Sciweavers

1599 search results - page 7 / 320
» Probabilistic Analysis of Anonymity
Sort
View
CCS
2010
ACM
13 years 9 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CONCUR
2005
Springer
14 years 2 months ago
Probabilistic Anonymity
Mohit Bhargava, Catuscia Palamidessi
PET
2009
Springer
14 years 3 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
CCS
2010
ACM
13 years 9 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 8 months ago
Accountable Anonymous Group Messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford