메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-10

Probabilistic analysis of onion routing in a black-box model

Author keywords

anonmity; onion routing; tor

Indexed keywords

ACTIVE ADVERSARY; ANONMITY; ANONYMOUS COMMUNICATION; BLACK-BOX MODEL; ONION ROUTING; PRIORI DISTRIBUTION; PROBABILISTIC ANALYSIS; PROBABILISTIC BEHAVIOR; TOR;

EID: 50249115176     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314333.1314335     Document Type: Conference Paper
Times cited : (20)

References (30)
  • 10
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3):483-514, 2005. (Pubitemid 41230695)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-514
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 11
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • D. Hughes and V. Shmatikov. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security, 12(1):3-36, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 24
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3-4):355-377, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 30
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • DOI 10.1145/1042031.1042032
    • M. K. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and Systems Security, 7(4):489-522, 2004. (Pubitemid 40302696)
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.