Content deleted Content added
Be more consistent about boldface application: if digital signature isn't bold, neither should public-key encryption be. (There should be a separate article for public-key encryption but it hasn't been written yet.) |
Citation bot (talk | contribs) Alter: isbn, publisher, pages. Added hdl. Formatted dashes. Upgrade ISBN10 to 13. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 157/205 |
||
Line 93:
|title=Handbook of Financial Cryptography and Security
|year=2010
|isbn=
|publisher=Chapman &
|chapter=Chapter 13: Anonymous Communication
|author-last1=Danezis
Line 104:
|author-first3=Paul
|author-link3=Paul Syverson
|pages=
|url=https://www.freehaven.net/anonbib/cache/systems-anon-communication.pdf
|quote=Since PGP, beyond compressing the messages, does not make any further attempts to hide their size, it is trivial to follow a message in the network just by observing its length.
Line 132:
|url=https://dspace.mit.edu/handle/1721.1/149471
|chapter=11: Limitations of End-to-End Encryption
|hdl=1721.1/149471
|quote=The scenario just described would seem to be secure, because all data is encrypted before being passed to the communications processors. However, certain control information must be passed in cleartext from the host to the communications processor to allow the network to function. This control information consists of the destination address for the packet, the length of the packet, and the time between successive packet transmissions.
}}</ref><ref name="chaum1981untraceableemail">{{cite journal
Line 158 ⟶ 159:
|conference=[[USENIX]]
|year=2001
|pages=
|url=https://www.usenix.org/legacy/events/usenix01/full_papers/davis/davis_html/
|quote=Why is naïve Sign & Encrypt insecure? Most simply, S&E is vulnerable to “surreptitious forwarding:” Alice signs & encrypts for Bob's eyes, but Bob re-encrypts Alice's signed message for Charlie to see. In the end, Charlie believes Alice wrote to him directly, and can't detect Bob's subterfuge.
|