Sciweavers

108 search results - page 7 / 22
» A Parallelism-Based Approach to Network Anonymization
Sort
View
CCS
2009
ACM
15 years 4 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
ICNS
2007
IEEE
15 years 3 months ago
Real-time anonymization in passive network monitoring
Abstract—Passive network monitoring that observes user traffic has many advantages over active monitoring that uses test packets. It can provide characteristics of real user tra...
Sven Ubik, Petr Zejdl, Jiri Halak
CMS
2006
127views Communications» more  CMS 2006»
14 years 11 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
ANSS
2004
IEEE
15 years 1 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
ICDCS
2009
IEEE
15 years 6 months ago
Fault-Tolerant Consensus in Unknown and Anonymous Networks
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from cr...
Carole Delporte-Gallet, Hugues Fauconnier, Andreas...