Sciweavers

241 search results - page 10 / 49
» Passive-Logging Attacks Against Anonymous Communications Sys...
Sort
View
82
Voted
CCS
2008
ACM
15 years 1 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
71
Voted
EUC
2005
Springer
15 years 5 months ago
A Survey of Anonymous Peer-to-Peer File-Sharing
Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
Tom Chothia, Konstantinos Chatzikokolakis
IWSEC
2007
Springer
15 years 5 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ISCC
2003
IEEE
15 years 5 months ago
Payload analysis of anonymous communication system with host-based rerouting mechanism
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity informati...
Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin W...
87
Voted
IH
2001
Springer
15 years 4 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn