메뉴 건너뛰기




Volumn 5222 LNCS, Issue , 2008, Pages 161-174

Compromising anonymity using packet spinning

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY NUMBERS; CRYPTOGRAPHIC OPERATIONS; DATA STREAMS; FREE CAPACITIES; IN PACKETS; MALICIOUS NODES; RELAY NODES; ROUTE REQUESTS;

EID: 56649123231     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85886-7_11     Document Type: Conference Paper
Times cited : (22)

References (22)
  • 1
    • 56649091597 scopus 로고    scopus 로고
    • The TOR Project
    • The TOR Project, http://www.torproject.org/
  • 2
    • 56649083956 scopus 로고    scopus 로고
    • TorFlow, https://www.torproject.org/svn/torflow/README
    • TorFlow
  • 3
    • 84947242344 scopus 로고    scopus 로고
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
  • 5
    • 84937549115 scopus 로고    scopus 로고
    • The disadvantages of free MIX routes and how to overcome them
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30-45. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 30-45
    • Berthold, O.1    Pfitzmann, A.2    Standtke, R.3
  • 6
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • October
    • Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: Proceedings of CCS 2007 (October 2007)
    • (2007) Proceedings of CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Febuary
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (Febuary 1981)
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 8
    • 33744479345 scopus 로고    scopus 로고
    • Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pp. 46-66 (2000)
    • Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pp. 46-66 (2000)
  • 9
    • 24344460554 scopus 로고    scopus 로고
    • Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 35-50. Springer, Heidelberg (2005)
    • Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 35-50. Springer, Heidelberg (2005)
  • 10
    • 0037810717 scopus 로고    scopus 로고
    • Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15 (2003)
    • Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15 (2003)
  • 11
    • 85084161366 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
  • 14
    • 24344478834 scopus 로고    scopus 로고
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
  • 16
    • 34547281136 scopus 로고    scopus 로고
    • Nambiar, A., Wright, M.: Salsa: A Structured Approach to Large-Scale Anonymity. In: Proceedings of CCS 2006 (October 2006)
    • Nambiar, A., Wright, M.: Salsa: A Structured Approach to Large-Scale Anonymity. In: Proceedings of CCS 2006 (October 2006)
  • 17
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 19
  • 20
    • 84874954212 scopus 로고    scopus 로고
    • Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)
    • Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)
  • 22
    • 84873857575 scopus 로고    scopus 로고
    • Cashmere: Resilient Anonymous Routing
    • Boston, MA, May, ACM/USENIX
    • Zhuang, L., Zhou, F., Zhao, B.Y., Rowstron, A.: Cashmere: Resilient Anonymous Routing. In: Proc. of NSDI, Boston, MA, May 2005, ACM/USENIX (2005)
    • (2005) Proc. of NSDI
    • Zhuang, L.1    Zhou, F.2    Zhao, B.Y.3    Rowstron, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.