Sciweavers

38 search results - page 6 / 8
» Certificateless onion routing
Sort
View
SASN
2006
ACM
14 years 1 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
EUC
2005
Springer
14 years 1 months ago
A Survey of Anonymous Peer-to-Peer File-Sharing
Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
Tom Chothia, Konstantinos Chatzikokolakis
SAINT
2008
IEEE
14 years 1 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
ISCC
2003
IEEE
14 years 22 days ago
Payload analysis of anonymous communication system with host-based rerouting mechanism
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity informati...
Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin W...
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 9 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine