메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2770-2784

Anonymous networking amidst eavesdroppers

Author keywords

Anonymity; Equivocation; Network security; Rate distortion; Traffic analysis

Indexed keywords

ELECTRIC DISTORTION; INFORMATION THEORY; NETWORK LAYERS; NETWORK PERFORMANCE; SCHEDULING; SIGNAL DISTORTION;

EID: 45249083605     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921660     Document Type: Article
Times cited : (64)

References (31)
  • 2
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • V. L. Voydock and S. T. Kent, "Security mechanisms in high-level network protocols," ACM Comp. Surv., vol. 15, pp. 135-171, 1983.
    • (1983) ACM Comp. Surv , vol.15 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 3
    • 84937555407 scopus 로고    scopus 로고
    • J.-F. Raymond, Traffic analysis: Protocols, attacks, design issues and open problems, in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (Lecture Notes in Computer Science), H. Federrath, Ed. Berlin, Germany: Springer-Verlag, 2001, 2009, pp. 10-29.
    • J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (Lecture Notes in Computer Science), H. Federrath, Ed. Berlin, Germany: Springer-Verlag, 2001, vol. 2009, pp. 10-29.
  • 5
    • 27544457394 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • presented at the, Toronto, ON, Canada, May
    • N. Matthewson and R. Dingledine, "Practical traffic analysis: Extending and resisting statistical disclosure," presented at the Privacy Enhancing Technologies: 4th International Workshop, Toronto, ON, Canada, May 2004.
    • (2004) Privacy Enhancing Technologies: 4th International Workshop
    • Matthewson, N.1    Dingledine, R.2
  • 7
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on SSH
    • Washington, DC, Aug
    • D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH," in Proc. 10th USENIX Security Sym., Washington, DC, Aug. 2001, pp. 25-40.
    • (2001) Proc. 10th USENIX Security Sym , pp. 25-40
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 8
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • Feb
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 10
    • 35248882142 scopus 로고    scopus 로고
    • Generalizing mixes
    • Proc. Privacy Enhancing Technologies Workshop PET 2003, Berlin, Germany: Springer-Verlag, Apr
    • C. Díaz and A. Serjantov, "Generalizing mixes," in Proc. Privacy Enhancing Technologies Workshop (PET 2003) (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, Apr. 2003, vol. 2760.
    • (2003) Lecture Notes in Computer Science , vol.2760
    • Díaz, C.1    Serjantov, A.2
  • 11
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go MIXes providing probabilistic security in an open system
    • Proc. 2nd Int. Workshop on Information Hiding IH'98, Portland, OR, Apr
    • D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go MIXes providing probabilistic security in an open system," in Proc. 2nd Int. Workshop on Information Hiding (IH'98), Portland, OR, Apr. 1998, vol. 1525, Lecture Notes in Computer Science, pp. 83-98.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Buschkes, R.3
  • 15
    • 84964477407 scopus 로고
    • Hiding traffic flow in communication networks
    • San Diego, CA
    • B. Radosavljevic and B. Hajek, "Hiding traffic flow in communication networks," in Proc. Military Communications Conf., San Diego, CA, 1992, pp. 1096-1100.
    • (1992) Proc. Military Communications Conf , pp. 1096-1100
    • Radosavljevic, B.1    Hajek, B.2
  • 16
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 17
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 19
    • 49549085794 scopus 로고    scopus 로고
    • Detection of information flows
    • submitted for publication
    • T. He and L. Tong, "Detection of information flows," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • He, T.1    Tong, L.2
  • 21
    • 45249102424 scopus 로고    scopus 로고
    • A. Serjantov and G. Danezis, Towards an information theoretic metric for anonymity, in Proc. Privacy Enhancing Technologies Workshop (PET 2002) (Lecture Notes in Computer Science), R. Dingledine and P. Syverson, Eds. Berlin, Germany: Springer-Verlag, Apr. 2002, 2482.
    • A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Proc. Privacy Enhancing Technologies Workshop (PET 2002) (Lecture Notes in Computer Science), R. Dingledine and P. Syverson, Eds. Berlin, Germany: Springer-Verlag, Apr. 2002, vol. 2482.
  • 22
    • 35048846490 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • Sophia-Antipolis, France, Sep
    • A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Conference on Recent Advance in Intrusion Detection (RAID), Sophia-Antipolis, France, Sep. 2004, pp. 258-277.
    • (2004) Conference on Recent Advance in Intrusion Detection (RAID) , pp. 258-277
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 23
    • 0033891241 scopus 로고    scopus 로고
    • About priority encoding transmission
    • Mar
    • S. Boucheron and M. R. Salamatian, "About priority encoding transmission," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 699-705, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 699-705
    • Boucheron, S.1    Salamatian, M.R.2
  • 24
    • 0025536530 scopus 로고
    • Pakcet recovery in high-speed networks using coding and buffer management
    • San Francisco, CA
    • N. Shacham and P. McKenney, "Pakcet recovery in high-speed networks using coding and buffer management," in Proc. IEEE INFOCOM, San Francisco, CA, 1990, pp. 124-131.
    • (1990) Proc. IEEE INFOCOM , pp. 124-131
    • Shacham, N.1    McKenney, P.2
  • 25
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • Jun
    • L. Rizzo, "Effective erasure codes for reliable computer communication protocols," Proc. ACM SIGCOMM Computer Communication Rev., vol. 27, pp. 24-36, Jun. 1997.
    • (1997) Proc. ACM SIGCOMM Computer Communication Rev , vol.27 , pp. 24-36
    • Rizzo, L.1
  • 27
    • 0015376113 scopus 로고
    • Computation of channel capacity and rate-distortion functions
    • Jul
    • R. Blahut, "Computation of channel capacity and rate-distortion functions," IEEE Trans. Inf. Theory, vol. IT-18, no. 4, pp. 460-473, Jul. 1972.
    • (1972) IEEE Trans. Inf. Theory , vol.IT-18 , Issue.4 , pp. 460-473
    • Blahut, R.1
  • 28
    • 0020180462 scopus 로고
    • Causal source codes
    • Sep
    • D. Neuhoff and L. Gilbert, "Causal source codes," IEEE Trans. Inf. Theory, vol. IT-28, no. 5, pp. 701-713, Sep. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.IT-28 , Issue.5 , pp. 701-713
    • Neuhoff, D.1    Gilbert, L.2
  • 29
    • 45249093836 scopus 로고    scopus 로고
    • Throughput-anonymity tradeoff in wireless networks under latency constraints
    • Phoenix, AZ, Apr
    • P. Venkitasubramaniam and L. Tong, "Throughput-anonymity tradeoff in wireless networks under latency constraints," in Proc. 2008 IEEE INFOCOM, Phoenix, AZ, Apr. 2008, pp. 807-815.
    • (2008) Proc. 2008 IEEE INFOCOM , pp. 807-815
    • Venkitasubramaniam, P.1    Tong, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.