Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods
暂无分享,去创建一个
Hannes Federrath | Dominik Herrmann | Karl-Peter Fuchs | Christopher Piosecny | H. Federrath | Dominik Herrmann | Karl-Peter Fuchs | Christopher Piosecny
[1] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[2] Tharam S. Dillon,et al. On the Move to Meaningful Internet Systems, OTM 2010 , 2010, Lecture Notes in Computer Science.
[3] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[4] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[5] Alan O. Freier,et al. Multicast Transport Protocol , 1992, RFC.
[6] Mark P. Andrews,et al. Negative Caching of DNS Queries (DNS NCACHE) , 1998, RFC.
[7] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[8] Chris Clifton,et al. Privacy-Preserving Kth Element Score over Vertically Partitioned Data , 2009, IEEE Transactions on Knowledge and Data Engineering.
[9] Stefan Köpsell,et al. Low Latency Anonymous Communication - How Long Are Users Willing to Wait? , 2006, ETRICS.
[10] Aiko Pras,et al. DNS: A Statistical Analysis of Name Server Traffic at Local Network-to-Internet Connections , 2005, EUNICE.
[11] Hannes Federrath,et al. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability , 2001 .
[12] Roger Dingledine,et al. Blending Different Latency Traffic with Alpha-mixing , 2006, Privacy Enhancing Technologies.
[13] Vashek Matyas,et al. User Profiling and Re-identification: Case of University-Wide Network Analysis , 2009, TrustBus.
[14] Chris Clifton,et al. Privacy - preserving top-k queries , 2005, 21st International Conference on Data Engineering (ICDE'05).
[15] Joaquín García,et al. Evaluation of Two Privacy-Preserving Protocols for the DNS , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[16] Günter Müller. Emerging Trends in Information and Communication Security , 2006, Lecture Notes in Computer Science.
[17] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[18] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] Vitaly Shmatikov,et al. Synchronous Batching: From Cascades to Free Routes , 2004, Privacy Enhancing Technologies.
[20] Hannes Federrath. Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.
[21] Mark Handley,et al. The Case for Pushing DNS , 2005 .
[22] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[23] Xenofontas A. Dimitropoulos,et al. Fast Privacy-Preserving Top-k Queries Using Secret Sharing , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[24] Robert Tappan Morris,et al. DNS performance and the effectiveness of caching , 2001, IMW '01.
[25] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[26] Joaquín García,et al. Anonymous Resolution of DNS Queries , 2008, OTM Conferences.
[27] Kouichi Sakurai,et al. Analysis of Privacy Disclosure in DNS Query , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[28] Vincenzo Conti,et al. A Self-Contained Biometric Sensor for Ubiquitous Authentication , 2007 .
[29] Yinghui Yang,et al. Web user behavioral profiling for user identification , 2010, Decis. Support Syst..
[30] Kouichi Sakurai,et al. Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving , 2007 .
[31] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[32] Torsten Suel,et al. Geographic web usage estimation by monitoring DNS caches , 2008, LocWeb.
[33] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[34] George Danezis. Mix-Networks with Restricted Routes , 2003, Privacy Enhancing Technologies.
[35] Gene Tsudik,et al. Towards Plugging Privacy Leaks in the Domain Name System , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[36] Niels Provos,et al. Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing , 2010, TOIT.