Sciweavers

480 search results - page 6 / 96
» Anonymous Transactions in Computer Networks
Sort
View
123
Voted
CCR
2010
133views more  CCR 2010»
15 years 2 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
127
Voted
CCS
2007
ACM
15 years 8 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
83
Voted
AINA
2007
IEEE
15 years 9 months ago
Anonymous Stabilizing Leader Election using a Network Sequencer
Matthias Wiesmann, Xavier Défago
117
Voted
CCS
2007
ACM
15 years 8 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
107
Voted
NETCOOP
2009
Springer
15 years 9 months ago
An Anonymous Sequential Game Approach for Battery State Dependent Power Control
Piotr Wiecek, Eitan Altman, Yezekael Hayel