메뉴 건너뛰기




Volumn , Issue , 2014, Pages 75-86

Balancing accountability and privacy in the network

Author keywords

accountability; privacy; source address

Indexed keywords

CONVOLUTIONAL CODES; DATA PRIVACY; INTERNET PROTOCOLS;

EID: 84907324602     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2619239.2626306     Document Type: Conference Paper
Times cited : (26)

References (38)
  • 1
    • 84907318391 scopus 로고    scopus 로고
    • Mining Hardware Comparison. https://en.bitcoin.it/wiki/Mining-hardware- comparison.
  • 2
    • 84907358326 scopus 로고    scopus 로고
    • University of Oregon Route Views Project. http://www.routeviews.org.
  • 4
    • 65249188655 scopus 로고    scopus 로고
    • Accountable internet protocol (AIP)
    • New York, NY, USA, ACM
    • D. G. Andersen, H. Balakrishnan, N. Feamster, et al. Accountable internet protocol (AIP). SIGCOMM '08, pages 339-350, New York, NY, USA, 2008. ACM.
    • (2008) SIGCOMM '08 , pp. 339-350
    • Andersen, D.G.1    Balakrishnan, H.2    Feamster, N.3
  • 5
  • 9
    • 84907378362 scopus 로고    scopus 로고
    • Technical Report UCAM-CL-TR-849, University of Cambridge, Computer Laboratory, Mar.
    • M. B. Braun and J. Crowcroft. SNA: Sourceless Network Architecture. Technical Report UCAM-CL-TR-849, University of Cambridge, Computer Laboratory, Mar. 2014.
    • (2014) SNA: Sourceless Network Architecture
    • Braun, M.B.1    Crowcroft, J.2
  • 10
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology-EUROCRYPT 2001, pages 93-118. Springer, 2001. (Pubitemid 33275827)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 84890583004 scopus 로고    scopus 로고
    • IPv6 source addresses considered harmful
    • C. Candolin and P. Nikander. IPv6 source addresses considered harmful. In NordSec '01, pages 54-68, 2001.
    • (2001) NordSec '01 , pp. 54-68
    • Candolin, C.1    Nikander, P.2
  • 12
    • 0019532104 scopus 로고
    • UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    • DOI 10.1145/358549.358563
    • D. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 13
    • 7744243126 scopus 로고    scopus 로고
    • Tussle in cyberspace: Defining tomorrow's internet
    • New York, NY, USA, ACM
    • D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: defining tomorrow's internet. SIGCOMM '02, pages 347-356, New York, NY, USA, 2002. ACM.
    • (2002) SIGCOMM '02 , pp. 347-356
    • Clark, D.D.1    Wroclawski, J.2    Sollins, K.R.3    Braden, R.4
  • 14
    • 39049160574 scopus 로고    scopus 로고
    • Constructing inter-domain packet filters to control ip spoofing based on bgp updates
    • Z. Duan, X. Yuan, and J. Chandrashekar. Constructing inter-domain packet filters to control ip spoofing based on bgp updates. In INFOCOM, 2006.
    • (2006) INFOCOM
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 17
    • 85050224259 scopus 로고    scopus 로고
    • XIA: Efficient support for evolvable internetworking
    • Berkeley, CA, USA, USENIX Association
    • D. Han, A. Anand, F. Dogar, et al. XIA: efficient support for evolvable internetworking. NSDI'12, pages 23-23, Berkeley, CA, USA, 2012. USENIX Association.
    • (2012) NSDI'12 , pp. 23-23
    • Han, D.1    Anand, A.2    Dogar, F.3
  • 20
    • 76749083002 scopus 로고    scopus 로고
    • Networking named content
    • New York, NY, USA, ACM
    • V. Jacobson, D. K. Smetters, J. D. Thornton, et al. Networking named content. CoNEXT '09, pages 1-12, New York, NY, USA, 2009. ACM.
    • (2009) CoNEXT '09 , pp. 1-12
    • Jacobson, V.1    Smetters, D.K.2    Thornton, J.D.3
  • 21
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed ddos traffic
    • ACM
    • C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: an effective defense against spoofed ddos traffic. In CCS '03, pages 30-41. ACM, 2003.
    • (2003) CCS '03 , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 22
    • 50849141961 scopus 로고    scopus 로고
    • Generic identifiers for id/locator split internetworking
    • V. Kafle, K. Nakauchi, and M. Inoue. Generic identifiers for id/locator split internetworking. In K-INGN 2008., pages 299-306, 2008.
    • (2008) K-INGN 2008 , pp. 299-306
    • Kafle, V.1    Nakauchi, K.2    Inoue, M.3
  • 23
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
    • S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds. In NSDI '05.
    • NSDI '05
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 28
    • 84889753542 scopus 로고    scopus 로고
    • Verifying and enforcing network paths with icing
    • New York, NY, USA, ACM
    • J. Naous, M. Walfish, A. Nicolosi, et al. Verifying and enforcing network paths with icing. CoNEXT '11, pages 30:1-30:12, New York, NY, USA, 2011. ACM.
    • (2011) CoNEXT '11
    • Naous, J.1    Walfish, M.2    Nicolosi, A.3
  • 29
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
    • DOI 10.1145/964723.383061
    • K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. In SIGCOMM CCR, volume 31, pages 15-26. ACM, 2001. (Pubitemid 32981951)
    • (2001) Computer Communication Review , vol.31 , Issue.4 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 30
    • 69949168070 scopus 로고    scopus 로고
    • Enlisting ISPs to improve online privacy: IP address mixing by default
    • B. Raghavan, T. Kohno, A. C. Snoeren, and D. Wetherall. Enlisting ISPs to improve online privacy: IP address mixing by default. PETS '09, pages 143-163, 2009.
    • (2009) PETS '09 , pp. 143-163
    • Raghavan, B.1    Kohno, T.2    Snoeren, A.C.3    Wetherall, D.4
  • 32
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. TISSEC, 1(1):66-92, 1998.
    • (1998) TISSEC , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 38
    • 84893398369 scopus 로고    scopus 로고
    • Scalable, high performance ethernet forwarding with cuckooswitch
    • New York, NY, USA, ACM
    • D. Zhou, B. Fan, H. Lim, M. Kaminsky, and D. G. Andersen. Scalable, high performance ethernet forwarding with cuckooswitch. CoNEXT '13, pages 97-108, New York, NY, USA, 2013. ACM.
    • (2013) CoNEXT '13 , pp. 97-108
    • Zhou, D.1    Fan, B.2    Lim, H.3    Kaminsky, M.4    Andersen, D.G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.