메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 114-128

Locating hidden servers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; SECURITY OF DATA; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES;

EID: 33750277833     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2006.24     Document Type: Conference Paper
Times cited : (241)

References (31)
  • 4
    • 84860034184 scopus 로고    scopus 로고
    • Anonymizer. http://www.anonymizer.com/.
  • 5
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, editor. Springer-Verlag, LNCS 2137
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
    • (2001) Information Hiding (IH 2001) , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 7
    • 0037974470 scopus 로고    scopus 로고
    • Dummy traffic against long term intersection attacks
    • R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
    • O. Berthold and H. Langos. Dummy traffic against long term intersection attacks. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
    • Berthold, O.1    Langos, H.2
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 20
    • 0028532812 scopus 로고
    • Denial of service: An example
    • R. M. Needham. Denial of service: an example. Communications of the ACM, 37(11):42-46, 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 42-46
    • Needham, R.M.1
  • 24
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • E. Snekkenes and D. Gollmann, editors. Springer-Verlag, LNCS 2808, October
    • A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In E. Snekkenes and D. Gollmann, editors, Computer Security - ESORICS 2003, pages 116-131. Springer-Verlag, LNCS 2808, October 2003.
    • (2003) Computer Security - ESORICS 2003 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 26
    • 84860033083 scopus 로고    scopus 로고
    • Tor Manual, http://tor.eff.org/tor-manual.html.en.
    • Tor Manual
  • 27
    • 84860036992 scopus 로고    scopus 로고
    • Torwiki
    • Torwiki. http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ.
  • 31
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • A preliminary version of this paper appeared in [29]
    • M. K. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [29].
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.