In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
—We analyze the anonymous communication patterns of 2.5 million customers of a Belgian mobile phone operator. With these communications, we construct a social network of customer...
Gautier Krings, Francesco Calabrese, Carlo Ratti, ...
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...