References
- LNCS 1958 IT-Security and Privacy:Design and Use of Privacy Enhancing Security Mechanism Fischer-Hubner
- PhD Thesis, Univ. of California at Berkeley A Pseudonymous Communications Infrastructure for the Internet Ian Avrum Goldberg
- 한국정보보호학회학회지 v.6 no.3 OECD, 프라이버시 그리고 시큐리티 박춘식
- KISDI이슈리포트 인터넷의 일상화와 개인정보보호 조동기;김성우
- EPIC Online Guide to Practical Privacy Tools EPIC
- RFID의 프라이버시(Japanese) Takagi Hiromitsu
- 유비쿼터스 정보사회에서의 안심 · 안전한휴먼인터페이스에관한워크샵 Open화와 프라이버시 확보(Japanese) Takagi Hiromitsu
- Privacy Enhancing Technologies, State of the Art Review UMIST
- Introducing PITs and PETs: Technologies Affecting Privacy Roger Clarke
- 정보사회의 인권, 국가인권위원회 발간 자료집 정보통신기술의 발전과 프라이버시 이인호
- 개인정보보호 김연수
- Implementation of OPS over HTTP Part Hensley(외 4)
- P3P 1.0: A New Standard in Online Privacy W3C
- P3P 논의 현황과 문제점 및 국내 정책 방향 윤재석
- 한국정보보호학회논문지 v.6 no.1 안전하고 효율적인 익명통신로 박춘식
- Proceedings of Int'l workshop on Design Issues in Anonymity and unobservability, LNCS 2009 Anonymity, Unobservabiltiy, and Pseudonymity- A Proposal for Terminology A.Pfitzmann
- Anonymous remailer FAQ Andre Bacard
- Rated top anonymous browsing software by PC Magazine. Anonymizer.com
- Proceedings of CRYPTO'82 Blind Signatures for untraceable payments D.Chaum
- 7th Intl' conf. on Information Security(IFIP/Sec'91) ISDN-Mixes-Untraceable Communication with Very small bandwidth Overhead A.Pfitzmann;B.Pfitzmann;M.Waidner
- Journal of Cryptology v.1 no.1 The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability D.L.Chaum
- ACM Transactions on Information and System Security v.1 no.1 Crowds:Anonymity for Web Transactions M.K.Reiter;A.D.Rubin https://doi.org/10.1145/290163.290168
- Communications of the ACM v.24 no.2 Untraceble Electronic Mail Return Address, and Digital Pseudonyms D.L.Chaum https://doi.org/10.1145/358549.358563
- Advances in Cryptology, Proceedings of Eurocrypt'93 Efficient Anonymous Channel and All.Nothing Election Scheme C.S.Park;K.Iton;K.Kurosawa
- Proceedings of 1995 Japn-Korea Joint Workshop on Information Security and Cryptology Secure Anonymous Channel against Active Attack C.S.Park;K.Kurosawa
- Proceedings of CRYPTO'98 Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-servers M.Abe
- Proceedings of CRYPTO'98 A Practical Mix M.Jakobsson
- Proceedings of ICICS'97 Fault Tolerant Anonymous Channel W.Ogata;K.Kurosawa;K.Sako;L.Takatani
- Proceedings of the Internet Society Symposium on Network and Distributed System security Mixing Email with BABEL C.Gulcu;G.Tsudik
- Proceedings of IEEE COMPCON Privacy-enhancing technologies for the Internet Ian Goldberg;David Wagner;Eric Brewer
- The Workshop on Privacy Enhancing Technologies, LNCS 2482 Privacy-enhancing technologies for the Internet,Ⅱ:Five Years Later Ian Goldberg
- press release Johan Helsingius
- Computer Cryptology
- Mixmaster & remailer Attacks Lance Cotrell
- Lucent Technologies
- IEEE Journal on Special Areas in Communications v.16 no.4 Anonymous Connections and Onion Routing M.G.Reed;P.F.Syverson;D.M.Goldschlag https://doi.org/10.1109/49.668972
- Freedom System2.0 Architecture P.Boucher;A.Shostack;I.Goldberg
- 한국정보보호학회논문지 v.9 no.1 익명통신로를 이용한 Escrow 전자화폐 김춘수;박춘식;전희종