![sherman 2 attack of the tagger sherman 2 attack of the tagger](https://render.fineartamerica.com/images/rendered/medium/greeting-card/images/artworkimages/medium/1/sherman-attack-tommy-anderson.jpg)
2006 on Electronic Voting Technology Workshop, EVT 2006, Berkeley, CA, USA, p. In: Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop. 37(2), 156–189 (1988)ĭe Ruiter, J.: Personal communication in e-mail from 28 July 2016ĮlGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. doi: 10.1007/7-6_9īrassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. IEEE Computer Society (1997)īerthold, O., Langos, H.: Dummy traffic against long term intersection attacks. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, SP 1997, Washington, DC, USA, pp. Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. (ed.) Designing Privacy Enhancing Technologies. Raymond, J.-F.: Traffic analysis: protocols, attacks, design issues, and open problems. doi: 10.1007/978-0-5_7ĭanezis, G.: The traffic analysis of continuous-time mixes. Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. doi: 10.1007/978-1-7_3ĭanezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. doi: 10.1007/2-4_3ĭanezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack.
SHERMAN 2 ATTACK OF THE TAGGER HOW TO
doi: 10.1007/6-8_37īerthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them.
![sherman 2 attack of the tagger sherman 2 attack of the tagger](https://i.pinimg.com/originals/7d/f6/cb/7df6cb5bb46f726e69e5a5145ef0dc77.jpg)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. , version 20160530:183553 from Ĭhaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Cryptology ePrint Archive, Report 2016/008 (2016). Chaum, D., Das, D., Javani, F., Kate, A., Krasnova, A., de Ruiter, J., Sherman, A.T.: cMix: anonymization by high-performance scalable mixing.