Sciweavers

480 search results - page 6 / 96
» Anonymous Transactions in Computer Networks
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 8 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CCS
2007
ACM
14 years 2 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
CCS
2007
ACM
14 years 2 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
NETCOOP
2009
Springer
14 years 3 months ago
An Anonymous Sequential Game Approach for Battery State Dependent Power Control
Piotr Wiecek, Eitan Altman, Yezekael Hayel