메뉴 건너뛰기




Volumn 6269 LNCS, Issue , 2010, Pages 48-70

Trust in anonymity networks

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMITY NETWORKS; E-GOVERNANCE; EBUSINESS; FREEDOM OF SPEECH; ONLINE COMMUNITIES; SECURITY ATTACKS; SECURITY PROPERTIES; TRUST LEVEL; TRUST METRICS;

EID: 78249256062     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15375-4_5     Document Type: Conference Paper
Times cited : (13)

References (34)
  • 1
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable Mix-net with verification work indendent of the number of Mix-servers
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Abe, M.: Universally verifiable Mix-net with verification work indendent of the number of Mix-servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437-447. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 437-447
    • Abe, M.1
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 77955437955 scopus 로고    scopus 로고
    • Anonymous webs of trust
    • 10th Privacy Enhancing Technologies Symposium, PETS 2010. Springer, Heidelberg to appear
    • Backes, M., Lorenz, S., Maffei, M., Pecina, K.: Anonymous webs of trust. In: 10th Privacy Enhancing Technologies Symposium, PETS 2010. LNCS. Springer, Heidelberg (to appear, 2010)
    • (2010) LNCS
    • Backes, M.1    Lorenz, S.2    Maffei, M.3    Pecina, K.4
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 84947287486 scopus 로고    scopus 로고
    • A reputation system to increase mix-net reliability
    • Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
    • Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase mix-net reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 126-141. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 126-141
    • Dingledine, R.1    Freedman, M.J.2    Hopwood, D.3    Molnar, D.4
  • 11
    • 84957023357 scopus 로고    scopus 로고
    • Reliable MIX cascade networks through reputation
    • Blaze, M. (ed.) FC Springer, Heidelberg
    • Dingledine, R., Syverson, P.F.: Reliable MIX cascade networks through reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 253-268. Springer, Heidelberg (2003)
    • (2002) LNCS , vol.2357 , pp. 253-268
    • Dingledine, R.1    Syverson, P.F.2
  • 12
    • 68949206252 scopus 로고    scopus 로고
    • An analysis of the exponential decay principle in probabilistic trust models
    • ElSalamouny, E., Krukow, K.T., Sassone, V.: An analysis of the exponential decay principle in probabilistic trust models. Theor. Comput. Sci. 410(41), 4067-4084 (2009)
    • (2009) Theor. Comput. Sci. , vol.410 , Issue.41 , pp. 4067-4084
    • ElSalamouny, E.1    Krukow, K.T.2    Sassone, V.3
  • 13
    • 77953245932 scopus 로고    scopus 로고
    • HMM-based trust model
    • Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. Springer, Heidelberg
    • ElSalamouny, E., Sassone, V., Nielsen, M.: HMM-based trust model. In: Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. LNCS, vol. 5983, pp. 21-35. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5983 , pp. 21-35
    • ElSalamouny, E.1    Sassone, V.2    Nielsen, M.3
  • 16
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 17
    • 77953244874 scopus 로고    scopus 로고
    • Probable innocence in the presence of independent knowledge
    • Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. Springer, Heidelberg
    • Hamadou, S., Palamidessi, C., Sassone, V., ElSalamouny, E.: Probable innocence in the presence of independent knowledge. In: Degano, P., Guttman, J.D. (eds.) Formal Aspects in Security and Trust. LNCS, vol. 5983, pp. 141-156. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5983 , pp. 141-156
    • Hamadou, S.1    Palamidessi, C.2    Sassone, V.3    ElSalamouny, E.4
  • 20
    • 37249031542 scopus 로고    scopus 로고
    • A logical framework for history-based access control and reputation systems
    • Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security 16(1), 63-101 (2008)
    • (2008) Journal of Computer Security , vol.16 , Issue.1 , pp. 63-101
    • Krukow, K.1    Nielsen, M.2    Sassone, V.3
  • 21
    • 54249091264 scopus 로고    scopus 로고
    • Don't clog the queue! circuit clogging and mitigation in P2P anonymity schemes
    • Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
    • McLachlan, J., Hopper, N.: Don't clog the queue! circuit clogging and mitigation in P2P anonymity schemes. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5143 , pp. 31-46
    • McLachlan, J.1    Hopper, N.2
  • 23
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor
    • IEEE Computer Society, Los Alamitos
    • Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Los Alamitos (2005)
    • (2005) IEEE Symposium on Security and Privacy , pp. 183-195
    • Murdoch, S.J.1    Danezis, G.2
  • 24
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM, New York
    • Nambiar, A., Wright, M.: Salsa: a structured approach to large-scale anonymity. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 17-26. ACM, New York (2006)
    • (2006) ACM Conference on Computer and Communications Security , pp. 17-26
    • Nambiar, A.1    Wright, M.2
  • 26
    • 84937415944 scopus 로고    scopus 로고
    • A length-invariant hybrid mix
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Ohkubo, M., Abe, M.: A length-invariant hybrid mix. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 178-191. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 178-191
    • Ohkubo, M.1    Abe, M.2
  • 27
    • 56649123231 scopus 로고    scopus 로고
    • Compromising anonymity using packet spinning
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
    • Pappas, V., Athanasopoulos, E., Ioannidis, S., Markatos, E.P.: Compromising anonymity using packet spinning. In:Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 161-174. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5222 , pp. 161-174
    • Pappas, V.1    Athanasopoulos, E.2    Ioannidis, S.3    Markatos, E.P.4
  • 29
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
    • Jajodia, S., Samarati, P. (eds.) ACM, New York
    • Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Jajodia, S., Samarati, P. (eds.) Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, WPES, pp. 91-102. ACM, New York (2002)
    • (2002) Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 30
    • 77958025455 scopus 로고    scopus 로고
    • Trust in Crowds: Probabilistic behaviour in anonymity protocols. Symposium on Trustworthy Global Computing, TGC 2010
    • Springer, Heidelberg
    • Sassone, V., ElSalamouny, E., Hamadou, S.: Trust in Crowds: probabilistic behaviour in anonymity protocols. In: Symposium on Trustworthy Global Computing, TGC 2010. LNCS, vol. 6084. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6084
    • Sassone, V.1    ElSalamouny, E.2    Hamadou, S.3
  • 31
    • 84943806344 scopus 로고    scopus 로고
    • Trustme: Anonymous management of trust relationships in decentralized P2P systems
    • Shahmehri, N., Graham, R.L., Caronni, G. (eds.) IEEE Computer Society, Los Alamitos
    • Singh, A., Liu, L.: Trustme: Anonymous management of trust relationships in decentralized P2P systems. In: Shahmehri, N., Graham, R.L., Caronni, G. (eds.) Peer-to-Peer Computing, pp. 142-149. IEEE Computer Society, Los Alamitos (2003)
    • (2003) Peer-to-Peer Computing , pp. 142-149
    • Singh, A.1    Liu, L.2
  • 33
    • 84943784070 scopus 로고    scopus 로고
    • Trust and reputation model in peer-to-peer networks
    • Shahmehri, N., Graham, R.L., Caronni, G. (eds.) IEEE Computer Society, Los Alamitos
    • Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: Shahmehri, N., Graham, R.L., Caronni, G. (eds.) Peer-to-Peer Computing. IEEE Computer Society, Los Alamitos (2003)
    • (2003) Peer-to-Peer Computing
    • Wang, Y.1    Vassileva, J.2
  • 34
    • 84871199341 scopus 로고    scopus 로고
    • Design principles for low latency anonymous network systems secure against timing attacks
    • Brankovic, L., Coddington, P.D., Roddick, J.F., Steketee, C., Warren, J.R., Wendelborn, A.L. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies), AISW 2007 Australian Computer Society
    • Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Brankovic, L., Coddington, P.D., Roddick, J.F., Steketee, C., Warren, J.R., Wendelborn, A.L. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies), AISW 2007. CRPIT, vol. 68, pp. 183-191. Australian Computer Society (2007)
    • (2007) CRPIT , vol.68 , pp. 183-191
    • Wiangsripanawan, R.1    Susilo, W.2    Safavi-Naini, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.