메뉴 건너뛰기




Volumn 4237 LNCS, Issue , 2006, Pages 22-32

On the privacy risks of publishing anonymized IP network traces

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; MATHEMATICAL MODELS; PACKET NETWORKS; STATISTICAL METHODS; USER INTERFACES; SOCIAL NETWORKING (ONLINE);

EID: 33845232198     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11909033_3     Document Type: Conference Paper
Times cited : (17)

References (20)
  • 10
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • Springer-Verlag, LNCS 2482
    • A. Hintz. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies (PET 2002), pages 171-178. Springer-Verlag, LNCS 2482, 2002.
    • (2002) Privacy Enhancing Technologies (PET 2002) , pp. 171-178
    • Hintz, A.1
  • 12
    • 0033697684 scopus 로고    scopus 로고
    • Sources and characteristics of web temporal locality
    • S. Jin and A. Bestavros. Sources and characteristics of web temporal locality. In MASCOTS, pages 28-35, 2000.
    • (2000) MASCOTS , pp. 28-35
    • Jin, S.1    Bestavros, A.2
  • 16
    • 10444260259 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • August
    • R. Pang and V. Paxson. A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In Proceedings of the ACM SIGCOMM Conference, August 2003.
    • (2003) Proceedings of the ACM SIGCOMM Conference
    • Pang, R.1    Paxson, V.2
  • 18
    • 85013350011 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • August
    • V. Paxson and S. Floyd. Wide-area traffic: the failure of Poisson modeling. In Proceedings of ACM SIGCOMM, pages 257-268. August 1994.
    • (1994) Proceedings of ACM SIGCOMM , pp. 257-268
    • Paxson, V.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.