메뉴 건너뛰기




Volumn , Issue , 2008, Pages 104-113

protecting anonymity in dynamic peer-to-peer networks

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS NETWORKS; ANONYMOUS PROTOCOL; ANONYMOUS ROUTING; DYNAMIC NETWORK; HIGH THROUGHPUT; INTERNET APPLICATION; INTERNET-SCALE NETWORKS; NODE FAILURE; PEER TO PEER; PEER-TO-PEER NETWORKS; PLANETLAB; PREDECESSOR ATTACK;

EID: 67249094910     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2008.4697029     Document Type: Conference Paper
Times cited : (9)

References (33)
  • 1
    • 54049153176 scopus 로고    scopus 로고
    • Low-resource routing attacks against tor
    • (Alexandria, VA, 2007)
    • BAUER, K., ET AL. Low-resource routing attacks against tor. In Proc. of WPES (Alexandria, VA, 2007).
    • Proc. of WPES
    • Bauer, K.1
  • 2
    • 67249103862 scopus 로고    scopus 로고
    • Oversim: A flexible overlay network simulation framework
    • BAUMGART, I., HEEP, B., AND KRAUSE, S. Oversim: A flexible overlay network simulation framework. In Proc. of GI (2007).
    • (2007) Proc. of GI
    • Baumgart, I.1    Heep, B.2    Krause, S.3
  • 3
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • BORISOV, N., ET AL. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
    • (2007) CCS
    • Borisov, N.1
  • 4
    • 2442603590 scopus 로고    scopus 로고
    • Security for structured peer-to-peer overlay networks
    • December 2002
    • CASTRO, M., ET AL. Security for structured peer-to-peer overlay networks. In Proc. of OSDI (December 2002).
    • Proc. of OSDI
    • Castro, M.1
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM 24, 2 (1981).
    • (1981) CACM 24 , Issue.2
    • Chaum, D.L.1
  • 6
    • 34447129576 scopus 로고    scopus 로고
    • Efficient replica maintenance for distributed storage systems
    • May 2006
    • CHUN, B.-G., ET AL. Efficient replica maintenance for distributed storage systems. In Proc. of NSDI (May 2006).
    • Proc. of NSDI
    • Chun, B.-G.1
  • 7
    • 2642576704 scopus 로고    scopus 로고
    • Towards a common API for structured P2P overlays
    • February 2003
    • DABEK, F., ET AL. Towards a common API for structured P2P overlays. In Proc. of IPTPS (February 2003).
    • Proc. of IPTPS
    • Dabek, F.1
  • 8
    • 67249160847 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • March 2003
    • DANEZIS, G. Mix-networks with restricted routes. In Proc. of PET (March 2003).
    • Proc. of PET
    • Danezis, G.1
  • 11
    • 33646756818 scopus 로고    scopus 로고
    • Reliable MIX cascade networks through reputation
    • March 2002
    • DINGLEDINE, R., AND SYVERSON, P. Reliable MIX cascade networks through reputation. In Proc. of FC (March 2002).
    • Proc. of FC
    • Dingledine, R.1    Syverson, P.2
  • 12
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • Cambridge, MA, March 2002
    • DOUCEUR, J. R. The Sybil attack. In Proc. of IPTPS (Cambridge, MA, March 2002).
    • Proc. of IPTPS
    • Douceur, J.R.1
  • 13
    • 0038349207 scopus 로고    scopus 로고
    • A peer-to-peer anonymizing network layer
    • Nov. 2002
    • FREEDMAN, M. J., AND MORRIS, R. Tarzan: A peer-to-peer anonymizing network layer. In Proc. of CCS (Nov. 2002).
    • Proc. of CCS
    • Freedman, M.J.1    Tarzan, M.R.2
  • 14
    • 85180784621 scopus 로고    scopus 로고
    • Halo-high assurance locate for distributed hash tables
    • KAPADIA, A., AND TRIANDOPOULOS, N. Halo-high assurance locate for distributed hash tables. In Proc of NDSS (2008).
    • (2008) Proc of NDSS
    • Kapadia, A.1    Triandopoulos, N.2
  • 15
    • 33745798251 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • Feb 2004
    • LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K Timing attacks in low-latency mix-based systems. In FC (Feb 2004).
    • FC
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 17
    • 34547281136 scopus 로고    scopus 로고
    • A structured approach to largescale anonymity
    • Nov 2006
    • NAMBIAR, A., AND WRIGHT,M. Salsa: A structured approach to largescale anonymity. In Proc. of CCS (Nov 2006).
    • Proc. of CCS
    • Nambiar, A.1    Salsa, W.M.2
  • 18
    • 67249129582 scopus 로고    scopus 로고
    • Protecting anonymity in dynamic peerto-peer networks
    • Sept. 2008
    • PUTTASWAMY, K. P. N., ET AL. Protecting anonymity in dynamic peerto- peer networks. Tech. Rep. 2008-2012, UCSB, Sept. 2008.
    • Tech. Rep. 2008-12 UCSB
    • Puttaswamy, K.P.N.1
  • 19
    • 67249114503 scopus 로고    scopus 로고
    • Securing structured overlays against identity attacks
    • Jan. 2008
    • PUTTASWAMY, K. P. N., ET AL. Securing structured overlays against identity attacks. Tech. Rep. 2008-2101, UCSB, Jan. 2008.
    • Tech. Rep. 2008-01 UCSB
    • Puttaswamy, K.P.N.1
  • 21
    • 67249159398 scopus 로고    scopus 로고
    • Anonymity for web transactions
    • June 1998
    • REITER, M., AND RUBIN, A. Crowds: Anonymity for web transactions. ACM TISS 1, 1 (June 1998).
    • ACM TISS 1 , Issue.1
    • Reiter, M.1    Crowds, R.A.2
  • 22
    • 0003007594 scopus 로고    scopus 로고
    • Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • November 2001
    • ROWSTRON, A., AND DRUSCHEL, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. Of Middleware (November 2001).
    • Proc. Of Middleware
    • Rowstone, A.1    Pastry, D.P.2
  • 23
    • 0038404059 scopus 로고    scopus 로고
    • A measurement study of peer-to-peer file sharing systems
    • January 2002
    • SAROIU, S.,GUMMADI, P. K., AND GRIBBLE, S. A measurement study of peer-to-peer file sharing systems. In Proc. of MMCN (January 2002).
    • Proc. of MMCN
    • Saroiu, S.1    Gummadi, P.K.2    Gribble, S.3
  • 24
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • April 2002
    • SERJANTOV, A., AND DANEZIS, G. Towards an information theoretic metric for anonymity. In Proc. of PET (April 2002).
    • Proc. of PET
    • Serjantov, A.1    Danezis, G.2
  • 25
    • 84874954212 scopus 로고    scopus 로고
    • P5: A protocol for scalable anonymous communication
    • May 2002
    • SHERWOOD, R., ET AL. P5: A protocol for scalable anonymous communication. In IEEE Sec. and Priv. (May 2002).
    • IEEE Sec. and Priv
    • Sherwood, R.1
  • 26
    • 77951431567 scopus 로고    scopus 로고
    • Eluding carnivores: File sharing with strong anonymity
    • Sept. 2004
    • SIRER, E. G., ET AL. Eluding carnivores: File sharing with strong anonymity. In Proc. of ACM SIGOPS European Workshop (Sept. 2004).
    • Proc. of ACM SIGOPS European Workshop
    • Sirer, E.G.1
  • 27
    • 0002245383 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for internet applications
    • STOICA, I., ET AL. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. of SIGCOMM (2001).
    • (2001) Proc. of SIGCOMM
    • Stoica, I.1
  • 28
    • 33744901134 scopus 로고    scopus 로고
    • Internet indirection infrastructure
    • DOI 10.1145/964725.633033, Proceedings of the ACM SIGCOMM 2002 Conference - Applications, Technologies, Architectures, and Protocols for Computer Communications
    • STOICA, I., ET AL. Internet indirection infrastructure. In Proc. Of SIGCOMM (August 2002), ACM, pp. 73-86. (Pubitemid 43843776)
    • (2002) Computer Communication Review , vol.32 , Issue.4 , pp. 73-86
    • Stoica, I.1    Adkins, D.2    Zhuang, S.3    Shenker, S.4    Surana, S.5
  • 29
    • 0030676973 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • May 1997
    • SYVERSON, P. F., ET AL. Anonymous connections and onion routing. In IEEE Sec. and Priv. (May 1997).
    • IEEE Sec. and Priv
    • Syverson, P.F.1
  • 30
    • 27944460736 scopus 로고    scopus 로고
    • An analysis of the degradation of anonymous protocols
    • Feb 2002
    • WRIGHT, M., ET AL. An analysis of the degradation of anonymous protocols. In Proc of NDSS (Feb. 2002).
    • Proc of NDSS
    • Wright, M.1
  • 31
    • 84954435745 scopus 로고    scopus 로고
    • Defending anonymous communications against passive logging attacks
    • May 2003
    • WRIGHT, M., ET AL. Defending anonymous communications against passive logging attacks. In Proc. of IEEE Sec. and Priv. (May 2003).
    • Proc. of IEEE Sec. and Priv
    • Wright, M.1
  • 32
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • WRIGHT, M., ET AL. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM TISS 7, 4 (2004).
    • (2004) ACM TISS 7 , Issue.4
    • Wright, M.1
  • 33
    • 34247223162 scopus 로고    scopus 로고
    • Cashmere: Resilient anonymous routing
    • Boston, MA, May 2005
    • ZHUANG, L., ET AL. Cashmere: Resilient anonymous routing. In Proc. of NSDI (Boston, MA, May 2005).
    • Proc. of NSDI
    • Zhuang, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.