메뉴 건너뛰기




Volumn , Issue , 2012, Pages 179-192

Dissent in numbers: Making strong anonymity scale

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; ECONOMIC AND SOCIAL EFFECTS; SCALABILITY; SYSTEMS ANALYSIS;

EID: 84883293920     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (157)

References (62)
  • 2
    • 34047223710 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA
    • B. Adida. Advances in cryptographic voting systems. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2006.
    • (2006) Advances in Cryptographic Voting Systems
    • Adida, B.1
  • 4
    • 85076878664 scopus 로고    scopus 로고
    • September
    • Anonymizer, September 2012. http://anonymizer.com/.
    • (2012)
  • 7
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption - How to encrypt with RSA
    • May
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In Eurocrypt, May 1994.
    • (1994) Eurocrypt
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • Oct
    • N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In ACM CCS, Oct. 2007.
    • (2007) ACM CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 11
    • 84863302085 scopus 로고    scopus 로고
    • Efficient anonymity-preserving data collection
    • Aug
    • J. Brickell and V. Shmatikov. Efficient anonymity-preserving data collection. In ACM KDD, Aug. 2006.
    • (2006) ACM KDD
    • Brickell, J.1    Shmatikov, V.2
  • 12
    • 0001038609 scopus 로고    scopus 로고
    • Practical byzantine fault tolerance
    • Feb
    • M. Castro and B. Liskov. Practical byzantine fault tolerance. In OSDI, Feb. 1999.
    • (1999) OSDI
    • Castro, M.1    Liskov, B.2
  • 13
    • 60349122307 scopus 로고    scopus 로고
    • Identifying proxy nodes in a Tor anonymization circuit
    • Nov
    • S. Chakravarty, A. Stavrou, and A. D. Keromytis. Identifying proxy nodes in a Tor anonymization circuit. In SITIS, Nov. 2008.
    • (2008) SITIS
    • Chakravarty, S.1    Stavrou, A.2    Keromytis, A.D.3
  • 14
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Jan
    • D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, Jan. 1988.
    • (1988) Journal of Cryptology
    • Chaum, D.1
  • 15
    • 0002187137 scopus 로고
    • Wallet databases with observers
    • D. Chaum and T. P. Pedersen. Wallet databases with observers. CRYPTO, 1992.
    • (1992) CRYPTO
    • Chaum, D.1    Pedersen, T.P.2
  • 16
    • 85076926921 scopus 로고    scopus 로고
    • Planetlab: An overlay testbed for broad-coverage services
    • July
    • B. Chun et al. PlanetLab: An overlay testbed for broad-coverage services. In ACM CCR, July 2003.
    • (2003) ACM CCR
    • Chun, B.1
  • 17
    • 84894168177 scopus 로고    scopus 로고
    • Usability of anonymous web browsing: An examination of tor interfaces and deploy-ability
    • J. Clark, P. C. van Oorschot, and C. Adams. Usability of anonymous web browsing: an examination of tor interfaces and deploy-ability. In SOUPS, 2007.
    • (2007) SOUPS
    • Clark, J.1    Van Oorschot, P.C.2    Adams, C.3
  • 19
    • 84874445658 scopus 로고    scopus 로고
    • Civitas: Toward a secure voting system
    • may
    • M. Clarkson, S. Chong, and A. Myers. Civitas: Toward a secure voting system. In IEEE SP, may 2008.
    • (2008) IEEE SP
    • Clarkson, M.1    Chong, S.2    Myers, A.3
  • 20
    • 78650018339 scopus 로고    scopus 로고
    • Dissent: Accountable anonymous group messaging
    • Oct
    • H. Corrigan-Gibbs and B. Ford. Dissent: accountable anonymous group messaging. In ACM CCS, Oct. 2010.
    • (2010) ACM CCS
    • Corrigan-Gibbs, H.1    Ford, B.2
  • 21
    • 80755134967 scopus 로고    scopus 로고
    • Mixminion: Design of a Type III anonymous remailer protocol
    • May
    • G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III anonymous remailer protocol. In IEEE SP, May 2003.
    • (2003) IEEE SP
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 24
    • 85076882949 scopus 로고    scopus 로고
    • How governments have tried to block Tor
    • R. Dingledine and J. Appelbaum. How governments have tried to block Tor, 2012. Tor project presentation, https://svn.torproject.org/svn/projects/presentations/ slides-28c3.pdf.
    • (2012) Tor Project Presentation
    • Dingledine, R.1    Appelbaum, J.2
  • 25
    • 80052008741 scopus 로고    scopus 로고
    • Design of a blocking-resistant anonymity system
    • Nov
    • R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system, Nov. 2006. Tor Project technical report, https://svn.torproject.org/svn/projects/design-paper/blocking.html.
    • (2006) Tor Project Technical Report
    • Dingledine, R.1    Mathewson, N.2
  • 27
    • 84864195701 scopus 로고    scopus 로고
    • How unique is your web browser?
    • July
    • P. Eckersley. How unique is your web browser? In PETS, July 2010.
    • (2010) PETS
    • Eckersley, P.1
  • 28
    • 74049136866 scopus 로고    scopus 로고
    • As-awareness in tor path selection
    • M. Edman and P. Syverson. As-awareness in tor path selection. In ACM CCS, 2009.
    • (2009) ACM CCS
    • Edman, M.1    Syverson, P.2
  • 30
    • 85076880866 scopus 로고    scopus 로고
    • Protecting consumer privacy in an era of rapid change
    • Federal Trade Commission. Dec
    • Federal Trade Commission. Protecting consumer privacy in an era of rapid change, Dec. 2010. Preliminary FTC Staff Report.
    • (2010) Preliminary FTC Staff Report
  • 31
    • 85076879016 scopus 로고    scopus 로고
    • Fast and secure distributed read-only file system
    • Feb
    • K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM TOCS, Feb. 2002.
    • (2002) ACM TOCS
    • Fu, K.1    Kaashoek, M.F.2    Mazières, D.3
  • 32
    • 35048813315 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • Aug
    • J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In CRYPTO, Aug. 2001.
    • (2001) CRYPTO
    • Furukawa, J.1    Sako, K.2
  • 33
    • 78649299876 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • june
    • B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In IEEE ICDCS, june 2005.
    • (2005) IEEE ICDCS
    • Gedik, B.1    Liu, L.2
  • 34
    • 35348924316 scopus 로고    scopus 로고
    • Prive: Anonymous location-based queries in distributed mobile systems
    • May
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In 16th WWW, May 2007.
    • (2007) 16th WWW
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 36
    • 32344447491 scopus 로고    scopus 로고
    • Dining cryptographers revisited
    • May
    • P. Golle and A. Juels. Dining cryptographers revisited. Eurocrypt, May 2004.
    • (2004) Eurocrypt
    • Golle, P.1    Juels, A.2
  • 37
    • 70349692738 scopus 로고    scopus 로고
    • How much anonymity does network latency leak?
    • Oct
    • N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? In ACM CCS, Oct. 2007.
    • (2007) ACM CCS
    • Hopper, N.1    Vasserman, E.Y.2    Chan-Tin, E.3
  • 38
    • 85084162733 scopus 로고    scopus 로고
    • Hiding amongst the clouds: A proposal for cloud-based onion routing
    • Aug
    • N. Jones, M. Arye, J. Cesareo, and M. J. Freedman. Hiding amongst the clouds: A proposal for cloud-based onion routing. In FOCI, Aug. 2011.
    • (2011) FOCI
    • Jones, N.1    Arye, M.2    Cesareo, J.3    Freedman, M.J.4
  • 40
    • 0035522322 scopus 로고    scopus 로고
    • Technologies of protest: Insurgent social movements and the First Amendment in the era of the Internet
    • October
    • S. F. Kreimer. Technologies of protest: Insurgent social movements and the First Amendment in the era of the Internet. University of Pennsylvania Law Review, October 2001.
    • (2001) University of Pennsylvania Law Review
    • Kreimer, S.F.1
  • 41
    • 33751069196 scopus 로고    scopus 로고
    • NetTop: Commercial technology in high assurance applications
    • R. Meushaw and D. Simard. NetTop: Commercial technology in high assurance applications. Tech Trend Notes, 2000.
    • (2000) Tech Trend Notes
    • Meushaw, R.1    Simard, D.2
  • 44
    • 35048890924 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • Nov
    • C. A. Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS, Nov. 2001.
    • (2001) ACM CCS
    • Neff, C.A.1
  • 45
    • 84869385723 scopus 로고    scopus 로고
    • Website fingerprinting in onion routing based anonymization networks
    • Oct
    • A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In WPES, Oct. 2011.
    • (2011) WPES
    • Panchenko, A.1    Niessen, L.2    Zinnen, A.3    Engel, T.4
  • 47
    • 85093968009 scopus 로고    scopus 로고
    • Fixing the embarrassing slowness of OpenDHT on PlanetLab
    • S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker. Fixing the embarrassing slowness of OpenDHT on PlanetLab. In WORLDS, 2005.
    • (2005) WORLDS
    • Rhea, S.1    Chun, B.-G.2    Kubiatowicz, J.3    Shenker, S.4
  • 48
    • 85046400337 scopus 로고    scopus 로고
    • Rushdie runs afoul of web's real-name police
    • Nov
    • S. Sengupta. Rushdie runs afoul of web's real-name police. New York Times, Nov. 2011.
    • (2011) New York Times
    • Sengupta, S.1
  • 49
    • 77951431567 scopus 로고    scopus 로고
    • Eluding carnivores: File sharing with strong anonymity
    • Sept
    • E. G. Sirer et al. Eluding carnivores: File sharing with strong anonymity. In ACM SIGOPS EW, Sept. 2004.
    • (2004) ACM SIGOPS EW
    • Sirer, E.G.1
  • 50
    • 84970898907 scopus 로고    scopus 로고
    • BridgeSpa: Improving Tor bridges with single packet authorization
    • Oct
    • R. Smits et al. BridgeSPA: Improving Tor bridges with single packet authorization. In WPES, Oct. 2011.
    • (2011) WPES
    • Smits, R.1
  • 52
    • 78650018760 scopus 로고    scopus 로고
    • The cocaine auction protocol: On the power of anonymous broadcast
    • Sept
    • F. Stajano and R. Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In Information Hiding Workshop, Sept. 1999.
    • (1999) Information Hiding Workshop
    • Stajano, F.1    Anderson, R.2
  • 54
    • 80755188477 scopus 로고    scopus 로고
    • Sleeping dogs lie on a bed of onions but wake when mixed
    • July
    • P. Syverson. Sleeping dogs lie on a bed of onions but wake when mixed. In HotPETs, July 2011.
    • (2011) HotPETs
    • Syverson, P.1
  • 56
    • 0033244305 scopus 로고    scopus 로고
    • Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference
    • May
    • A. Teich, M. S. Frankel, R. Kling, and Y. Lee. Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference. Information Society, May 1999.
    • (1999) Information Society
    • Teich, A.1    Frankel, M.S.2    Kling, R.3    Lee, Y.4
  • 57
    • 0347315060 scopus 로고    scopus 로고
    • Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
    • May
    • E. Volokh. Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you. Stanford Law Review, May 2000.
    • (2000) Stanford Law Review
    • Volokh, E.1
  • 58
    • 6244294214 scopus 로고
    • The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
    • Apr
    • M. Waidner and B. Pfitzmann. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Eurocrypt, Apr. 1989.
    • (1989) Eurocrypt
    • Waidner, M.1    Pfitzmann, B.2
  • 60
  • 62
    • 85084160016 scopus 로고    scopus 로고
    • Fine-grained censorship mapping information sources, legality and ethics
    • Aug
    • J. Wright, T. de Souza, and I. Brown. Fine-grained censorship mapping information sources, legality and ethics. In FOCI, Aug. 2011.
    • (2011) FOCI
    • Wright, J.1    De Souza, T.2    Brown, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.