Entry Mittal:2012:ILS from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Mittal:2012:ILS,
author = "Prateek Mittal and Nikita Borisov",
title = "Information Leaks in Structured Peer-to-Peer Anonymous
Communication Systems",
journal = j-TISSEC,
volume = "15",
number = "1",
pages = "5:1--5:??",
month = mar,
year = "2012",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2133375.2133380",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Sat Mar 24 09:45:43 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We analyze information leaks in the lookup mechanisms
of structured peer-to-peer (P2P) anonymous
communication systems and how these leaks can be used
to compromise anonymity. We show that the techniques
used to combat active attacks on the lookup mechanism
dramatically increase information leaks and the
efficacy of passive attacks, resulting in a tradeoff
between robustness to active and passive attacks. We
study this tradeoff in two P2P anonymous systems: Salsa
and AP3. In both cases, we find that, by combining both
passive and active attacks, anonymity can be
compromised much more effectively than previously
thought, rendering these systems insecure for most
proposed uses. Our results hold even if security
parameters are changed or other improvements to the
systems are considered. Our study, therefore, shows the
importance of considering these attacks in P2P
anonymous communication.",
acknowledgement = ack-nhfb,
articleno = "5",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- active,
5(4)492,
15(2)9,
15(3)14,
17(2)6,
18(3)9
- analyze,
2(3)230,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- anonymity,
1(1)66,
2(3)230,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(3)11,
15(3)12,
15(3)14,
17(1)4
- anonymous,
3(2)63,
7(4)489,
11(2)3,
12(3)15,
12(4)21,
13(1)8,
13(4)39,
13(4)41,
14(1)4,
14(1)10,
14(4)29,
15(1)4,
15(3)14,
17(1)4,
17(3)10,
17(3)12
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- case,
7(2)206,
9(4)391,
10(4)2,
11(3)14,
11(4)19,
11(4)21,
12(1)1,
12(1)5,
12(2)10,
12(4)20,
13(4)32,
13(4)34,
14(1)14,
14(2)18,
14(4)28,
15(2)7,
15(3)13,
16(1)4,
17(1)1,
17(2)7,
18(1)1,
18(1)2,
18(1)4
- combining,
1(1)93,
13(1)10,
13(3)22,
14(3)24
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(2)9,
17(2)7,
17(3)11,
18(2)5
- compromised,
2(3)332,
10(4)6,
11(3)12,
11(3)15,
11(4)18,
12(2)13,
13(4)30,
13(4)38
- considered,
1(1)26,
10(2)5,
14(1)14,
15(4)16
- considering,
14(4)28,
16(1)2,
17(1)1
- dramatically,
10(2)6
- effectively,
10(3)12,
10(4)2,
11(3)15,
14(1)10
- efficacy,
12(2)13,
12(4)22,
13(4)35,
18(3)11
- even,
1(1)66,
2(3)332,
2(4)416,
10(1)2,
11(1)4,
11(2)6,
11(4)22,
12(2)11,
12(4)20,
13(1)10,
13(4)30,
13(4)35,
13(4)41,
14(3)25,
14(3)27,
16(3)12,
17(3)11,
17(3)12,
18(1)1
- find,
10(1)4,
12(1)3,
12(1)6,
12(2)10,
12(4)22,
15(4)18,
16(2)8,
17(3)11,
17(4)13,
18(3)10,
18(4)12
- hold,
10(4)1,
11(2)6,
16(1)4,
17(1)2
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- importance,
10(4)6,
11(4)19
- improvement,
10(2)6,
11(4)17,
13(4)33,
15(4)17
- increase,
11(4)20,
12(3)18,
14(1)3,
15(3)11,
16(2)8,
18(4)14
- insecure,
7(2)319
- leak,
12(3)17,
13(2)13
- lookup,
14(1)11,
17(4)13
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
10(4)6,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- most,
2(3)332,
9(4)391,
11(2)2,
11(3)12,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- much,
2(3)332,
12(2)10,
13(2)13,
13(3)28,
15(3)14,
15(4)16,
18(3)11
- other,
1(1)93,
2(4)354,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)2,
11(2)6,
11(3)15,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(2)6,
15(3)11,
15(3)14,
15(4)15,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- parameter,
9(4)461,
10(4)5,
11(3)13,
12(1)2,
17(3)10,
18(2)5
- passive,
16(4)14
- peer, peer-to-,
11(2)3,
13(4)38
- peer-to-peer,
11(2)3,
13(4)38
- previously,
13(3)27,
14(3)27,
16(3)10,
17(2)7,
17(4)14
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- resulting,
2(1)34,
10(1)2,
10(4)2,
11(4)20,
15(1)4,
15(2)10,
15(3)13,
15(4)15,
16(3)10,
16(4)17,
17(2)7
- robustness,
15(3)12,
18(2)7
- structured,
6(1)1
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
11(3)14,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
13(4)35,
14(3)27,
14(4)31,
15(2)9,
15(2)10,
15(4)15,
15(4)16,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- therefore,
2(2)177,
10(4)4,
11(4)19,
12(2)11,
13(1)10,
13(3)28,
14(3)24,
15(4)16,
17(1)3
- thought,
17(4)14
- to-peer, peer-,
11(2)3,
13(4)38
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14