메뉴 건너뛰기




Volumn 2009, Issue , 2001, Pages 96-114

Towards an analysis of onion routing security

Author keywords

Anonymity; Privacy; Security; Traffic analysis

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS; DATA PRIVACY;

EID: 84937565289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44702-4_6     Document Type: Conference Paper
Times cited : (163)

References (22)
  • 2
    • 84984842401 scopus 로고
    • Maintaining Security in the Presence of Transient Faults
    • LNCS, Springer-Verlag,
    • R. Canetti and A. Herzberg. “Maintaining Security in the Presence of Transient Faults”, Advances in Cryptology—CRYPTO’94, LNCS vol. 839, Springer-Verlag, 1994, pp. 425–438.
    • (1994) Advances in Cryptology—CRYPTO’94 , vol.839 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 3
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”
    • D. Chaum. “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Communications of the ACM, vol. 24, no. 2, Feb. 1981, pages 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 4
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability”
    • D. Chaum. “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability”, Journal of Cryptology, vol. 1, no. 1, 1988, pages 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 0003317098 scopus 로고    scopus 로고
    • How to Make Personalized Web Browsing Simple, Secure, and Anonymous”
    • R. Hirschfeld (ed.), Springer-Verlag, LNCS
    • E. Gabber, P. Gibbons, Y. Matias, and A. Mayer. “How to Make Personalized Web Browsing Simple, Secure, and Anonymous”, in Financial Cryptography: FC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 17–31, 1998.
    • (1998) Financial Cryptography: FC ‘97, Proceedings , vol.1318 , pp. 17-31
    • Gabber, E.1    Gibbons, P.2    Matias, Y.3    Mayer, A.4
  • 8
    • 54649083230 scopus 로고    scopus 로고
    • TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web”
    • I. Goldberg and D. Wagner. “TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web”, First Monday, vol. 3 no. 4, April 1998.
    • (1998) First Monday, Vol , vol.4 , pp. 3
    • Goldberg, I.1    Wagner, D.2
  • 9
    • 84955557456 scopus 로고    scopus 로고
    • Hiding Routing Information”
    • R. Anderson, ed., LNCS, Springer-Verlag,
    • D. Goldschlag, M. Reed, P. Syverson. “Hiding Routing Information”, in Information Hiding, R. Anderson, ed., LNCS vol. 1174, Springer-Verlag, 1996, pp. 137–150.
    • (1996) In InformaTion Hiding , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 10
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for Anonymous and Private Internet Connections
    • February
    • D. Goldschlag, M. Reed, P. Syverson. “Onion Routing for Anonymous and Private Internet Connections,” Communications of the ACM, vol. 42, num. 2, February 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 14
    • 0011702966 scopus 로고
    • ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead
    • Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heidelberg
    • A. Pfitzmann, B. Pfitzmann, and M. Waidner. “ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead”, GI/ITG Conference: Communication in Distributed Systems, Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heidelberg 1991, pp. 451-463.
    • (1991) GI/ITG Conference: Communication in Distributed Systems , pp. 451-463
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 15
    • 84957030837 scopus 로고    scopus 로고
    • Protocols using Anonymous Connections: Mobile Applications
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds., LNCS, Springer-, Verlag,
    • M. Reed, P. Syverson, and D. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: Fifth International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds., LNCS vol. 1361, Springer-Verlag, 1997, pp. 13–23.
    • (1997) In Security Protocols: Fifth International Workshop , vol.1361 , pp. 13-23
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 16
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous Connections and Onion Routing
    • May, A preliminary version of this paper appeared in [19].)
    • M. Reed, P. Syverson, and D. Goldschlag. “Anonymous Connections and Onion Routing”, IEEE Journal on Selected Areas in Communications, vol. 16 no. 4, May 1998, pp. 482–494. (A preliminary version of this paper appeared in [19].)
    • (1998) IEEE Journal on Selected Areas in Communications, , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 17
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for Web Transactions
    • November, A preliminary version of this paper appeared in [18].)
    • M. Reiter and A. Rubin. “Crowds: Anonymity for Web Transactions”, ACM Transactions on Information System Security, vol. 1, no. 1, November 1998, pp. 66–92. (A preliminary version of this paper appeared in [18].)
    • (1998) ACM TranSactions on Information System Security, , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.1    Rubin, A.2
  • 22
    • 0023331864 scopus 로고
    • Networks without User Observability”
    • A. Pfitzmann and M. Waidner, “Networks without User Observability”, Computers & Security, vol. 6 (1987), pp. 158–166.
    • (1987) Computers & Security , vol.6 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.