메뉴 건너뛰기




Volumn 410, Issue 41, 2009, Pages 4006-4025

Probabilistic and nondeterministic aspects of anonymity

Author keywords

Anonymity; Probabilistic automata; Probability

Indexed keywords

CALCULATIONS; PROBABILISTIC LOGICS; PROBABILITY; SEMANTICS;

EID: 68949221468     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2009.06.008     Document Type: Article
Times cited : (3)

References (38)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Proceedings of CONCUR 00, Springer INRIA Research Report 3915, March 2000
    • Amadio R.M., and Lugiez D. On the reachability problem in cryptographic protocols. Proceedings of CONCUR 00. Lecture Notes in Computer Science vol. 1877 (2000), Springer INRIA Research Report 3915, March 2000
    • (2000) Lecture Notes in Computer Science , vol.1877
    • Amadio, R.M.1    Lugiez, D.2
  • 4
    • 41549128851 scopus 로고    scopus 로고
    • Formal approaches to information-hiding (tutorial)
    • Proceedings of the Third Symposium on Trustworthy Global Computing. Barthe G., and Fournet C. (Eds). TGC 2007, Springer
    • Beauxis R., Chatzikokolakis K., Palamidessi C., and Panangaden P. Formal approaches to information-hiding (tutorial). In: Barthe G., and Fournet C. (Eds). Proceedings of the Third Symposium on Trustworthy Global Computing. TGC 2007. Lecture Notes in Computer Science vol. 4912 (2008), Springer 347-362
    • (2008) Lecture Notes in Computer Science , vol.4912 , pp. 347-362
    • Beauxis, R.1    Chatzikokolakis, K.2    Palamidessi, C.3    Panangaden, P.4
  • 5
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • Proceedings of CONCUR. Abadi M., and de Alfaro L. (Eds), Springer
    • Bhargava M., and Palamidessi C. Probabilistic anonymity. In: Abadi M., and de Alfaro L. (Eds). Proceedings of CONCUR. Lecture Notes in Computer Science vol. 3653 (2005), Springer 171-185. http://www.lix.polytechnique.fr/catuscia/papers/Anonymity/concur.pdf
    • (2005) Lecture Notes in Computer Science , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 6
    • 0001645384 scopus 로고    scopus 로고
    • Some congruence properties for π-calculus bisimilarities
    • Boreale M., and Sangiorgi D. Some congruence properties for π-calculus bisimilarities. Theoretical Computer Science 198 1-2 (1998) 159-176
    • (1998) Theoretical Computer Science , vol.198 , Issue.1-2 , pp. 159-176
    • Boreale, M.1    Sangiorgi, D.2
  • 7
    • 68949207198 scopus 로고    scopus 로고
    • Bisimulation for demonic schedulers
    • Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). FOSSACS 2009, York, UK, March 2009, Springer
    • Chatzikokolakis K., Norman G., and Parker D. Bisimulation for demonic schedulers. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. FOSSACS 2009, York, UK, March 2009. Lecture Notes in Computer Science vol. 5504 (2009), Springer 318-332
    • (2009) Lecture Notes in Computer Science , vol.5504 , pp. 318-332
    • Chatzikokolakis, K.1    Norman, G.2    Parker, D.3
  • 8
    • 38149090986 scopus 로고    scopus 로고
    • Making random choices invisible to the scheduler
    • Proceedings of CONCUR'07. Caires L., and Vasconcelos V.T. (Eds), Springer
    • Chatzikokolakis K., and Palamidessi C. Making random choices invisible to the scheduler. In: Caires L., and Vasconcelos V.T. (Eds). Proceedings of CONCUR'07. Lecture Notes in Computer Science vol. 4703 (2007), Springer 42-58. http://www.lix.polytechnique.fr/catuscia/papers/Scheduler/report.pdf
    • (2007) Lecture Notes in Computer Science , vol.4703 , pp. 42-58
    • Chatzikokolakis, K.1    Palamidessi, C.2
  • 9
    • 40149107259 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Chatzikokolakis K., Palamidessi C., and Panangaden P. Anonymity protocols as noisy channels. Information and Computation 206 2-4 (2008) 378-401. http://www.lix.polytechnique.fr/catuscia/papers/Anonymity/Channels/full.pdf
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 378-401
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 11
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Springer
    • Clarke I., Sandberg O., Wiley B., and Hong T.W. Freenet: A distributed anonymous information storage and retrieval system. Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability. Lecture Notes in Computer Science vol. 2009 (2000), Springer 44-66
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 44-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 13
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Proceedings of the Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds). PET 2002, Springer
    • Díaz C., Seys S., Claessens J., and Preneel B. Towards measuring anonymity. In: Dingledine R., and Syverson P.F. (Eds). Proceedings of the Workshop on Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science vol. 2482 (2002), Springer 54-68
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 54-68
    • Díaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 14
    • 0001206510 scopus 로고    scopus 로고
    • Coarsening at random: Characterizations, conjectures and counterexamples
    • Proceedings of the First Seattle Symposium in Biostatistics. Lin D.Y., and Fleming T.R. (Eds), Springer
    • Gill R.D., van der Laan M., and Robins J. Coarsening at random: Characterizations, conjectures and counterexamples. In: Lin D.Y., and Fleming T.R. (Eds). Proceedings of the First Seattle Symposium in Biostatistics. Lecture Notes in Statistics (1997), Springer 255-294
    • (1997) Lecture Notes in Statistics , pp. 255-294
    • Gill, R.D.1    van der Laan, M.2    Robins, J.3
  • 16
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • Halpern J.Y., and O'Neill K.R. Anonymity and information hiding in multiagent systems. Journal of Computer Security 13 3 (2005) 483-512
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 17
    • 84878650387 scopus 로고    scopus 로고
    • Probabilistic asynchronous π-calculus
    • Proceedings of FOSSACS 2000 (Part of ETAPS 2000). Tiuryn J. (Ed), Springer
    • Herescu O.M., and Palamidessi C. Probabilistic asynchronous π-calculus. In: Tiuryn J. (Ed). Proceedings of FOSSACS 2000 (Part of ETAPS 2000). Lecture Notes in Computer Science vol. 1784 (2000), Springer 146-160. http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/fossacs.ps
    • (2000) Lecture Notes in Computer Science , vol.1784 , pp. 146-160
    • Herescu, O.M.1    Palamidessi, C.2
  • 19
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12 1 (2004) 3-36
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 20
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied pi-calculus
    • Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. Sagiv M. (Ed). ESOP'05, Springer, Edinburgh, U.K.
    • Kremer S., and Ryan M.D. Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv M. (Ed). Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. ESOP'05. Lecture Notes in Computer Science vol. 3444 (2005), Springer, Edinburgh, U.K. 186-200
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 21
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997
    • Lowe G. Casper: A compiler for the analysis of security protocols. Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Journal of Computer Security 6 (1998) 53-84
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 22
    • 33846535380 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • Hofmann M., and Felleisen M. (Eds). POPL 2007, Nice, France, 17-19 January, 2007, ACM
    • Malacaria P. Assessing security threats of looping constructs. In: Hofmann M., and Felleisen M. (Eds). Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 2007, Nice, France, 17-19 January, 2007 (2007), ACM 225-235
    • (2007) Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , pp. 225-235
    • Malacaria, P.1
  • 23
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Erlingsson Ú., and Pistoia M. (Eds). PLAS 2008, ACM, Tucson, AZ, USA
    • Malacaria P., and Chen H. Lagrange multipliers and maximum information leakage in different observational models. In: Erlingsson Ú., and Pistoia M. (Eds). Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. PLAS 2008 (2008), ACM, Tucson, AZ, USA 135-146
    • (2008) Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 25
    • 44049113210 scopus 로고
    • A calculus of mobile processes, I and II
    • 41-77. A preliminary version appeared as Technical Reports ECF-LFCS-89-85 and -86, University of Edinburgh, 1989
    • Milner R., Parrow J., and Walker D. A calculus of mobile processes, I and II. Information and Computation 100 1 (1992) 1-40 41-77. A preliminary version appeared as Technical Reports ECF-LFCS-89-85 and -86, University of Edinburgh, 1989
    • (1992) Information and Computation , vol.100 , Issue.1 , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 27
    • 17944377470 scopus 로고    scopus 로고
    • A randomized encoding of the π-calculus with mixed choice
    • Palamidessi C., and Herescu O.M. A randomized encoding of the π-calculus with mixed choice. Theoretical Computer Science 335 2-3 (2005) 373-404. http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.pdf
    • (2005) Theoretical Computer Science , vol.335 , Issue.2-3 , pp. 373-404
    • Palamidessi, C.1    Herescu, O.M.2
  • 31
    • 0030260547 scopus 로고    scopus 로고
    • π-calculus, internal mobility and agent-passing calculi
    • Sangiorgi D. π-calculus, internal mobility and agent-passing calculi. Theoretical Computer Science 167 1-2 (1996) 235-274
    • (1996) Theoretical Computer Science , vol.167 , Issue.1-2 , pp. 235-274
    • Sangiorgi, D.1
  • 33
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • Proc. of the European Symposium on Research in Computer Security. ESORICS, Springer
    • Schneider S., and Sidiropoulos A. CSP and anonymity. Proc. of the European Symposium on Research in Computer Security. ESORICS. Lecture Notes in Computer Science vol. 1146 (1996), Springer 198-218
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 34
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • An extended abstract appeared in: Proceedings of CONCUR'94, in: LNCS, vol. 836, pp. 481-496
    • Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing 2 2 (1995) 250-273 An extended abstract appeared in: Proceedings of CONCUR'94, in: LNCS, vol. 836, pp. 481-496
    • (1995) Nordic Journal of Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2
  • 35
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Proceedings of the Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds). PET 2002, Springer
    • Serjantov A., and Danezis G. Towards an information theoretic metric for anonymity. In: Dingledine R., and Syverson P.F. (Eds). Proceedings of the Workshop on Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science vol. 2482 (2002), Springer 41-53
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 36
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). FOSSACS 2009, Springer, York, UK
    • Smith G. On the foundations of quantitative information flow. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. FOSSACS 2009. Lecture Notes in Computer Science vol. 5504 (2009), Springer, York, UK 288-302
    • (2009) Lecture Notes in Computer Science , vol.5504 , pp. 288-302
    • Smith, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.