Sciweavers

27 search results - page 6 / 6
» On Flow Correlation Attacks and Countermeasures in Mix Netwo...
Sort
View
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 days ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
CCS
2006
ACM
13 years 9 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch