Sciweavers

134 search results - page 5 / 27
» Attack for Flash MIX
Sort
View
ICNP
2002
IEEE
14 years 12 days ago
A Lightweight, Robust P2P System to Handle Flash Crowds
Abstract— Internet flash crowds (a.k.a. hot spots) are a phenomenon that result from a sudden, unpredicted increase in an on-line object’s popularity. Currently, there is no e...
Angelos Stavrou, Dan Rubenstein, Sambit Sahu
PET
2004
Springer
14 years 24 days ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
GLOBECOM
2010
IEEE
13 years 5 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
PET
2009
Springer
14 years 2 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
CCS
2007
ACM
14 years 1 months ago
Kleptographic attacks on a cascade of mix servers
Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zag&...