메뉴 건너뛰기




Volumn 31, Issue 15, 2008, Pages 3662-3671

Protocols for purpose-restricted anonymous communications in IP-based wireless networks

Author keywords

Anonymous authentication; Anonymous communication; IP address assignment; Password based authenticated key exchange; Sender anonymity

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CHEMOTHERAPY; DISTRIBUTED COMPUTER SYSTEMS; DRUG DELIVERY; DRUG DOSAGE; LAWS AND LEGISLATION; LOCAL AREA NETWORKS; NETWORK PROTOCOLS; SERVERS; STANDARDS; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50849091261     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.06.026     Document Type: Article
Times cited : (2)

References (19)
  • 1
    • 0023861309 scopus 로고    scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 1 (1998) 65-75
    • (1998) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 2
    • 50849107044 scopus 로고    scopus 로고
    • Anonymizer, Available from: .
    • Anonymizer, Available from: .
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 2 (1981) 84-88
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 4
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Goldschlag D., Reed M., and Syverson P. Onion routing for anonymous and private internet connections. Communications of the ACM 42 2 (1999) 39-41
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 5
    • 0030676973 scopus 로고    scopus 로고
    • P. Syverson, D. Goldschlag, and M. Reed, Anonymous connections and onion routing, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, May 1997, pp. 44-54.
    • P. Syverson, D. Goldschlag, and M. Reed, Anonymous connections and onion routing, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, May 1997, pp. 44-54.
  • 6
    • 84961707899 scopus 로고    scopus 로고
    • P. Syverson, M. Reed, D. Goldschlag, Onion routing access configuration, in: Proceedings of the DARPA Information Survivability Conference and Exposition, ser., IEEE CS Press, January 2000, pp. 34-40.
    • P. Syverson, M. Reed, D. Goldschlag, Onion routing access configuration, in: Proceedings of the DARPA Information Survivability Conference and Exposition, ser., IEEE CS Press, January 2000, pp. 34-40.
  • 7
    • 50849124485 scopus 로고    scopus 로고
    • P. Syverson, G. Tsudik, M. Reed, C. Landwehr, Towards an analysis of onion routing security, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000.
    • P. Syverson, G. Tsudik, M. Reed, C. Landwehr, Towards an analysis of onion routing security, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000.
  • 9
    • 50849097872 scopus 로고    scopus 로고
    • R. Droms, Dynamic host configuration protocol, IETF RFC2131 March 1997.
    • R. Droms, Dynamic host configuration protocol, IETF RFC2131 March 1997.
  • 10
    • 50849137183 scopus 로고    scopus 로고
    • S. Shin, K. Kobara, H. Imai, An efficient anonymous password-authenticated key exchange protocol, in: Proceedings of the ISEC 54, IEICE, Ed., July 2006, pp. 107-114.
    • S. Shin, K. Kobara, H. Imai, An efficient anonymous password-authenticated key exchange protocol, in: Proceedings of the ISEC 54, IEICE, Ed., July 2006, pp. 107-114.
  • 11
    • 33646844820 scopus 로고    scopus 로고
    • D.Q. Viet, A. Yamamura, H. Tanaka, Anonymous password-based authenticated key exchange, in: Proceedings of the INDOCRYPT 2005, ser., LNCS 3797, Springer, Berlin, 2005, pp. 244-257.
    • D.Q. Viet, A. Yamamura, H. Tanaka, Anonymous password-based authenticated key exchange, in: Proceedings of the INDOCRYPT 2005, ser., LNCS 3797, Springer, Berlin, 2005, pp. 244-257.
  • 12
    • 0030648441 scopus 로고    scopus 로고
    • S. Patel, Number theoretic attacks on secure password schemes, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, 1997, pp. 236-247.
    • S. Patel, Number theoretic attacks on secure password schemes, in: Proceedings of the IEEE Symposium on Security and Privacy, ser., IEEE CS Press, 1997, pp. 236-247.
  • 13
    • 35048901616 scopus 로고    scopus 로고
    • Z. Wan and S. Wang, Cryptanalysis of two password-authenticated key exchange protocols, in: Proceedings of the ACISP 2004, ser. LNCS 3108, Springer, Berlin, 2004, pp. 164-175.
    • Z. Wan and S. Wang, Cryptanalysis of two password-authenticated key exchange protocols, in: Proceedings of the ACISP 2004, ser. LNCS 3108, Springer, Berlin, 2004, pp. 164-175.
  • 14
    • 0027726717 scopus 로고
    • Entity authentication and key distribution
    • ACM
    • Bellare M., and Rogaway P. Entity authentication and key distribution. Proceedings of the CCS'93 (1993), ACM 62-73
    • (1993) Proceedings of the CCS'93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 15
    • 84873466407 scopus 로고    scopus 로고
    • M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proceedings of the EUROCRYPT 2000, ser. LNCS 1807, Springer, Berlin, 2000, pp. 139-155.
    • M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proceedings of the EUROCRYPT 2000, ser. LNCS 1807, Springer, Berlin, 2000, pp. 139-155.
  • 18
    • 33749515127 scopus 로고    scopus 로고
    • K. Chin, D. Lowe, W. Lau, Routing in MANETs with address conflicts, Mobile and ubiquitous systems: networking and services, Mobiquitous, 2005, pp. 225- 236.
    • K. Chin, D. Lowe, W. Lau, Routing in MANETs with address conflicts, Mobile and ubiquitous systems: networking and services, Mobiquitous, 2005, pp. 225- 236.
  • 19
    • 34248630807 scopus 로고    scopus 로고
    • An integrated security framework for open wireless networking architecture
    • April
    • Jeong J., and Haas Z.J. An integrated security framework for open wireless networking architecture. IEEE Wireless Communications Magazine 13 2 (2007) 10-18 April
    • (2007) IEEE Wireless Communications Magazine , vol.13 , Issue.2 , pp. 10-18
    • Jeong, J.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.