Sciweavers

1064 search results - page 27 / 213
» Cryptography from Anonymity
Sort
View
WETICE
2002
IEEE
14 years 27 days ago
Analysis of an Anonymity Network for Web Browsing
Various systems offering anonymity for near real-time Internet traffic have been operational. However, they did not deliver many quantitative results about performance, bandwidth...
Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bern...
CMS
2006
158views Communications» more  CMS 2006»
13 years 9 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
14 years 1 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
CSFW
2010
IEEE
13 years 12 months ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...