Sciweavers

Share
ICDCS
2002
IEEE
10 years 3 months ago
An Optimal Strategy for Anonymous Communication Protocols
For many Internet applications, the ability to protect the identity of participants in a distributed applications is critical. For such applications, a number of anonymous communi...
Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
IH
2005
Springer
10 years 3 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
ICNP
2005
IEEE
10 years 4 months ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
10 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
FC
2009
Springer
100views Cryptology» more  FC 2009»
10 years 5 months ago
Relations Among Privacy Notions
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Jens-Matthias Bohli, Andreas Pashalidis
books