메뉴 건너뛰기




Volumn , Issue , 2005, Pages 514-524

Anonymity v.s. information leakage in anonymity systems

Author keywords

Anonymity; Covert Channels; Mix Networks

Indexed keywords

CHANNEL CAPACITY; INFORMATION ANALYSIS; MATHEMATICAL MODELS; REAL TIME SYSTEMS; TOPOLOGY; COMPUTER NETWORKS; DATA PRIVACY;

EID: 27944454436     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (49)

References (27)
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39-41, 1999.
    • (1999) Communications of the ACM (USA) , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 23
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors. Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
    • Serjantov, A.1    Danezis, G.2
  • 24
    • 2642544584 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • F. Petitcolas, editor. Springer-Verlag, LNCS 2578, October
    • A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
    • (2002) Proceedings of Information Hiding Workshop (IH 2002)
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 25
    • 20444435333 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • October
    • A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.
    • (2003) Proceedings of ESORICS 2003
    • Serjantov, A.1    Sewell, P.2
  • 26
    • 27944457902 scopus 로고    scopus 로고
    • Anonymity v.s. information leakage in a anonymity systems
    • Texas A&M University, Computer Science Department, October
    • Y. Zhu and R. Bettati. Anonymity v.s. information leakage in a anonymity systems. Technical Report 2004-10-3, Texas A&M University, Computer Science Department, October 2004.
    • (2004) Technical Report 2004-10-3
    • Zhu, Y.1    Bettati, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.