Paul. A. Strassmann, Risk-Free Access into the global information infrastructure via anonymous re-mailers, www.strassmann.com/plus/anon-remail.html, total 9 pages, Jan. 28, 1996.* |
Article entitled “Security Without Identification: Transaction Systems to Make Big Brother Obsolete” by David Chaum, from Communications of the ACM, Oct. 1985, pp. 1030-1044. |
Article entitled “Privacy-Enhancing Technologies for the internet” by Ian Goldberg, David Wagner and Eric Brewer of the University of California, Berkeley. |
Article entitled “Netbill Security and Transaction Protocol” by Benjamin Cox. J.D. Tygar and Marvin Sirbu of Carnagie Mellon University. |
Article entitled “How to Construct Random Functions” from the Journal of the Association for Computing Machinery, by Oded Goldreich, Shafi Goldwasser and Silvio Micali, Oct. 1986, pp. 792-807. |
Article entitled “Proceedings Symposium on Network and Distributed System Security” by the IEEE Computer Society Press: Feb. 22-23, 1996: pp. 1-16. |
Article entitled “Anonymous Connections and Onion Routing” IEEE Symposium on Security and Privacy: by Paul F. Syverson, David M. Goldschlag and Michael G. Reed, Naval Research Library, pp. 1-11. |
Article entitled “Frequently Asked Questions about Mixmaster Remailers” FAB Verson 1.8. Jul. 4, 1996. |
“How to Make Personalized Web Browsing Simple, Secure, and Anonymous” by Eran Gabber, Phillip B. Gibbons, Yossi Matias, Alain Mayer; pp. 17-31; Feb. 1997. |
“How to be Virtually Anonymous” by Randal L. Schwartz; Feb. 1997; pp. 30-33. |
“Private Web Browsing” by Paul F. Syverson, Michael G. Reed, David M. Goldschlag; 1997; pp. 237-248. |
“Anonymous Connections and Onion Routing” by Paul F. Syverson, David M. Goldschlag and Michael G. Reed; May 1997; pp. 44-54. |