메뉴 건너뛰기




Volumn 12, Issue 1 SPEC. ISS., 2004, Pages 3-36

Information hiding, anonymity and privacy: A modular approach

Author keywords

Anonymity; Information hiding; Knowledge; Kripke structure; Logic; Privacy; Security; Verification

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; EQUIVALENCE CLASSES; MATHEMATICAL MODELS; PROBABILITY DISTRIBUTIONS; RANDOM NUMBER GENERATION; SECURITY OF DATA; SET THEORY;

EID: 0344875575     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-12102     Document Type: Conference Paper
Times cited : (151)

References (39)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi-calculus
    • M. Abadi and A. Gordon, A calculus for cryptographic protocols: the spi-calculus, Information and Computation 148(1) (1999), 1-70.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 4
    • 0344844023 scopus 로고    scopus 로고
    • http://www.anonymizer.com.
  • 5
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), J. Cryptology 15(2) (2002), 103-127.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • D. Chaum, Security without identification: transaction systems to make Big Brother obsolete, Communications of the ACM 28(10) (1985), 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 0023861309 scopus 로고
    • The Dining Cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, The Dining Cryptographers problem: unconditional sender and recipient untraceability, J. Cryptology 1 (1) (1988), 65-75.
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Proc. International Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
    • I. Clarke, O. Sandberg, B. Wiley and T.W. Hong, Freenet: A distributed anonymous information storage and retrieval system, in: Proc. International Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of LNCS, Springer-Verlag, 2000, pp. 46-66.
    • (2000) LNCS , vol.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 20
    • 0027665952 scopus 로고
    • Knowledge, probability, and adversaries
    • J. Halpern and M. Tuttle, Knowledge, probability, and adversaries, J. ACM 40(4) (1993), 917-962.
    • (1993) J. ACM , vol.40 , Issue.4 , pp. 917-962
    • Halpern, J.1    Tuttle, M.2
  • 22
    • 0344412460 scopus 로고    scopus 로고
    • IS 15408
    • ISO, IS 15408, http://www.commoncriteria.org/, 1999.
    • (1999)
  • 24
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • Proc. World Congress on Formal Methods, Springer-Verlag
    • P. Lincoln, J.C. Mitchell, M. Mitchell and A. Scedrov, Probabilistic polynomial-time equivalence and security analysis, in: Proc. World Congress on Formal Methods, Volume 1708 of LNCS, Springer-Verlag, 1999, pp. 776-793.
    • (1999) LNCS , vol.1708 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.C.2    Mitchell, M.3    Scedrov, A.4
  • 25
    • 0344412459 scopus 로고    scopus 로고
    • Private communication
    • D. Malkhi, Private communication, 2001.
    • (2001)
    • Malkhi, D.1
  • 27
    • 0003056522 scopus 로고
    • ISDN-MIXes - Untraceable communication with very small bandwidth overhead
    • A. Pfitzmann, B. Pfitzmann and M. Waidner, ISDN-MIXes - untraceable communication with very small bandwidth overhead, in: Proc. IFIP/Sec 91, 1991, pp. 245-258.
    • (1991) Proc. IFIP/Sec '91 , pp. 245-258
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 28
    • 0023331864 scopus 로고
    • Networks without user observability
    • A. Pfitzmann and M. Waidner, Networks without user observability, Computers and Security 6(2) (1987), 158-166.
    • (1987) Computers and Security , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 31
    • 0001995203 scopus 로고
    • Continuous lattices
    • Lecture Note in Mathematics 274, E. Lawvere, ed., Springer-Verlag
    • D.S. Scott, Continuous lattices, in: Topases, Algebraic Geometry and Logic, Lecture Note in Mathematics 274, E. Lawvere, ed., Springer-Verlag, 1972, pp. 97-136.
    • (1972) Topases, Algebraic Geometry and Logic , pp. 97-136
    • Scott, D.S.1
  • 35
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • Proc. 4th European Symposium on Research in Computer Security (ESORICS), Springer-Verlag
    • S. Schneider and A. Sidiroupoulos, CSP and anonymity, in: Proc. 4th European Symposium on Research in Computer Security (ESORICS), Volume 1146 of LNCS, Springer-Verlag, 1996, pp. 198-218.
    • (1996) LNCS , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiroupoulos, A.2
  • 36
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
    • Computer Science Laboratory, SRI
    • P. Samarati and L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-03, Computer Science Laboratory, SRI, 1998.
    • (1998) Technical Report , vol.SRI-CSL-98-03
    • Samarati, P.1    Sweeney, L.2
  • 37
    • 84924758404 scopus 로고    scopus 로고
    • Group principals and the formalization of anonymity
    • Proc. World Congress on Formal Methods, Springer-Verlag
    • P. Syverson and S. Stubblebine, Group principals and the formalization of anonymity, in: Proc. World Congress on Formal Methods, Volume 1708 of LNCS, Springer-Verlag, 1999, pp. 814-833.
    • (1999) LNCS , vol.1708 , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 39
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Proc. International Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
    • P. Syverson, G. Tsudik, M. Reed and C. Landwehr, Towards an analysis of onion routing security, in: Proc. International Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of LNCS, Springer-Verlag, 2000, pp. 96-114.
    • (2000) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.