메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Scalable anonymous communication with provable security

Author keywords

[No Author keywords available]

Indexed keywords

FAULT TOLERANT COMPUTER SYSTEMS; NETWORK ARCHITECTURE; PEER TO PEER NETWORKS;

EID: 85054509425     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 3
    • 2442603590 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • (December)
    • CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. Secure routing for structured peer-to-peer overlay networks. In OSDI (December 2002).
    • (2002) OSDI
    • CASTRO, M.1    DRUSCHEL, P.2    GANESH, A.3    ROWSTRON, A.4    WALLACH, D. S.5
  • 4
    • 85091912614 scopus 로고    scopus 로고
    • Route Fingerprinting in Anonymous Communications
    • DANEZIS, G., AND CLAYTON, R. Route Fingerprinting in Anonymous Communications. IEEE P2P (2006).
    • (2006) IEEE P2P
    • DANEZIS, G.1    CLAYTON, R.2
  • 5
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • DANEZIS, G., AND MITTAL, P. Sybilinfer: Detecting sybil nodes using social networks. In NDSS (2009).
    • (2009) NDSS
    • DANEZIS, G.1    MITTAL, P.2
  • 6
    • 74049145915 scopus 로고    scopus 로고
    • Bridging and fingerprinting: Epistemic attacks on route selection
    • DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In PETS (2008).
    • (2008) PETS
    • DANEZIS, G.1    SYVERSON, P.2
  • 8
    • 85019517087 scopus 로고    scopus 로고
    • Improving the robustness of private information retrieval
    • IEEE Computer Society
    • GOLDBERG, I. Improving the robustness of private information retrieval. In IEEE S&P (2007), IEEE Computer Society.
    • (2007) IEEE S&P
    • GOLDBERG, I.1
  • 9
  • 10
    • 70349298073 scopus 로고    scopus 로고
    • Tor at heart of embassy passwords leak
    • (September 10)
    • GOODIN, D. Tor at heart of embassy passwords leak. The Register (September 10 2007).
    • (2007) The Register
    • GOODIN, D.1
  • 11
    • 84883261388 scopus 로고    scopus 로고
    • Replication is not needed: single database, computationally-private information retrieval
    • KUSHILEVITZ, E., AND OSTROVSKY, R. Replication is not needed: single database, computationally-private information retrieval. In FOCS 97.
    • FOCS , vol.97
    • KUSHILEVITZ, E.1    OSTROVSKY, R.2
  • 12
    • 85091895343 scopus 로고    scopus 로고
    • Measuring the tor network: Evaluation of client requests to the directories
    • LO E S I N G, K
    • LO E S I N G, K. Measuring the tor network: Evaluation of client requests to the directories. Tech. Report (2009). https://git.torproject.org/checkout/metrics/master/ report/dirreq/directory- requests- 2009- 06- 26.pdf.
    • (2009) Tech. Report
  • 14
    • 0009554659 scopus 로고
    • Protocols for public key cryptosystems
    • MERKLE, R. Protocols for public key cryptosystems. In IEEE S&P (1980).
    • (1980) IEEE S&P
    • MERKLE, R.1
  • 16
    • 70349273917 scopus 로고    scopus 로고
    • Infomation leaks in structured peer-to-peer anonymous communication systems
    • MITTAL, P., AND BORISOV, N. Infomation leaks in structured peer-to-peer anonymous communication systems. ACM CCS (2008).
    • (2008) ACM CCS
    • MITTAL, P.1    BORISOV, N.2
  • 17
    • 74049096681 scopus 로고    scopus 로고
    • Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
    • MITTAL, P., AND BORISOV, N. Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies. ACM CCS (2009).
    • (2009) ACM CCS
    • MITTAL, P.1    BORISOV, N.2
  • 18
    • 84855690631 scopus 로고    scopus 로고
    • Metrics for security and performance in low-latency anonymity systems
    • MURDOCH, S. J., AND WATSON, R. N. M. Metrics for security and performance in low-latency anonymity systems. In PETS (2008).
    • (2008) PETS
    • MURDOCH, S. J.1    WATSON, R. N. M.2
  • 19
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • NAMBIAR, A., AND WRIGHT, M. Salsa: A structured approach to large-scale anonymity. ACM CCS (2006).
    • (2006) ACM CCS
    • NAMBIAR, A.1    WRIGHT, M.2
  • 20
    • 74049122426 scopus 로고    scopus 로고
    • Nisan: Network information service for anonymization networks
    • (November)
    • PANCHENKO, A., RICHTER, S., AND RACHE, A. Nisan: Network information service for anonymization networks. ACM CCS (November 2009).
    • (2009) ACM CCS
    • PANCHENKO, A.1    RICHTER, S.2    RACHE, A.3
  • 21
    • 65549153230 scopus 로고    scopus 로고
    • News briefs
    • (April)
    • PAULSON, L. D. News briefs. IEEE Computer 39(4):17-19 (April 2006).
    • (2006) IEEE Computer , vol.39 , Issue.4 , pp. 17-19
    • PAULSON, L. D.1
  • 22
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • (June)
    • REITER, M., AND RUBIN, A. Crowds: Anonymity for web transactions. ACM TISSEC 1, 1 (June 1998).
    • (1998) ACM TISSEC , vol.1 , pp. 1
    • REITER, M.1    RUBIN, A.2
  • 23
    • 20444437836 scopus 로고    scopus 로고
    • Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
    • RENNHARD, M., AND PLATTNER, B. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. WPES (2002).
    • (2002) WPES
    • RENNHARD, M.1    PLATTNER, B.2
  • 25
    • 85056528164 scopus 로고    scopus 로고
    • Breaking the collusion detection mechanism of MorphMix
    • TABRIZ, P., AND BORISOV, N. Breaking the collusion detection mechanism of MorphMix. In PET (2006).
    • (2006) PET
    • TABRIZ, P.1    BORISOV, N.2
  • 26
    • 78650117154 scopus 로고    scopus 로고
    • Hashing it out in public: common failure modes of dht-based anonymity schemes
    • TRAN, A., HOPPER, N., AND KIM, Y. Hashing it out in public: common failure modes of dht-based anonymity schemes. In WPES (2009).
    • (2009) WPES
    • TRAN, A.1    HOPPER, N.2    KIM, Y.3
  • 27
    • 85091916526 scopus 로고    scopus 로고
    • In search of an anonymous and secure lookup
    • WANG, Q., MITTAL, P., AND BORISOV, N. In search of an anonymous and secure lookup. In ACM CCS (2010).
    • (2010) ACM CCS
    • WANG, Q.1    MITTAL, P.2    BORISOV, N.3
  • 28
    • 70449694823 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against sybil attacks
    • YU, H., GIBBONS, P. B., KAMINSKY, M., AND XIAO, F. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE S&P (2008).
    • (2008) IEEE S&P
    • YU, H.1    GIBBONS, P. B.2    KAMINSKY, M.3    XIAO, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.