메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 123-138

Probable innocence revisited

Author keywords

Anonymity; Crowds; Nondeterminism; Probability; Probable innocence

Indexed keywords

COMPUTER SCIENCE; CONSTRAINT THEORY; PROBABILISTIC LOGICS; PROBABILITY; SECURITY OF DATA;

EID: 33750488738     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.033     Document Type: Article
Times cited : (26)

References (24)
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptology 1 (1988) 65-75
    • (1988) J. Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 5
    • 33750437620 scopus 로고    scopus 로고
    • Y. Deng, C. Palamidessi, J. Pang, Weak probabilistic anonymity, in: Proc. of the International Workshop on Security Issues in Concurrency (SecCo), 2005. Electronic Notes in Theoretical Computer Science, Elsevier Science Publishers, 2005, to appear.
  • 6
    • 84957800033 scopus 로고    scopus 로고
    • C. Díaz, S. Seys, J. Claessens, B. Preneel, Towards measuring anonymity, in: Proc. of the International Workshop on Privacy Enhancing Technologies (PET), Lecture Notes in Computer Science, Vol. 2482, Springer, 2002. pp. 54-68.
  • 8
    • 1142263341 scopus 로고    scopus 로고
    • A.V. Evfimievski, J. Gehrke, R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proc. PODS 2003, 2003, pp. 211-222.
  • 9
    • 33646018220 scopus 로고    scopus 로고
    • J.Y. Halpern, K.R. O'Neill, Anonymity and information hiding in multiagent systems, in: Proc. 16th IEEE Computer Security Foundations Workshop, 2003, pp. 75-88.
  • 10
    • 24144492346 scopus 로고    scopus 로고
    • J.Y. Halpern, K.R. O'Neill, Anonymity and information hiding in multiagent systems, J. Comput. Security 13 (3) (2005) 483-512.
  • 12
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: a modular approach
    • Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: a modular approach. J. Comput. Security 12 1 (2004) 3-36
    • (2004) J. Comput. Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 13
    • 16244397718 scopus 로고    scopus 로고
    • M.Z. Kwiatkowska, G. Norman, D. Parker, PRISM 2.0: a tool for probabilistic model checking, in: Proc. First Internat. Conf. on Quantitative Evaluation of Systems (QEST), 2004, IEEE Computer Society, pp. 322-323.
  • 14
    • 17944377470 scopus 로고    scopus 로고
    • A randomized encoding of the π-calculus with mixed choice
    • Palamidessi C., and Herescu O.M. A randomized encoding of the π-calculus with mixed choice. Theoret. Comput. Sci. 335 2-3 (2005) 73-404
    • (2005) Theoret. Comput. Sci. , vol.335 , Issue.2-3 , pp. 73-404
    • Palamidessi, C.1    Herescu, O.M.2
  • 18
    • 84937444411 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • An extended abstract appeared in Proc. CONCUR '94, Lecture Notes in Computer Science, Vol. 836, Springer, Berlin, pp. 481-496
    • Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Nordic J. Computing 2 2 (1995) 250-273 An extended abstract appeared in Proc. CONCUR '94, Lecture Notes in Computer Science, Vol. 836, Springer, Berlin, pp. 481-496
    • (1995) Nordic J. Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2
  • 19
    • 84957802536 scopus 로고    scopus 로고
    • A. Serjantov, G. Danezis, Towards an information theoretic metric for anonymity, in: Proc. of the International Workshop on Privacy Enhancing Technologies (PET), Lecture Notes in Computer Science, Vol. 2482, Springer, 2002, pp. 41-53.
  • 20
    • 84948775332 scopus 로고    scopus 로고
    • V. Shmatikov, Probabilistic analysis of anonymity, in: Proc. of the IEEE Computer Security Foundations Workshop (CSFW), 2002, pp. 119-128.
  • 21
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • Shmatikov V. Probabilistic model checking of an anonymity system. J. Comput. Security 12 3/4 (2004) 355-377
    • (2004) J. Comput. Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 22
    • 0030676973 scopus 로고    scopus 로고
    • P.F. Syverson, D.M. Goldschlag, M.G. Reed, Anonymous connections and onion routing, in: IEEE Symp. on Security and Privacy, Oakland, CA, 1997, pp. 44-54.
  • 23
    • 84924758404 scopus 로고    scopus 로고
    • P.F. Syverson, S.G. Stubblebine, Group principals and the formalization of anonymity, in: World Cong. on Formal Methods (1), 1999, pp. 814-833.
  • 24
    • 33750456400 scopus 로고    scopus 로고
    • M. Wright, M. Adler, B. Levine, C. Shields, An analysis of the degradation of anonymous protocols, in: ISOC Network and Distributed System Security Symp. (NDSS), 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.