Sciweavers

1599 search results - page 53 / 320
» Probabilistic Analysis of Anonymity
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 6 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 6 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
WWW
2010
ACM
15 years 5 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
COLCOM
2005
IEEE
15 years 5 months ago
Stochasticity of probabilistic systems: analysis methodologies case-study
We do a case study of two different analysis techniques for studying the stochastic behavior of a randomized system/algorithms: (i) The first approach can be broadly termed as a ...
Anwitaman Datta, Martin Hasler, Karl Aberer
BMCBI
2010
125views more  BMCBI 2010»
14 years 7 months ago
ProbFAST: Probabilistic Functional Analysis System Tool
Background: The post-genomic era has brought new challenges regarding the understanding of the organization and function of the human genome. Many of these challenges are centered...
Israel T. da Silva, Ricardo Z. N. Vêncio, Th...