메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Effective probabilistic approach protecting sensor traffics

Author keywords

[No Author keywords available]

Indexed keywords

SENSOR NETWORKS; SENSOR TRAFFICS; TRAFFIC ANALYSIS ATTACKS; WIRELESS TRANSMISSIONS;

EID: 33847350601     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2005.1605681     Document Type: Conference Paper
Times cited : (42)

References (18)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic Analysis Attacks and Tradeoffs in Anonymity Providing Systems
    • I. S. Moskowitz, editor, Fourth International Workshop on Information Hiding IH'01
    • A. Back, U. Möller, and A. Stiglic. Traffic Analysis Attacks and Tradeoffs in Anonymity Providing Systems. In I. S. Moskowitz, editor, Fourth International Workshop on Information Hiding (IH'01), Lecture Notes in Computer Science, 2137, pages 245-257, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, editor, DIAU'00
    • O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 115-129, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 4
    • 84957805506 scopus 로고    scopus 로고
    • Dummy Traffic against Long Term Intersection Attacks
    • R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
    • O. Berthold and H. Langos. Dummy Traffic against Long Term Intersection Attacks. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 110-128, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 110-128
    • Berthold, O.1    Langos, H.2
  • 5
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    • D. L. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, 1(1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.L.1
  • 8
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting Websites Using Traffic Analysis
    • R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
    • A. Hintz. Fingerprinting Websites Using Traffic Analysis. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 171-178, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 171-178
    • Hintz, A.1
  • 10
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go MIXes Providing Probabilistic Security in an Open System
    • Second International Workshop on Information Hiding IH'98
    • D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go MIXes Providing Probabilistic Security in an Open System. Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science 1525, pages 83-98, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Buschkes, R.3
  • 11
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
    • J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
    • (2003) ACM MOBIHOC'03 , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 12
    • 14844303406 scopus 로고    scopus 로고
    • Source-Location Privacy in Energy-Constrained Sensor Network Routing
    • C. Ozturk, Y. Zhang, and W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In ACM SASN, pages 88-93, 2004.
    • (2004) ACM SASN , pp. 88-93
    • Ozturk, C.1    Zhang, Y.2    Trappe, W.3
  • 13
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
    • H. Federrath, editor, DIAU'00
    • A. Pfitzmann and M. Köhntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 1-9, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 15
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, DIAU'00
    • J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 10-29, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 16
    • 84957802536 scopus 로고    scopus 로고
    • Towards an Information Theoretic Metric for Anonymity
    • R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002
    • A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 41-53, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 17
    • 35248841429 scopus 로고    scopus 로고
    • From a Trickle to a Flood: Active Attacks on Several Mix Types
    • F. A. P. Petitcolas, editor, Fifth International Workshop on Information Hiding IH'02
    • A. Serjantov, R. Dingledine, and P. F. Syverson. From a Trickle to a Flood: Active Attacks on Several Mix Types. In F. A. P. Petitcolas, editor, Fifth International Workshop on Information Hiding (IH'02), Lecture Notes in Computer Science, 2578, pages 36-52, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 36-52
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.