메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 217-222

Scalable anonymous connections in the context of MIP and AAA

Author keywords

Authentication; Computer architecture; Context; Europe; Internet; Mobile communication; National electric code; Privacy; Telecommunication traffic; Time factors

Indexed keywords

AUTHENTICATION; COMPUTER ARCHITECTURE; COMPUTER PRIVACY; DATA PRIVACY; INTERNET; INTERNET PROTOCOLS; MOBILE TELECOMMUNICATION SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 84860886917     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ENABL.2001.953417     Document Type: Conference Paper
Times cited : (1)

References (21)
  • 1
    • 84976845043 scopus 로고
    • End-to-end arguments in system design
    • J.H. Saltzer, D.P. Reed, D.D. Clark: 'End-to-end arguments in system design' ACM Tocs 2, 1984, pp.277-288.
    • (1984) ACM Tocs , vol.2 , pp. 277-288
    • Saltzer, J.H.1    Reed, D.P.2    Clark, D.D.3
  • 2
    • 4944253372 scopus 로고    scopus 로고
    • Protection in Mobile Communication
    • Addison-Wesely-Longmann
    • H. Fedderath: 'Protection in Mobile Communication', Multilateral Security in Communications, Addison-Wesely-Longmann 1999, pp. 349-364.
    • (1999) Multilateral Security in Communications , pp. 349-364
    • Fedderath, H.1
  • 4
    • 84955605258 scopus 로고    scopus 로고
    • Mixes in mobile communication systems: Location management with privacy
    • Information Hiding, Proceedings, Springer Verlag
    • H. Federrath, A. Jerichow, A. Pfitzmann: 'Mixes in mobile communication systems: Location management with privacy', Information Hiding, Proceedings, Springer Verlag, LNCS 1174, 1996, pp.121-135.
    • (1996) LNCS , vol.1174 , pp. 121-135
    • Federrath, H.1    Jerichow, A.2    Pfitzmann, A.3
  • 5
    • 84950246822 scopus 로고    scopus 로고
    • Anonymizer, http://www.anonymizer.com/ 2000.
    • (2000)
  • 6
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms
    • D. Chaum: 'Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms', Communications of the ACM, Vol. 24, No. 2, 1981, pp.-84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 84955557456 scopus 로고    scopus 로고
    • Hiding Routing Information
    • Information Hiding, Proceedings, Springer Verlag
    • D. Goldschlag, M. Reed, P. Syverson: 'Hiding Routing Information', Information Hiding, Proceedings, Springer Verlag, LNCS 1174, 1996, pp. 137-150.
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 8
    • 84957030837 scopus 로고    scopus 로고
    • Protocols Using Anonymous Connections: Mobile Applications
    • Security Protocols, Proceedings, Springer Verlag
    • M. Reed, P. Syverson, D. Goldschlag: 'Protocols Using Anonymous Connections: Mobile Applications', Security Protocols, Proceedings, Springer Verlag, LNCS 1361, 1998, pp.13-23.
    • (1998) LNCS , vol.1361 , pp. 13-23
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 10
    • 84948149704 scopus 로고    scopus 로고
    • Methods for Protecting a Mobile Agent's Route
    • Information Security, Proceedings, Springer Verlag
    • D. Westhoff, M. Schneider, C. Unger, F. Kaderali: 'Methods for Protecting a Mobile Agent's Route', Information Security, Proceedings, Springer Verlag, LNCS 1729, 1999, pp.57-71.
    • (1999) LNCS , vol.1729 , pp. 57-71
    • Westhoff, D.1    Schneider, M.2    Unger, C.3    Kaderali, F.4
  • 11
    • 0032631694 scopus 로고    scopus 로고
    • Virtual private networks: Joint resource allocation and routing design
    • D. Mitra, J.A. Morrison, K.G. Ramakrishnan: 'Virtual private networks: joint resource allocation and routing design', IEEE INFOCOM 99, 1999, pp.480-490.
    • (1999) IEEE INFOCOM 99 , pp. 480-490
    • Mitra, D.1    Morrison, J.A.2    Ramakrishnan, K.G.3
  • 17
    • 0006810624 scopus 로고
    • The Data Encryption Standard in Perspective
    • National Bureau of Standards Special Publication 500-27
    • R.M. Davis: 'The Data Encryption Standard in Perspective', Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publication 500-27, 1978.
    • (1978) Computer Security and the Data Encryption Standard
    • Davis, R.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.