메뉴 건너뛰기




Volumn 2137, Issue , 2001, Pages 245-257

Traffic analysis attacks and trade-offs in anonymity providing systems

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCE; DENIAL-OF-SERVICE ATTACK; TELECOMMUNICATION NETWORKS; TRANSMISSION CONTROL PROTOCOL;

EID: 84947242344     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: 10.1007/3-540-45496-9_18     Document Type: Article
Times cited : (166)

References (30)
  • 4
    • 0342880858 scopus 로고
    • Studies in Secure Multiparty Computation and Applications
    • Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June, revised version
    • Canetti, R. Studies in Secure Multiparty Computation and Applications. PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June 1995. revised version.
    • (1995) PhD thesis
    • Canetti, R.1
  • 6
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
    • Chaum, D. The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology 7, 1 (1988), 65-75.
    • (1988) Journal of Cryptology , vol.7 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 33746088658 scopus 로고    scopus 로고
    • Efficient multiparty computations with dishonest minority
    • March, of Lecture Notes in Computer Science, Springer-Verlag
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., and Rabin, T. Efficient multiparty computations with dishonest minority. In Advances in Cryptology-EUROCRYPT99 (March 1999), vol. 1561 of Lecture Notes in Computer Science, Springer-Verlag, pp. 311-326.
    • (1999) Advances in Cryptology-EUROCRYPT99 , vol.1561 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 8
    • 0010275933 scopus 로고    scopus 로고
    • Dai, W. Pipenet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 1998.
    • (1998) Pipenet 1.1
    • Dai, W.1
  • 10
    • 84948958135 scopus 로고    scopus 로고
    • How to break a practical mix and design a new one
    • Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg
    • Desmedt, Y., and Kurosawa, K. How to break a practical mix and design a new one. In Advances in Cryptology - EUROCRYPT '2000 (2000), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg, pp. 557-572.
    • (2000) Advances in Cryptology - EUROCRYPT '2000 , pp. 557-572
    • Desmedt, Y.1    Kurosawa, K.2
  • 14
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Feb
    • Goldschlag, D., Reed, M., and Syverson, P. Onion routing for anonymous and private internet connections. Communications of the ACM (USA) 42, 2 (Feb. 1999), 39-41.
    • (1999) Communications of the ACM (USA) , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 18
    • 0002919433 scopus 로고    scopus 로고
    • Millimix: Mixing in small batches
    • DIMACS, June 10, Thu, 22 Jul 1999 23: 50: 00 GMT
    • Jakobsson, M., and Juels, A. Millimix: Mixing in small batches. Tech. Rep. 99-33, DIMACS, June 10 1999. Thu, 22 Jul 1999 23: 50: 00 GMT.
    • (1999) Tech. Rep. 99-33
    • Jakobsson, M.1    Juels, A.2
  • 19
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • N. Koblitz, Ed., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Kocher, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology - CRYPTO’ 96 (1996), N. Koblitz, Ed., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, pp. 104-113.
    • (1996) In Advances in Cryptology - CRYPTO’ 96 , pp. 104-113
    • Kocher, P.C.1
  • 20
    • 84944878354 scopus 로고    scopus 로고
    • The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA
    • Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A. Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA, 1997.
    • (1997) Handbook of applied cryptography
    • Menezes, A.J.1    Van Oorschot, P.C.2    Vanstone, S.A.3
  • 21
    • 84937415944 scopus 로고    scopus 로고
    • A length-invariant hybrid mix
    • Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg
    • Ohkubo, M., and Abe, M. A length-invariant hybrid mix. In Advances in Cryptology -ASIACRYPT '2000 (2000), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg, pp. 178-191.
    • (2000) In Advances in Cryptology -ASIACRYPT '2000 , pp. 178-191
    • Ohkubo, M.1    Abe, M.2
  • 25
    • 0038311863 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • 25-26 July, ICSITR-00-011
    • Raymond, J.-F. Traffic analysis: Protocols, attacks, design issues and open problems. In Proc. Workshop on Design Issues in Anonymity and Unobservability (25-26 July 2000), ICSITR-00-011, pp. 7-26.
    • (2000) Proc. Workshop on Design Issues in Anonymity and Unobservability , pp. 7-26
    • Raymond, J.-F.1
  • 26
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web transactions with crowds
    • Feb
    • Reiter, M. K., and Rubin, A. D. Anonymous Web transactions with crowds. Communications of the ACM 42, 2 (Feb. 1999), 32-48.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 27
    • 84947262990 scopus 로고    scopus 로고
    • Multiparty computation unconditionally secure against II2 adversary structures
    • McGill University, Montreal, Canada
    • Smith, A., and Stiglic, A. Multiparty computation unconditionally secure against II2 adversary structures. Cryptology SOCS-98.2, School of Computer Science, McGill University, Montreal, Canada, 1998.
    • (1998) Cryptology SOCS-98.2, School of Computer Science
    • Smith, A.1    Stiglic, A.2
  • 29
    • 84896508047 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • J.-J. Quisquater and J. Vande-walle, Eds., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Waidner, M. Unconditional sender and recipient untraceability in spite of active attacks. In Advances in Cryptology - EUROCRYPT’ 89 (1990), J.-J. Quisquater and J. Vande-walle, Eds., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, pp. 302-319.
    • (1990) Advances in Cryptology - EUROCRYPT’ 89 , pp. 302-319
    • Waidner, M.1
  • 30
    • 85032863028 scopus 로고
    • The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
    • 10-13 Apr, J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer-Verlag, 1990
    • Waidner, M., and Pfitzmann, B. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Advances in Cryptology-EUROCRYPT89 (10-13 Apr. 1989), J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer-Verlag, 1990, p. 690.
    • (1989) In Advances in Cryptology-EUROCRYPT89 , pp. 690
    • Waidner, M.1    Pfitzmann, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.