메뉴 건너뛰기




Volumn , Issue , 2009, Pages 3-12

More anonymous onion routing through trust

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS ONION ROUTING; ARBITRARY LEVELS; IN-NETWORK; LINEAR PROGRAMS; ONION ROUTERS; OPTIMAL ROUTES; PATH SELECTION; ROUTING DECISIONS; ROUTING NETWORKS; TRUST LEVEL;

EID: 70350543794     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2009.27     Document Type: Conference Paper
Times cited : (25)

References (27)
  • 4
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer-Verlag, July
    • P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an analysis of onion routing security," in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer-Verlag, LNCS 2009, July 2000, pp. 96-114.
    • (2000) LNCS , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 5
    • 1542302145 scopus 로고
    • I'm OK if you're OK: On the notion of trusting communication
    • November
    • R. Fagin and J. Y. Halpern, "I'm OK if you're OK: On the notion of trusting communication," Journal of Philosophical Logic, vol. 17, no. 4, pp. 329-354, November 1988.
    • (1988) Journal of Philosophical Logic , vol.17 , Issue.4 , pp. 329-354
    • Fagin, R.1    Halpern, J.Y.2
  • 6
    • 84974759626 scopus 로고
    • The role of trust in information integrity protocols
    • G. J. Simmons and C. Meadows, "The role of trust in information integrity protocols," Journal of Computer Security, vol. 3, no. 1, pp. 71-84, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 71-84
    • Simmons, G.J.1    Meadows, C.2
  • 7
    • 0029700344 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, in In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996, pp. 164-173.
    • M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996, pp. 164-173.
  • 8
    • 0031637195 scopus 로고    scopus 로고
    • On SDSIs linked local name spaces
    • M. Abadi, "On SDSIs linked local name spaces," Journal of Computer Security, vol. 6, no. 1/2, pp. 2-22, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 2-22
    • Abadi, M.1
  • 10
    • 11944249167 scopus 로고    scopus 로고
    • Reputation-based trust management
    • V. Shmatikov and C. Talcott, "Reputation-based trust management," Journal of Computer Security, vol. 13, no. 1, pp. 167-190, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 167-190
    • Shmatikov, V.1    Talcott, C.2
  • 11
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Online, Available
    • A. J. sang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8S-4GJK82P-1/2/ a9a6e96414fa04641c1d31a57989618d
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • sang, A.J.1    Ismail, R.2    Boyd, C.3
  • 13
    • 70350555463 scopus 로고    scopus 로고
    • The Tor project home page
    • "The Tor project home page," https://www.torproject.org/.
  • 17
    • 35248878897 scopus 로고    scopus 로고
    • On the economics of anonymity
    • Financial Cryptography, 7th International Conference, FC 2003, R. N. Wright, Ed. Springer-Verlag
    • A. Acquisti, R. Dingledine, and P. Syverson, "On the economics of anonymity," in Financial Cryptography, 7th International Conference, FC 2003, R. N. Wright, Ed. Springer-Verlag, LNCS 2742, 2003, pp. 84-102.
    • (2003) LNCS , vol.2742 , pp. 84-102
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.3
  • 22
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • Privacy Enhancing Technologies: Second International Workshop, PET 2002, R. Dingledine and P. Syverson, Eds. San Francisco, CA, USA: Springer-Verlag, April
    • A. Hintz, "Fingerprinting websites using traffic analysis," in Privacy Enhancing Technologies: Second International Workshop, PET 2002, R. Dingledine and P. Syverson, Eds. San Francisco, CA, USA: Springer-Verlag, LNCS 2482, April 2002, pp. 171-178.
    • (2002) LNCS , vol.2482 , pp. 171-178
    • Hintz, A.1
  • 23
    • 34547350876 scopus 로고    scopus 로고
    • M. Liberatore and B. N. Levine, Inferring the source of encrypted HTTP connections, in CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, Eds. ACM Press, 2006, pp. 255-263.
    • M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, Eds. ACM Press, 2006, pp. 255-263.
  • 26
    • 38149130456 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • Proceedings of the Seventh Workshop on Privacy Enhancing Technologies PET 2007, N. Borisov and P. Golle, Eds. Ottawa, Canada: Springer-Verlag, June
    • S. J. Murdoch and P. Zieliński, "Sampled traffic analysis by internet-exchange-level adversaries," in Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), N. Borisov and P. Golle, Eds. Ottawa, Canada: Springer-Verlag, LNCS 4776, June 2007.
    • (2007) LNCS , vol.4776
    • Murdoch, S.J.1    Zieliński, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.