메뉴 건너뛰기




Volumn 180, Issue 1, 2007, Pages 55-76

Weak Probabilistic Anonymity

Author keywords

Anonymity; Dining Cryptographers; Nondeterminism; Probability

Indexed keywords

ANONYMITY; DINING CRYPTOGRAPHERS; NONDETERMINISM;

EID: 34249809380     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.05.047     Document Type: Article
Times cited : (18)

References (16)
  • 2
    • 84944391391 scopus 로고    scopus 로고
    • Model checking continuous-time markov chains by transient analysis
    • Proceedings of the 12th Conference on Computer Aided Verification, Springer-Verlag
    • Baier C., Haverkort B., Hermanns H., and Katoen J.-P. Model checking continuous-time markov chains by transient analysis. Proceedings of the 12th Conference on Computer Aided Verification. Lecture Notes in Computer Science volume 1855 (2000), Springer-Verlag 358-372
    • (2000) Lecture Notes in Computer Science , vol.1855 , pp. 358-372
    • Baier, C.1    Haverkort, B.2    Hermanns, H.3    Katoen, J.-P.4
  • 3
    • 0032131465 scopus 로고    scopus 로고
    • Model checking for a probabilistic branching time logic with fairness
    • Baier C., and Kwiatkowska M. Model checking for a probabilistic branching time logic with fairness. Distributed Computing 11 3 (1998) 125-155
    • (1998) Distributed Computing , vol.11 , Issue.3 , pp. 125-155
    • Baier, C.1    Kwiatkowska, M.2
  • 4
    • 34249780871 scopus 로고    scopus 로고
    • Mohit Bhargava and Catuscia Palamidessi. Probabilistic anonymity. Technical report, INRIA Futurs and LIX, 2005. To appear in the proceedings of CONCUR 2005. Report version available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report.ps
  • 5
    • 21844505024 scopus 로고
    • Model checking of probabilistic and nondeterministic systems
    • Proceedings of the 15th Conference on Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag
    • Bianco A., and de Alfaro L. Model checking of probabilistic and nondeterministic systems. Proceedings of the 15th Conference on Foundations of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science volume 1026 (1995), Springer-Verlag 499-513
    • (1995) Lecture Notes in Computer Science , vol.1026 , pp. 499-513
    • Bianco, A.1    de Alfaro, L.2
  • 6
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 33646018220 scopus 로고    scopus 로고
    • Joseph Y. Halpern and Kevin R. O'Neill. Anonymity and information hiding in multiagent systems. In Proc. of the 16th IEEE Computer Security Foundations Workshop, pages 75-88, 2003
  • 8
    • 0003096318 scopus 로고
    • A logic for reasoning about time and reliability
    • Hansson H., and Jonsson B. A logic for reasoning about time and reliability. Formal Aspects of Computing 6 5 (1994) 512-535
    • (1994) Formal Aspects of Computing , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 9
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go MIXes: Providing probabilistic anonymity in an open system
    • Proceedings of Information Hiding Workshop. (IH 1998), Springer-Verlag
    • Kesdogan D., Egner J., and Büschkes R. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. Proceedings of Information Hiding Workshop. (IH 1998). LNCS 1525 (1998), Springer-Verlag
    • (1998) LNCS , vol.1525
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 10
    • 84863981780 scopus 로고    scopus 로고
    • PRISM: Probabilistic symbolic model checker
    • Proceedings of the 12th Conference on Computer Performance Evaluation, Modelling Techniques and Tools, Springer-Verlag
    • Kwiatkowska M.Z., Norman G., and Parker D. PRISM: Probabilistic symbolic model checker. Proceedings of the 12th Conference on Computer Performance Evaluation, Modelling Techniques and Tools. Lecture Notes in Computer Science volume 2324 (2002), Springer-Verlag 200-204
    • (2002) Lecture Notes in Computer Science , vol.2324 , pp. 200-204
    • Kwiatkowska, M.Z.1    Norman, G.2    Parker, D.3
  • 13
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • Proc. of the European Symposium on Research in Computer Security. (ESORICS), Springer-Verlag
    • Schneider S., and Sidiropoulos A. CSP and anonymity. Proc. of the European Symposium on Research in Computer Security. (ESORICS). Lecture Notes in Computer Science volume 1146 (1996), Springer-Verlag 198-218
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 14
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing 2 2 (1995) 250-273
    • (1995) Nordic Journal of Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2
  • 15
    • 34249774615 scopus 로고    scopus 로고
    • An extended abstract appeared in Proceedings of CONCUR '94, LNCS 836: 481-496
  • 16
    • 0030676973 scopus 로고    scopus 로고
    • P.F. Syverson, D.M. Goldschlag, and M.G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, 1997


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.