메뉴 건너뛰기




Volumn 7, Issue 12, 2014, Pages 2761-2777

On collaborative anonymous communications in lossy networks

Author keywords

Anonymous communications; Crowds; Lossy, wireless and vehicular networks; Quality of service

Indexed keywords

CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS;

EID: 84911907835     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.793     Document Type: Article
Times cited : (7)

References (35)
  • 4
    • 51049117550 scopus 로고    scopus 로고
    • On performance bottleneck of anonymous communication networks
    • Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), Miami, FL, April
    • Pries R, Yu W, Graham S, Fu X. On performance bottleneck of anonymous communication networks, Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), Miami, FL, April 2008; 1-11.
    • (2008) , pp. 1-11
    • Pries, R.1    Yu, W.2    Graham, S.3    Fu, X.4
  • 5
    • 79951818797 scopus 로고    scopus 로고
    • Evaluating the QoS impact of Web service anonymity
    • Proceedings of the IEEE European Conference on Web Services (ECOWS), Ayia Napa, Cyprus, Dec.
    • Miede A, Lampe U, Schuller D, Eckert J, Steinmetz R. Evaluating the QoS impact of Web service anonymity, Proceedings of the IEEE European Conference on Web Services (ECOWS), Ayia Napa, Cyprus, Dec. 2010; 75-82.
    • (2010) , pp. 75-82
    • Miede, A.1    Lampe, U.2    Schuller, D.3    Eckert, J.4    Steinmetz, R.5
  • 6
    • 50249106959 scopus 로고    scopus 로고
    • Preserving caller anonymity in voice-over-IP networks
    • Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, May
    • Srivatsa M, Liu L, Iyengar A. Preserving caller anonymity in voice-over-IP networks, Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, May 2008; 50-63.
    • (2008) , pp. 50-63
    • Srivatsa, M.1    Liu, L.2    Iyengar, A.3
  • 7
    • 84911940243 scopus 로고    scopus 로고
    • Free Haven's anonymity bibliography [Accessed date: 19 April 2013].
    • Dingledine R. Free Haven's anonymity bibliography, 2009. Available at: www.freehaven.net/anonbib/ [Accessed date: 19 April 2013].
    • (2009)
    • Dingledine, R.1
  • 8
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 1985; 28(10): 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 11
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of Tor
    • Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA
    • Murdoch Steven J, Danezis George. Low-cost traffic analysis of Tor, Proceedings of the IEEE Symposium on Security and Privacy (SP), Oakland, CA, 2005; 183-195.
    • (2005) , pp. 183-195
    • Murdoch Steven, J.1    Danezis, G.2
  • 12
    • 38149140661 scopus 로고    scopus 로고
    • Low-resource routing attacks against anonymous systems
    • Technicl Report, University of Colorado
    • Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-resource routing attacks against anonymous systems. Technicl Report, University of Colorado, 2007.
    • (2007)
    • Bauer, K.1    McCoy, D.2    Grunwald, D.3    Kohno, T.4    Sicker, D.5
  • 13
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2): 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 14
    • 78649989557 scopus 로고    scopus 로고
    • A terminology for talking about privacy by data minimization: Anonymity
    • unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 [Accessed date: 19 April 2013].
    • Pfitzmann A, Hansen M. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010. v0.34. Available at: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf [Accessed date: 19 April 2013].
    • (2010)
    • Pfitzmann, A.1    Hansen, M.2
  • 16
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The second-generation onion router
    • Proceedings of the USENIX Security Symposium, Berkeley, CA
    • Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router, Proceedings of the USENIX Security Symposium, Berkeley, CA, 2004; 21-21.
    • (2004) , pp. 21-21
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 20
    • 84911936992 scopus 로고    scopus 로고
    • Crowds revisited: practically effective predecessor attack
    • Proceedings of the Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland
    • Panchenko A, Pimenidis L. Crowds revisited: practically effective predecessor attack, Proceedings of the Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 2007; 1-6.
    • (2007) , pp. 1-6
    • Panchenko, A.1    Pimenidis, L.2
  • 21
    • 0038729392 scopus 로고    scopus 로고
    • An analysis of forwarding mechanism in Crowds
    • Proceedings of the International Conference on Communication (ICC), Anchorage, AK, May
    • Sui H, Wang J, Chen J, Chen S. An analysis of forwarding mechanism in Crowds, Proceedings of the International Conference on Communication (ICC), Anchorage, AK, May 2003; 261-265.
    • (2003) , pp. 261-265
    • Sui, H.1    Wang, J.2    Chen, J.3    Chen, S.4
  • 22
    • 27544436703 scopus 로고    scopus 로고
    • BT-Crowds: Crowds-style anonymity with bluetooth and Java
    • Proceedings of the IEEE Annual Hawaii International Conference On System Sciences (HICSS)
    • Vaha-Sipila A, Virtanen T. BT-Crowds: Crowds-style anonymity with bluetooth and Java, Proceedings of the IEEE Annual Hawaii International Conference On System Sciences (HICSS), 2005; 1-11.
    • (2005) , pp. 1-11
    • Vaha-Sipila, A.1    Virtanen, T.2
  • 23
    • 84911915324 scopus 로고    scopus 로고
    • Wireless Crowds based on NTRU
    • Technical Report, Iowa State University
    • Xu G. Wireless Crowds based on NTRU. Technical Report, Iowa State University, 2001.
    • (2001)
    • Xu, G.1
  • 24
    • 50249107905 scopus 로고    scopus 로고
    • VIPER: a vehicle-to-infrastructure communication privacy enforcementprotocol
    • Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS), Pisa, Italy
    • Cencioni P, Piertro R.D. VIPER: a vehicle-to-infrastructure communication privacy enforcementprotocol, Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS), Pisa, Italy, 2007; 1-6.
    • (2007) , pp. 1-6
    • Cencioni, P.1    Piertro, R.2
  • 25
    • 76049114679 scopus 로고    scopus 로고
    • Private location-based information retrieval through user collaboration
    • [Accessed date: 19 April 2013].
    • Rebollo-Monedero D, Forné J, Solanas A, Martínez-Ballesté T. Private location-based information retrieval through user collaboration. Computer Communications 2010; 33(6): 762-774. Available at: http://dx.doi.org/10.1016/j.comcom.2009.11.024 [Accessed date: 19 April 2013].
    • (2010) Computer Communications , vol.33 , Issue.6 , pp. 762-774
    • Rebollo-Monedero, D.1    Forné, J.2    Solanas, A.3    Martínez-Ballesté, T.4
  • 26
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1988; 1(1): 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 31
    • 84868100937 scopus 로고    scopus 로고
    • Measuring anonymity by profiling probability distributions
    • Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communication (TRUSTCOM), Liverpool, UK, Jun.
    • Bagai R, Jiang N. Measuring anonymity by profiling probability distributions, Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communication (TRUSTCOM), Liverpool, UK, Jun. 2012; 366-374.
    • (2012) , pp. 366-374
    • Bagai, R.1    Jiang, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.