메뉴 건너뛰기




Volumn 13, Issue 3, 2005, Pages 483-514

Anonymity and information hiding in multiagent systems

Author keywords

Anonymity; Epistemic logic; Formal methods; Security

Indexed keywords

ALGEBRA; INFORMATION ANALYSIS; KNOWLEDGE ACQUISITION; PROBABILISTIC LOGICS;

EID: 24144492346     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13305     Document Type: Conference Paper
Times cited : (108)

References (34)
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology 1(1) (1988), 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 4
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • Proc. Privacy Enhancing Technologies Workshop (PET 2003), R. Dingledine, ed., Springer-Verlag, Berlin/New York
    • G. Danezis, Mix-networks with restricted routes, in: Proc. Privacy Enhancing Technologies Workshop (PET 2003), R. Dingledine, ed., Volume 2760 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2003, pp. 54-68.
    • (2003) Lecture Notes in Computer Science , vol.2760 , pp. 54-68
    • Danezis, G.1
  • 5
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Springer-Verlag, Berlin/New York
    • C. Diaz, S. Seys, J. Claessens and B. Preneel, Towards measuring anonymity, in: Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Volume 2482 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2002, pp. 54-68.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 8
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Springer-Verlag
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Foundationsof Security Analysis and Design, Springer-Verlag, 2001, pp. 331-396.
    • (2001) Foundationsof Security Analysis and Design , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 35248847052 scopus 로고    scopus 로고
    • Hiding names: Private authentication in the applied pi calculus
    • Proc. International Symposium on Software Security (ISSS 2002), Springer-Verlag, Berlin/New York
    • C. Fournet and M. Abadi, Hiding names: Private authentication in the applied pi calculus, in: Proc. International Symposium on Software Security (ISSS 2002), Volume 2609 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2003, pp. 317-338.
    • (2003) Lecture Notes in Computer Science , vol.2609 , pp. 317-338
    • Fournet, C.1    Abadi, M.2
  • 12
    • 0032047481 scopus 로고    scopus 로고
    • A logical approach to multillevel security of probabilistic systems
    • J.W. Gray and P.F. Syverson, A logical approach to multillevel security of probabilistic systems, Distributed Computing 11(2) (1998), 73-90.
    • (1998) Distributed Computing , vol.11 , Issue.2 , pp. 73-90
    • Gray, J.W.1    Syverson, P.F.2
  • 15
    • 0035754511 scopus 로고    scopus 로고
    • On the relationship between strand spaces and multi-agent systems
    • To appear, ACM Transactions on Information and System Security
    • J.Y. Halpern and R. Pucella, On the relationship between strand spaces and multi-agent systems, in: Proc. Eighth ACM Conference on Computer and Communications Security, 2001, pp. 106-115. To appear, ACM Transactions on Information and System Security.
    • (2001) Proc. Eighth ACM Conference on Computer and Communications Security , pp. 106-115
    • Halpern, J.Y.1    Pucella, R.2
  • 16
    • 0027665952 scopus 로고
    • Knowledge, probability, and adversaries
    • J.Y. Halpern and M.R. Tuttle, Knowledge, probability, and adversaries, Journal of the ACM 40(4) (1993), 917-962.
    • (1993) Journal of the ACM , vol.40 , Issue.4 , pp. 917-962
    • Halpern, J.Y.1    Tuttle, M.R.2
  • 18
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • D. Hughes and V. Shmatikov, Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security 12(1) (2004), 3-36.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 20
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A multicast based protocol for anonymity
    • B.N. Levine and C. Shields, Hordes: A multicast based protocol for anonymity, Journal of Computer Security 10(3) (2002), 213-240.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 21
    • 0003630836 scopus 로고
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York
    • R. Milner, A Calculus of Communicating Systems, Lecture Notes in Computer Science, Vol. 92, Springer-Verlag, Berlin/New York, 1980.
    • (1980) A Calculus of Communicating Systems , vol.92
    • Milner, R.1
  • 22
    • 0346338341 scopus 로고    scopus 로고
    • Common knowledge and update in finite environments
    • R. van der Meyden, Common knowledge and update in finite environments, Information and Computation 140(2) (1998), 115-157.
    • (1998) Information and Computation , vol.140 , Issue.2 , pp. 115-157
    • Van Der Meyden, R.1
  • 28
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Springer-Verlag, Berlin/New York
    • A. Serjantov and G. Danezis, Towards an information theoretic metric for anonymity, in: Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Volume 2482 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2002, pp. 41-53.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.