Sciweavers

46 search results - page 3 / 10
» Probabilistic Anonymity
Sort
View
CCS
2007
ACM
14 years 7 days ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
ISI
2007
Springer
14 years 6 days ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
CDC
2010
IEEE
107views Control Systems» more  CDC 2010»
13 years 1 months ago
Probabilistic mutual localization in multi-agent systems from anonymous position measures
Abstract-- Recent research on multi-agent systems has produced a plethora of decentralized controllers that implicitly assume various degrees of agent localization. However, many p...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
CCS
2010
ACM
13 years 6 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 4 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...