Sciweavers

2 search results - page 1 / 1
» Message Splitting Against the Partial Adversary
Sort
View
PET
2005
Springer
13 years 10 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
ENTCS
2007
131views more  ENTCS 2007»
13 years 4 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo