메뉴 건너뛰기




Volumn 6452 LNCS, Issue , 2010, Pages 85-106

Anonygator: Privacy and integrity preserving data aggregation

Author keywords

Anonymity; Distributed aggregation; Integrity; Pollution; Scalability; Tokens

Indexed keywords

ANONYMITY; ANONYMOUS ROUTING; DATA AGGREGATION; DATA AGGREGATION SERVICE; DISTRIBUTED AGGREGATION; DISTRIBUTED APPLICATIONS; DISTRIBUTED DIAGNOSTICS; DISTRIBUTED SENSING; INTEGRITY; LARGE-SCALE DISTRIBUTED APPLICATIONS; LIGHT WEIGHT; PERFORMANCE MONITORING; PLANETLAB; POLLUTION ATTACK; POLLUTION RESISTANCE; SYSTEM SCALABILITY; TOKENS; TREE-BASED; USER ANONYMITY;

EID: 79956336254     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16955-7_5     Document Type: Conference Paper
Times cited : (10)

References (39)
  • 1
    • 79956310271 scopus 로고    scopus 로고
    • CoMon webpage, http://comon.cs.princeton.edu.
    • CoMon Webpage
  • 6
    • 2442603590 scopus 로고    scopus 로고
    • Security for structured peer-to-peer overlay networks
    • December
    • Castro, M., et al.: Security for structured peer-to-peer overlay networks. In: OSDI (December 2002).
    • (2002) OSDI
    • Castro, M.1
  • 7
    • 57349137953 scopus 로고    scopus 로고
    • Splitstream: High-bandwidth multicast in cooperative environments
    • Castro, M., et al: Splitstream: high-bandwidth multicast in cooperative environments. In: SOSP (2003).
    • (2003) SOSP
    • Castro, M.1
  • 8
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks
    • Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proc. of CCS (2006).
    • (2006) Proc. of CCS
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Crypto, vol. 82, pp. 23-25 (1982).
    • (1982) Proceedings of Crypto , vol.82 , pp. 23-25
    • Chaum, D.1
  • 10
    • 35448979944 scopus 로고    scopus 로고
    • Smartsiren: Virus detection and alert for smartphones
    • Cheng, J., Wong, S., Yang, H., and Lu, S. Smartsiren: Virus detection and alert for smartphones. In: MobiSys (2007).
    • (2007) MobiSys
    • Cheng, J.1    Wong, S.2    Yang, H.3    Lu, S.4
  • 11
    • 57349110591 scopus 로고    scopus 로고
    • AnonySense: Privacy-aware people-centric sensing
    • Cornelius, C., et al.: AnonySense: Privacy-aware people-centric sensing. In: MobiSys (2008).
    • (2008) MobiSys
    • Cornelius, C.1
  • 14
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Druschel, P. Kaashoek, M.F. Rowstron, A. (eds.), LNCS, Springer, Heidelberg
    • Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002).
    • (2002) IPTPS 2002 , vol.2429 , pp. 251
    • Douceur, J.R.1
  • 15
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Brickell, E.F. (ed.), LNCS, Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993).
    • (1993) CRYPTO 1992 , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 16
    • 79956336390 scopus 로고    scopus 로고
    • Not-a-bot (nab): Improving service availability in the face of botnet attacks
    • Gummadi, R., et al.: Not-a-bot (nab): Improving service availability in the face of botnet attacks. In: Proc. of NSDI (2009).
    • (2009) Proc. of NSDI
    • Gummadi, R.1
  • 17
    • 85127507791 scopus 로고    scopus 로고
    • Virtual trip lines for distributed privacy-preserving traffic monitoring
    • Hoh, B., et al.Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys (2008).
    • (2008) MobiSys
    • Hoh, B.1
  • 19
    • 41149119422 scopus 로고    scopus 로고
    • Privacy-preserving friends troubleshooting network
    • Huang, Q., Wang, H., Borisov, N.: Privacy-Preserving Friends Troubleshooting Network. In: ISOC NDSS (2005).
    • (2005) ISOC NDSS
    • Huang, Q.1    Wang, H.2    Borisov, N.3
  • 20
    • 34247356882 scopus 로고    scopus 로고
    • Cartel: A distributed mobile sensor computing system
    • Hull, B., et al.: Cartel: a distributed mobile sensor computing system. In: SenSys (2006).
    • (2006) SenSys
    • Hull, B.1
  • 21
    • 38149012971 scopus 로고    scopus 로고
    • Nymble: Anonymous IP-address blocking
    • Borisov, N. Golle, P. (eds.), LNCS, Springer, Heidelberg
    • Johnson, P.C., et al.: Nymble: Anonymous IP-address blocking. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 113-133. Springer, Heidelberg (2007).
    • (2007) PET 2007 , vol.4776 , pp. 113-133
    • Johnson, P.C.1
  • 22
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM (1981).
    • (1981) Communications of the ACM
    • Lamport, L.1
  • 23
    • 84866503356 scopus 로고    scopus 로고
    • Nericell: Rich monitoring of road and traffic conditions using mobile smartphones
    • Mohan, P., Padmanabhan, V., Ramjee, R.: Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In: SenSys (2008).
    • (2008) SenSys
    • Mohan, P.1    Padmanabhan, V.2    Ramjee, R.3
  • 24
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • November
    • Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Proc. of CCS (November 2006).
    • (2006) Proc. of CCS
    • Nambiar, A.1    Wright, M.2
  • 25
    • 0035752112 scopus 로고    scopus 로고
    • The biba one-time signature and broadcast authentication protocol
    • Perrig, A.: The biba one-time signature and broadcast authentication protocol. In: Proc. of CCS (2001).
    • (2001) Proc. of CCS
    • Perrig, A.1
  • 26
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • Perrig, A., et al.: Spins: Security protocols for sensor networks. Wireless Networks (2002).
    • (2002) Wireless Networks
    • Perrig, A.1
  • 27
    • 85076918626 scopus 로고    scopus 로고
    • Antfarm: Efficient content distribution with managed swarms
    • Peterson, R.S., Sirer, E.G.: Antfarm: Efficient content distribution with managed swarms. In: Proc. of NSDI (2009).
    • (2009) Proc. of NSDI
    • Peterson, R.S.1    Sirer, E.G.2
  • 31
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • Guerraoui, R. (ed.), LNCS, Springer, Heidelberg
    • Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001).
    • (2001) Middleware 2001 , vol.2218 , pp. 329
    • Rowstron, A.1    Druschel, P.2
  • 32
    • 35048881955 scopus 로고    scopus 로고
    • NETI@home: A distributed approach to collecting end-to-end network performance measurements
    • Barakat, C. Pratt, I. (eds.), LNCS, Springer, Heidelberg
    • Simpson Jr., C.R., Riley, G.F.: NETI@home: A distributed approach to collecting end-to-end network performance measurements. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 168-174. Springer, Heidelberg (2004).
    • (2004) PAM 2004 , vol.3015 , pp. 168-174
    • Simpson Jr., C.R.1    Riley, G.F.2
  • 33
    • 33746780102 scopus 로고    scopus 로고
    • Astrolabe: A robust and scalable technology for distributed system monitoring, management and data mining
    • van Renesse, R., Birman, K., Vogels, W.: Astrolabe: A robust and scalable technology for distributed system monitoring, management and data mining. ACM Transactions on Computer Systems (2003).
    • (2003) ACM Transactions on Computer Systems
    • Van Renesse, R.1    Birman, K.2    Vogels, W.3
  • 35
    • 36949027066 scopus 로고    scopus 로고
    • Distributed quota enforcement for spam control
    • Walfish, M., et al.: Distributed quota enforcement for spam control. In: Proc. of NSDI (2006).
    • (2006) Proc. of NSDI
    • Walfish, M.1
  • 36
    • 36048998112 scopus 로고    scopus 로고
    • Experience with a distributed object reputation system for peer-to-peer filesharing
    • Walsh, K., Sirer, E.G.: Experience With A Distributed Object Reputation System for Peer-to-Peer Filesharing. In: Proc. of NSDI (2006).
    • (2006) Proc. of NSDI
    • Walsh, K.1    Sirer, E.G.2
  • 37
    • 85077048913 scopus 로고    scopus 로고
    • Automatic misconfiguration troubleshooting with peerpressure
    • Wang, H., Platt, J., Chen, Y., Zhang, R., Wang, Y.: Automatic Misconfiguration Troubleshooting with PeerPressure. In: Proc. of OSDI (2004).
    • (2004) Proc. of OSDI
    • Wang, H.1    Platt, J.2    Chen, Y.3    Zhang, R.4    Wang, Y.5
  • 38
    • 33745207692 scopus 로고    scopus 로고
    • A scalable distributed information management system
    • August
    • Yalagandula, P., Dahlin, M.: A scalable distributed information management system. In: SIGCOMM (August 2004).
    • (2004) SIGCOMM
    • Yalagandula, P.1    Dahlin, M.2
  • 39
    • 34547373192 scopus 로고    scopus 로고
    • Providing witness anonymity in peer-to-peer systems
    • ACM, New York
    • Zhu, B., Setia, S., Jajodia, S.: Providing witness anonymity in peer-to-peer systems. In: Proc. of CCS. ACM, New York (2006).
    • (2006) Proc. of CCS
    • Zhu, B.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.