Sciweavers

DIAU
2000
Springer
14 years 4 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
DIAU
2000
Springer
14 years 4 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
DIAU
2000
Springer
14 years 4 months ago
The Disadvantages of Free MIX Routes and how to Overcome Them
There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two sp...
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke
DIAU
2000
Springer
14 years 4 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
CCS
2000
ACM
14 years 4 months ago
A protocol for anonymous communication over the Internet
Ï Ø Ø ÖÓÛØ Ò ÔØ Ò Ó Ø ÁÒØ ÖÒ Ø¸ Ø Ö × Ò Ò Ö × ÒØ Ö ×Ø Ò Ñ ÒØ Ò Ò ÒÓÒÝÑ ØÝ Ò Ø Ò ØÛÓÖ º Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û...
Clay Shields, Brian Neil Levine
CCS
2000
ACM
14 years 4 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
CCS
2000
ACM
14 years 4 months ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
CCS
2000
ACM
14 years 4 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada