Sciweavers

480 search results - page 6 / 96
» Anonymous Transactions in Computer Networks
Sort
View
96
Voted
CCR
2010
133views more  CCR 2010»
15 years 13 days ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
112
Voted
CCS
2007
ACM
15 years 6 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
CCS
2007
ACM
15 years 6 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
NETCOOP
2009
Springer
15 years 6 months ago
An Anonymous Sequential Game Approach for Battery State Dependent Power Control
Piotr Wiecek, Eitan Altman, Yezekael Hayel