PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Group signature revocable anonymity scheme for network monitoring

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Subscriber’s Privacy is in a constant conflict with security and accountability providing controls employed for network monitoring activities of service providers and enterprises. This paper presents the results of the author’s research in the field of distributed network security monitoring architectures and the proposal of such a system that incorporates cryptographic protocols and a group signature scheme to deliver privacy protecting, network surveillance system architecture that provides subscriber’s accountability and controlled, revocable anonymity.
Rocznik
Strony
101--115
Opis fizyczny
Bibliogr. 10 poz., tab.
Twórcy
autor
  • Institute of Telecommunications, Warsaw University of Technology, Poland
Bibliografia
  • [1] Bianchi G., Boschi E., Kaklamani D.I., Koutsoloukas E.A., Lioudakis G.V., Oppedisano F., Petraschek M., Ricciato F., and Schmoll C., Towards privacy-preserving network monitoring: Issues and challenges, Personal, Indoor and Mobile Radio Communications - PIMRC’07 (2007): 1.
  • [2] Xu K., Zhang Z. L., and Bhattacharyya S., Internet traffic behavior profiling for network security monitoring, IEEE/ACM 16(6) (2008): 1241.
  • [3] Gogoulos F., Antonakopoulou A., Mousas A. S., Lioudakis G. V., Kaklamani D. I., and Venieris I. S., Privacy-aware passive network monitoring, Panhellenic Conference on Informatics 0 (2009): 171.
  • [4] Bellare M., Shi H., and Zhang C., Foundations of group signatures: The case of dynamic groups, Topics in Cryptology - CT-RSA ’05, Lecture Notes in Computer Science 3376 (2005): 136.
  • [5] Bellare M., Micciancio D., and Warinschi B., Foundations of group signatures: Formal definitions, simplifieed requirements, and a construction based on general assumptions, Advances in Cryptology - EUROCRYPT ’03, Lecture Notes in Computer Science 2656 (2003): 644.
  • [6] Goldreich O., Two remarks concerning the goldwasser-micali-rivest signature scheme, Proceedings of CRYPTO ’86, London, UK, Springer–Verlag (1987): 104.
  • [7] Boyen X. and Waters B., Full-domain subgroup hiding and constant-size group signatures, Public Key Cryptography – PKC ’07, Lecture Notes in Computer Science 4450 (2007): 1; Available at http://www.cs.stanford.edu/∼xb/pkc07/.
  • [8] Groth J., Fully anonymous group signatures without random oracles, Proceedings of ASIACRYPT ’07, Berlin, Heidelberg, Springer–Verlag (2007): 164.
  • [9] Liang X., Cao Z., Shaoand J., and Lin H., Short group signature without random oracles, 9th International Conference on Information and Communications Security – ICICS ’07, Berlin, Heidelberg, Springer–Verlag (2007): 69.
  • [10] Boneh D. and Boyen X., Short signatures without random oracles, Proceedings of EUROCRYPT ’04, Lecture Notes in Computer Sciences 3027 (2004): 56.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-11294140-c350-420d-ab45-79c876045748
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.