Sciweavers

SPW
1997
Springer

Protocols Using Anonymous Connections: Mobile Applications

14 years 3 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us to focus on high onymity goals of these protocols much as abstracting away from encryption clari es and emphasizes high level security goals of key distribution protocols. The contributions of this paper are 1 a notation for describing such protocols, and 2 two protocols for location protected communication over a public infrastructure.
Michael G. Reed, Paul F. Syverson, David M. Goldsc
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where SPW
Authors Michael G. Reed, Paul F. Syverson, David M. Goldschlag
Comments (0)