메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 378-401

Anonymity protocols as noisy channels

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CAPACITY; COMMUNICATION CHANNELS (INFORMATION THEORY); INFORMATION ANALYSIS; MODEL CHECKING;

EID: 40149107259     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.07.003     Document Type: Article
Times cited : (138)

References (33)
  • 1
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • S. Schneider A. Sidiropoulos CSP and anonymity Proceeding of the European Symposium on Research in Computer Security (ESORICS) Lecture Notes in Computer Science vol. 1146 1996 Springer 198 218
    • (1996) , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 2
    • 0003777431 scopus 로고    scopus 로고
    • Modelling and Analysis of Security Protocols
    • P.Y. Ryan S. Schneider Modelling and Analysis of Security Protocols 2001 Addison-Wesley
    • (2001)
    • Ryan, P.Y.1    Schneider, S.2
  • 3
    • 85120276756 scopus 로고    scopus 로고
    • P.F. Syverson, S.G. Stubblebine, Group principals and the formalization of anonymity, in: World Congress on Formal Methods (1), 1999, pp. 814–833.
  • 4
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • J.Y. Halpern K.R. O’Neill Anonymity and information hiding in multiagent systems Journal of Computer Security 13 3 2005 483 512
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O’Neill, K.R.2
  • 5
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding anonymity and privacy: a modular approach
    • D. Hughes V. Shmatikov Information hiding anonymity and privacy: a modular approach Journal of Computer Security 12 1 2004 3 36
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • D. Chaum The dining cryptographers problem: unconditional sender and recipient untraceability Journal of Cryptology 1 1988 65 75
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • M. Bhargava C. Palamidessi Probabilistic anonymity M. Abadi L. de Alfaro Proceedings of CONCUR Lecture Notes in Computer Science vol. 3653 2005 Springer 171 185
    • (2005) , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 12
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • A. Serjantov G. Danezis Towards an information theoretic metric for anonymity Proceedings of the Workshop on Privacy Enhancing Technologies (PET) 2002 R. Dingledine P.F. Syverson Lecture Notes in Computer Science vol. 2482 2002 Springer 41 53
    • (2002) , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 13
    • 3242815149 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • C. Díaz S. Seys J. Claessens B. Preneel Towards measuring anonymity Proceedings of the Workshop on Privacy Enhancing Technologies (PET) 2002 R. Dingledine P.F. Syverson Lecture Notes in Computer Science Vol. 2482 2002 Springer 54 68
    • (2002) , pp. 54-68
    • Díaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 14
    • 85120273067 scopus 로고    scopus 로고
    • I.S. Moskowitz, R.E. Newman, D.P. Crepeau, A.R. Miller, Covert channels and anonymizing networks, in: S. Jajodia, P. Samarati, P.F. Syverson (Eds.), WPES, ACM, 2003, pp. 79–88.
  • 15
    • 85120263812 scopus 로고    scopus 로고
    • I.S. Moskowitz, R.E. Newman, P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126–131.
  • 16
    • 85120281017 scopus 로고    scopus 로고
    • Y. Zhu, R. Bettati, Anonymity vs. information leakage in anonymity systems, in: Proc. of ICDCS, IEEE Computer Society, 2005, pp. 514–524.
  • 17
    • 85120278650 scopus 로고    scopus 로고
    • M.R. Clarkson, A.C. Myers, F.B. Schneider, Belief in information flow, in: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW’05), IEEE, 2005, pp. 31–45.
  • 18
    • 35048819403 scopus 로고    scopus 로고
    • Measuring anonymity with relative entropy
    • Y. Deng J. Pang P. Wu Measuring anonymity with relative entropy T. Dimitrakos F. Martinelli P.Y.A. Ryan S.A. Schneider Proceeddings of the of the 4th International Workshop on Formal Aspects in Security and Trust Lecture Notes in Computer Science Vol. 4691 2006 Springer 65 79
    • (2006) , pp. 65-79
    • Deng, Y.1    Pang, J.2    Wu, P.3
  • 19
    • 85120245775 scopus 로고    scopus 로고
    • J. McLean, Security models and information flow, in: IEEE Symposium on Security and Privacy, 1990, pp. 180–189.
  • 20
    • 85120270178 scopus 로고    scopus 로고
    • J.W. Gray, III, Toward a mathematical foundation for information flow security, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP ’91), IEEE, Washington– Brussels–Tokyo, 1991, pp. 21–35.
  • 21
    • 85120273240 scopus 로고    scopus 로고
    • D. Clark, S. Hunt, P. Malacaria, Quantitative analysis of the leakage of confidential data, in: Proc. of QAPL 2001, Electr. Notes Theor. Comput. Sci., vol. 59 (3), Elsevier Science B.V., 2001, pp. 238–251.
  • 22
    • 11344288540 scopus 로고    scopus 로고
    • Quantified interference for a while language
    • D. Clark S. Hunt P. Malacaria Quantified interference for a while language Proceeding of QAPL 2004 Electr. Notes Theor. Comput. Sci vol. 112 2005 Elsevier Science B.V. 149 166
    • (2005) , pp. 149-166
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 23
    • 84948775168 scopus 로고    scopus 로고
    • Quantifying information flow
    • G. Lowe Quantifying information flow Proceeding of CSFW 2002 2002 IEEE Computer Society Press 18 31
    • (2002) , pp. 18-31
    • Lowe, G.1
  • 24
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • U.M. Maurer Authentication theory and hypothesis testing IEEE Transactions on Information Theory 46 4 2000 1350 1356
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 27
    • 0004188848 scopus 로고
    • Elements of Information Theory
    • T.M. Cover J.A. Thomas Elements of Information Theory 1991 John Wiley & Sons, Inc.
    • (1991)
    • Cover, T.M.1    Thomas, J.A.2
  • 28
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • A. Sabelfeld D. Sands Probabilistic noninterference for multi-threaded programs Proc. of CSFW 2000 2000 IEEE Computer Society Press 200 214
    • (2000) , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 29
    • 85120282611 scopus 로고    scopus 로고
    • Y. Deng, C. Palamidessi, J. Pang, Weak probabilistic anonymity, in: Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo), Electronic Notes in Theoretical Computer Science, vol. 180 (1), Elsevier Science B.V., 2007, pp. 55–76.
  • 30
    • 85120282207 scopus 로고    scopus 로고
    • M.Z. Kwiatkowska, G. Norman, D. Parker, PRISM 2.0: A tool for probabilistic model checking, in: Proceedings of the First International Conference on Quantitative Evaluation of Systems (QEST) 2004, IEEE Computer Society, 2004, pp. 322–323.
  • 31
    • 85120262991 scopus 로고    scopus 로고
    • V. Shmatikov, Probabilistic analysis of anonymity, in: 15th IEEE Computer Security Foundations Workshop (CSFW), 2002, pp. 119–128.
  • 32
    • 85120248030 scopus 로고    scopus 로고
    • M. Wright, M. Adler, B. Levine, C. Shields, An analysis of the degradation of anonymous protocols, in: ISOC Network and Distributed System Security Symposium (NDSS), 2002.
  • 33
    • 85120285180 scopus 로고    scopus 로고
    • K. Chatzikokolakis, C. Palamidessi, P. Panangaden, Probability of error in information-hiding protocols, in: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), IEEE Computer Society, 2007, pp. 341–354.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.