메뉴 건너뛰기




Volumn , Issue , 2011, Pages 475-490

PIR-Tor: Scalable anonymous communication using private information retrieval

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL; INFORMATION USE; NETWORK ARCHITECTURE; PEER TO PEER NETWORKS;

EID: 84962047384     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (73)

References (48)
  • 1
    • 84921020129 scopus 로고    scopus 로고
    • A lattice-based computationally-efficient private information retrieval protocol, 2007
    • Accessed February 2011
    • C. Aguilar-Melchor and P. Gaborit. A lattice-based computationally-efficient private information retrieval protocol, 2007. Presented at WEWORC 2007. http: //eprint.iacr.org/2007/446.pdf, Accessed February 2011.
    • (2007) WEWORC
    • Aguilar-Melchor, C.1    Gaborit, P.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • In C. Boyd, editor, 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), Springer
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In C. Boyd, editor, 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 70349301122 scopus 로고    scopus 로고
    • Route fingerprinting in anonymous communications
    • In A. Montresor, A. Wierzbicki, and N. Shahmehri, editors, IEEE Computer Society
    • G. Danezis and R. Clayton. Route fingerprinting in anonymous communications. In A. Montresor, A. Wierzbicki, and N. Shahmehri, editors, International Conference on Peer-to-Peer Computing (P2P 2006), pages 69-72. IEEE Computer Society, 2006.
    • (2006) International Conference on Peer-to-Peer Computing (P2P 2006) , pp. 69-72
    • Danezis, G.1    Clayton, R.2
  • 7
    • 50249147866 scopus 로고    scopus 로고
    • Bridging and fingerprinting: Epistemic attacks on route selection
    • In N. Borisov and I. Goldberg, editors 8th Privacy Enhancing Technologies Symposium (PETS 2008), Springer
    • G. Danezis and P. F. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In N. Borisov and I. Goldberg, editors, 8th Privacy Enhancing Technologies Symposium (PETS 2008), volume 5134 of Lecture Notes in Computer Science, pages 151-166. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5134 , pp. 151-166
    • Danezis, G.1    Syverson, P.F.2
  • 8
    • 85076458635 scopus 로고    scopus 로고
    • January Accessed February 2011.
    • R. Dingledine. Clients download consensus + microdescriptors. https://gitweb.torproject.org/ tor.git/blob/master:/doc/spec/proposals/ 158-microdescriptors.txt, January 2009. Accessed February 2011.
    • (2009) Clients Download Consensus + Microdescriptors
    • Dingledine, R.1
  • 12
    • 34548787882 scopus 로고    scopus 로고
    • Improving the robustness of private information retrieval
    • IEEE Computer Society
    • I. Goldberg. Improving the robustness of private information retrieval. In IEEE Symposium on Security and Privacy (S&P 2007), pages 131-148. IEEE Computer Society, 2007.
    • (2007) IEEE Symposium on Security and Privacy (S&P 2007) , pp. 131-148
    • Goldberg, I.1
  • 13
    • 85076488056 scopus 로고    scopus 로고
    • I. Goldberg. Percy++, 2010. https://sourceforge.net/ projects/percy/.
    • (2010) Percy++
    • Goldberg, I.1
  • 14
    • 67650312114 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • In H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, and Y. Tobe, editors, m 7th International Conference Pervasive Computing (Pervasive 2009), Springer
    • P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, and Y. Tobe, editors, 7th International Conference Pervasive Computing (Pervasive 2009), volume 5538 of Lecture Notes in Computer Science, pages 390-397. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5538 , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 17
    • 85076469216 scopus 로고    scopus 로고
    • Contemporary profiling of web users, December 2010
    • December 27
    • D. Herrmann and lexi. Contemporary profiling of web users, December 2010. Presented at the 27th Chaos Communication Congress in Berlin on December 27, 2010.
    • (2010) 27th Chaos Communication Congress in Berlin
    • Herrmann, D.1    Lexi2
  • 23
    • 70349273917 scopus 로고    scopus 로고
    • Information leaks in structured peer-topeer anonymous communication systems
    • In P. F. Syverson and S. Jha, editors, ACM
    • P. Mittal and N. Borisov. Information leaks in structured peer-topeer anonymous communication systems. In P. F. Syverson and S. Jha, editors, ACM Conference on Computer and Communications Security (CCS 2008), pages 267-278. ACM, 2008.
    • (2008) ACM Conference on Computer and Communications Security (CCS 2008) , pp. 267-278
    • Mittal, P.1    Borisov, N.2
  • 24
    • 74049096681 scopus 로고    scopus 로고
    • ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies
    • In S. Jha and A. D. Keromytis, editors, ACM
    • P. Mittal and N. Borisov. ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies. In S. Jha and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security (CCS 2009), pages 161-172. ACM, 2009.
    • (2009) ACM Conference on Computer and Communications Security (CCS 2009) , pp. 161-172
    • Mittal, P.1    Borisov, N.2
  • 27
    • 38149130456 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Workshop (PET 2007), Springer
    • S. J. Murdoch and P. Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Workshop (PET 2007), volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 167-183
    • Murdoch, S.J.1    Zielinski, P.2
  • 29
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to largescale anonymity
    • In R. N. Wright and S. De Capitani di Vimercati, editors, ACM
    • A. Nambiar and M. Wright. Salsa: A structured approach to largescale anonymity. In R. N. Wright and S. De Capitani di Vimercati, editors, 13th ACM Conference on Computer and Communications Security (CCS 2006)), pages 17-26. ACM, 2006.
    • (2006) 13th ACM Conference on Computer and Communications Security (CCS 2006)) , pp. 17-26
    • Nambiar, A.1    Wright, M.2
  • 34
    • 85076473294 scopus 로고    scopus 로고
    • June. Accessed February 2011.
    • P. Palfrader. Download server descriptors on demand. https://gitweb.torproject.org/tor. git/blob/master:/doc/spec/proposals/ 141-jit-sd-downloads.txt, June 2008. Accessed February 2011.
    • (2008) Download Server Descriptors on Demand
    • Palfrader, P.1
  • 36
    • 78650332400 scopus 로고    scopus 로고
    • July 2007. Presented at Black Hat USA on July 2007
    • M. Perry. Securing the Tor network, July 2007. Presented at Black Hat USA on July 2007.
    • Securing the Tor Network
    • Perry, M.1
  • 38
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-topeer based anonymous internet usage with collusion detection
    • In S. Jajodia and P. Samarati, editors, ACM
    • M. Rennhard and B. Plattner. Introducing MorphMix: Peer-topeer based anonymous internet usage with collusion detection. In S. Jajodia and P. Samarati, editors, ACM Workshop on Privacy in the Electronic Society (WPES 2002), pages 91-102. ACM, 2002.
    • (2002) ACM Workshop on Privacy in the Electronic Society (WPES 2002) , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 42
    • 79960549105 scopus 로고    scopus 로고
    • Improving security and performance in the Tor network through tunable path selection
    • preprint
    • Robin Snader and Nikita Borisov. Improving security and performance in the Tor network through tunable path selection. IEEE Transactions on Dependable and Secure Computing, 2010. http://dx.doi.org/10.1109/TDSC.2010.40 (preprint).
    • (2010) IEEE Transactions on Dependable and Secure Computing
    • Snader, R.1    Borisov, N.2
  • 43
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics, 25:98-110, 1997.
    • (1997) Journal of Law, Medicine and Ethics , vol.25 , pp. 98-110
    • Sweeney, L.1
  • 45
    • 84855658647 scopus 로고    scopus 로고
    • The Tor Project, February
    • The Tor Project. Tor metrics portal, February 2011. http://metrics.torproject.org/.
    • (2011) Tor Metrics Portal
  • 46
    • 84994593259 scopus 로고    scopus 로고
    • The Tor Project, Accessed Februrary 2011.
    • The Tor Project. Who uses Tor. http://www.torproject. org/about/torusers.html.en. Accessed Februrary 2011.
    • Who Uses Tor
  • 47
    • 74049164513 scopus 로고    scopus 로고
    • Hashing it out in public: Common failure modes of DHT-based anonymity schemes
    • In S. Paraboschi, editor, ACM
    • A. Tran, N. Hopper, and Y. Kim. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In S. Paraboschi, editor, 8th ACM Workshop on Privacy in the Electronic Society (WPES 2009), pages 71-80. ACM, 2009.
    • (2009) 8th ACM Workshop on Privacy in the Electronic Society (WPES 2009) , pp. 71-80
    • Tran, A.1    Hopper, N.2    Kim, Y.3
  • 48
    • 78649990817 scopus 로고    scopus 로고
    • In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems
    • In A. D. Keromytis and V. Shmatikov, editors,. ACM
    • Q. Wang, P. Mittal, and N. Borisov. In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems. In A. D. Keromytis and V. Shmatikov, editors, ACM Conference on Computer and Communications Security (CCS 2010), pages 308-318. ACM, 2010.
    • (2010) ACM Conference on Computer and Communications Security (CCS 2010) , pp. 308-318
    • Wang, Q.1    Mittal, P.2    Borisov, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.