Sciweavers

38 search results - page 6 / 8
» A Formalization of Anonymity and Onion Routing
Sort
View
ISCC
2003
IEEE
14 years 21 days ago
Payload analysis of anonymous communication system with host-based rerouting mechanism
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity informati...
Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin W...
NDSS
2002
IEEE
14 years 10 days ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
CCS
2009
ACM
14 years 8 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
PEWASUN
2004
ACM
14 years 25 days ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
JNCA
2011
123views more  JNCA 2011»
13 years 2 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...