메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Tor: The second-generation onion router

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION; DIRECTORY SERVER; INTEGRITY CHECKING; INTERNATIONAL NETWORKS; KERNEL MODIFICATIONS; PERFECT FORWARD SECRECY; RENDEZVOUS POINT; SECOND GENERATION;

EID: 85084161366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2943)

References (54)
  • 1
    • 35248878897 scopus 로고    scopus 로고
    • On the economics of anonymity
    • R. N. Wright, editor Springer-Verlag, LNCS 2742
    • A. Acquisti, R. Dingledine, and P. Syverson. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography. Springer-Verlag, LNCS 2742, 2003.
    • (2003) Financial Cryptography
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.3
  • 3
    • 85077747639 scopus 로고    scopus 로고
    • The Anonymizer. .
  • 5
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, editor Springer-Verlag, LNCS 2137
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
    • (2001) Information Hiding (IH 2001) , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 6
    • 26444526862 scopus 로고    scopus 로고
    • The EAX mode of operation: A two-pass authenticated-encryption scheme optimized for simplicity and efficiency
    • February
    • M. Bellare, P. Rogaway, and D. Wagner. The EAX mode of operation: A two-pass authenticated-encryption scheme optimized for simplicity and efficiency. In Fast Software Encryption 2004, February 2004.
    • (2004) Fast Software Encryption 2004
    • Bellare, M.1    Rogaway, P.2    Wagner, D.3
  • 9
    • 33746649304 scopus 로고    scopus 로고
    • Cebolla: Pragmatic IP anonymity
    • June
    • Z. Brown. Cebolla: Pragmatic IP Anonymity. In Ottawa Linux Symposium, June 2002.
    • (2002) Ottawa Linux Symposium
    • Brown, Z.1
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudo-nyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudo-nyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 12
    • 0010275933 scopus 로고    scopus 로고
    • Usenet post, August First mentioned in a post to the cypherpunks list, Feb. 1995
    • W. Dai. Pipenet 1.1. Usenet post, August 1996. First mentioned in a post to the cypherpunks list, Feb. 1995.
    • (1996) Pipenet 1.1
    • Dai, W.1
  • 13
    • 19744378452 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • R. Dingledine, editor Springer-Verlag LNCS 2760
    • G. Danezis. Mix-networks with restricted routes. In R. Dingledine, editor, Privacy Enhancing Technologies (PET 2003). Springer-Verlag LNCS 2760, 2003.
    • (2003) Privacy Enhancing Technologies (PET 2003)
    • Danezis, G.1
  • 17
    • 0004035649 scopus 로고    scopus 로고
    • The TLS protocol - Version 1.0
    • January
    • T. Dierks and C. Allen. The TLS Protocol - Version 1.0. IETF RFC 2246, January 1999.
    • (1999) IETF RFC 2246
    • Dierks, T.1    Allen, C.2
  • 18
    • 84947287486 scopus 로고    scopus 로고
    • A reputation system to increase MIX-net reliability
    • I. S. Moskowitz, editor Springer-Verlag, LNCS 2137
    • R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar. A Reputation System to Increase MIX-net Reliability. In I. S. Moskowitz, editor, Information Hiding (IH 2001), pages 126-141. Springer-Verlag, LNCS 2137, 2001.
    • (2001) Information Hiding (IH 2001) , pp. 126-141
    • Dingledine, R.1    Freedman, M.J.2    Hopwood, D.3    Molnar, D.4
  • 21
    • 33646756818 scopus 로고    scopus 로고
    • Reliable MIX cascade networks through reputation
    • M. Blaze, editor Springer-Verlag, LNCS 2357
    • R. Dingledine and P. Syverson. Reliable MIX Cascade Networks through Reputation. In M. Blaze, editor, Financial Cryptography. Springer-Verlag, LNCS 2357, 2002.
    • (2002) Financial Cryptography
    • Dingledine, R.1    Syverson, P.2
  • 23
    • 84955605258 scopus 로고    scopus 로고
    • MIXes in mobile communication systems: Location management with privacy
    • R. Anderson, editor Springer-Verlag, LNCS 1174, May
    • H. Federrath, A. Jerichow, and A. Pfitzmann. MIXes in mobile communication systems: Location management with privacy. In R. Anderson, editor, Information Hiding, First International Workshop, pages 121-135. Springer-Verlag, LNCS 1174, May 1996.
    • (1996) Information Hiding, First International Workshop , pp. 121-135
    • Federrath, H.1    Jerichow, A.2    Pfitzmann, A.3
  • 25
    • 4944262982 scopus 로고    scopus 로고
    • Herbivore: A scalable and efficient protocol for anonymous communication
    • Cornell University Computing and Information Science, February
    • S. Goel, M. Robson, M. Polte, and E. G. Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report TR2003-1890, Cornell University Computing and Information Science, February 2003.
    • (2003) Technical Report TR2003-1890
    • Goel, S.1    Robson, M.2    Polte, M.3    Sirer, E.G.4
  • 29
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • R. Dingledine and P. Syverson, editors Springer-Verlag, LNCS 2482
    • A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies (PET 2002), pages 171-178. Springer-Verlag, LNCS 2482, 2002.
    • (2002) Privacy Enhancing Technologies (PET 2002) , pp. 171-178
    • Hintz, A.1
  • 31
    • 1642380665 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • F. Petitcolas, editor Springer-Verlag, LNCS 2578, October
    • D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. Petitcolas, editor, Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
    • (2002) Information Hiding Workshop (IH 2002)
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 33
    • 33745798251 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix-based systems
    • A. Juels, editor Springer-Verlag, LNCS (forthcoming)
    • B. N. Levine, M. K. Reiter, C. Wang, and M. Wright. Timing analysis in low-latency mix-based systems. In A. Juels, editor, Financial Cryptography. Springer-Verlag, LNCS (forthcoming), 2004.
    • (2004) Financial Cryptography
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.4
  • 34
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A multicast-based protocol for anonymity
    • B. N. Levine and C. Shields. Hordes: A multicast-based protocol for anonymity. Journal of Computer Security, 10(3):213-240, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 35
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 39
    • 85077753457 scopus 로고    scopus 로고
    • Privoxy. .
  • 40
    • 84938811530 scopus 로고    scopus 로고
    • Protocols using anonymous connections: Mobile applications
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors Springer-Verlag, LNCS 1361, April
    • M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Protocols using anonymous connections: Mobile applications. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols: 5th International Workshop, pages 13-23. Springer-Verlag, LNCS 1361, April 1997.
    • (1997) Security Protocols: 5th International Workshop , pp. 13-23
    • Reed, M.G.1    Syverson, P.F.2    Goldschlag, D.M.3
  • 42
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • June
    • M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1):66-92, June 1998.
    • (1998) ACM TISSEC , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 43
    • 20444454461 scopus 로고    scopus 로고
    • Practical anonymity for the masses with morphmix
    • A. Juels, editor Springer-Verlag, LNCS (forthcoming)
    • M. Rennhard and B. Plattner. Practical anonymity for the masses with morphmix. In A. Juels, editor, Financial Cryptography. Springer-Verlag, LNCS (forthcoming), 2004.
    • (2004) Financial Cryptography
    • Rennhard, M.1    Plattner, B.2
  • 45
    • 20444435333 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • Springer-Verlag, LNCS 2808, October
    • A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Computer Security - ESORICS 2003. Springer-Verlag, LNCS 2808, October 2003.
    • (2003) Computer Security - ESORICS 2003
    • Serjantov, A.1    Sewell, P.2
  • 47
    • 79952938836 scopus 로고    scopus 로고
    • Using caching for browsing anonymity
    • Sept
    • A. Shubina and S. Smith. Using caching for browsing anonymity. ACM SIGEcom Exchanges, 4(2), Sept 2003.
    • (2003) ACM SIGEcom Exchanges , vol.4 , Issue.2
    • Shubina, A.1    Smith, S.2
  • 53
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system
    • August
    • M. Waldman, A. Rubin, and L. Cranor. Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system. In Proc. 9th USENIX Security Symposium, pages 59-72, August 2000.
    • (2000) Proc. 9th USENIX Security Symposium , pp. 59-72
    • Waldman, M.1    Rubin, A.2    Cranor, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.