메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 428-445

A framework for the analysis of mix-based steganographic file systems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 57049157741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_28     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 1
    • 84957873374 scopus 로고    scopus 로고
    • Anderson, R.J., Needham, R.M., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, 1525, pp. 73-82. Springer, Heidelberg (1998)
    • Anderson, R.J., Needham, R.M., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73-82. Springer, Heidelberg (1998)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239-248 (1983)
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
    • (1981) Communications of the ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 35048831821 scopus 로고    scopus 로고
    • Diaz, C., Preneel, B.: Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 309-325. Springer, Heidelberg (2004)
    • Diaz, C., Preneel, B.: Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 309-325. Springer, Heidelberg (2004)
  • 6
    • 49949112535 scopus 로고    scopus 로고
    • Mojitos: A distributed steganographic file system
    • Technical Report, University of Washington
    • Giefer, C., Letchner, J.: Mojitos: A distributed steganographic file system. Technical Report, University of Washington (2004)
    • (2004)
    • Giefer, C.1    Letchner, J.2
  • 7
    • 84947222165 scopus 로고    scopus 로고
    • Mnemosyne: Peer-to-peer steganographic storage
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Hand, S., Roscoe, T.: Mnemosyne: Peer-to-peer steganographic storage. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 130-140. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 130-140
    • Hand, S.1    Roscoe, T.2
  • 9
    • 84947944750 scopus 로고    scopus 로고
    • McDonald, A.D., Kuhn, M.G.: Stegfs: A steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, 1768, pp. 462-477. Springer, Heidelberg (2000)
    • McDonald, A.D., Kuhn, M.G.: Stegfs: A steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 462-477. Springer, Heidelberg (2000)
  • 10
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Pfitzmann, A., Hansen, M.: Anonymity, Unobservability and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Hansen, M.2
  • 11
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Rabin, M.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of ACM 36(2), 335-348 (1989)
    • (1989) Journal of ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 12
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • Rizzo, L.: Effective erasure codes for reliable computer communication protocols. Computer Communication Review 27(2), 24-36 (1997)
    • (1997) Computer Communication Review , vol.27 , Issue.2 , pp. 24-36
    • Rizzo, L.1
  • 13
    • 49949108041 scopus 로고    scopus 로고
    • Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., et al. (eds.) IH 2007. LNCS, 4567, pp. 220-236. Springer, Heidelberg (2008)
    • Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., et al. (eds.) IH 2007. LNCS, vol. 4567, pp. 220-236. Springer, Heidelberg (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.