Sciweavers

85 search results - page 10 / 17
» Network Cost-Sharing without Anonymity
Sort
View
STACS
2005
Springer
14 years 3 months ago
Exact Quantum Algorithms for the Leader Election Problem
Abstract. It is well-known that no classical algorithm can solve exactly (i.e., in bounded time without error) the leader election problem in anonymous networks. This paper propose...
Seiichiro Tani, Hirotada Kobayashi, Keiji Matsumot...
CCS
2006
ACM
14 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
SIGCOMM
2000
ACM
14 years 2 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...