Sciweavers

1599 search results - page 67 / 320
» Probabilistic Analysis of Anonymity
Sort
View
MICCAI
2010
Springer
14 years 10 months ago
Probabilistic Multi-Shape Representation Using an Isometric Log-Ratio Mapping
Abstract. Several sources of uncertainties in shape boundaries in medical images have motivated the use of probabilistic labeling approaches. Although it is well-known that the sam...
Neda Changizi, Ghassan Hamarneh
PET
2007
Springer
15 years 6 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
CSFW
2012
IEEE
13 years 2 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
P2P
2008
IEEE
15 years 6 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
SIGCOMM
2000
ACM
15 years 4 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...