Movatterモバイル変換


[0]ホーム

URL:


Murdoch, 2013 - Google Patents

Quantifying and measuring anonymity

Murdoch, 2013

ViewPDF
Document ID
4370253314307912471
Author
Murdoch S
Publication year
Publication venue
International Workshop on Data Privacy Management

External Links

Snippet

The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of research since its beginning. In recent years, anonymous communication systems have evolved from obscure …
Continue reading atdiscovery.ucl.ac.uk (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems

Similar Documents

PublicationPublication DateTitle
Wu et al.An effective approach for the protection of user commodity viewing privacy in e-commerce website
Ren et al.Privacy-preserving using homomorphic encryption in Mobile IoT systems
US10181043B1 (en)Method and apparatus for cookie validation and scoring
Ranchal et al.Protection of identity information in cloud computing without trusted third party
Fischer-Hbner et al.Privacy-enhancing technologies
MurdochQuantifying and measuring anonymity
Bodriagov et al.Encryption for peer-to-peer social networks
Rebollo‐Monedero et al.Reconciling privacy and efficient utility management in smart cities
Sharma et al.A hybrid cryptographic technique for file storage mechanism over cloud
Patel et al.Homomorphic cryptography and its applications in various domains
Praveena et al.Prevention of inference attacks for private information in social networking sites
Al-Khafaji et al.Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
Chen et al.PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain
Arvind et al.Secure data classification using superior naive classifier in agent based mobile cloud computing
Anusuya et al.Maximum decision support regression-based advance secure data encrypt transmission for healthcare data sharing in the cloud computing
Singh et al.Privacy attack modeling and risk assessment method for name data networking
Singh et al.Threat identification and risk assessments for named data networking architecture using SecRam
Satyanarayana Murty et al.A hybrid intelligent cryptography algorithm for distributed big data storage in cloud computing security
Trujillo et al.A traffic analysis attack to compute social network measures
Chen et al.Ppapafl: a novel approach to privacy protection and anti-poisoning attacks in federated learning
Kapil et al.Managing multimedia big data: Security and privacy perspective
Preneel et al.Privacy and security in an age of surveillance (Dagstuhl perspectives workshop 14401)
Cremonini et al.Privacy on the Internet
Kavianpour et al.Classification of third-party applications on Facebook to mitigate users’ information leakage
KVK et al.A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments

[8]
ページ先頭

©2009-2025 Movatter.jp