메뉴 건너뛰기




Volumn 5134 LNCS, Issue , 2008, Pages 151-166

Bridging and fingerprinting: Epistemic attacks on route selection

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER SYSTEMS;

EID: 50249147866     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70630-4_10     Document Type: Conference Paper
Times cited : (22)

References (26)
  • 1
    • 50249119735 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • De Capitani di Vimercati, S, Syverson, P, Evans, D, eds, ACM Press, New York
    • Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: De Capitani di Vimercati, S., Syverson, P., Evans, D. (eds.) CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92-102. ACM Press, New York (2007)
    • (2007) CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 92-102
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
    • (1981) Communications of the ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 84957800033 scopus 로고    scopus 로고
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
  • 6
    • 85084161366 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-319. USENIX Association (2004)
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-319. USENIX Association (2004)
  • 9
    • 84910595881 scopus 로고    scopus 로고
    • Introducing Tarzan, a peer-to-peer anonymizing network layer
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing Tarzan, a peer-to-peer anonymizing network layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 121-129. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 121-129
    • Freedman, M.J.1    Sit, E.2    Cates, J.3    Morris, R.4
  • 10
    • 84955557456 scopus 로고    scopus 로고
    • Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 137-150. Springer, Heidelberg (1996)
    • Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
  • 11
    • 38149130456 scopus 로고    scopus 로고
    • Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007, 4776, pp. 167-183. Springer, Heidelberg (2007)
    • Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007, vol. 4776, pp. 167-183. Springer, Heidelberg (2007)
  • 12
    • 34547281136 scopus 로고    scopus 로고
    • Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, October 2006, pp. 17-26. ACM Press, New York (2006)
    • Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Wright, R.N., De Capitani di Vimercati, S., Shmatikov, V. (eds.) CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, October 2006, pp. 17-26. ACM Press, New York (2006)
  • 13
    • 33750277833 scopus 로고    scopus 로고
    • Locating hidden servers
    • May, IEEE Computer Society Press, Los Alamitos () 2006
    • Øverlier, L., Syverson, P.: Locating hidden servers. In: IEEE Symposium on Security and Privacy (S&P 2006), May 2006, pp. 100-114. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) IEEE Symposium on Security and Privacy (S&P , pp. 100-114
    • Øverlier, L.1    Syverson, P.2
  • 15
    • 35048897629 scopus 로고    scopus 로고
    • Rennhard, M., Plattner, B.: Practical anonymity for the masses with morphmix. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 233-250. Springer, Heidelberg (2004)
    • Rennhard, M., Plattner, B.: Practical anonymity for the masses with morphmix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 233-250. Springer, Heidelberg (2004)
  • 16
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
  • 17
    • 35248841429 scopus 로고    scopus 로고
    • Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 36-52. Springer, Heidelberg (2003)
    • Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 36-52. Springer, Heidelberg (2003)
  • 18
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 19
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security 12(3-4), 355-377 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 22
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 23
    • 50249163851 scopus 로고    scopus 로고
    • Venkitasubramaniam, P., He, T., Tong, L.: Anonymous networking amidst eavesdroppers (October 2007) arXiv:0710.4903v1 at arxiv.org
    • Venkitasubramaniam, P., He, T., Tong, L.: Anonymous networking amidst eavesdroppers (October 2007) arXiv:0710.4903v1 at arxiv.org
  • 24
    • 0038148416 scopus 로고    scopus 로고
    • Defending anonymous communication against passive logging attacks. In: 2003 IEEE Symposium on Security and Privacy, May 2003
    • Los Alamitos
    • Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 28-43. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE Computer Society Press , pp. 28-43
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.