메뉴 건너뛰기




Volumn 4, Issue 3, 2005, Pages 172-180

Passive-attack analysis for connection-based anonymity systems

Author keywords

Anonymous communication systems; Traffic analysis

Indexed keywords

DATA PRIVACY; INTERNET; NETWORK PROTOCOLS; TELECOMMUNICATION SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 19744377978     PISSN: 16155262     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10207-004-0059-3     Document Type: Article
Times cited : (5)

References (22)
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Back A, Müller U, Stiglic A (2001) Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information hiding workshop. Lecture notes in computer science, vol 2137. Springer, Berlin Heidelberg New York, pp 245-257
    • (2001) Information Hiding Workshop , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 0037974466 scopus 로고    scopus 로고
    • The disadvantages of free MIX routes and how to overcome them
    • Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Berthold O, Pfitzmann A, Standtke R (2000) The disadvantages of free MIX routes and how to overcome them. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp 10-29
    • (2000) Workshop on the Design Issues in Anonymity and Observability , vol.2009 , pp. 10-29
    • Berthold, O.1    Pfitzmann, A.2    Standtke, R.3
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • Chaum D (1981) Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24(2):84-88
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • Dresden, Germany, Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Danezis G (2003) Mix-networks with restricted routes. In: Workshop on privacy enhancing technologies, Dresden, Germany. Lecture notes in computer science, vol 2760. Springer, Berlin Heidelberg New York
    • (2003) Workshop on Privacy Enhancing Technologies , vol.2760
    • Danezis, G.1
  • 11
    • 19744368424 scopus 로고    scopus 로고
    • The JAP project
    • The JAP project. http://anon.inf.tu-dresden.de/index_en.html
  • 12
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go MIXes: Providing probabilistic anonymity in an open system
    • Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Kesdogan D, Egner J, Büschkes R (1998) Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Information hiding workshop. Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York
    • (1998) Information Hiding Workshop , vol.1525
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 14
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Raymond J (2000) Traffic analysis: Protocols, attacks, design issues, and open problems. In: Workshop on the design issues in anonymity and observability. Lecture notes in computer science, vol 2009. Springer, Berlin Heidelberg New York, pp 10-29
    • (2000) Workshop on the Design Issues in Anonymity and Observability , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 15
    • 19744377678 scopus 로고    scopus 로고
    • Practical anonymity for the masses with mix-networks
    • Technical Report 157, ETH Zurich, Switzerland
    • Rennhard M (2003) Practical anonymity for the masses with mix-networks. Technical Report 157, ETH Zurich, Switzerland
    • (2003)
    • Rennhard, M.1
  • 16
    • 20444437836 scopus 로고    scopus 로고
    • Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
    • Washington DC
    • Rennhard M, Plattner B (2002) Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In: Workshop on privacy in the electronic society (WPES), Washington DC
    • (2002) Workshop on Privacy in the Electronic Society (WPES)
    • Rennhard, M.1    Plattner, B.2
  • 18
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • San Francisco. Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Workshop on privacy enhancing technologies, San Francisco. Lecture notes in computer science, vol 2482. Springer, Berlin Heidelberg New York
    • (2002) Workshop on Privacy Enhancing Technologies , vol.2482
    • Serjantov, A.1    Danezis, G.2
  • 19
    • 2642544584 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Serjantov A, Dingledine R, Syverson P (2002) From a trickle to a flood: active attacks on several mix types. In: Information hiding workshop. Lecture notes in computer science, vol 2578. Springer, Berlin Heidelberg New York
    • (2002) Information Hiding Workshop , vol.2578
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.