Sciweavers

237 search results - page 3 / 48
» Anonymous Networking with Minimum Latency in Multihop Networ...
Sort
View
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 20 days ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
DSN
2009
IEEE
14 years 1 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
ACSW
2007
13 years 7 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 6 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
13 years 4 months ago
Latency and Capacity Optimal Broadcasting in Wireless Multihop Networks
In this paper, we study the fundamental properties of broadcasting in multi-hop wireless networks. Previous studies have shown that, as long as broadcast capacity is concerned, asy...
Giovanni Resta, Paolo Santi