메뉴 건너뛰기




Volumn , Issue , 2007, Pages 82-91

How much anonymity does network latency leak?

Author keywords

Anonymity; Latency

Indexed keywords

DATA SETS; EQUAL ERROR RATE; INTERNET HOSTS; LOW-LATENCY; NETWORK COORDINATES; NETWORK LATENCIES; NETWORK LOCATION; NETWORK SERVICES; REMOTE LOGIN; ROUND-TRIP TIME; TIMING INFORMATION; WEB BROWSING;

EID: 70349692738     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315257     Document Type: Conference Paper
Times cited : (68)

References (38)
  • 1
    • 77952343570 scopus 로고    scopus 로고
    • TOR the onion router servers
    • TOR (the onion router) servers. http://proxy.org/tor.shtml, 2007.
    • (2007)
  • 3
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • April, LNCS
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. Information Hiding Workshop (IH 2001) (April 2001), LNCS 2137, pp. 245-257.
    • (2001) Proc. Information Hiding Workshop (IH 2001) , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (1981), 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 8
    • 21844440623 scopus 로고    scopus 로고
    • Vivaldi: A decentralized network coordinate system
    • New York, NY, USA, ACM Press
    • DABEK, F., COX, R., KAASHOEK, F., AND MORRIS, R. Vivaldi: a decentralized network coordinate system. In SIGCOMM '04 (New York, NY, USA, 2004), ACM Press, pp. 15-26.
    • (2004) SIGCOMM '04 , pp. 15-26
    • Dabek, F.1    Cox, R.2    Kaashoek, F.3    Morris, R.4
  • 9
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • Athens, May, IFIP TC11, Kluwer
    • DANEZIS, G. Statistical disclosure attacks: Traffic confirmation in open environments. In Proc. Security and Privacy in the Age of Uncertainty, (SEC2003) (Athens, May 2003), IFIP TC11, Kluwer, pp. 421-426.
    • (2003) Proc. Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • Danezis, G.1
  • 14
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • FAWCETT, T. An introduction to ROC analysis. Pattern Recogn. Lett. 27, 8 (2006), 861-874.
    • (2006) Pattern Recogn. Lett. , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 18
    • 33745897370 scopus 로고    scopus 로고
    • Constraint-based geolocation of internet hosts
    • Dec 2006
    • GUEYE, B., ZIVIANI, A., CROVELLA, M., AND FDIDA, S. 2006. Constraint-based geolocation of internet hosts. IEEE/ACM Trans. Netw. 14, 6 (Dec. 2006), 1219-1232.
    • (2006) IEEE/ACM Trans. Netw , vol.14 , Issue.6 , pp. 1219-1232
    • Gueye, B.1    Ziviani, A.2    Crovella, M.3    Fdida, S.4
  • 20
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • April, R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS
    • HINTZ, A. Fingerprinting websites using traffic analysis. In Proc. 2nd Privacy Enhancing Technologies workshop (PET 2002) (April 2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482.
    • (2002) Proc. 2nd Privacy Enhancing Technologies Workshop (PET 2002) , vol.2482
    • Hintz, A.1
  • 21
    • 77952390786 scopus 로고    scopus 로고
    • JRANDOM, ET AL. I2P. http://www.i2p. net/, 2007.
    • (2007) I2P
    • Jrandom1
  • 22
    • 0006913907 scopus 로고    scopus 로고
    • Stop-and-go MIXes: Providing probabilistic anonymity in an open system
    • Springer-Verlag, LNCS 1525
    • KESDOGAN, D., EGNER, J., AND BÜSCHKES, R. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In Proc. Information Hiding Workshop (IH 1998) (1998), Springer-Verlag, LNCS 1525.
    • (1998) Proc. Information Hiding Workshop (IH 1998)
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 28
    • 84855244197 scopus 로고    scopus 로고
    • A network positioning system for the Internet
    • NG, T. E., AND ZHANG, H. A network positioning system for the Internet. Proc. USENIX Conference (2004).
    • (2004) Proc. USENIX Conference
    • Ng, T.E.1    Zhang, H.2
  • 32
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
    • New York, NY, USA, ACM Press
    • RENNHARD, M., AND PLATTNER, B. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In WPES '02: Proc. 2002 ACM workshop on Privacy in the Electronic Society (New York, NY, USA, 2002), ACM Press, pp. 91-102.
    • (2002) WPES '02: Proc. 2002 ACM Workshop on Privacy in the Electronic Society , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 34
    • 27944452198 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • October
    • SERJANTOV, A., AND SEWELL, P. Passive attack analysis for connection-based anonymity systems. In Proc. ESORICS 2003 (October 2003).
    • (2003) Proc. ESORICS 2003
    • Serjantov, A.1    Sewell, P.2
  • 37
    • 51849091256 scopus 로고    scopus 로고
    • Geolocalization on the internet through constraint satisfaction
    • WONG, B., STOYANOV, I., AND SIRER, E. G. 2006. Geolocalization on the internet through constraint satisfaction. In Proc. USENIX WORLDS 2006.
    • (2006) Proc. USENIX WORLDS 2006
    • Wong, B.1    Stoyanov, I.2    Sirer, E.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.