Sciweavers

18 search results - page 1 / 4
» IPsec-Based Anonymous Networking: A Working Implementation
Sort
View
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 2 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
CMS
2006
127views Communications» more  CMS 2006»
13 years 6 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
ESORICS
2008
Springer
13 years 6 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
DEXAW
2004
IEEE
136views Database» more  DEXAW 2004»
13 years 8 months ago
A Protocol for Reputation Management in Super-Peer Networks
Peer-to-Peer (P2P) applications have recently seen an enormous success and have reached millions of users. The main reason of this success is the anonymity the users enjoy. Howeve...
Shalendra Chhabra, Ernesto Damiani, Sabrina De Cap...
TON
2012
11 years 7 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...