Mixing Email with BABEL (1996)  (Make Corrections)  
Ceki Gülcü, Gene Tsudik

  Home/Search   Context   Related
 
View or download:
isi.edu/~gts/paps/guts96.ps.gz
isu.edu/sndss/gulcu.ps
isoc.org/conferences/ndss96/gulcu.ps
Cached:  PS.gz  PS  PDF  DjVu  Image  Update  Help

From:  isi.edu/~gts/pubs (more)
From:  isoc.org/conferences/nd...sndss96
Homepages:  G.Tsudik  HPSearch  (Update Links)

Rate this article: (best)
  Comment on this article  
(Enter summary)

Abstract: Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identification of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and desired properties of anonymous email in general and introduces the design and salient features of Babel ... (Update)

Similar documents (at the sentence level):
36.7%:   The Anonymous E-mail Conversation - Gülcu (1995)   (Correct)

Active bibliography (related documents):   More   All
0.3:   On Shopping Incognito - Hauser, Tsudik (1996)   (Correct)
0.3:   Rationale, Requirements, And Application Notes - Ccsds Draft Green   (Correct)
0.2:   Engineering Via Discourse: Content Structure As An Essential.. - Morris (1999)   (Correct)

Users who viewed this document also viewed:   More   All
0.1:   SMART: Towards Spatial Internet Marketplaces - Abel, Gaede, Taylor, Zhou (1997)   (Correct)
0.1:   Decision-Theoretic Refinement Planning: A New Method for.. - Anhai Doan (1995)   (Correct)
0.1:   Decentralized Trust Management - Blaze, Feigenbaum, Lacy (1996)   (Correct)

Similar documents based on text:   More   All
0.6:   Mixminion: Design of a Type III Anonymous Remailer.. - Danezis, Dingledine.. (2002)   (Correct)
0.6:   Mixminion: Design of a Type III Anonymous Remailer - Danezis, Dingledine..   (Correct)
0.4:   A Reputation System to Increase MIX-net Reliability - Dingledine, Freedman.. (2001)   (Correct)

BibTeX entry:   (Update)

@misc{ lc-mixing,
  author = "Ceki Gülcü and Gene Tsudik",
  title = "Mixing Email with BABEL",
  url = "citeseer.nj.nec.com/2254.html" }
Citations (may not include all citations):
500   Applied Cryptography (context) - Schneier - 1994    
214   Programming Perl (context) - Wall, Schwartz - 1993
193   Cryptography and Data Security (context) - Denning - 1982
165   Privacy Enhancement for Internet Electronic Mail --- Part I:.. - Linn - 1993
148   Security without Identification: Transaction Systems to make.. (context) - Chaum - 1985
106   Simple Mail Transfer Protocol (context) - Postel - 1982
83   A proposal for a New Block Encryption Standard - Lai, Massey - 1991
63   Network Time Protocol (Version 3) Specification, Implementat.. (context) - Mills - 1992
60   Untraceable Electronic Mail, Return Addresses, and Digital P.. (context) - Chaum - 1981
46   Security for Computer Networks (context) - Davies, Price - 1984
42   ISDNMixes: Untraceable Communication with Very Small Bandwid.. - Pfitzmann, Pfitzmann et al. - 1991
38   the Design and Security of of Block Ciphers (context) - Lai - 1992
28   PGP User's Guide (context) - Zimmerman - 1994
22   Mixmaster and Remailer Attacks (context) - Cottrell
17   Writing Solid Code (context) - Maguire - 1993
16   How to break the direct RSA-implementation of MIXes - Pfitzmann, Pfitzmann - 1990
15   How to Expose an Eavesdropper (context) - Rivest, Shamir - 1978
14   Learning Perl (context) - Schwartz - 1993    
10   A first Course in Probability (context) - Sheldon - 1994
7   Algorithms for synchronizing network clocks (context) - Mills - 1985
7   How to implement ISDNs without user observability---Some rem.. (context) - Pfitzmann - 1985
7   Network Security via Dynamic Process Renaming (context) - Farber, Larson - 1975
6   Experiments in network clock synchronization (context) - Mills - 1985
5   Cryptographic Communications System and Method (context) - Rivest, Shamir et al. - 1983
4   Crypto Anarchy and Virtual communities (context) - May - 1995
4   Standard for the format of Arpa Internet messages (context) - Crocker - 1982
3   Requirements for Internet Hosts -- Application and Support (context) - Task - 1989
2   Cypherpunks Manifesto (context) - Hughes - 1993
2   February 20th (context) - Helsingius, release - 1995
2   PGP 2.6 file formats (context) - Zimmerman - 1994
2   Allman and N (context) - Costales - 1993
2   Unmasked on the Net (context) - Quittner - 1995
2   Postcard from cyberspace (context) - Akst - 1995
2   Personal technology (context) - Mossberg - 1995
1   The Dining CryptographersProblem: Unconditional Sender and R.. (context) - Chaum - 1988

Documents on the same site (http://www.isi.edu/~gts/pubs.html):   More
Server-Supported Signatures - Asokan, Tsudik, Waidner (1997)   (Correct)
Secure and Minimal Protocols for Authenticated Key Distribution - Janson, Tsudik (1995)   (Correct)
A Security Architecture for Computational Grids - Foster, Kesselman, Tsudik.. (1998)   (Correct)

Online articles have much greater impact   More about CiteSeer   Add search form to your site   Submit documents    

CiteSeer - citeseer.org - Terms of Service - Privacy Policy - Copyright © 1997-2002 NEC Research Institute