BOOK-CHAPTER

Anonymous Traceback for End-to-End Encryption

Erin M. KenneyQiang TangChase Q. Wu

Year: 2022 Lecture notes in computer science Pages: 42-62   Publisher: Springer Science+Business Media
Keywords:
Computer science Computer security Communication source Anonymity Eavesdropping Encryption Overhead (engineering) Cryptography Internet privacy Computer network Operating system

Metrics

3
Cited By
1.09
FWCI (Field Weighted Citation Impact)
6
Refs
0.79
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

End-to-End Encryption

Benjamin Aleshire

Journal:   Pleiades Year: 2024 Vol: 44 (1)Pages: 285-285
JOURNAL ARTICLE

End-to-end encryption

Elizaveta Sergeevna Mazunina

Journal:   Academic community of students Year: 2016 Pages: 48-50
BOOK-CHAPTER

end-to-end encryption

Martin H. Weik

Year: 2000 Pages: 522-522
© 2026 ScienceGate Book Chapters — All rights reserved.