메뉴 건너뛰기




Volumn , Issue , 2003, Pages 188-195

On countermeasures to traffic analysis attacks

Author keywords

Computer science; Contracts; Cryptography; Information analysis; Information security; Mission critical systems; Pattern recognition; Payloads; Protection; System testing

Indexed keywords

COMPUTER SCIENCE; CONTRACTS; CRYPTOGRAPHY; CYBERNETICS; INFORMATION ANALYSIS; PATTERN RECOGNITION; SECURITY OF DATA;

EID: 34548743797     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232420     Document Type: Conference Paper
Times cited : (22)

References (25)
  • 3
    • 84946415466 scopus 로고    scopus 로고
    • S. inc., "Safeweb," http://www.safewebinc.com/, 2002.
    • (2002) Safeweb
  • 4
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), Springer-Verlag
    • J. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), vol. 2009 of LNCS, pp. 10-29, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, Feb. 1981.
    • (1981) Communications of the ACM , vol.24
    • Chaum, D.L.1
  • 9
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 11
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • V. Voydoc and S. Kent, "Security mechanisms in high-level network protocols," ACM Computing Surveys, pp. 135-171, 1983.
    • (1983) ACM Computing Surveys , pp. 135-171
    • Voydoc, V.1    Kent, S.2
  • 15
    • 0028713303 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
    • B. R. Venkatraman and R. E. Newman-Wolfe, "Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network," Computer Security Applications Conference, 10th Annual, pp. 288-297, 1994.
    • (1994) Computer Security Applications Conference, 10th Annual , pp. 288-297
    • Venkatraman, B.R.1    Newman-Wolfe, R.E.2
  • 22
    • 24344490149 scopus 로고    scopus 로고
    • TimeSys, "Timesys linux docs," http://www.timesys.com/index.cfm?hdr=home-header.cfm&bdy=home-bdy-library.cfm, 2003.
    • (2003) Timesys Linux Docs
  • 24
    • 0024621174 scopus 로고
    • On estimation of entropy and mutual information of continuous distributions
    • R. Moddemeijer, "On estimation of entropy and mutual information of continuous distributions," Signal Processing, vol. 16, no. 3, pp. 233-246, 1989.
    • (1989) Signal Processing , vol.16 , Issue.3 , pp. 233-246
    • Moddemeijer, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.