메뉴 건너뛰기




Volumn , Issue , 2009, Pages 206-217

Quantifying maximal loss of anonymity in protocols

Author keywords

Anonymity; Lagrange multipliers; Quantitative analysis

Indexed keywords

CURRENT THEORIES; LAGRANGE MULTIPLIER METHOD; LAGRANGIAN APPROACHES; ONION ROUTING; QUANTITATIVE ANALYSIS;

EID: 77951534380     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533087     Document Type: Conference Paper
Times cited : (22)

References (30)
  • 2
    • 33746371722 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi
    • Michele Boreale: Quantifying Information Leakage in Process Calculi. ICALP (2) 2006:119-131
    • (2006) ICALP , Issue.2 , pp. 119-131
    • Boreale, M.1
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • David Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1 (1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • Number 3
    • David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, Volume 15, Number 3/2007.
    • (2007) Journal of Computer Security , vol.15
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 9
    • 57849150065 scopus 로고
    • Cyptography and data security
    • D. E. Denning: Cyptography and Data Security. Addison-Wesley, 1982.
    • (1982) Addison-Wesley
    • Denning, D.E.1
  • 10
    • 38149040070 scopus 로고    scopus 로고
    • Two-sided statistical disclosure attack
    • LNCS 4476
    • George Danezis, Claudia Diaz and Carmela Troncoso. Two-Sided Statistical Disclosure Attack. In Proc. PET 2007, LNCS 4476, pp. 30-44, 2007.
    • (2007) Proc. PET 2007 , pp. 30-44
    • Danezis, G.1    Diaz, C.2    Troncoso, C.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning: A lattice model of secure information flow. Communications of the ACM, 19 (5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 15
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability: The importance of context
    • LNCS 4776
    • Matthias Franz, Bernd Meyer and Andreas Pashalidis, Attacking Unlinkability: The Importance of Context. In Proc. PET 2007, LNCS 4776, pp. 1-16, 2007.
    • (2007) Proc. PET 2007 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 16
    • 0026157130 scopus 로고
    • Toward a methematical foundataion for information flow security
    • Oakland, California, May
    • James W Gray III: Toward a methematical foundataion for information flow security. Proc. 1991 IEEE Symposium on Security and Privacy. Oakland, California, May 1991.
    • (1991) Proc. 1991 IEEE Symposium on Security and Privacy
    • James Iii, W.G.1
  • 17
    • 1942500486 scopus 로고    scopus 로고
    • A quantitative analysis of anonymous communications
    • and, March
    • Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao: A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, Page 103-115, Volume 53 (1), March 2004.
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.1 , pp. 103-115
    • Guan, Y.1    Fu, X.2    Bettati, R.3    Zhao, W.4
  • 18
    • 39049114504 scopus 로고    scopus 로고
    • Information theory and statistics
    • S. Kullback: Information Theory and Statistics. Dover Publications. 1997.
    • (1997) Dover Publications
    • Kullback, S.1
  • 23
    • 77049119724 scopus 로고    scopus 로고
    • Andreas pashalidis and bernd meyer linking anonymous transactions: The consistent view attack
    • Andreas Pashalidis and Bernd Meyer Linking Anonymous Transactions: The Consistent View Attack. In Proc. PET 2006, LNCS 4258, pp. 384-392, 2006.
    • (2006) Proc. PET 2006, LNCS 4258 , pp. 384-392
  • 29
    • 77950856913 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • Vitaly Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, vol 12, 2004.
    • (2004) Journal of Computer Security , vol.12
    • Shmatikov, V.1
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.