메뉴 건너뛰기




Volumn , Issue , 2010, Pages 52-56

Embedding covert information flow

Author keywords

Anonymous networking; Fredholm integral equation; Riemann Hilbert problem; traffic analysis

Indexed keywords

ANONYMOUS NETWORKING; EMBEDDING EFFICIENCY; FREDHOLM INTEGRAL EQUATION; INFORMATION FLOWS; RIEMANN HILBERT PROBLEMS; TRAFFIC ANALYSIS;

EID: 79958018732     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2010.5757465     Document Type: Conference Paper
Times cited : (1)

References (32)
  • 4
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • V. L. Voydock and S. T. Kent, "Security mechanisms in high-level network protocols," ACM Computing Surveys, vol. 15, pp. 135-171, 1983.
    • (1983) ACM Computing Surveys , vol.15 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 5
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), Springer-Verlag
    • J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), vol. 2009 of LNCS, pp. 10-29, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 11
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • vol. 00, (Los Alamitos, CA, USA), IEEE Computer Society
    • W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proceedings of the 2001 IEEE Symposium on Security and Privacy, vol. 00, (Los Alamitos, CA, USA), p. 0130, IEEE Computer Society, 2001.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 0130
    • Lee, W.1    Xiang, D.2
  • 13
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 17
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July
    • O. Berthold, H. Federrath, and S. Kopsell, "Web MIXes: A system for anonymous and unobservable Internet access," in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, vol. 2009, (Berkeley, CA), pp. 115-129, July 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Kopsell, S.3
  • 24
    • 35248841429 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several MIX types
    • Proceedings of the Fifth International Workshop on Information Hiding (IH'02), Noordwijkerhout, The Netherlands, October
    • A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several MIX types," in Proceedings of the Fifth International Workshop on Information Hiding (IH'02), Lecture Notes in Computer Science, vol. 2578, (Noordwijkerhout, The Netherlands), pp. 36-52, October 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 36-52
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 30
    • 84956040127 scopus 로고
    • Diffraction by a wave-guide of finite length
    • D. S. Jones, "Diffraction by a wave-guide of finite length," Proc Camb Phil Soc, vol. 48, no. 1, pp. 118-134, 1952.
    • (1952) Proc Camb Phil Soc , vol.48 , Issue.1 , pp. 118-134
    • Jones, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.