메뉴 건너뛰기




Volumn 4258 LNCS, Issue , 2006, Pages 223-244

Valet services: Improving hidden servers with a personal touch

Author keywords

[No Author keywords available]

Indexed keywords

DIRECTORY SERVER; DOS ATTACKS; KNOW-HOW; SERVICE DESIGN; VULNERABILITY ANALYSIS;

EID: 77049121293     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11957454_13     Document Type: Conference Paper
Times cited : (13)

References (30)
  • 2
  • 3
    • 35248893039 scopus 로고    scopus 로고
    • GAP - practical anonymous networking
    • Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop PET 2003, Springer-Verlag, March
    • Krista Bennett and Christian Grothoff. GAP - practical anonymous networking. In Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, March 2003.
    • (2003) LNCS , vol.2760
    • Bennett, K.1    Grothoff, C.2
  • 4
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 10
    • 0003302799 scopus 로고    scopus 로고
    • The Free Haven Project: Distributed anonymous storage service
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, July
    • Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed anonymous storage service. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS
    • Dingledine, R.1    Freedman, M.J.2    Molnar, D.3
  • 14
    • 84955557456 scopus 로고    scopus 로고
    • Hiding Routing Information
    • R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
    • David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 17
    • 33750277833 scopus 로고    scopus 로고
    • Lasse ∅verlier and Paul Syverson. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006.
    • Lasse ∅verlier and Paul Syverson. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006.
  • 19
    • 77049083327 scopus 로고    scopus 로고
    • Proxify.com. http://www.proxify.com/.
    • Proxify.com
  • 21
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 10-29
    • Raymond, J.-F.1
  • 24
    • 20444435333 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • October
    • Andrei Serjantov and Peter Sewell. Passive attack analysis for connection-based anonymity systems. In Computer Security - ESORICS 2003, October 2003.
    • (2003) Computer Security - ESORICS 2003
    • Serjantov, A.1    Sewell, P.2
  • 29
    • 14544273666 scopus 로고    scopus 로고
    • Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [28].
    • Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 7(4):489-522, 2004. A preliminary version of this paper appeared in [28].


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.