[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/647095.716723guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Mix-Networks on Permutation Networks

Published: 14 November 1999 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ASIACRYPT '99: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
November 1999
411 pages
ISBN:3540666664

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 November 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)No right to remain silentProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361466(1841-1858)Online publication date: 14-Aug-2019
  • (2019)E-voting scheme using secret sharing and K-anonymityWorld Wide Web10.1007/s11280-018-0575-022:4(1657-1667)Online publication date: 1-Jul-2019
  • (2018)Protecting Privacy in Trajectories with a User-Centric ApproachACM Transactions on Knowledge Discovery from Data10.1145/323318512:6(1-27)Online publication date: 28-Aug-2018
  • (2017)AtomProceedings of the 26th Symposium on Operating Systems Principles10.1145/3132747.3132755(406-422)Online publication date: 14-Oct-2017
  • (2016)VOTORProceedings of the Australasian Computer Science Week Multiconference10.1145/2843043.2843362(1-13)Online publication date: 1-Feb-2016
  • (2015)User-Centric Privacy-Preserving Collection and Analysis of Trajectory DataRevised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 948110.1007/978-3-319-29883-2_17(245-253)Online publication date: 21-Sep-2015
  • (2013)A shuffle to achieve high efficiency through pre-computation and batch verificationInternational Journal of Information Security10.1007/s10207-013-0193-x12:4(337-345)Online publication date: 1-Aug-2013
  • (2012)A secure mix network with an efficient validity verification mechanismProceedings of the 5th international conference on Internet and Distributed Computing Systems10.1007/978-3-642-34883-9_7(85-96)Online publication date: 21-Nov-2012
  • (2012)Efficiently shuffling in publicProceedings of the 15th international conference on Practice and Theory in Public Key Cryptography10.1007/978-3-642-30057-8_26(431-448)Online publication date: 21-May-2012
  • (2012)Malleable proof systems and applicationsProceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques10.1007/978-3-642-29011-4_18(281-300)Online publication date: 15-Apr-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media