메뉴 건너뛰기




Volumn 4886 LNCS, Issue , 2007, Pages 57-71

A model of onion routing with provable anonymity

Author keywords

Anonymity; Onion routing; Privacy; Security

Indexed keywords

AUTOMATA THEORY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 38549171987     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77366-5_9     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 2
    • 38549125215 scopus 로고    scopus 로고
    • Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (2000)
    • Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (2000)
  • 3
    • 33745174191 scopus 로고    scopus 로고
    • A formal treatment of onion routing
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: A formal treatment of onion routing. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 169-187. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 169-187
    • Camenisch, J.1    Lysyanskaya, A.2
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • October
    • Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. CACM 28(10) (October 1985)
    • (1985) CACM , vol.28 , Issue.10
    • Chaum, D.1
  • 7
    • 72849147698 scopus 로고    scopus 로고
    • Goldberg, I.: On the security of the Tor authentication protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 316-331. Springer, Heidelberg (2006)
    • Goldberg, I.: On the security of the Tor authentication protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006)
  • 8
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • Anderson, R, ed, Information Hiding, Springer, Heidelberg
    • Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 9
    • 0004215089 scopus 로고    scopus 로고
    • 1st edn. Morgan Kaufmann, San Francisco
    • Lynch, N.: Distributed Algorithms, 1st edn. Morgan Kaufmann, San Francisco (1996)
    • (1996) Distributed Algorithms
    • Lynch, N.1
  • 12
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
  • 13
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.