by Jan Iwanik, Marek Klonowski, and Miroslaw Kutylowski. In Journal of Computer Security 10 (3 2002, pages 213-240. ( BibTeX entry ) Making a Nymbler Nymble using verbs (Extended Version) ( PDF ) (Cached: PDF ) by Ryan Henry, Kevin Henry, and Ian Goldberg. ( BibTeX entry ) Reputable Mix Networks ( PDF ) (Cached: PDF ) by Philippe Golle. In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pages 10-29. ( BibTeX entry ) GAS: Overloading a File Sharing Network as an Anonymizing System ( PDF ) (Cached: PDF ) by Elias Athanasopoulos, Mema Roussopoulos, Kostas.
In the Proceedings of Privacy Enhancing Technologies Workshop (PET 2002 April 2002. Contact me online and I'll be happy to help.
( PDF ) (Cached: PDF ) by Peter Eckersley. In the Proceedings of Privacy Enhancing Technologies workshop (PET 2003 March 2003, pages 141-160. Whether in the Methods or elsewhere in a manuscript, the passive voice redirects attention to the action (or the recipient). ( BibTeX entry ) OSS: Using Online Scanning home food is the best food essay Services for Censorship Circumvention ( PDF ) (Cached: PDF ) by David Fifield, Gabi Nakibly, and Dan Boneh. ( BibTeX entry ) Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers by Masayuki Abe. ( BibTeX entry ) Nonesuch: a mix network with sender unobservability ( PDF ) (Cached: PDF ) by Thomas. ( BibTeX entry ) CloudTransport: Using Cloud Storage for Censorship-Resistant Networking ( PDF ) (Cached: PDF ) by Chad Brubaker, Amir Houmansadr, and Vitaly Shmatikov. Differential Treatment of Anonymous Users ( PDF ) (Cached: PDF ) by Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, and Steven.