메뉴 건너뛰기




Volumn 53, Issue 1, 2004, Pages 103-115

A quantitative analysis of anonymous communications

Author keywords

Anonymous communication; Network security; Rerouting; Sender receiver anonymity

Indexed keywords

ELECTRONIC MAIL; NETWORK PROTOCOLS; PROBABILITY; SECURITY OF DATA; SYSTEMS ANALYSIS; WEB BROWSERS;

EID: 1942500486     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2004.824826     Document Type: Article
Times cited : (18)

References (41)
  • 1
    • 1942475932 scopus 로고    scopus 로고
    • The Anonymizer [Online]
    • The Anonymizer [Online]. Available: http:/www.anonymizer.com/
  • 2
    • 1942508061 scopus 로고    scopus 로고
    • Anonymous Remailer [Online]
    • Anonymous Remailer [Online]. Available: http://www.lcs.mit.edu/research/anonymous.html
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • ____, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 6
    • 84976841221 scopus 로고
    • Generating beta variatew with nonintegral shape parameters
    • R. C. H. Cheng, "Generating beta variatew with nonintegral shape parameters," Communications of the ACM, vol. 21, no. 4, pp. 317-322, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 317-322
    • Cheng, R.C.H.1
  • 13
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Communications of the ACM, vol. 42, no. 2, pp. 39-41, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 14
    • 0033282985 scopus 로고    scopus 로고
    • Preventing traffic analysis for real-time communication networks
    • Nov.
    • Y. Guan et al., "Preventing traffic analysis for real-time communication networks," in Proc. IEEE MILCOM1999, vol. 1, Nov. 1999, pp. 744-750.
    • (1999) Proc. IEEE MILCOM1999 , vol.1 , pp. 744-750
    • Guan, Y.1
  • 16
    • 0035402083 scopus 로고    scopus 로고
    • NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
    • July; Special Issue on Information Assurance
    • Y. Guan et al., NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications, in IEEE Trans, System, Man, and Cybernetics, vol. 31, no. 4, pp. 253-266, July 2001. Special Issue on Information Assurance.
    • (2001) IEEE Trans, System, Man, and Cybernetics , vol.31 , Issue.4 , pp. 253-266
    • Guan, Y.1
  • 17
    • 1942508055 scopus 로고    scopus 로고
    • A quantitative analysis of anonymous communications
    • Dept. of Computer Science, Texas A&M University, Technical Report TR01-016, July
    • Y. Guan, X. Fu, R. Bettati, and W. Zhao, "A Quantitative Analysis of Anonymous Communications," Dept. of Computer Science, Texas A&M University, Technical Report TR01-016, July 2001.
    • (2001)
    • Guan, Y.1    Fu, X.2    Bettati, R.3    Zhao, W.4
  • 20
    • 0032074980 scopus 로고    scopus 로고
    • Real-time mixes: A bandwidth-efficient anonymity protocol
    • A. Jerichow et al., "Real-time mixes: A bandwidth-efficient anonymity protocol," IEEE J. Selected Areas in Communications, vol. 16, no. 4, pp. 495-509, 1998.
    • (1998) IEEE J. Selected Areas in Communications , vol.16 , Issue.4 , pp. 495-509
    • Jerichow, A.1
  • 21
    • 1942475930 scopus 로고    scopus 로고
    • Lucent Personalized Web Assistant
    • Lucent Personalized Web Assistant (2001). [Online]. Available: http://www.bell-labs.com/projects/lpwa
    • (2001)
  • 22
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • RFC2401
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol,", RFC2401, 1998.
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 27
    • 84949756689 scopus 로고    scopus 로고
    • ESORICS'96
    • E. Kurth, G. Martella, and E. Montolivio, Eds: Springer-Verlag; LNCS
    • S. Schneider and A. Sidiropoulos, "ESORICS'96," in CSP and Anonymity, E. Kurth, G. Martella, and E. Montolivio, Eds: Springer-Verlag, 1996, vol. 1146, pp. 198-218. LNCS.
    • (1996) CSP and Anonymity , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 32
    • 84924758404 scopus 로고    scopus 로고
    • Group principles and the formalization of anonymity
    • Springer-Verlag, LNCS 1708
    • P. Syverson and S. Stubblebine, "Group principles and the formalization of anonymity," in World Congress on Formal Methods' 1999: Springer-Verlag, LNCS 1708, pp. 814-833.
    • World Congress on Formal Methods' 1999 , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 35
    • 1942443750 scopus 로고    scopus 로고
    • in Personal Communication, Zero-Knowledge Systems Inc., May
    • Anton stiglic, in Personal Communication, Zero-Knowledge Systems Inc., May 2001.
    • (2001) Anton Stiglic
  • 36
    • 0033244305 scopus 로고    scopus 로고
    • Anonymous communication policies for the internet: Results and recommendations of the AAAS conference
    • A. Teich, M. Frankel, R. Kling, and Y.-C. Lee, "Anonymous communication policies for the internet: Results and recommendations of the AAAS conference," The Information Society, vol. 15, no. 2, 1999.
    • (1999) The Information Society , vol.15 , Issue.2
    • Teich, A.1    Frankel, M.2    Kling, R.3    Lee, Y.-C.4
  • 38
    • 1942508057 scopus 로고    scopus 로고
    • Report from the national workshop on internet voting released. presented at National Workshop on Internet Voting
    • Report from the national workshop on internet voting released. presented at National Workshop on Internet Voting. [Online]. Available: http://www.netvoting.org/Resources/InternetVotingReport.pdf
  • 39
    • 84896508047 scopus 로고    scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • M. Waidner, "Unconditional sender and recipient untraceability in spite of active attacks," in Proc. Eurocrypt, 1989, pp. 302-319.
    • Proc. Eurocrypt, 1989 , pp. 302-319
    • Waidner, M.1
  • 41
    • 1942539898 scopus 로고    scopus 로고
    • Zero-knowledge Systems
    • Zero-knowledge Systems (2001). [Online]. Available: http://www.zero-knowledge.com/
    • (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.