Recommendations
Cites work
- scientific article; zbMATH DE number 1689866 (Why is no real title available?)
- scientific article; zbMATH DE number 1689868 (Why is no real title available?)
- scientific article; zbMATH DE number 1690176 (Why is no real title available?)
- scientific article; zbMATH DE number 1487488 (Why is no real title available?)
- scientific article; zbMATH DE number 1512615 (Why is no real title available?)
- scientific article; zbMATH DE number 2090929 (Why is no real title available?)
- scientific article; zbMATH DE number 2090930 (Why is no real title available?)
- scientific article; zbMATH DE number 794262 (Why is no real title available?)
- A randomized encoding of the \(\pi\)-calculus with mixed choice
- CONCUR 2005 – Concurrency Theory
- CSP and anonymity
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- Weak probabilistic anonymity
Cited in
(15)- Probabilistic anonymity via coalgebraic simulations
- Quantifying leakage in the presence of unreliable sources of information
- Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus
- An analysis of trust in anonymity networks in the presence of adaptive attackers
- Anonymity Protocols as Noisy Channels
- Weak bisimulation for probabilistic timed automata
- Anonymity protocols as noisy channels
- Quantitative simulations by matrices
- Formalizing provable anonymity in Isabelle/HOL
- Analyzing anonymity attacks through noisy channels
- On compositional reasoning about anonymity and privacy in epistemic logic
- Probabilistic Anonymity Via Coalgebraic Simulations
- The cost of becoming anonymous: on the participant payload in crowds
- Conditional anonymity with non-probabilistic adversary
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
This page was built for publication: Probable innocence revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q860902)