메뉴 건너뛰기




Volumn 3810 LNCS, Issue , 2005, Pages 261-273

Non-expanding transaction specific pseudonymization for IP traffic monitoring

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER HARDWARE; DATA REDUCTION; INFORMATION MANAGEMENT; INTERNET; NETWORK PROTOCOLS;

EID: 33744794886     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11599371_22     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 2
    • 79251645890 scopus 로고    scopus 로고
    • Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies
    • Brekne, T., Årnes, A., Øslebø, A.: Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). (2005)
    • (2005) Proceedings of Privacy Enhancing Technologies Workshop (PET 2005)
    • Brekne, T.1    Årnes, A.2    Øslebø, A.3
  • 4
    • 85086053727 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B., ed.: Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Springer-Verlag
    • Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Pfitzmann, B., ed.: Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Springer-Verlag, LNCS 2045 (2003)
    • (2003) LNCS , vol.2045
    • Camenisch, J.1    Lysyanskaya, A.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4 (1981)
    • (1981) Communications of the ACM , vol.4
    • Chaum, D.1
  • 7
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 8
    • 0038311863 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
    • Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, LNCS 2009 (2000)
    • (2000) LNCS , vol.2009
    • Raymond, J.F.1
  • 9
    • 84862620665 scopus 로고    scopus 로고
    • On pseudonymization of audit data for intrusion detection
    • Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
    • Biskup, J., Flegel, U.: On pseudonymization of audit data for intrusion detection. In: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, LNCS 2009 (2000)
    • (2000) LNCS , vol.2009
    • Biskup, J.1    Flegel, U.2
  • 10
    • 0343472295 scopus 로고    scopus 로고
    • Pseudonymous audit for privacy enhanced intrusion detection
    • Sobirey, M., Fischer-Hübner, S., Rannenberg, K.: Pseudonymous audit for privacy enhanced intrusion detection. In: SEC. (1997) 151-163
    • (1997) SEC , pp. 151-163
    • Sobirey, M.1    Fischer-Hübner, S.2    Rannenberg, K.3
  • 12
    • 24344436696 scopus 로고    scopus 로고
    • Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • Xu, J., Fan, J., Ammar, M., Moon, S.B.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. ICNP 2002 (2002)
    • (2002) ICNP 2002
    • Xu, J.1    Fan, J.2    Ammar, M.3    Moon, S.B.4
  • 16
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym systems
    • Keys, H., Adams, C., eds.: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Springer-Verlag
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In Keys, H., Adams, C., eds.: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Springer-Verlag, LNCS 1758 (1999)
    • (1999) LNCS , vol.1758
    • Lysyanskaya, A.1    Rivest, R.L.2    Sahai, A.3    Wolf, S.4
  • 17
    • 33744781066 scopus 로고    scopus 로고
    • An efficient and usable multi-show non-transferable anonymous credential system
    • Financial Cryptography: 8th International Conference, Springer-Verlag
    • Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Financial Cryptography: 8th International Conference, Springer-Verlag, LNCS 3110 (2004) 196-211
    • (2004) LNCS , vol.3110 , pp. 196-211
    • Persiano, G.1    Visconti, I.2
  • 19
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • Diffie, W., Hellman, M.E.: Privacy and authentication: An introduction to cryptography. In: Proceedings of the IEEE. Volume 67. (1979) 297-427
    • (1979) Proceedings of the IEEE , vol.67 , pp. 297-427
    • Diffie, W.1    Hellman, M.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.