Sciweavers

1128 search results - page 4 / 226
» Structuring anonymity metrics
Sort
View
CCS
2008
ACM
13 years 9 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
IH
2005
Springer
14 years 1 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
CCS
2009
ACM
14 years 2 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
INTR
2006
87views more  INTR 2006»
13 years 7 months ago
Agyaat: mutual anonymity over structured P2P networks
Purpose
Aameek Singh, Bugra Gedik, Ling Liu
WCRE
2008
IEEE
14 years 1 months ago
The Metric Lens: Visualizing Metrics and Structure on Software Diagrams
We present the metric lens, a new visualization of methodlevel code metrics atop UML class diagrams, which allows performing metric-metric and metric-structure correlations on lar...
Heorhiy Byelas, Alexandru Telea