메뉴 건너뛰기




Volumn 2760, Issue , 2003, Pages 48-65

Metrics for traffic analysis prevention

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35248877248     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40956-4_4     Document Type: Article
Times cited : (22)

References (21)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Ira S. Moskowitz, editor, Information Hiding, 4th International Workshop (IH 2001), Springer-Verlag
    • Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Ira S. Moskowitz, editor, Information Hiding, 4th International Workshop (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
    • (2001) LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 2
    • 84957805506 scopus 로고    scopus 로고
    • Dummy traffic against long term intersection attacks
    • Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, April
    • O. Berthold and H. Langos. Dummy traffic against long term intersection attacks. In Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Berthold, O.1    Langos, H.2
  • 3
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002) Springer-Verlag, April
    • Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 5
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • Ross Anderson, editor, Information Hiding, First International Workshop, Springer-Verlag, May
    • D. Goldschlag, M. Reed, and P. Syverson. Hiding routing information. In Ross Anderson, editor, Information Hiding, First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 10
    • 35248855152 scopus 로고    scopus 로고
    • Onion routing home page
    • Onion routing home page. http://www.onion-router.net.
  • 11
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability and pseudonymity - A proposal for terminology
    • Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
    • Andreas Pfitzmann and Marit Köhntopp. Anonymity, unobservability and pseudonymity - a proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 1-9. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 13
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
    • J. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 15
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Paul Syverson and Roger Dingledine, editors, Privacy Enhacing Technologies (PET 2002) Springer-Verlag, April
    • Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Paul Syverson and Roger Dingledine, editors, Privacy Enhacing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Serjantov, A.1    Danezis, G.2
  • 16
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 18
    • 84924758404 scopus 로고    scopus 로고
    • Group principals and the formalization of anonymity
    • J.M. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Vol. I, Springer-Verlag, March
    • Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In J.M. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Vol. I, pages 814-833. Springer-Verlag, LNCS 1708, March 1999.
    • (1999) LNCS , vol.1708 , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 19
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
    • Paul F. Syverson, Gene Tsudik, Michael G. Reed, and Carl E. Landwehr. Towards an analysis of onion routing security. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.F.1    Tsudik, G.2    Reed, M.G.3    Landwehr, C.E.4
  • 20
    • 0028713303 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
    • Orlando, FL, December 5-9 IEEE CS Press
    • B. R. Venkatraman and R. E. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. In Proc. IEEE/ACM Tenth Annual Computer Security Applications Conference, pages 288-297, Orlando, FL, December 5-9 1994. IEEE CS Press.
    • (1994) Proc. IEEE/ACM Tenth Annual Computer Security Applications Conference , pp. 288-297
    • Venkatraman, B.R.1    Newman-Wolfe, R.E.2
  • 21
    • 0029221690 scopus 로고
    • Capacity estimation and auditability of network covert channels
    • Oakland, CA, May 8-10 IEEE CS Press
    • B. R. Venkatraman and R. E. Newman-Wolfe. Capacity estimation and auditability of network covert channels. In Proc. IEEE Symposium on Security and Privacy, pages 186-198, Oakland, CA, May 8-10 1995. IEEE CS Press.
    • (1995) Proc. IEEE Symposium on Security and Privacy , pp. 186-198
    • Venkatraman, B.R.1    Newman-Wolfe, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.