An efficient methodology to limit path length guaranteeing anonymity in overlay networks
Proceedings:
SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
ISBN: 9789898111593
Year of publication: 2008
Pages: 205-208
Type: Conference paper