Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng, Journal of Information Processing Systems Vol. 8, No. 1, pp. 175-190, Mar. 2012
Keywords: Mix Network, Correction
Fulltext:
Abstract
Statistics
                    Show / Hide Statistics
                    
                    
                        
                            
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
                        
                            
                    
                
                Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
| 
                                     | 
                            
Cite this article
[APA Style]
Peng, K. (2012). Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8(1), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.
                [IEEE Style]
K. Peng, "Attack and Correction: How to Design a Secure and Efficient Mix Network," Journal of Information Processing Systems, vol. 8, no. 1, pp. 175-190, 2012. DOI: 10.3745/JIPS.2012.8.1.175.
                [ACM Style]
Kun Peng. 2012. Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8, 1, (2012), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.