메뉴 건너뛰기




Volumn , Issue , 2009, Pages 141-150

NISAN: Network information service for anonymization networks

Author keywords

Anonymous communication; DHT; Node lookup; Peer to peer; Privacy

Indexed keywords

ANONYMIZATION; ANONYMOUS COMMUNICATION; DIRECT IMPACT; DISTRIBUTED DESIGN; DISTRIBUTING NETWORKS; DISTRIBUTION SERVICES; INFORMATION DISTRIBUTIONS; LOOKUPS; MALICIOUS NODES; NETWORK INFORMATION; NETWORK INFORMATION SERVICES; PATH SELECTION; PEER TO PEER; PROBABILISTIC ANALYSIS; REAL NETWORKS; SECURITY PROBLEMS; SECURITY REQUIREMENTS; THIRD PARTIES;

EID: 74049122426     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653681     Document Type: Conference Paper
Times cited : (27)

References (25)
  • 3
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, Jul
    • O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, Jul 2000.
    • (2000) LNCS , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 10
    • 67249102575 scopus 로고    scopus 로고
    • Halo: High-assurance locate for distributed hash tables
    • The Internet Society
    • A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In NDSS. The Internet Society, 2008.
    • (2008) NDSS
    • Kapadia, A.1    Triandopoulos, N.2
  • 14
    • 77951462266 scopus 로고    scopus 로고
    • A. Mislove, G. Oberoi, A. Post, C. Reis, and P. Druschel. AP3: Cooperative, decentralized anonymous communication. In In Proc. of SIGOPS European Workshop, 2004.
    • A. Mislove, G. Oberoi, A. Post, C. Reis, and P. Druschel. AP3: Cooperative, decentralized anonymous communication. In In Proc. of SIGOPS European Workshop, 2004.
  • 15
    • 70349273917 scopus 로고    scopus 로고
    • Information leaks in structured peer-to-peer anonymous communication systems
    • P. Syverson, S. Jha, and X. Zhang, editors, Alexandria, Virginia, USA, October, ACM Press
    • P. Mittal and N. Borisov. Information leaks in structured peer-to-peer anonymous communication systems. In P. Syverson, S. Jha, and X. Zhang, editors, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pages 267-278, Alexandria, Virginia, USA, October 2008. ACM Press.
    • (2008) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) , pp. 267-278
    • Mittal, P.1    Borisov, N.2
  • 16
    • 33644815552 scopus 로고    scopus 로고
    • Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
    • San Diego, CA, September
    • R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In ACM SIGCOMM 2001, San Diego, CA, September 2001.
    • (2001) ACM SIGCOMM 2001
    • Morris, R.1    Karger, D.2    Kaashoek, F.3    Balakrishnan, H.4
  • 17
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • Alexandria, VA, USA, October, ACM Press
    • A. Nambiar and M. Wright. Salsa: A structured approach to large-scale anonymity. In Proceedings of ACM CCS 2006, Alexandria, VA, USA, October 2006. ACM Press.
    • (2006) Proceedings of ACM CCS 2006
    • Nambiar, A.1    Wright, M.2
  • 21
    • 34547492967 scopus 로고    scopus 로고
    • Eclipse attacks on overlay networks: Threats and defenses
    • IEEE
    • A. Singh, T.-W. Ngan, P. Druschel, and D. S. Wallach. Eclipse attacks on overlay networks: Threats and defenses. In INFOCOM. IEEE, 2006.
    • (2006) INFOCOM
    • Singh, A.1    Ngan, T.-W.2    Druschel, P.3    Wallach, D.S.4
  • 23
    • 77049097177 scopus 로고    scopus 로고
    • Breaking the collusion detection mechanism of morphmix
    • G. Danezis and P. Golle, editors, Cambridge, UK, June, Springer
    • P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of morphmix. In G. Danezis and P. Golle, editors, Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), pages 368-384, Cambridge, UK, June 2006. Springer.
    • (2006) Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006) , pp. 368-384
    • Tabriz, P.1    Borisov, N.2
  • 24
    • 49049088635 scopus 로고    scopus 로고
    • Tor Documentation. https://www.torproject.org/documentation.html.
    • Tor Documentation
  • 25
    • 70350632925 scopus 로고    scopus 로고
    • A kademlia-based node lookup system for anonymization networks
    • Advances in Information Security and Assurance: Proceedings of the Third International Conference on Information Security and Assurance ISA 2009, of, Seoul, South Korea, Jun, Springer
    • B. Westermann, A. Panchenko, and L. Pimenidis. A kademlia-based node lookup system for anonymization networks. In Advances in Information Security and Assurance: Proceedings of the Third International Conference on Information Security and Assurance (ISA 2009), volume 5576 of LNCS, pages 179-189, Seoul, South Korea, Jun 2009. Springer.
    • (2009) LNCS , vol.5576 , pp. 179-189
    • Westermann, B.1    Panchenko, A.2    Pimenidis, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.