메뉴 건너뛰기




Volumn 5672 LNCS, Issue , 2009, Pages 56-72

Vida: How to use bayesian inference to de-anonymize persistent communications

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION SYSTEMS; BAYESIAN INFERENCE; BLACK-BOX MODEL; ERROR ESTIMATES; GAIN INFORMATION; PATTERNS OF COMMUNICATION; TRAFFIC ANALYSIS; USER PROFILE;

EID: 69949115577     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03168-7_4     Document Type: Conference Paper
Times cited : (35)

References (21)
  • 1
    • 0038148419 scopus 로고    scopus 로고
    • Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 16-27 (2003)
    • Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 16-27 (2003)
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 4
    • 32344446687 scopus 로고
    • Understanding the metropolis-hastings algorithm
    • Chib, S., Greenberg, E.: Understanding the metropolis-hastings algorithm. The American Statistician 49(4), 327-335 (1995)
    • (1995) The American Statistician , vol.49 , Issue.4 , pp. 327-335
    • Chib, S.1    Greenberg, E.2
  • 5
    • 84904332394 scopus 로고    scopus 로고
    • Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), Athens, IFIP TC11, May 2003, pp. 421-426. Kluwer, Dordrecht (2003)
    • Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), Athens, IFIP TC11, May 2003, pp. 421-426. Kluwer, Dordrecht (2003)
  • 6
    • 50249171823 scopus 로고    scopus 로고
    • A survey of anonymous communication channels
    • Technical Report MSR-TR-2008-35, Microsoft Research January
    • Danezis, G., Diaz, C.: A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research (January 2008)
    • (2008)
    • Danezis, G.1    Diaz, C.2
  • 7
    • 38149040070 scopus 로고    scopus 로고
    • Danezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 30-44. Springer, Heidelberg (2007)
    • Danezis, G., Diaz, C., Troncoso, C.: Two-sided statistical disclosure attack. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 30-44. Springer, Heidelberg (2007)
  • 8
    • 35048895319 scopus 로고    scopus 로고
    • Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 293-308. Springer, Heidelberg (2004)
    • Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293-308. Springer, Heidelberg (2004)
  • 9
    • 84957800033 scopus 로고    scopus 로고
    • Diáz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
    • Diáz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
  • 10
    • 50249117750 scopus 로고    scopus 로고
    • Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 44-62. Springer, Heidelberg (2008)
    • Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44-62. Springer, Heidelberg (2008)
  • 12
    • 35248900308 scopus 로고    scopus 로고
    • Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 53-69. Springer, Heidelberg (2003)
    • Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 53-69. Springer, Heidelberg (2003)
  • 13
    • 35048865346 scopus 로고    scopus 로고
    • Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 326-339. Springer, Heidelberg (2004)
    • Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 326-339. Springer, Heidelberg (2004)
  • 15
    • 24344478834 scopus 로고    scopus 로고
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
  • 16
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • IEEE Computer Society Press, Los Alamitos
    • Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111-125. IEEE Computer Society Press, Los Alamitos (2008)
    • (2008) IEEE Symposium on Security and Privacy , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 17
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 19
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
  • 20
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic analysis of an anonymity system
    • Shmatikov, V.: Probabilistic analysis of an anonymity system. Journal of Computer Security 12(3-4), 355-377 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 21
    • 50249128196 scopus 로고    scopus 로고
    • Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 2-23. Springer, Heidelberg (2008)
    • Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 2-23. Springer, Heidelberg (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.