메뉴 건너뛰기




Volumn 9, Issue 6, 2010, Pages 1165-1171

Survey of anonymity and authentication in P2P networks

Author keywords

Anonymity; Authentication; P2P; Traceability

Indexed keywords

AUTHENTICATION; DISTRIBUTED COMPUTER SYSTEMS;

EID: 77954507696     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2010.1165.1171     Document Type: Article
Times cited : (11)

References (60)
  • 3
    • 39749124886 scopus 로고    scopus 로고
    • MuON: Epidemic based mutual anonymity in unstructured P2P networks
    • Bansod, N., A. Malgi, B.K. Choi and J. Mayo, 2008. MuON: Epidemic based mutual anonymity in unstructured P2P networks. Comput. Networks, 52: 915-934.
    • (2008) Comput. Networks , vol.52 , pp. 915-934
    • Bansod, N.1    Malgi, A.2    Choi, B.K.3    Mayo, J.4
  • 4
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Belenky, A. and N. Ansari, 2003. IP traceback with deterministic packet marking. Commun. Lett. IEEE, 7: 162-164.
    • (2003) Commun. Lett. IEEE , vol.7 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 6
    • 33846193135 scopus 로고    scopus 로고
    • Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
    • Chang, C.C., C.Y. Linand, K.C. Lin, 2007. Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network Comput. Appl., 30: 662-676.
    • (2007) J. Network Comput. Appl. , vol.30 , pp. 662-676
    • Chang, C.C.1    Linand, C.Y.2    Lin, K.C.3
  • 7
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-54620-7
    • Chaum, D. and E.V. Heyst, 1991. Group Signatures. In: Advances in Cryptology-EURO CRYPT '91, Davies, D.W. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-54620-7, pp: 257-265.
    • (1991) Advances in Cryptology-EURO CRYPT '91 , pp. 257-265
    • Chaum, D.1    Heyst, E.V.2
  • 10
    • 67749097815 scopus 로고    scopus 로고
    • FBT: An efficient traceback scheme in hierarchical wireless sensor network
    • Cheng, B.C., H. Chen and G.T. Liao, 2008. FBT: An efficient traceback scheme in hierarchical wireless sensor network. Security Commun. Networks, 2: 133-144.
    • (2008) Security Commun. Networks , vol.2 , pp. 133-144
    • Cheng, B.C.1    Chen, H.2    Liao, G.T.3
  • 11
    • 58349119575 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers Computer Society, Zhangjiajie, Hunan, China
    • Dong, J., C. Tan and Y. Zhang, 2008. A Reputation Evaluation Method in P2P Anonymous Environment. Institute of Electrical and Electronics Engineers Computer Society, Zhangjiajie, Hunan, China, pp: 1516-1521.
    • (2008) A Reputation Evaluation Method in P2P Anonymous Environment , pp. 1516-1521
    • Dong, J.1    Tan, C.2    Zhang, Y.3
  • 13
    • 24344445915 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers Inc., Seoul, Korea
    • Gong, C. and K.I.P. Sarac, 2005. Traceback Based on Packet Marking and Logging. Institute of Electrical and Electronics Engineers Inc., Seoul, Korea, pp: 1043-1047.
    • (2005) Traceback Based on Packet Marking and Logging , pp. 1043-1047
    • Gong, C.1    Sarac, K.I.P.2
  • 15
  • 16
    • 26444604913 scopus 로고    scopus 로고
    • A random walk based anonymous peer-to-peer protocol design
    • Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
    • Han, J., Y. Liu, L. Lu, L. Hu and A. Paul, 2005. A Random Walk Based Anonymous Peer-to-Peer Protocol Design. In: Networking and Mobile Computing, Lu, X. andW. Ahao(Eds.).LNCS., 3619, Springer-Verlag, Berlin, Heidelberg, ISBN-13: 978-3-540-28102-3, pp: 143-152. (Pubitemid 41435753)
    • (2005) Lecture Notes in Computer Science , vol.3619 , pp. 143-152
    • Han, J.1    Liu, Y.2    Lu, L.3    Hu, L.4    Patil, A.5
  • 20
    • 67649217531 scopus 로고    scopus 로고
    • A novel and efficient unlinkable secret handshakes scheme
    • Huang, H. and Z. Cao, 2009. A novel and efficient unlinkable secret handshakes scheme. IEEE Commun. Lett., 13: 363-365.
    • (2009) IEEE Commun. Lett. , vol.13 , pp. 363-365
    • Huang, H.1    Cao, Z.2
  • 24
    • 58049189579 scopus 로고    scopus 로고
    • Heightening security of P2P networks by neighborhood key method
    • Nov. 1-3, Institute of Electrical and Electronics Engineering Computer Society, Wuhan, China
    • Lai-Cheng, C, 2008. Heightening security of P2P networks by neighborhood key method. Proceedings of the 1 st International Conference on Intelligent Networks and Intelligent Systems, Nov. 1-3, Institute of Electrical and Electronics Engineering Computer Society, Wuhan, China, pp: 201-204.
    • (2008) Proceedings of the 1 st International Conference on Intelligent Networks and Intelligent Systems , pp. 201-204
    • Lai-Cheng, C.1
  • 25
    • 0020780905 scopus 로고
    • Weak byzantine generals problem
    • Lamport, L., 1983. Weak byzantine generals problem. J. ACM, 30: 668-676.
    • (1983) J. ACM , vol.30 , pp. 668-676
    • Lamport, L.1
  • 34
    • 84943517115 scopus 로고    scopus 로고
    • On the utility of distributed cryptography in P2P and MANETs: The case of membership control
    • Nov. 04-07, TEEE Computer Society Washington DC, USA.,pp
    • Narasimha, M., G. Tsudik and J.H. Yi, 2003. On the utility of distributed cryptography in P2P and MANETs: The case of membership control. Proceedings of 11th IEEE International Conference on Network Protocols, Nov. 04-07, TEEE Computer Society Washington, DC, USA.,pp: 336-345.
    • (2003) Proceedings of 11th IEEE International Conference on Network Protocols , pp. 336-345
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 37
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for Web transaction
    • Reiter, M.K. and A.D. Rubin, 1998. Crowds: Anonymity for Web transaction. ACM TISSEC, 1: 66-92.
    • (1998) ACM TISSEC , vol.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 38
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
    • Nov. 21, Association for Computing Machinery, Washington DC, USA.
    • Rennhard, M. and B. Plattner, 2002. Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection. Proceedings of the ACM Conference on Computer and Communications Security, Nov. 21, Association for Computing Machinery, Washington, DC, USA., pp: 91-102.
    • (2002) Proceedings of the ACM Conference on Computer and Communications Security , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 41
    • 0035701330 scopus 로고    scopus 로고
    • Responder anonymity and anonymous peer-to-peer file sharing
    • Nov .11-14, Riverside, CA, United states, Institute of Electrical and Electronics Engineers Computer Society
    • Scarlata, V., B.N. Levine and C. Shields, 2001. Responder anonymity and anonymous peer-to-peer file sharing. Proceedings of the 9th International Conference on Network Protocols, Nov .11-14, Riverside, CA, United states, Institute of Electrical and Electronics Engineers Computer Society, pp: 272-280.
    • (2001) Proceedings of the 9th International Conference on Network Protocols , pp. 272-280
    • Scarlata, V.1    Levine, B.N.2    Shields, C.3
  • 47
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An IP overlay network for tracking DoS floods
    • Aug. 14-17, Denver, Colorado, USA
    • Stone, R., 2000. Centertrack: An IP overlay network for tracking DoS floods. Proceedings of the 9th USENIX Security Symposium, Aug. 14-17, Denver, Colorado, USA.,pp: 107-118.
    • (2000) Proceedings of the 9th USENIX Security Symposium , pp. 107-118
    • Stone, R.1
  • 48
    • 70350393707 scopus 로고    scopus 로고
    • On the security of a novel and efficient unlinkable secret handshakes scheme
    • Su, R., 2009. On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun. Lett., 13: 712-713.
    • (2009) IEEE Commun. Lett. , vol.13 , pp. 712-713
    • Su, R.1
  • 50
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • Syverson, P.F., 1998. Anonymous connections and onion routing. IEEE J. Selected Areas Commun., 16: 482-494.
    • (1998) IEEE J. Selected Areas Commun. , vol.16 , pp. 482-494
    • Syverson, P.F.1
  • 51
    • 59249107072 scopus 로고    scopus 로고
    • A new scalable distributed authentication for P2P network and its performance evaluation
    • Takeda, A., D. Chakraborty, G. Kitagata, K. Hashimoto and N. Shiratori, 2008. A new scalable distributed authentication for P2P network and its performance evaluation. WSEAS Trans. Comput, 7: 1628-1637.
    • (2008) WSEAS Trans. Comput , vol.7 , pp. 1628-1637
    • Takeda, A.1    Chakraborty, D.2    Kitagata, G.3    Hashimoto, K.4    Shiratori, N.5
  • 53
    • 67650805900 scopus 로고    scopus 로고
    • Fair blind signature based authentication for super peer P2P network
    • Wang, X. and X. Sun, 2009. Fair blind signature based authentication for super peer P2P network. Inform. Technol. J., 8: 887-894.
    • (2009) Inform. Technol. J. , vol.8 , pp. 887-894
    • Wang, X.1    Sun, X.2
  • 56
    • 33745142175 scopus 로고    scopus 로고
    • Authentication with controlled anonymity in P2P systems
    • Dalian, China 2005. Institute of Electrical and Electronics Engineers Computer Society, Washington DC, USA., ISBN:0-7695-2405-2
    • Wierzbicki, A., A. Zwierko and Z. Kotulski, 2005. Authentication with Controlled Anonymity in P2P Systems. In: Parallel and Distributed Computing, Applications and Technologies. Dalian, China, 2005. Institute of Electrical and Electronics Engineers Computer Society, Washington, DC, USA., ISBN:0-7695-2405-2, pp: 871-875.
    • (2005) Parallel and Distributed Computing, Applications and Technologies , pp. 871-875
    • Wierzbicki, A.1    Zwierko, A.2    Kotulski, Z.3
  • 58
    • 34848842164 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers Inc., Toronto, ON, Canada
    • Ye, F., H. Yang and Z. Liu, 2007. Catching Moles in Sensor Networks. Institute of Electrical and Electronics Engineers Inc., Toronto, ON, Canada.
    • (2007) Catching Moles in Sensor Networks
    • Ye, F.1    Yang, H.2    Liu, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.