Sciweavers

66 search results - page 5 / 14
» Building Incentives into Tor
Sort
View
PET
2009
Springer
14 years 4 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
PET
2007
Springer
14 years 3 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
14 years 4 months ago
Research issues and overview of economic models in Mobile-P2P networks
The mobile-P2P paradigm is becoming increasingly popular. Existing mobile-P2P solutions largely do not consider economic incentive models for enticing peer participation without e...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
IJWBC
2007
90views more  IJWBC 2007»
13 years 9 months ago
Salutogenic community building
This paper explores a new approach to community building. It is based on the concept of salutogenesis; a proactive approach to community health which seeks preventative measures i...
Khamphira Viravong
MADNES
2005
Springer
14 years 3 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis