References
- D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, vol, 24, no. 2, pages 84-88, Feb. 1981 https://doi.org/10.1145/358549.358563
- Michael K. Reiter and Aviel D. Rubin, "Crowds: Anonymity for web transactions," ACM Transactions on Information and System Security (TISSEC), vol, 1, no. 1, pp. 66-92, 1998 https://doi.org/10.1145/290163.290168
- Frederik Armknecht, Joao Girao, Alfredo Matos, and Rui L. Aguiar., "who said that? privacy at link layer," In 26th Annual IEEE Conference on Computer Communications, Anchorage, Alaska, USA, May 2007. INFOCOM 2007. Minisymposium
- R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems,' Comm, of the ACM, vol, 21, no. 2, pp. 120-126, Feb. 1978 https://doi.org/10.1145/359340.359342
- Azzedine Boukerche, Khalil EI-Khatib, Li Xu and Larry Korba, "SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks," Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN04)
- Wireless medium access control and physical layer specifications for lowrate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5
- O. Berthold, H. Federrath, and M. Kohntopp, "Project Anonymity and Unobservability in the Internet," In Computers Freedom and Privacy Conference 2000 (CFP 2000), Workshop on Freedom and Privacy by Design, 2000
- D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go MIXes Providing Probabilistic Security in an Open System," Second International Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pages 83-98,1998
- S. Basagni, K. Herrin, E. Rosti, and D. Bruschi. "Secure Pebblenets," In MobiHoc, pages 156.163, 2001