메뉴 건너뛰기




Volumn 2760, Issue , 2003, Pages 161-176

An analysis of GNUnet and the implications for anonymous, censorship-resistant networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS;

EID: 35248879382     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40956-4_11     Document Type: Article
Times cited : (13)

References (19)
  • 3
    • 84947444524 scopus 로고    scopus 로고
    • Efficient sharing of encrypted data
    • Information Security and Privacy - 7th Autralasian Conference (ACISP 2002), Springer-Verlag
    • Krista Bennett, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu. Efficient sharing of encrypted data. In Information Security and Privacy - 7th Autralasian Conference (ACISP 2002), Lecture Notes in Computer Science 2384, pages 107-120. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2384 , pp. 107-120
    • Bennett, K.1    Grothoff, C.2    Horozov, T.3    Patrascu, I.4
  • 4
    • 84937549115 scopus 로고    scopus 로고
    • The disadvantages of free MIX routes and how to overcome them
    • Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobseruability 2000, Springer-Verlag
    • Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvantages of free MIX routes and how to overcome them. In Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobseruability 2000, Lecture Notes in Computer Science 2009, pages 30-45. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 30-45
    • Berthold, O.1    Pfitzmann, A.2    Standtke, R.3
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return adresses and digital pseudonyms
    • David Chaum. Untraceable electronic mail, return adresses and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 6
    • 0036184272 scopus 로고    scopus 로고
    • Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet
    • Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. IEEE Internet Computing, pages 40-49, 2002.
    • (2002) IEEE Internet Computing , pp. 40-49
    • Clarke, I.1    Miller, S.G.2    Hong, T.W.3
  • 7
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Springer-Verlag
    • Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Lecture Notes in Computer Science 2009, pages 46-66. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 8
    • 33645240198 scopus 로고    scopus 로고
    • The free haven project: Distributed anonymous storage service
    • Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Springer-Verlag
    • Roger Dingledine, Michael J. Freedman, and David Molnar. The free haven project: Distributed anonymous storage service. In Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Lecture Notes in Computer Science 2009, pages 67-95. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 67-95
    • Dingledine, R.1    Freedman, M.J.2    Molnar, D.3
  • 11
    • 4544296007 scopus 로고    scopus 로고
    • An excess-based economic model for resource allocation in peer-to-peer networks
    • Christian Grothoff. An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik, (3), 2003.
    • (2003) Wirtschaftsinformatik , Issue.3
    • Grothoff, C.1
  • 13
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident, censorship-resistant, web publishing system
    • Aviel D. Rubin Marc Waldman and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, pages 59-72, 2000.
    • (2000) Proc. 9th USENIX Security Symposium , pp. 59-72
    • Rubin, A.D.1    Waldman, M.2    Cranor, L.F.3
  • 14
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability, and pseudonymity - A proposal for terminology
    • Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Springer-Verlag
    • Andreas Pfitzmann and Marit Köhntopp. Anonymity, Unobservability, and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability 2000, Lecture Notes in Computer Science 2009, pages 1-9. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 16
    • 69749109687 scopus 로고    scopus 로고
    • Anonymizing censorship resistant systems
    • Peer-to-Peer Systems, First International Workshop - IPTPS 2002, Springer-Verlag
    • Andrei Serjantov. Anonymizing censorship resistant systems. In Peer-to-Peer Systems, First International Workshop - IPTPS 2002, Lecture Notes in Computer Science 2429, pages 111-120. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 111-120
    • Serjantov, A.1
  • 17
    • 84948775332 scopus 로고    scopus 로고
    • Probabilistic analysis of anonymity
    • IEEE Computer Society Press
    • Vitaly Shmatikov. Probabilistic analysis of anonymity. In 15th IEEE Computer Security Foundations Workshop, pages 119-128. IEEE Computer Society Press, 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 119-128
    • Shmatikov, V.1
  • 19
    • 0035754863 scopus 로고    scopus 로고
    • Tangier: A censorship-resistant publishing system based on document entanglements
    • ACM Press
    • Marc Waldman and David David Mazières. Tangier: A censorship-resistant publishing system based on document entanglements. In ACM Conference on Computer and Communications Security, pages 126-135. ACM Press, 2001.
    • (2001) ACM Conference on Computer and Communications Security , pp. 126-135
    • Waldman, M.1    Mazières, D.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.