메뉴 건너뛰기




Volumn 262, Issue , 2008, Pages 325-341

On the fundamentals of anonymity metrics

Author keywords

[No Author keywords available]

Indexed keywords

EDUCATION; ENTROPY; MEASUREMENT THEORY; PROBABILITY DISTRIBUTIONS; INFORMATION SCIENCE;

EID: 45949087897     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-79026-8_23     Document Type: Conference Paper
Times cited : (14)

References (18)
  • 2
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    • David Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. J. Cryptography, 1(1):65-75, 1988.
    • (1988) J. Cryptography , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 5
    • 24944524538 scopus 로고    scopus 로고
    • Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002)
    • Roger Dingledine and Paul Syverson, editors, of, San Fransisco, CA, USA, Apr, Springer-Verlag
    • Roger Dingledine and Paul Syverson, editors. Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002), volume 2482 of LNCS, San Fransisco, CA, USA, Apr 2002. Springer-Verlag.
    • (2002) LNCS , vol.2482
  • 7
    • 45949084136 scopus 로고    scopus 로고
    • Norman E. Fenton and Shari Lawrence Pfleeger. Software Metrics - A Rigorous & Practical Approach. PWS Publishing Company, 20 Park Plaza, Boston, MA 02116-4324, second edition, 1997.
    • Norman E. Fenton and Shari Lawrence Pfleeger. Software Metrics - A Rigorous & Practical Approach. PWS Publishing Company, 20 Park Plaza, Boston, MA 02116-4324, second edition, 1997.
  • 8
    • 33644968219 scopus 로고    scopus 로고
    • IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
    • of, Springer-Verlag, May
    • Simone Fischer-Hübner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, volume 1958 of LNCS. Springer-Verlag, May 2001.
    • (2001) LNCS , vol.1958
    • Fischer-Hübner, S.1
  • 9
    • 33749452717 scopus 로고    scopus 로고
    • Entropy and Effective Support Size
    • Short note, Aug
    • Marian Grendar. Entropy and Effective Support Size. Entropy, 8(3):169-174, Aug 2006. Short note.
    • (2006) Entropy , vol.8 , Issue.3 , pp. 169-174
    • Grendar, M.1
  • 10
    • 84938015047 scopus 로고
    • A Method for the Construction of Minimum-Redundancy Codes
    • Sep
    • David A. Huffman. A Method for the Construction of Minimum-Redundancy Codes. Proceedings of the Institute of Radio Engineers, 40(9):1098-1101, Sep 1952.
    • (1952) Proceedings of the Institute of Radio Engineers , vol.40 , Issue.9 , pp. 1098-1101
    • Huffman, D.A.1
  • 12
    • 45949087972 scopus 로고    scopus 로고
    • Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.29, 31 Jul 2007.
    • Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.29, 31 Jul 2007.
  • 13
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, of, Springer-Verlag, July
    • Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, July 2000.
    • (2000) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 14
    • 0003611111 scopus 로고    scopus 로고
    • Crowds: Anonymity for Web Transactions
    • Michael Reiter and Avi Rubin. Crowds: Anonymity for Web Transactions. In DIMACS Technical report, pages 97-115, 1997.
    • (1997) DIMACS Technical report , pp. 97-115
    • Reiter, M.1    Rubin, A.2
  • 15
    • 45949109214 scopus 로고    scopus 로고
    • Towards and Information Theoretic Metric for Anonymity
    • Andrei Serjantov and George Danezis. Towards and Information Theoretic Metric for Anonymity. In Dingledine and Syverson [5].
    • Dingledine and Syverson , vol.5
    • Serjantov, A.1    Danezis, G.2
  • 16
    • 84940644968 scopus 로고    scopus 로고
    • Claude E. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, Jul 1948.
    • Claude E. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, Jul 1948.
  • 17
    • 24344501784 scopus 로고    scopus 로고
    • Measuring Anonymity in a Non-Adaptive, Real-Time System
    • David Martin and Andrei Serjantov, editors, Toronto, Canada, 26-28 May
    • Gergely Tóth and Zóltan Hornák. Measuring Anonymity in a Non-Adaptive, Real-Time System. In David Martin and Andrei Serjantov, editors, Proceedings of the 4th Workshop on Privacy Enhancing Technologies (PET 2004), pages 226-241, Toronto, Canada, 26-28 May 2004.
    • (2004) Proceedings of the 4th Workshop on Privacy Enhancing Technologies (PET 2004) , pp. 226-241
    • Tóth, G.1    Hornák, Z.2
  • 18
    • 14544273666 scopus 로고    scopus 로고
    • The Predecessor Attack: An Analysis of a Threat to Anonymous Communication Systems
    • Nov
    • Matthew K. Wright, Micah Adler, and Brian Neil Levine. The Predecessor Attack: An Analysis of a Threat to Anonymous Communication Systems. ACM Transactions on Information and System Security, 7(4):489-522, Nov 2004.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Neil Levine, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.