메뉴 건너뛰기




Volumn 6205 LNCS, Issue , 2010, Pages 202-219

Drac: An architecture for anonymous low-volume communications

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMIZATION; CORE DESIGN; INSTANT MESSAGING; PASSIVE ADVERSARY; PEER-TO-PEER FASHION; SIMULATION-BASED SECURITY; SOCIAL NETWORKS; SYSTEM USE; THIRD PARTIES; UNOBSERVABILITY; VOICE-OVER-IP COMMUNICATION; VOLUME COMMUNICATION;

EID: 77955441003     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14527-8_12     Document Type: Conference Paper
Times cited : (20)

References (37)
  • 1
    • 35248878897 scopus 로고    scopus 로고
    • On the economics of anonymity
    • Wright, R. N. ed., Springer, Heidelberg
    • Acquisti, A., Dingledine, R., Syverson, P. F.: On the Economics of Anonymity. In: Wright, R. N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84-102. Springer, Heidelberg (2003)
    • (2003) FC 2003. LNCS , vol.2742 , pp. 84-102
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.F.3
  • 3
    • 70349811111 scopus 로고    scopus 로고
    • Prying data out of a social network
    • Memon, N., Alhajj, R. eds. ASONAM
    • Bonneau, J., Anderson, J., Danezis, G.: Prying data out of a social network. In: Memon, N., Alhajj, R. (eds.) ASONAM, pp. 249-254. IEEE Computer Society, Los Alamitos (2009)
    • (2009) IEEE Computer Society, los Alamitos , pp. 249-254
    • Bonneau, J.1    Anderson, J.2    Danezis, G.3
  • 4
    • 50249119735 scopus 로고    scopus 로고
    • Denial of service or denial of security?
    • Ning, P., De Capitani di Vimercati, S., Syverson, P. F. eds., ACM, New York
    • Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Ning, P., De Capitani di Vimercati, S., Syverson, P. F. (eds.) ACM Conference on Computer and Communications Security, pp. 92-102. ACM, New York (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 92-102
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 5
    • 77955460015 scopus 로고    scopus 로고
    • Borisov, N., Golle, P. eds. :, Springer, Heidelberg
    • Borisov, N., Golle, P. (eds.) : PET 2007. LNCS, vol. 4776. Springer, Heidelberg (2007)
    • (2007) PET 2007. LNCS , vol.4776
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (2), 84-88 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • Dingledine, R. ed., Springer, Heidelberg
    • Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1-17. Springer, Heidelberg (2003)
    • (2003) PET 2003. LNCS , vol.2760 , pp. 1-17
    • Danezis, G.1
  • 8
    • 0037810717 scopus 로고    scopus 로고
    • Mixminion: Design of a type III anonymous remailer protocol
    • IEEE Computer Society, Los Alamitos
    • Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy, pp. 2-15. IEEE Computer Society, Los Alamitos (2003)
    • (2003) IEEE Symposium on Security and Privacy , pp. 2-15
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 9
    • 70449674640 scopus 로고    scopus 로고
    • Sphinx: A compact and provably secure mix format
    • IEEE Computer Society, Los Alamitos
    • Danezis, G., Goldbergp, I.: Sphinx: A compact and provably secure mix format. In: IEEE Symposium on Security and Privacy, pp. 269-282. IEEE Computer Society, Los Alamitos (2009)
    • (2009) IEEE Symposium on Security and Privacy , pp. 269-282
    • Danezis, G.1    Goldbergp, I.2
  • 10
    • 74049135841 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • The Internet Society
    • Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: NDSS. The Internet Society (2009)
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 11
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Dingledine, R., Syverson, P. F. eds., Springer, Heidelberg
    • Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
    • (2003) PET 2002. LNCS , vol.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 12
    • 50249117750 scopus 로고    scopus 로고
    • On the impact of social network profiling on anonymity
    • Borisov, N., Goldberg, I. eds., Springer, Heidelberg
    • Díaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44-62. Springer, Heidelberg (2008)
    • (2008) PETS 2008. LNCS , vol.5134 , pp. 44-62
    • Díaz, C.1    Troncoso, C.2    Serjantov, A.3
  • 15
    • 20444439634 scopus 로고    scopus 로고
    • Location diversity in anonymity networks
    • Atluri, V., Syverson, P. F., De Capitani di Vimercati, S. eds., ACM, New York
    • Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Atluri, V., Syverson, P. F., De Capitani di Vimercati, S. (eds.) WPES, pp. 66-76. ACM, New York (2004)
    • (2004) WPES , pp. 66-76
    • Feamster, N.1    Dingledine, R.2
  • 16
    • 72849147698 scopus 로고    scopus 로고
    • On the security of the tor authentication protocol
    • Danezis, G., Golle, P. eds., Springer, Heidelberg
    • Goldberg, I.: On the security of the tor authentication protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006)
    • (2006) PET 2006. LNCS , vol.4258 , pp. 316-331
    • Goldberg, I.1
  • 17
    • 70350543794 scopus 로고    scopus 로고
    • More anonymous onion routing through trust
    • IEEE Computer Society, Los Alamitos
    • Johnson, A., Syverson, P. F.: More anonymous onion routing through trust. In: CSF, pp. 3-12. IEEE Computer Society, Los Alamitos (2009)
    • (2009) CSF , pp. 3-12
    • Johnson, A.1    Syverson, P.F.2
  • 19
    • 33751039759 scopus 로고    scopus 로고
    • Fundamental limits on the anonymity provided by the mix technique
    • IEEE Computer Society, Los Alamitos
    • Kesdogan, D., Agrawal, D., Pham, D. V., Rautenbach, D.: Fundamental limits on the anonymity provided by the mix technique. In: IEEE Symposium on Security and Privacy, pp. 86-99. IEEE Computer Society, Los Alamitos (2006)
    • (2006) IEEE Symposium on Security and Privacy , pp. 86-99
    • Kesdogan, D.1    Agrawal, D.2    Pham, D.V.3    Rautenbach, D.4
  • 20
    • 77955450879 scopus 로고    scopus 로고
    • Apres - a system for anonymous presence. Technical report
    • Laurie, B.: Apres - a system for anonymous presence. Technical report
    • Laurie, B.1
  • 21
    • 70349273917 scopus 로고    scopus 로고
    • Information leaks in structured peer-to-peer anonymous communication systems
    • Syverson, P., Jha, S., Zhang, X. eds., Alexandria, Virginia, USA, October 2008, ACM Press, New York
    • Mittal, P., Borisov, N.: Information leaks in structured peer-to-peer anonymous communication systems. In: Syverson, P., Jha, S., Zhang, X. (eds.) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 2008, pp. 267-278. ACM Press, New York (2008)
    • (2008) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) , pp. 267-278
    • Mittal, P.1    Borisov, N.2
  • 23
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor
    • IEEE Computer Society, Los Alamitos
    • Murdoch, S. J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Los Alamitos (2005)
    • (2005) IEEE Symposium on Security and Privacy , pp. 183-195
    • Murdoch, S.J.1    Danezis, G.2
  • 24
    • 38149130456 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • Golle eds.
    • Murdoch, S. J., Zielinski, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, Golle (eds.) [5], pp. 167-183
    • Borisov , vol.5 , pp. 167-183
    • Murdoch, S.J.1    Zielinski, P.2
  • 25
    • 70350655384 scopus 로고    scopus 로고
    • Entropy bounds for traffic confirmation
    • IACR October
    • O'Connor, L.: Entropy bounds for traffic confirmation. Technical Report 2008/365, IACR (October 2008)
    • (2008) Technical Report 2008/365
    • O'Connor, L.1
  • 26
    • 0011702966 scopus 로고
    • ISDN-MIXes: Untraceable communication with small bandwidth overhead
    • Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Informatik-Fachberichte, pp. 451-463 (1991)
    • (1991) Informatik-Fachberichte , pp. 451-463
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 27
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • Federrath, H. ed., Springer, Heidelberg
    • Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) PET 2000. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
    • (2001) PET 2000. LNCS , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 29
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, M. K., Rubin, A. D.: Anonymous web transactions with crowds. Commun. ACM 42 (2), 32-38 (1999)
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.K.1    Rubin, A.D.2
  • 30
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Dingledine, R., Syverson, P. F. eds., Springer, Heidelberg
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
    • (2003) PET 2002. LNCS , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 31
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Federrath, H. ed., Springer, Heidelberg
    • Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) PET 2000. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) PET 2000. LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 32
    • 74049160327 scopus 로고    scopus 로고
    • The bayesian traffic analysis of mix networks
    • Al- Shaer, E., Jha, S., Keromytis, A. D. eds., ACM, New York
    • Troncoso, C., Danezis, G.: The bayesian traffic analysis of mix networks. In: Al- Shaer, E., Jha, S., Keromytis, A. D. (eds.) ACM Conference on Computer and Communications Security, pp. 369-379. ACM, New York (2009)
    • (2009) ACM Conference on Computer and Communications Security , pp. 369-379
    • Troncoso, C.1    Danezis, G.2
  • 33
    • 77953723457 scopus 로고    scopus 로고
    • Greek intelligence and the capture of PKK leader abdullah ocalan in 1999
    • Extracts March
    • Varouhakis, M.: Greek intelligence and the capture of PKK leader abdullah ocalan in 1999. Studies in Intelligence 53 (1) (Extracts) (March 2009)
    • (2009) Studies in Intelligence , vol.53 , Issue.1
    • Varouhakis, M.1
  • 35
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • Watts, D. J., Strogatz, S. H.: Collective dynamics of 'small-world' networks. Nature 393, 440-442 (1998)
    • (1998) Nature , vol.393 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 37
    • 50249140706 scopus 로고    scopus 로고
    • Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
    • IEEE Computer Society, Los Alamitos
    • Wright, C. V., Ballard, L., Coull, S. E., Monrose, F., Masson, G. M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: IEEE Symposium on Security and Privacy, pp. 35-49. IEEE Computer Society, Los Alamitos (2008)
    • (2008) IEEE Symposium on Security and Privacy , pp. 35-49
    • Wright, C.V.1    Ballard, L.2    Coull, S.E.3    Monrose, F.4    Masson, G.M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.