메뉴 건너뛰기




Volumn 15, Issue 3, 2012, Pages

Probabilistic analysis of onion routing in a black-box model

Author keywords

Security; Theory Additional

Indexed keywords

ACTIVE ADVERSARY; ANONYMOUS COMMUNICATION; BLACK-BOX MODEL; ONION ROUTING; PRIORI DISTRIBUTION; PROBABILISTIC ANALYSIS; PROBABILISTIC BEHAVIOR; SECURITY; THEORY ADDITIONAL; UNIVERSALLY COMPOSABLE;

EID: 84872023509     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2382448.2382452     Document Type: Article
Times cited : (34)

References (50)
  • 3
    • 13644250069 scopus 로고    scopus 로고
    • Buses for anonymous message delivery
    • BEIMEL, A. AND DOLEV, S. 2003. Buses for anonymous message delivery. J. Cryptol. 16, 1, 25-39.
    • (2003) J. Cryptol. , vol.16 , Issue.1 , pp. 25-39
    • Beimel, A.1    Dolev, S.2
  • 6
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • CANETTI, R. 2000. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067. http://eprint.iacr.org/.
    • (2000) Cryptology EPrint Archive, Report 2000/067.
    • Canetti, R.1
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 4, 2, 84-88.
    • (1981) Comm. ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability. International Association for Cryptology Research
    • CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. International Association for Cryptology Research. J. Cryptol. 1, 1, 65-75.
    • (1988) J. Cryptol. , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 19
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • HALPERN, J. Y. AND O'NEILL, K. R. 2005. Anonymity and information hiding in multiagent systems. J. Comput. Secur. 13, 3, 483-514.
    • (2005) J. Comput. Secur. , vol.13 , Issue.3 , pp. 483-514
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 22
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • HUGHES, D. AND SHMATIKOV, V. 2004. Information hiding, anonymity and privacy: A modular approach. J. Comput. Secur. 12, 1, 3-36.
    • (2004) J. Comput. Secur. , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 27
    • 84855789346 scopus 로고    scopus 로고
    • LOESING ET AL.
    • LOESING ET AL. 2011. Tor metrics portal. https://metrics.torproject.org/.
    • (2011) Tor Metrics Portal.
  • 40
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • REITER, M. AND RUBIN, A. 1998. Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 1, 66-92.
    • (1998) ACM Trans. Inf. Syst. Secur. , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.1    Rubin, A.2
  • 43
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • SHMATIKOV, V. 2004. Probabilistic model checking of an anonymity system. J. Comput. Secur. 12, 3-4, 355-377.
    • (2004) J. Comput. Secur. , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 50
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • WRIGHT, M. K., ADLER, M., LEVINE, B. N., AND SHIELDS, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7, 4, 489-522.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.