Sciweavers

173 search results - page 4 / 35
» On performance bottleneck of anonymous communication network...
Sort
View
77
Voted
WISA
2004
Springer
15 years 5 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
INFOCOM
2008
IEEE
15 years 6 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
CCS
2005
ACM
15 years 5 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
IJNSEC
2007
144views more  IJNSEC 2007»
14 years 11 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
IWCC
1999
IEEE
15 years 4 months ago
A High Performance Communication Subsystem for PODOS
PODOS is a performance oriented distributed operating system being developed to harness the performance capabilities of a cluster computing environment. In order to address the gr...
Sudharshan Vazhkudai, P. Tobin Maginnis