메뉴 건너뛰기




Volumn , Issue , 2005, Pages 43-48

Circumventing IP-address pseudonymization

Author keywords

Anonymity; Network Monitoring; Network Security; Traffic Analysis

Indexed keywords

DATA PROCESSING; INTERNET; PACKET NETWORKS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33244468799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (15)
  • 3
    • 79251645890 scopus 로고    scopus 로고
    • Anonymization of IP traffic monitoring data - Attacks on two prefix-preserving anonymization schemes and some proposed remedies
    • T.Brekne, A. Øslebø, and A. Årnes, Anonymization of IP Traffic Monitoring Data - Attacks on Two Prefix-preserving Anonymization Schemes and Some Proposed Remedies, Privacy Enhancing Technologies 2005.
    • Privacy Enhancing Technologies 2005
    • Brekne, T.1    Øslebø, A.2    Årnes, A.3
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 4(2), 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 5
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology, Vol. 1, Pages 56-75, 1988.
    • (1988) Journal of Cryptology , vol.1
    • Chaum, D.1
  • 8
    • 1242263141 scopus 로고    scopus 로고
    • A method to compress and anonymize packet traces
    • M. Peuhkuri, A Method to Compress and Anonymize Packet Traces, Internet Measurement Workshop 2001, pages 257-261, 2001.
    • (2001) Internet Measurement Workshop 2001 , pp. 257-261
    • Peuhkuri, M.1
  • 11
    • 0038311863 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • LNCS 2009, Springer-verlag
    • J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems, Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, Springer-Verlag, 2000.
    • (2000) Workshop on Design Issues in Anonymity and Unobservability
    • Raymond, J.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.