Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng, Journal of Information Processing Systems Vol. 8, No. 1, pp. 175-190, Mar. 2012
Keywords: Mix Network, Correction
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Peng, K. (2012). Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8(1), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.
[IEEE Style]
K. Peng, "Attack and Correction: How to Design a Secure and Efficient Mix Network," Journal of Information Processing Systems, vol. 8, no. 1, pp. 175-190, 2012. DOI: 10.3745/JIPS.2012.8.1.175.
[ACM Style]
Kun Peng. 2012. Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8, 1, (2012), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.