메뉴 건너뛰기




Volumn , Issue , 2007, Pages 341-351

Probability of error in information-hiding protocols

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DECISION MAKING; ERROR ANALYSIS; INFORMATION THEORY; PROBABILITY; PROBLEM SOLVING;

EID: 35048859323     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.27     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 1
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • M. Abadi and L. de Alfaro, editors, Proceedings of CONCUR, of, Springer, Available at
    • M. Bhargava and C. Palamidessi. Probabilistic anonymity. In M. Abadi and L. de Alfaro, editors, Proceedings of CONCUR, volume 3653 of Lecture Notes in Computer Science, pages 171-185. Springer, 2005. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf.
    • (2005) Lecture Notes in Computer Science , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 2
    • 33750488738 scopus 로고    scopus 로고
    • Probable innocence revisited
    • Available at
    • K. Chatzikokolakis and C. Palamidessi. Probable innocence revisited. Theoretical Computer Science, 367(1-2):123-138, 2006. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 123-138
    • Chatzikokolakis, K.1    Palamidessi, C.2
  • 3
    • 35048848903 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Postproceedings of the Symp. on Trustworthy Global Computing, Springer, To appear. Available at
    • K. Chatzikokolakis, C. Palamidessi, and P. Panangaden. Anonymity protocols as noisy channels. In Postproceedings of the Symp. on Trustworthy Global Computing, Lecture Notes in Computer Science. Springer, 2006. To appear. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/ Channels/full.pdf.
    • (2006) Lecture Notes in Computer Science
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 4
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 5
    • 0345275464 scopus 로고    scopus 로고
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. of QAPL 2001, 59 (3) of Electr. Notes Theor. Comput. Sci, pages 238-251. Elsevier Science B.V., 2001.
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. of QAPL 2001, volume 59 (3) of Electr. Notes Theor. Comput. Sci, pages 238-251. Elsevier Science B.V., 2001.
  • 6
    • 11344288540 scopus 로고    scopus 로고
    • D. Clark, S. Hunt, and P. Malacaria. Quantified interference for a while language. In Proc. of QAPL 2004, 112 of Electr. Notes Theor. Comput. Sci, pages 149-166. Elsevier Science B.V., 2005.
    • D. Clark, S. Hunt, and P. Malacaria. Quantified interference for a while language. In Proc. of QAPL 2004, volume 112 of Electr. Notes Theor. Comput. Sci, pages 149-166. Elsevier Science B.V., 2005.
  • 7
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, of, Springer
    • I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 44-66. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 44-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 9
    • 35048819403 scopus 로고    scopus 로고
    • Measuring anonymity with relative entropy
    • Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust FAST, Springer, To appear
    • Y. Deng, J. Pang, and P. Wu. Measuring anonymity with relative entropy. In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust (FAST), Lecture Notes in Computer Science. Springer, 2006. To appear.
    • (2006) Lecture Notes in Computer Science
    • Deng, Y.1    Pang, J.2    Wu, P.3
  • 10
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, of, Springer
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, volume 2482 of Lecture Notes in Computer Science, pages 54-68. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 54-68
    • Díaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 12
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3):483-512, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 13
    • 84915005479 scopus 로고
    • Probability of error, equivocation, and the chernoff bound
    • M. Hellman and J. Raviv. Probability of error, equivocation, and the chernoff bound. IEEE Trans. on Information Theory, IT-16:368-372, 1970.
    • (1970) IEEE Trans. on Information Theory , vol.IT-16 , pp. 368-372
    • Hellman, M.1    Raviv, J.2
  • 14
    • 84948775168 scopus 로고    scopus 로고
    • Quantifying information flow
    • IEEE Computer Society Press
    • G.Lowe. Quantifying information flow. In Proc. of CSFW 2002, pages 18-31. IEEE Computer Society Press, 2002.
    • (2002) Proc. of CSFW 2002 , pp. 18-31
    • Lowe, G.1
  • 15
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • U. M. Maurer. Authentication theory and hypothesis testing. LEEE Transactions on Information Theory, 46(4): 1350-1356, 2000.
    • (2000) LEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 17
    • 1642355346 scopus 로고    scopus 로고
    • Covert channels and anonymizing networks
    • S. Jajodia, P. Samarati, and P. F. Syverson, editors, ACM
    • I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller. Covert channels and anonymizing networks. In S. Jajodia, P. Samarati, and P. F. Syverson, editors, WPES, pages 79-88. ACM, 2003.
    • (2003) WPES , pp. 79-88
    • Moskowitz, I.S.1    Newman, R.E.2    Crepeau, D.P.3    Miller, A.R.4
  • 22
    • 0242718403 scopus 로고
    • On the amount of missing information and the Neyman-Pearson lemma
    • Wiley, New York
    • A. Rényi. On the amount of missing information and the Neyman-Pearson lemma. In Festschriftf for J. Neyman, pages 281-288. Wiley, New York, 1966.
    • (1966) Festschriftf for J. Neyman , pp. 281-288
    • Rényi, A.1
  • 24
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, of, Springer
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, volume 2482 of Lecture Notes in Computer Science, pages 41-53. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 25
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3/4):355-377, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.