2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 2007
DOI: 10.1109/seccom.2007.4550344
|View full text |Cite
|
Sign up to set email alerts
|

Securing pseudo identities in an anonymous peer-to-peer file-sharing network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
1
1
0
Order By: Relevance
“…The coefficient (n − 1)r i /(1 + (n − 2)r i ) comes from the inequality (14). The definition agrees with the informal description (10) when the a-priori suspicion (r i ) i∈U is uniform.…”
Section: "Innocent" Automaton Inno(x )supporting
confidence: 75%
See 1 more Smart Citation
“…The coefficient (n − 1)r i /(1 + (n − 2)r i ) comes from the inequality (14). The definition agrees with the informal description (10) when the a-priori suspicion (r i ) i∈U is uniform.…”
Section: "Innocent" Automaton Inno(x )supporting
confidence: 75%
“…The analysis led to discovery of a flaw, which can be detected by the ABC bisimulation checker [6] for the π-calculus. A detailed account of the flaw is in [14]. In [15] a general framework for automatic checking of anonymity is proposed; the framework is based on the process algebra µCRL.…”
Section: Process Algebraic Techniquesmentioning
confidence: 99%