메뉴 건너뛰기




Volumn 6, Issue 3 PART 1, 2011, Pages 752-762

BIT-TRAPS: Building information-theoretic traffic privacy into packet streams

Author keywords

Computer networks; data privacy; information security; mutual information

Indexed keywords

AVERAGE COST; BUFFERING DELAY; COMMUNICATIONS PROTOCOLS; CONSTRAINED OPTIMIZATION PROBLEMS; DISCRETE CHANNEL; ENCRYPTED DATA; MUTUAL INFORMATIONS; NON-LINEAR RELATIONSHIPS; ORTHOGONAL METHOD; PACKET STREAMS; PREVENT INFORMATION LEAKAGE; RANDOMIZED ALGORITHMS; SIDE-CHANNEL; VARIABLE PACKET SIZE;

EID: 80051753305     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2138696     Document Type: Article
Times cited : (16)

References (17)
  • 2
    • 50249161557 scopus 로고    scopus 로고
    • Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
    • Boston, MA
    • C. Wright, L. Ballard, F. Monrose, and G. Masson, "Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?", in Proc. 16th USENIX Security Symp., Boston, MA, 2007.
    • (2007) Proc. 16th USENIX Security Symp.
    • Wright, C.1    Ballard, L.2    Monrose, F.3    Masson, G.4
  • 4
    • 34249340846 scopus 로고    scopus 로고
    • Analysis and protection of dynamic membership information for group key distribution schemes
    • DOI 10.1109/TIFS.2007.897274
    • Y. Sun and K. Liu, "Analysis and protection of dynamic membership information for group key distribution schemes", IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 213-226, Jun. 2007. (Pubitemid 46808689)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.2 , pp. 213-226
    • Sun, Y.L.1    Liu, K.J.R.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Commun. ACM, vol. 24, pp. 84-88, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 8
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • May
    • M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing", IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 10
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go-mixes providing probabilistic anonymity in an open system
    • London, U. K., Springer-Verlag
    • D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go-mixes providing probabilistic anonymity in an open system", in Proc. Second Int. Workshop on Information Hiding, London, U. K., 1998, pp. 83-98, Springer-Verlag.
    • (1998) Proc. Second Int. Workshop on Information Hiding , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Buschkes, R.3
  • 11
    • 27944440026 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • D. Martin and A. Serjantov, Eds., May
    • G. Danezis, "The traffic analysis of continuous-time mixes", in Proc. Privacy Enhancing Technologies (PET 2004), D. Martin and A. Serjantov, Eds., May 2004.
    • (2004) Proc. Privacy Enhancing Technologies (PET 2004)
    • Danezis, G.1
  • 12
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on ssh
    • Berkeley, CA, USENIX Association
    • D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on ssh", in Proc. 10th Conf. USENIX Security Symp. (SSYM'01), Berkeley, CA, 2001, pp. 25-25, USENIX Association.
    • (2001) Proc. 10th Conf. USENIX Security Symp. (SSYM'01) , pp. 25-25
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 16
    • 0029179490 scopus 로고
    • Rate distortion functions and effective bandwidth of queueing processes
    • Piscataway, NJ
    • C. Chang and J. Thomas, "Rate distortion functions and effective bandwidth of queueing processes", in Proc. 1995 IEEE Int. Symp. Information Theory, Piscataway, NJ, 1995, pp. 103-103.
    • (1995) Proc. 1995 IEEE Int. Symp. Information Theory , pp. 103-103
    • Chang, C.1    Thomas, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.