메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1484-1488

A new anonymity measure based on partial entropy

Author keywords

Anonymity measure; Anonymous communication; Entropy; Network security

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTER NETWORKS; ENTROPY; INFORMATION SERVICES; INTERNET;

EID: 51249094082     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2008.287     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 2
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity-a proposal for terminology
    • Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, F. Hannes, Ed, Springer-Verlag, pp
    • A. Pfitzmann, M. Kohntopp, Anonymity, unobservability, and pseudonymity-a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, F. Hannes, Ed., LNCS 2009, Springer-Verlag, pp.1-9, 2001.
    • (2001) LNCS , pp. 1-9
    • Pfitzmann, A.1    Kohntopp, M.2
  • 3
    • 84937578170 scopus 로고    scopus 로고
    • O. Berthold, H. Federrath and S. Köpsell. Web MIXes: A system for anonymous and unobservable internet access. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed., Designing Privacy Enhancing Technologies, LNCS 2009, Springer-Verlag, pp.115-129, 2001.
    • O. Berthold, H. Federrath and S. Köpsell. Web MIXes: A system for anonymous and unobservable internet access. In Proceedings of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed., Designing Privacy Enhancing Technologies, LNCS 2009, Springer-Verlag, pp.115-129, 2001.
  • 4
    • 14544273666 scopus 로고    scopus 로고
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.(TISSEC), 7,no.4, pp.489-522, 2004.
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.(TISSEC), vol.7,no.4, pp.489-522, 2004.
  • 6
    • 51249093215 scopus 로고    scopus 로고
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.54-68, 2002.
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.54-68, 2002.
  • 7
    • 51249084522 scopus 로고    scopus 로고
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.41-53, 2002.
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds., LNCS2482, Springer-Verlag, pp.41-53, 2002.
  • 9
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • Proceedings of Information Hiding Workshop IH'02, F. Petitcolas, Ed, Springer-Verlag, pp
    • D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In Proceedings of Information Hiding Workshop (IH'02), F. Petitcolas, Ed., LNCS 2578, Springer-Verlag, pp.53-69, 2002.
    • (2002) LNCS , vol.2578 , pp. 53-69
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 10
    • 33846288517 scopus 로고    scopus 로고
    • Stopping timing attacks in low-latency mix-based systems
    • Proceedings of Financial Cryptography FC'04, A. Juels, Ed, Springer-Verlag, pp
    • B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Stopping timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC'04), A. Juels, Ed., LNCS 3110, Springer-Verlag, pp.251-265, 2004.
    • (2004) LNCS , vol.3110 , pp. 251-265
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.