Sciweavers

134 search results - page 6 / 27
» Attack for Flash MIX
Sort
View
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 1 months ago
Timing Attacks in Low-Latency Mix Systems (Extended Abstract)
Brian Neil Levine, Michael K. Reiter, Chenxi Wang,...
DIAU
2000
Springer
14 years 5 days ago
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostl...
Jean-François Raymond
ICDCS
2005
IEEE
14 years 2 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
SACRYPT
1998
Springer
14 years 23 days ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
14 years 15 days ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...