메뉴 건너뛰기




Volumn , Issue , 2005, Pages 63-71

Provable anonymity

Author keywords

Anonymity; Crowds; Cryptography; Epistemic Logic; Formal Methods; Knowledge; Onion Routing; Privacy; Unlinkability

Indexed keywords

DATA PRIVACY; ERROR ANALYSIS; FORMAL LOGIC; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 31844437820     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103576.1103585     Document Type: Conference Paper
Times cited : (57)

References (18)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 0004260840 scopus 로고    scopus 로고
    • Number 53 in Cambridge Tracts in Theoretical Computer Science. Cambridge University Press
    • P. Blackburn, M. de Rijke, and Y. Venema. Modal Logic. Number 53 in Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 2001.
    • (2001) Modal Logic
    • Blackburn, P.1    De Rijke, M.2    Venema, Y.3
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 9
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 137-150. Springer-Verlag, May 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 10
    • 31844457258 scopus 로고    scopus 로고
    • Key compromise, strand spaces, and the authentication tests
    • Mathematical Foundations of Programming Semantics 17, Elsevier, Amsterdam
    • J. Guttman. Key compromise, strand spaces, and the authentication tests. In Mathematical Foundations of Programming Semantics 17, volume 47 of Electronic Notes in Theoretical Computer Science, pages 1-21. Elsevier, Amsterdam, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.47 , pp. 1-21
    • Guttman, J.1
  • 13
    • 31844446595 scopus 로고    scopus 로고
    • A formalization of anonymity and onion routing
    • Esorics 2004, Sophia Antipolis
    • S. Mauw, J. Verschuren, and E. de Vink. A formalization of anonymity and onion routing. In Esorics 2004, volume 3193 of Lecture Notes in Computer Science, pages 109-124, Sophia Antipolis, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 109-124
    • Mauw, S.1    Verschuren, J.2    De Vink, E.3
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 18
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3):355-377, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3 , pp. 355-377
    • Shmatikov, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.