Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
Dingledine, R., Mathewson, N. and Syverson, P. (2004) Tor: The Second-Generation Onion Router. Technical Report, DTIC Document.
has been cited by the following article:
TITLE: The SMS Chaum Mix
AUTHORS: Matthew Rothmeyer, Dale R. Thompson, Matthew Moccaro
KEYWORDS: Chaum Mix; Distributed System; Mobile Security; Anonymity; Information Privacy
JOURNAL NAME: Journal of Computer and Communications, Vol.2 No.4, March 18, 2014
ABSTRACT: Mobile devices such as smartphones are prime candidates for the application of mixing techniques to provide anonymity for small groups of individuals numbering 30 to 40 members. In this work, a Chaum mix inspired, smartphone based network that uses the Short Message Service (SMS) is proposed. This system leverages both techniques used by current anonymity networks as well as knowledge gained from current and past research to make messages private and untraceable. Previously published attacks to anonymous systems are addressed as well as mitigation techniques.
Related Articles:
Interpretation and Classification of P-Series Recommendations in ITU-R
Wei Li, Zhaojun Qian, Huiyu Li
DOI: 10.4236/ijcns.2016.95010 2,404 Downloads 3,093 Views Citations
Pub. Date: May 30, 2016
Political History of Equatorial Guinea: “The Rise and Entrenchment of Nguemism” (Geoffrey Wood, 2004: p. 548)
Martin Revayi Rupiya
DOI: 10.4236/ahs.2020.93009 72 Downloads 219 Views Citations
Pub. Date: September 17, 2020
Polarizabilities and Orientational Order Parameter in N-(p-n-Ethoxybenzylidene)- p-n-Alkoxy Anilines, 2O.Om LC Compounds
Putcha Srinivasa Sastry, Chintalapati Srinivas, Pokkunuri Pardhasaradhi, Venkata Gopala Krishna Murthy Pisipati
DOI: 10.4236/jsemat.2016.63013 1,546 Downloads 1,999 Views Citations
Pub. Date: July 28, 2016
Hydrogen Bonds Sites of Amylose or Amylopectin from Starch at the ONION Level (B3LYP/6-311++G [d, p]: AM1)
Ablé Anoh Valentin, N’Guessan Boka Robert, Bamba El Hadji Sawaliho
DOI: 10.4236/cc.2021.91005 78 Downloads 208 Views Citations
Pub. Date: January 25, 2021
First Measurements with a Linear Mirror Device of Second Generation
H. Grassmann, J. J. Huaman Aguilar, E. Kapllaj
DOI: 10.4236/sgre.2013.43030 3,715 Downloads 5,446 Views Citations
Pub. Date: June 14, 2013