메뉴 건너뛰기




Volumn , Issue , 2003, Pages 1259-1264

Payload analysis of anonymous communication system with host-based rerouting mechanism

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION SYSTEMS; APPLICATION LAYERS; COMMUNICATION DELAYS; IDENTITY INFORMATION; IP ADDRESSS; ONION ROUTING; PAYLOAD ANALYSIS; ROUTING SCHEME;

EID: 84883870206     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2003.1214287     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 1
    • 84883875879 scopus 로고    scopus 로고
    • The anonymizer
    • The anonymizer. http://www. anonymizer. com.
  • 2
    • 84883864583 scopus 로고    scopus 로고
    • Anonymous remailer
    • Anonymous remailer. http:// www. lcs. mit. edu /research /anonymous. html.
  • 3
    • 0038419771 scopus 로고    scopus 로고
    • Hordes: A protocol for anonymous communication over the internet
    • B. N. L. C. Shields. Hordes: a protocol for anonymous communication over the internet. ACM Journal of Computer Security, 10-3, 2002.
    • (2002) ACM Journal of Computer Security , vol.10 , Issue.3
    • Shields, B.N.L.C.1
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24-2:84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 0023861309 scopus 로고
    • The dinning cryptographers problem: Unconditional sender and recipient untraceabilit
    • D. Chaum. The dinning cryptographers problem: Unconditional sender and recipient untraceabilit. Journal of Cryptology, 1/1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 6
    • 84883863505 scopus 로고    scopus 로고
    • Pipenet 1. 1
    • W. Dai. Pipenet 1. 1. Http://www. eskimo. com /weidai /pipenet. txt.
    • Dai, W.1
  • 7
    • 84948946447 scopus 로고    scopus 로고
    • How to make personalized web browsing simple, secure, and anonymous
    • E. Gabber, P. Gibbons, Y. Matias, et al. How to make personalized web browsing simple, secure, and anonymous. Lecture Notes in Computer Science, 1318:17-31, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1318 , pp. 17-31
    • Gabber, E.1    Gibbons, P.2    Matias, Y.3
  • 9
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42-2:39-41, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 14
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • M. K. Reiter and A. D. Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32-38, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.K.1    Rubin, A.D.2
  • 19
    • 0011653195 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • April
    • M. Waidner. Unconditional sender and recipient untraceability in spite of active attacks. Eurocrypt89, (7), April 1989.
    • (1989) Eurocrypt , vol.89 , Issue.7
    • Waidner, M.1
  • 20
    • 84883890398 scopus 로고    scopus 로고
    • A anonymous communication protocol based on groups with definite route length
    • W. Wang, J. Chen, J. Wang, et al. A anonymous communication protocol based on groups with definite route length. Journal of computer research and development(In Chinese), 24(5):463-467, 2003.
    • (2003) Journal of Computer Research and Development(In Chinese) , vol.24 , Issue.5 , pp. 463-467
    • Wang, W.1    Chen, J.2    Wang, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.