Abstract | ||
---|---|---|
In recent years, interest has shifted from protecting the confidentiality of data to protecting the confidentiality of metadata. The police often learn more from traffic analysis than from content interception; thus anonymity becomes more important than confidentiality in the classical sense. Many researchers have been working with systems such as remailers and Tor in order to provide anonymity of various kinds against various threats. In this note we argue that it's often not enough to protect the confidentiality of metadata; we may have to protect its authenticity, availability and other properties as well. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-642-22137-8_29 | Security Protocols Workshop |
Keywords | Field | DocType |
various kind,traffic analysis,recent year,content interception,classical sense,various threat | Metadata,Traffic analysis,Internet privacy,Confidentiality,Computer security,Computer science,Anonymity | Conference |
Volume | ISSN | Citations |
6615 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 1 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ross J. Anderson | 1 | 5349 | 971.91 |
Steven J. Murdoch | 2 | 806 | 57.90 |