Sciweavers

3046 search results - page 6 / 610
» Anonymous communications in the Internet
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
SIGOPSE
2004
ACM
15 years 2 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
70
Voted
EUC
2005
Springer
15 years 3 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
IPPS
2006
IEEE
15 years 3 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
AINA
2006
IEEE
15 years 1 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel