메뉴 건너뛰기




Volumn 2578, Issue , 2003, Pages 53-69

Limits of anonymity in open environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTERS;

EID: 35248900308     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36415-3_4     Document Type: Article
Times cited : (61)

References (29)
  • 1
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • February
    • D. Chaum: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A. C. M., 24(2):84-88, February 1981.
    • (1981) Communications of the A. C. M. , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 3
    • 0016867208 scopus 로고
    • Network Security Via Dynamic Process Renaming
    • 7-9 October Quebec City, Canada
    • D. J. Farber, K. C. Larson: Network Security Via Dynamic Process Renaming. Fourth Data Communication Symposium, 7-9 October 1975, Quebec City, Canada.
    • (1975) Fourth Data Communication Symposium
    • Farber, D.J.1    Larson, K.C.2
  • 4
    • 4243995024 scopus 로고
    • Master Thesis, Massachusetts Institute of Technology. Laboratory for Computer Science, 545 Technology Square, Camebridge, Massachusetts 02139, Mai Report MIT/LCS/TR-179
    • P. A. Karger: Non-Discretionary Access Control for Decentralized Computing Systems. Master Thesis, Massachusetts Institute of Technology. Laboratory for Computer Science, 545 Technology Square, Camebridge, Massachusetts 02139, Mai 1977, Report MIT/LCS/TR-179.
    • (1977) Non-Discretionary Access Control for Decentralized Computing Systems
    • Karger, P.A.1
  • 5
    • 84937555451 scopus 로고
    • Networks without user observability, design options
    • Advances in Cryptology. Eurocrypt '85, Spinger-Verlag
    • A. Pfitzmann, M. Waidner, Networks without user observability, design options. In: Advances in Cryptology. Eurocrypt '85, volume 219 of Lecture Notes in Computer Science. Spinger-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.219
    • Pfitzmann, A.1    Waidner, M.2
  • 9
    • 84955605258 scopus 로고    scopus 로고
    • MIXes in Mobile Communication Systems: Location Management with Privacy
    • Information Hiding, Springer-Verlag, Berlin
    • H. Federrath, A. Jerichow, A. Pfitzmann: MIXes in Mobile Communication Systems: Location Management with Privacy. Information Hiding, LNCS 1174. Springer-Verlag, Berlin 1996, 121-135.
    • (1996) LNCS , vol.1174 , pp. 121-135
    • Federrath, H.1    Jerichow, A.2    Pfitzmann, A.3
  • 12
    • 0011702966 scopus 로고
    • ISDN-mixes: Untraceable communication with very small bandwidth overhead
    • Springer-Verlag, Heidelberg, February
    • A. Pfitzmann, B. Pfitzmann, M. Waidner: ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: GI/ITG Conference: Communication in Distributed Systems, pages 451-463. Springer-Verlag, Heidelberg, February 1991.
    • (1991) GI/ITG Conference: Communication in Distributed Systems , pp. 451-463
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 14
    • 84957030837 scopus 로고    scopus 로고
    • Protocols using Anonymous Connections: Mobile Applications, Security Protocols
    • 5th International Workshop Proceedings B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.).
    • M. G. Reed, P. F. Syverson, D. M. Goldschlag: Protocols using Anonymous Connections: Mobile Applications, Security Protocols. 5th International Workshop Proceedings. B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.). Springer-Verlag LNCS 1361, 1998, pp. 13-23.
    • (1998) Springer-Verlag LNCS , vol.1361 , pp. 13-23
    • Reed, M.G.1    Syverson, P.F.2    Goldschlag, D.M.3
  • 15
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go mixes providing probabilistic security in an open system
    • David Aucsmith (ed.): Information Hiding: Second International Workshop, Springer-Verlag, Berlin, Germany
    • D. Kesdogan, J. Egner, R. Büschkes: Stop-and-go mixes providing probabilistic security in an open system. In: David Aucsmith (ed.): Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 83-98. Springer-Verlag, Berlin, Germany, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 16
    • 85032859691 scopus 로고
    • How to Break the Direct RSA-Implementation of MIXes
    • Eurocrypt '89, Springer-Verlag, Berlin
    • B. Pfitzmann, A. Pfitzmann: How to Break the Direct RSA-Implementation of MIXes. Eurocrypt '89, LNCS 434. Springer-Verlag, Berlin 1990, pp. 373-381.
    • (1990) LNCS , vol.434 , pp. 373-381
    • Pfitzmann, B.1    Pfitzmann, A.2
  • 17
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • International Workshop on Design Issues in Anonymity and Unobservability, Berkley, Springer-Verlag
    • J. F. Raymond: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. International Workshop on Design Issues in Anonymity and Unobservability, Berkley, LNCS 2009. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009
    • Raymond, J.F.1
  • 18
    • 0037974470 scopus 로고    scopus 로고
    • Dummy Traffic Against Long Term Intersection Attacks
    • San Francisco, CA, USA, April 14-15
    • O. Berthold, H. Langos: Dummy Traffic Against Long Term Intersection Attacks. Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, April 14-15, 2002.
    • (2002) Workshop on Privacy Enhancing Technologies
    • Berthold, O.1    Langos, H.2
  • 22
    • 2642543760 scopus 로고    scopus 로고
    • Towards an Information Theoretic Metric for Anonymity
    • San Francisco, CA, USA, April 14-15
    • A. Serjantov, G. Danezis: Towards an Information Theoretic Metric for Anonymity. Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, April 14-15, 2002.
    • (2002) Workshop on Privacy Enhancing Technologies
    • Serjantov, A.1    Danezis, G.2
  • 24
    • 0008452404 scopus 로고    scopus 로고
    • Backtracking algorithms for constraint satisfaction problems
    • September
    • R. Dechter, D. Frost: Backtracking algorithms for constraint satisfaction problems. An ICS technical report, September 1999.
    • (1999) An ICS Technical Report
    • Dechter, R.1    Frost, D.2
  • 26
    • 0002514541 scopus 로고
    • Algorithms for Constraint Satisfaction Problems, a Survey
    • V. Kumar: Algorithms for Constraint Satisfaction Problems, A Survey. AI magazine, 13(1):32-44, 1992.
    • (1992) AI Magazine , vol.13 , Issue.1 , pp. 32-44
    • Kumar, V.1
  • 27
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A System for Anonymous and Unobservable Internet Access
    • International Workshop on Design Issues in Anonymity and Unobservability, Berkley, Springer-Verlag
    • O. Berthold, H. Federrath, S. Köpsell: Web MIXes: A System for Anonymous and Unobservable Internet Access. International Workshop on Design Issues in Anonymity and Unobservability, Berkley, 2009 LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.