메뉴 건너뛰기




Volumn , Issue , 2008, Pages 154-159

Self-certified Sybil-free pseudonyms

Author keywords

Identities; Privacy; Sybil attack

Indexed keywords

AD HOC NETWORKS; COMMUNICATION SYSTEMS; INTERNET; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 56749160366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352558     Document Type: Conference Paper
Times cited : (31)

References (15)
  • 3
    • 33746048789 scopus 로고    scopus 로고
    • I. Damgård, K. Dupont, and M. Ø. Pedersen. Unclonable group identification. In EUROCRYPT, 4004 of Lecture Notes in Computer Science, pages 555 - 572. Springer, 2006.
    • I. Damgård, K. Dupont, and M. Ø. Pedersen. Unclonable group identification. In EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pages 555 - 572. Springer, 2006.
  • 4
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • Athens, May, IFIP TC11, Kluwer
    • G. Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • Danezis, G.1
  • 6
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • CRYPTO '86, of, Springer Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 7
    • 44649144215 scopus 로고    scopus 로고
    • A survey of solutions to the sybil attack
    • University of Massachusetts Amherst, Amherst, MA, Oct
    • B. N. Levine, C. Shields, and N. B. Margolin. A survey of solutions to the sybil attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA, Oct 2006.
    • (2006) Tech report 2006-052
    • Levine, B.N.1    Shields, C.2    Margolin, N.B.3
  • 8
    • 56749178150 scopus 로고    scopus 로고
    • L. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko. Self-certified Sybil-free Pseudonyms - Introducing Privacy in Wireless Networks. Technical Report Karlstad University Studies, Karlstad University, 2008.
    • L. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko. Self-certified Sybil-free Pseudonyms - Introducing Privacy in Wireless Networks. Technical Report Karlstad University Studies, Karlstad University, 2008.
  • 13
    • 35048839792 scopus 로고    scopus 로고
    • k-times anonymous authentication (extended abstract)
    • ASIACRYPT, of, Springer
    • I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, pages 308 - 322. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 308-322
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3
  • 15
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • New York, NY, USA, ACM Press
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: defending against sybil attacks via social networks. In SIGCOMM '06, pages 267-278, New York, NY, USA, 2006. ACM Press.
    • (2006) SIGCOMM '06 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.