Sciweavers

480 search results - page 14 / 96
» Anonymous Transactions in Computer Networks
Sort
View
TON
2012
11 years 11 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SAC
2009
ACM
14 years 3 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 10 months ago
On the Anonymization of Sparse High-Dimensional Data
Abstract-- Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as ka...
Gabriel Ghinita, Yufei Tao, Panos Kalnis
CCS
2008
ACM
13 years 10 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
IMC
2006
ACM
14 years 2 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills