Sciweavers

173 search results - page 3 / 35
» On performance bottleneck of anonymous communication network...
Sort
View
SIGMETRICS
2003
ACM
113views Hardware» more  SIGMETRICS 2003»
13 years 10 months ago
An empirical evaluation of wide-area internet bottlenecks
Conventional wisdom has been that the performance limitations in the current Internet lie at the edges of the network – i.e last mile connectivity to users, or access links of s...
Aditya Akella, Srinivasan Seshan, Anees Shaikh
CCR
2010
133views more  CCR 2010»
13 years 5 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
NDSS
2008
IEEE
13 years 11 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
CCS
2011
ACM
12 years 4 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
MOBICOM
1995
ACM
13 years 8 months ago
Mobile Wireless Network System Simulation
In this paper, we describe a simulation environment which is used to examine, validate, and predict the performance of mobile wireless network systems. This simulation environment...
Joel Short, Rajive Bagrodia, Leonard Kleinrock