- D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84--88, February 1981. Google ScholarDigital Library
- X. Fu, B. Graham, R. Bettati, and W. Zhao, "On countermeasures to traffic analysis attacks," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 188--195, 18--23 June 2003.Google Scholar
- T. Cover and J. Thomas, Elements of Information Theory. John Wiley & Sons, Inc., 1991. Google ScholarDigital Library
Index Terms
- Dummy rate analysis of buffer constrained chaum mix
Recommendations
Dummy rate analysis of buffer constrained chaum mix
SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conferenceDensity gradient minimization with coupling-constrained dummy fill for CMP control
ISPD '10: Proceedings of the 19th international symposium on Physical designIn the nanometer IC design, dummy fill is often performed to improve layout pattern uniformity and the post-CMP quality. However, filling dummies might greatly increase interconnect coupling capacitance and thus circuit delay, and might also lead to ...
Rate vs. buffer size: greedy information gathering on the line
SPAA '07: Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architecturesWe consider packet networks with limited buffer space at the nodes, and are interested in the question of maximizing the number of packets that arrive to destination rather than being dropped due to full buffers.
We initiate a more refined analysis of ...
Comments