Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Untraceable electronic mail, return addresses, and digital pseudonyms

Published: 01 February 1981 Publication History
First page of PDF

References

[1]
Baran, P. On distributed communications: IX security secrecy and tamper-free considerations. Memo RM-3765-PR, Rand Corp., Santa Monica, CA, Aug. 1964.
[2]
Diffie,W. and Hellman, M.E. New directions in cryptography. IEEE Trans. Information Theory 1T-22, 6 (Nov. 1976), 644-654.
[3]
Kahn, D. The Code Breakers, The Story of Secret Writing. Macmillan, New York, 1967.
[4]
Merkle, R.C. Secure communications over insecure channels. Comm. ACM 21, 4 (Apt. 1978), 294-299.
[5]
Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1977), 120-126.

Cited By

View all
  • (2024)PACIFICIACR Communications in Cryptology10.62056/ay11fhbmoOnline publication date: 8-Jul-2024
  • (2024)Digitalized Voting System using Blockchain TechnologyInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-17955(381-386)Online publication date: 30-Apr-2024
  • (2024)Blockchain-Based Quantum Resistant Electoral Management System for the Post-Pandemic EraEnsuring Security and End-to-End Visibility Through Blockchain and Digital Twins10.4018/979-8-3693-3494-2.ch006(102-115)Online publication date: 28-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 24, Issue 2
Feb. 1981
29 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/358549
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 1981
Published in CACM Volume 24, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital signatures
  2. electronic mail
  3. privacy
  4. public key cryptosystems
  5. security
  6. traffic analysis

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,791
  • Downloads (Last 6 weeks)219
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)PACIFICIACR Communications in Cryptology10.62056/ay11fhbmoOnline publication date: 8-Jul-2024
  • (2024)Digitalized Voting System using Blockchain TechnologyInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-17955(381-386)Online publication date: 30-Apr-2024
  • (2024)Blockchain-Based Quantum Resistant Electoral Management System for the Post-Pandemic EraEnsuring Security and End-to-End Visibility Through Blockchain and Digital Twins10.4018/979-8-3693-3494-2.ch006(102-115)Online publication date: 28-Jun-2024
  • (2024)Enhancing Trust in Transactive Energy with Individually Linkable Pseudonymous Trading Using Smart ContractsEnergies10.3390/en1714356817:14(3568)Online publication date: 20-Jul-2024
  • (2024)A Novel Scalable Quantum Protocol for the Dining Cryptographers ProblemDynamics10.3390/dynamics40100104:1(170-191)Online publication date: 8-Mar-2024
  • (2024)A Multi-Candidate Self-Tallying Voting Scheme Based on Smart ContractsCryptography10.3390/cryptography80300428:3(42)Online publication date: 12-Sep-2024
  • (2024)Auditable Anonymous Electronic ExaminationCryptography10.3390/cryptography80200198:2(19)Online publication date: 1-May-2024
  • (2024)A P2P Scheme for Debating and Voting with Unconditional FlexibilityApplied Sciences10.3390/app1408350214:8(3502)Online publication date: 21-Apr-2024
  • (2024)Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption SolutionApplied Sciences10.3390/app1403096614:3(966)Online publication date: 23-Jan-2024
  • (2024)Transformation from e-voting to e-chequePLOS ONE10.1371/journal.pone.030265919:6(e0302659)Online publication date: 20-Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media