메뉴 건너뛰기




Volumn , Issue , 2013, Pages

LIRA: Lightweight Incentivized Routing for Anonymity

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84883308148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (53)
  • 3
    • 84870651248 scopus 로고    scopus 로고
    • “The Tor Project, ” https://www.torproject.org/.
    • The Tor Project
  • 14
    • 85180418631 scopus 로고    scopus 로고
    • “Torservers.net, ” https://www.torservers.net/.
    • Torservers.net
  • 16
  • 22
    • 0033365373 scopus 로고    scopus 로고
    • A case for relative differentiated services and the proportional differentiation model
    • C. Dovrolis and P. Ramanathan, “A case for relative differentiated services and the proportional differentiation model, ” Network, IEEE, vol. 13, no. 5, pp. 26-34, 1999.
    • (1999) Network, IEEE , vol.13 , Issue.5 , pp. 26-34
    • Dovrolis, C.1    Ramanathan, P.2
  • 23
  • 25
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • Oct. [Online]. Available
    • D. Chaum, “Security without identification: transaction systems to make big brother obsolete, ” Commun. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985. [Online]. Available: http://doi.acm.org/10.1145/4372.4373
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 26
    • 80055013636 scopus 로고    scopus 로고
    • Eigenspeed: secure peer-to-peer bandwidth evaluation
    • Berkeley, CA, USA: USENIX Association, [Online]. Available
    • R. Snader and N. Borisov, “Eigenspeed: secure peer-to-peer bandwidth evaluation, ” in Proceedings of the 8th international conference on Peer-to-peer systems, ser. IPTPS'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 9-9. [Online]. Available: http://dl.acm.org/citation.cfm?id=1855663.1855672
    • (2009) Proceedings of the 8th international conference on Peer-to-peer systems, ser. IPTPS'09 , pp. 9-9
    • Snader, R.1    Borisov, N.2
  • 27
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Apr. [Online]. Available
    • M. Luby and C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions, ” SIAM J. Comput., vol. 17, no. 2, pp. 373-386, Apr. 1988. [Online]. Available: http://dx.doi.org/10.1137/0217022
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 29
    • 50249133191 scopus 로고    scopus 로고
    • Shining light in dark places: Understanding the Tor network
    • N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July
    • D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, “Shining light in dark places: Understanding the Tor network, ” in Privacy Enhancing Technologies: 8th International Symposium, PETS 2008, N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July 2008, pp. 63-76.
    • (2008) Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 , pp. 63-76
    • McCoy, D.1    Bauer, K.2    Grunwald, D.3    Kohno, T.4    Sicker, D.5
  • 33
    • 0036476131 scopus 로고    scopus 로고
    • Proportional differentiated services: Delay differentiation and packet scheduling
    • C. Dovrolis, D. Stiliadis, and P. Ramanathan, “Proportional differentiated services: Delay differentiation and packet scheduling, ” IEEE/ACM Transactions on Networking (TON), vol. 10, no. 1, pp. 12-26, 2002.
    • (2002) IEEE/ACM Transactions on Networking (TON) , vol.10 , Issue.1 , pp. 12-26
    • Dovrolis, C.1    Stiliadis, D.2    Ramanathan, P.3
  • 37
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • October
    • N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, “Denial of service or denial of security? How attacks on reliability can compromise anonymity, ” in Proceedings of CCS 2007, October 2007.
    • (2007) Proceedings of CCS 2007
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 41
    • 85180401152 scopus 로고    scopus 로고
    • “Shadow Code, ” http://github.com/shadow/.
    • Shadow Code
  • 43
    • 84887028845 scopus 로고    scopus 로고
    • “MaxMind GeoIP, ” http://www.maxmind.com/.
    • MaxMind GeoIP
  • 45
    • 84878349287 scopus 로고    scopus 로고
    • “iPlane: Datasets, ” http://iplane.cs.washington.edu/data/data.html.
    • iPlane: Datasets
  • 46
    • 84889047189 scopus 로고    scopus 로고
    • “Net Index Dataset, ” http://www.netindex.com/source-data/.
    • Net Index Dataset
  • 52
    • 35248878897 scopus 로고    scopus 로고
    • On the economics of anonymity
    • Springer-Verlag, LNCS 2742
    • A. Acquisti, R. Dingledine, and P. Syverson, “On the economics of anonymity, ” in Financial Cryptography. Springer-Verlag, LNCS 2742, 2003, pp. 84-102.
    • (2003) Financial Cryptography , pp. 84-102
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.