Électronique (REE) à paraître en, 2006. ,
Technologies de protection de la vie privée sur Internet, dans Sécurité des systèmes d'information, Réseaux et Télécoms. Hermès-Science, pp.49-72, 2006. ,
The Implementation of an Auction Protocol over Anonymous Networks, 2000. ,
The Traffic Analysis of Continuous-Time Mixes, Proceedings of Privacy Enhancing Technologies workshop, 2004. ,
DOI : 10.1007/11423409_3
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
A new privacy homomorphism and applications, Information Processing Letters, vol.60, issue.5, pp.277-282, 1996. ,
DOI : 10.1016/S0020-0190(96)00170-6
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-652, 1976. ,
DOI : 10.1109/TIT.1976.1055638
A Length-Flexible Threshold Cryptosystem with Applications, ACISP 2003, pp.350-364, 2003. ,
Tor : The Second- Generation Onion Router, USENIX Security Symposium, pp.303-320, 2004. ,
Xor-Trees for Efficient Anonymous Multicast and Reception. j-TISSEC, pp.63-84, 2000. ,
The Sybil Attack, Proceedings of the 1st International Peer To Peer Systems Workshop Mars, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Taxonomy of Mixes and Dummy Traffic, International Information Security Workshops, pp.215-230, 2004. ,
DOI : 10.1007/1-4020-8145-6_18
Generalising Mixes, Proceedings of Privacy Enhancing Technologies workshop, 2003. ,
DOI : 10.1007/978-3-540-40956-4_2
Tarzan : a Peer-to-Peer Anonymizing Network Layer Malicious Bots Threaten Network Security, ACM Conference on Computer and Communications Security, pp.193-20618, 2002. ,
Dining Cryptographers Revisited, LNCS, vol.3027, pp.456-473, 2004. ,
DOI : 10.1007/978-3-540-24676-3_27
Parallel mixing, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004. ,
DOI : 10.1145/1030083.1030113
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
Single-Database Private Information Retrieval with Constant Communication Rate, ICALP : Annual International Colloquium on Automata, Languages and Programming, 2005. ,
DOI : 10.1007/11523468_65
Onion Routing, Communications ACM, vol.42, issue.2, pp.39-41, 1999. ,
Mixing E-mail with Babel, Proceedings of Internet Society Symposium on Network and Distributed Systems Security, pp.2-16, 1996. ,
DOI : 10.1109/NDSS.1996.492350
Flash mixing, Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing , PODC '99, 1999. ,
DOI : 10.1145/301308.301333
Téléphonie : pourquoi n'externalisez-vous pas, 01 Informatique, pp.38-41, 2006. ,
Real-Time MIXes : A Bandwidth-Efficient Anonymity Protocol, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, 1998. ,
Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System, Proceedings of Information Hiding Workshop, 1998. ,
DOI : 10.1007/3-540-49380-8_7
Replication Is Not Needed : Single Database, Computationally-Private Information Retrieval (extended abstract) ,
An Oblivious Transfer Protocol with Log-Squared Communication, LNCS, vol.3650, pp.314-328, 2005. ,
DOI : 10.1007/11556992_23
Hordes: a multicast based protocol for anonymity1, Journal of Computer Security, vol.10, issue.3, pp.213-240, 2002. ,
DOI : 10.3233/JCS-2002-10302
Private Access to Distributed Information, 2004. ,
Local anonymity in the Internet, 1999. ,
Low-Cost Traffic Analysis of Tor, Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS, 2005. ,
Attack for Flash MIX, Proceedings of ASIACRYPT 2000, 1976. ,
DOI : 10.1007/3-540-44448-3_15
The Notion of Security for Probabilistic Cryptosystems, SIAM Journal on Computing, vol.17, issue.2, 1988. ,
DOI : 10.1137/0217025
Random Number Generation ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT : Advances in Cryptology : Proceedings of EUROCRYPT, 1999. ,
DOI : 10.1007/3-540-48910-X_16
How to Implement Isdns Without User Observability some Remarks, 1985. ,
Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz, 1990. ,
DOI : 10.1007/978-3-642-75544-6
Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Designing Privacy Enhancing Technologies, pp.1-9, 2000. ,
DOI : 10.1007/3-540-44702-4_1
How to Break the Direct RSA-Implementation of Mixes, Proceedings of EUROCRYPT 1989, 1990. ,
DOI : 10.1007/3-540-46885-4_37
ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, Proceedings of the GI/ITG Conference on Communication in Distributed Systems Fevrier 1991. [PW85] Andreas Pfitzmann and Michael Waidner. Networks without User Observability?Design Options Advances in Cryptology?EUROCRYPT 85, pp.451-463 ,
DOI : 10.1007/978-3-642-76462-2_32
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Proceedings of Designing Privacy Enhancing Technologies : Workshop on Design Issues in Anonymity and Unobservability, pp.10-29, 2000. ,
DOI : 10.1007/3-540-44702-4_2
Practical Anonymity for the Masses with MorphMix, Financial Cryptography, pp.233-250, 2004. ,
DOI : 10.1007/978-3-540-27809-2_24
Crowds : Anonymity for Web Transactions, ACM Trans. Inf. Syst. Secur, vol.1, issue.1, pp.66-92, 1998. ,
P5 : A Protocol for Scalable Anonymous Communication, IEEE Symposium on Security and Privacy, p.58, 2002. ,
Cryptanalysis of Polly Cracker, IEEE Transactions on Information Theory, vol.48, issue.11, pp.2990-2991, 2002. ,
DOI : 10.1109/TIT.2002.804112
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol, ASIACRYPT, pp.357-371, 1998. ,
k-Anonymous Message Transmission, ACM Conference on Computer and Communications Security, pp.122-130, 2003. ,
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks, Advances in Cryptology?EUROCRYPT 89, pp.302-319, 1989. ,
DOI : 10.1007/3-540-46885-4_32
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability, Advances in Cryptology?EUROCRYPT 89, pp.690-700, 1989. ,
DOI : 10.1007/3-540-46885-4_69
A New k-Anonymous Message Transmission Protocol, WISA, pp.388-399, 2004. ,
DOI : 10.1007/978-3-540-31815-6_31