메뉴 건너뛰기




Volumn , Issue , 2011, Pages

On the trade-off between relationship anonymity and communication overhead in anonymity networks

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL EXPRESSIONS; ANONYMITY NETWORKS; COMMUNICATION DELAYS; COMMUNICATION OVERHEADS; INDUSTRIAL COMMUNICATION NETWORKS; MESSAGE DELAY;

EID: 80052185753     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icc.2011.5962454     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 1
    • 85081076484 scopus 로고    scopus 로고
    • Security for Industrial Communication Systems
    • D. Dzung, M. Naedele, T. V. Hoff, and M. Crevatin "Security for Industrial Communication Systems." Proc. IEEE vol. 82, pp. 6 1152-1177, 2005.
    • (2005) Proc. IEEE , vol.82 , pp. 61152-61177
    • Dzung, D.1    Naedele, M.2    Hoff, T.V.3    Crevatin, M.4
  • 2
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability Assessment of Cybersecurity for SCADA Systems
    • C. W. Ten, C. C. Liu and M. Govindarasu "Vulnerability Assessment of Cybersecurity for SCADA Systems." IEEE Trans. Power Syst., vol. 23, no. 4, 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4
    • Ten, C.W.1    Liu, C.C.2    Govindarasu, M.3
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • D. Chaum "Untraceable electronic mail, return addresses and digital pseudonyms" Commun. of the ACM 24(2), pp. 84-88, 1981
    • (1981) Commun. of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 4
    • 0008144259 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • A. Pfitzman, M. Köhntopp "Anonymity, unobservability, and pseudonymity - a proposal for terminology" Anonymity 2000, pp. 1-9, 2000
    • (2000) Anonymity 2000 , pp. 1-9
    • Pfitzman, A.1    Köhntopp, M.2
  • 10
    • 14544273666 scopus 로고    scopus 로고
    • The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
    • November
    • M. Wright, M. Adler, B. N. Levine, and C. Shields "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems" ACM Trans. Inform. Syst. Security (TISSEC) 4(7), pp. 489-522, November 2004
    • (2004) ACM Trans. Inform. Syst. Security (TISSEC) , vol.4 , Issue.7 , pp. 489-522
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.