메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1068-1079

PrivEx: Private collection of traffic statistics for anonymous communication networks

Author keywords

Anonymity; Differential privacy; Distributed networks; Secure multiparty computation

Indexed keywords

CRYPTOGRAPHY; DATA ACQUISITION; DATA COMMUNICATION SYSTEMS; DATA PRIVACY; TELECOMMUNICATION NETWORKS; TRAFFIC SURVEYS;

EID: 84910605848     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660280     Document Type: Conference Paper
Times cited : (56)

References (36)
  • 2
    • 84937844200 scopus 로고    scopus 로고
    • Retrieved May 2014
    • Anonymizer Inc. Anonymizer. https://www.anonymizer.com/index.html, 2013. Retrieved May 2014.
    • (2013) Anonymizer
    • Anonymizer Inc.1
  • 4
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • Springer
    • A. Beimel, K. Nissim, and E. Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology-CRYPTO 2008, pages 451-468. Springer, 2008.
    • (2008) Advances in Cryptology-CRYPTO 2008 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 7
    • 35048882121 scopus 로고    scopus 로고
    • Comparison between two practical mix designs
    • Springer
    • C. Diaz, L. Sassaman, and E. Dewitte. Comparison between two practical mix designs. In ESORICS 2004, pages 141-159. Springer, 2004.
    • (2004) ESORICS 2004 , pp. 141-159
    • Diaz, C.1    Sassaman, L.2    Dewitte, E.3
  • 12
    • 84910608284 scopus 로고    scopus 로고
    • PrivEx: Private collection of traffic statistics for anonymous communication networks
    • T. Elahi, G. Danezis, and I. Goldberg. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. Technical Report 2014-08, CACR, 2014. http://cacr.uwaterloo.ca/techreports/2014/cacr2014-08.pdf.
    • (2014) Technical Report 2014-08, CACR
    • Elahi, T.1    Danezis, G.2    Goldberg, I.3
  • 13
    • 84884467207 scopus 로고    scopus 로고
    • Accuracy-privacy tradeoffs for two-party differentially private protocols
    • Springer
    • V. Goyal, I. Mironov, O. Pandey, and A. Sahai. Accuracy-privacy tradeoffs for two-party differentially private protocols. In Advances in Cryptology-CRYPTO 2013, pages 298-315. Springer, 2013.
    • (2013) Advances in Cryptology-CRYPTO 2013 , pp. 298-315
    • Goyal, V.1    Mironov, I.2    Pandey, O.3    Sahai, A.4
  • 16
    • 84937915180 scopus 로고    scopus 로고
    • Retrieved May 2014
    • JonDo Inc. JonDonym. http://anonymous-proxy-servers.net/, 2013. Retrieved May 2014.
    • (2013) JonDonym
    • JonDo Inc.1
  • 19
    • 20444495394 scopus 로고    scopus 로고
    • How to achieve blocking resistance for existing systems enabling anonymous web surfing
    • Washington, DC, USA, October
    • S. Köpsell and U. Hillig. How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing. In Workshop on Privacy in the Electronic Society (WPES), Washington, DC, USA, October 2004.
    • (2004) Workshop on Privacy in the Electronic Society (WPES)
    • Köpsell, S.1    Hillig, U.2
  • 21
    • 74049083962 scopus 로고    scopus 로고
    • Retrieved August 2014
    • K. Loesing. Measuring the Tor Network. https://research.torproject.org/techreports/directory-requests-2009-06-25.pdf, 2009. Retrieved August 2014.
    • (2009) Measuring the Tor Network
    • Loesing, K.1
  • 28
    • 84966238549 scopus 로고
    • Monte carlo methods for index computation (mod p)
    • J. M. Pollard. Monte carlo methods for index computation (mod p). Mathematics of computation, 32(143):918-924, 1978.
    • (1978) Mathematics of Computation , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 30
    • 0000211152 scopus 로고
    • Class number, a theory of factorization, and genera
    • D. Shanks. Class number, a theory of factorization, and genera. In Proc. Symp. Pure Math, volume 20, pages 415-440, 1971.
    • (1971) Proc. Symp. Pure Math , vol.20 , pp. 415-440
    • Shanks, D.1
  • 33
    • 84861428495 scopus 로고    scopus 로고
    • Enforced community standards for research on users of the tor anonymity network
    • C. Soghoian. Enforced Community Standards for Research on Users of the Tor Anonymity Network. In 2nd Workshop on Ethics in Computer Security Research (WECSR), pages 146-153, 2011.
    • (2011) 2nd Workshop on Ethics in Computer Security Research (WECSR) , pp. 146-153
    • Soghoian, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.