메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1957-1969

Admissible length study in anonymous networking: A detection theoretic perspective

Author keywords

Anonymity; Chaum Mix; Traffic Analysis Admissible Length

Indexed keywords

ANONYMITY; ANONYMOUS NETWORKINGS; ANONYMOUS NETWORKS; EQUILIBRIUM CONDITIONS; GAME-THEORETIC MODEL; INTERMEDIATE ROUTERS; NETWORK RESOURCE; OPTIMAL STRATEGIES;

EID: 84883349409     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130926     Document Type: Article
Times cited : (7)

References (21)
  • 6
    • 49549085794 scopus 로고    scopus 로고
    • Detection of information flows
    • T. He and L. Tong, "Detection of information flows," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 4925-4945, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 4925-4945
    • He, T.1    Tong, L.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 9
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix systems
    • (A. Juels, ed.) Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • B. Levine, M. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems," in Financial Cryptography (A. Juels, ed.), vol. 3110 of Lecture Notes in Computer Science, pp. 251-265, Springer Berlin Heidelberg.
    • Financial Cryptography , vol.3110 , pp. 251-265
    • Levine, B.1    Reiter, M.2    Wang, C.3    Wright, M.4
  • 12
    • 0031701310 scopus 로고    scopus 로고
    • Linear complexity algorithms for maximum throughput in radio networks and input queued switches
    • L. Tassiulas, "Linear complexity algorithms for maximum throughput in radio networks and input queued switches," in IEEE INFOCOM '98, vol. 2, pp. 533-539, 1998.
    • (1998) IEEE INFOCOM '98 , vol.2 , pp. 533-539
    • Tassiulas, L.1
  • 15
    • 45249083605 scopus 로고    scopus 로고
    • Anonymous networking amidst eavesdroppers
    • June
    • P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, pp. 2770-2784, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2770-2784
    • Venkitasubramaniam, P.1    He, T.2    Tong, L.3
  • 19
    • 83655202655 scopus 로고    scopus 로고
    • Embedding information flows into renewal traffic
    • IEEE, IEEE
    • S. Marano, V. Matta, T. He, and L. Tong, "Embedding information flows into renewal traffic," in Information Theory Workshop (ITW), 2011 IEEE, pp. 50-54, IEEE, 2011.
    • (2011) Information Theory Workshop (ITW) , vol.2011 , pp. 50-54
    • Marano, S.1    Matta, V.2    He, T.3    Tong, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.