Next: About this document ...
Up: Publius: A robust, tamper-evident,
Previous: Acknowledgements
- 1
-
A. V. Aho, J. E. Hopcroft, and J. D. Ullman.
Data Structures And Algorithms.
Addison-Wesley Publishing Company, 1983.
- 2
-
R. J. Anderson.
The eternity service.
In Pragocrypt 1996, 1996.
https://www.cl.cam.ac.uk/users/rja14/
eternity/eternity.html.
- 3
-
A. Back.
The eternity service.
Phrack Magazine, 7(51), 1997.
https://www.cypherspace.org/ adam/
eternity/phrack.html.
- 4
-
T. Benes.
The eternity service.
1998.
https://www.kolej.mff.cuni.cz/eternity/.
- 5
-
D. Chaum.
Untraceable electronic mail, return addresses, and digital
pseudonyms.
Communications of the ACM, 24(2):84-88, 1981.
- 6
-
Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti, and P. N. Yianilos.
A prototype implementation of archival intermemory.
In Proc. ACM Digital Libraries. ACM, August 1999.
https://www.intermemory.org/.
- 7
-
I. Clark.
A distributed decentralised information storage and retrieval system.
1999.
https://freenet.sourceforge.net/Freenet.ps.
- 8
-
C. Dwork and M.Naor.
Pricing via processing or combatting junk mail.
In Advances in Cryptology--CRYPTO '92, pages 139-147.
Springer-Verlag, 1992.
- 9
-
E.G. Gabber, P.B. Gibbons, D.M. Kristol, Y. Matias, and A. Mayer.
Consistent, yet anonymous web access with LPWA.
Communications of the ACM, 42(2):42-47, 1999.
- 10
-
P. Gemmell and M. Sudan.
Highly resilient correctors for polynomials.
Information Processing Letters, 43:169-174, 1992.
- 11
-
A. V. Goldberg and P. N. Yianilos.
Towards and archival intermemory.
In Proc. IEEE International Forum on Research and Technology
Advances in Digital Libraries (ADL'98), pages 147-156. IEEE Computer
Society, April 1998.
https://www.intermemory.org/.
- 12
-
I. Goldberg and D. Wagner.
TAZ servers and the rewebber network: Enabling anonymous publishing
on the world wide web.
First Monday, 3, 1998.
https://www.firstmonday.dk/issues/issue3_4/
goldberg/index.html.
- 13
-
Wendy M. Grossman.
Wired, 3(12):172 -177 and 248-252, December 1995.
https://www.wired.com/wired/archive/3.12/
alt.scientology.war_pr.html.
- 14
-
H. Krawczyk.
Secret sharing made short.
In Advances in Cryptology--CRYPTO '93, pages 136-143.
Springer-Verlag, 1993.
- 15
-
R. Motwani and P. Raghavan.
Randomized Algorithms.
Cambridge University Press, 1995.
- 16
-
Ron Newman.
The church of scientology vs. the net.
February 1998.
https://www2.thecia.net/users/rnewman/
scientology/home.html.
- 17
-
U.S. Library of Congress.
About the federalist papers.
https://lcweb2.loc.gov/const/
fed/abt_fedpapers.html.
- 18
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag.
Proxies for anonymous routing.
In 12th Annual Computer Security Applications Conference, 1996.
https://www.onion-router.net/Publications.html.
- 19
-
Michael K. Reiter and Aviel D. Rubin.
Crowds: Anonymity for web transactions.
ACM Transactions on Information System Security, 1(1), April
1998.
- 20
-
R. Rivest.
The MD5 message digest algorithm.
RFC 1321, April 1992.
- 21
-
B. Schneier.
Applied Cryptography.
John Wiley and Sons, 1996.
- 22
-
A. Shamir.
How to share a secret.
Communications of the ACM, 22:612-613, November 1979.
Avi Rubin
2000-06-13