{"success":1,"onion":[{"id":"22402","titolo":"Free Haven's Selected Papers in Anonymity","ricetta":"[Offline \/ 2020-05-14] Free Haven's Selected Papers in Anonymity\nSelected Papers in Anonymity\nAnonymity Bibliography\u00a0|\u00a0Selected Papers in Anonymity\nBy topic\u00a0|\u00a0By date\u00a0|\u00a0By author\nYears:\n1977\n1978\n1981\n1985\n1988\n1990\n1991\n1993\n1995\n1996\n1997\n1998\n1999\n2000\n2001\n2002\n2003\n2004\n2005\n2006\n2007\n2008\n2009\n2010\n2011\n2012\n2013\n2014\n2015\nPublications by date\n1977\nNon-Discretionary Access Control for Decentralized Computing Systems (PDF)\u00a0(Cached:\u00a0PDF)by Paul A. Karger.\nLaboratory for Computer Science, Massachusetts Institute of Technology S. M. amp; E. E. thesis MIT\/LCS\/TR-179, May 1977. (BibTeX\u00a0entry)\u00b7Chapter 11, \"Limitations of End-to-End Encryption,\" has some early discussion of traffic analysis issues.\n1978\nLimitations of End-to-End Encryption in Secure Computer Networks (PDF)\u00a0(Cached:\u00a0PDF)by Michael A. Padlipsky, David W. Snow, and Paul A. Karger.\nThe MITRE Corporation: Bedford MA, HQ Electronic Systems Division technical report ESD-TR-78-158, August 1978. (BibTeX\u00a0entry)\u00b7\n1981\nUntraceable electronic mail, retu...","url":"http:\/\/entropisth3ctkzd.onion\/anonbib"}]}