Sciweavers

764 search results - page 87 / 153
» Reputable Mix Networks
Sort
View
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 2 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
NSDI
2010
13 years 9 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
ICICS
2005
Springer
14 years 1 months ago
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers ...
Wei Wei, Xuhua Ding, Kefei Chen
ICA
2004
Springer
14 years 1 months ago
Post-nonlinear Independent Component Analysis by Variational Bayesian Learning
Post-nonlinear (PNL) independent component analysis (ICA) is a generalisation of ICA where the observations are assumed to have been generated from independent sources by linear mi...
Alexander Ilin, Antti Honkela