skip to main content
article
Free access

Untraceable electronic mail, return addresses, and digital pseudonyms

Published: 01 February 1981 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    Baran, P. On distributed communications: IX security secrecy and tamper-free considerations. Memo RM-3765-PR, Rand Corp., Santa Monica, CA, Aug. 1964.
    [2]
    Diffie,W. and Hellman, M.E. New directions in cryptography. IEEE Trans. Information Theory 1T-22, 6 (Nov. 1976), 644-654.
    [3]
    Kahn, D. The Code Breakers, The Story of Secret Writing. Macmillan, New York, 1967.
    [4]
    Merkle, R.C. Secure communications over insecure channels. Comm. ACM 21, 4 (Apt. 1978), 294-299.
    [5]
    Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1977), 120-126.

    Cited By

    View all
    • (2024)PACIFICIACR Communications in Cryptology10.62056/ay11fhbmoOnline publication date: 8-Jul-2024
    • (2024)Digitalized Voting System using Blockchain TechnologyInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-17955(381-386)Online publication date: 30-Apr-2024
    • (2024)A Novel Scalable Quantum Protocol for the Dining Cryptographers ProblemDynamics10.3390/dynamics40100104:1(170-191)Online publication date: 8-Mar-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 24, Issue 2
    Feb. 1981
    29 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/358549
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 1981
    Published in CACM Volume 24, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. digital signatures
    2. electronic mail
    3. privacy
    4. public key cryptosystems
    5. security
    6. traffic analysis

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,605
    • Downloads (Last 6 weeks)182

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)PACIFICIACR Communications in Cryptology10.62056/ay11fhbmoOnline publication date: 8-Jul-2024
    • (2024)Digitalized Voting System using Blockchain TechnologyInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-17955(381-386)Online publication date: 30-Apr-2024
    • (2024)A Novel Scalable Quantum Protocol for the Dining Cryptographers ProblemDynamics10.3390/dynamics40100104:1(170-191)Online publication date: 8-Mar-2024
    • (2024)Auditable Anonymous Electronic ExaminationCryptography10.3390/cryptography80200198:2(19)Online publication date: 1-May-2024
    • (2024)A P2P Scheme for Debating and Voting with Unconditional FlexibilityApplied Sciences10.3390/app1408350214:8(3502)Online publication date: 21-Apr-2024
    • (2024)Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption SolutionApplied Sciences10.3390/app1403096614:3(966)Online publication date: 23-Jan-2024
    • (2024)Transformation from e-voting to e-chequePLOS ONE10.1371/journal.pone.030265919:6(e0302659)Online publication date: 20-Jun-2024
    • (2024)Blockchain-Based Electronic Voting System: Significance and RequirementsMathematical Problems in Engineering10.1155/2024/55911472024(1-17)Online publication date: 24-Feb-2024
    • (2024)CLAM: Client-Aware Routing in Mix NetworksProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659631(199-209)Online publication date: 24-Jun-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media