Sciweavers

3046 search results - page 4 / 610
» Anonymous communications in the Internet
Sort
View
CCS
2008
ACM
14 years 11 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
IJNSEC
2011
110views more  IJNSEC 2011»
14 years 4 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao
ICCNMC
2005
Springer
15 years 3 months ago
SAS: A Scalar Anonymous Communication System
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, whi...
Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, J...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 3 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
85
Voted
MASCOTS
2008
14 years 11 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...