Sciweavers

108 search results - page 3 / 22
» A Parallelism-Based Approach to Network Anonymization
Sort
View
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 4 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
IPPS
2006
IEEE
14 years 8 days ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi
CCR
2010
133views more  CCR 2010»
13 years 6 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
EUROSEC
2009
ACM
14 years 1 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
CLUSTER
2007
IEEE
13 years 6 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi