Sciweavers

85 search results - page 8 / 17
» The role of network trace anonymization under attack
Sort
View
IWSEC
2007
Springer
14 years 1 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
TISSEC
2010
72views more  TISSEC 2010»
13 years 6 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
PET
2007
Springer
14 years 1 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 9 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
CMG
2004
13 years 9 months ago
Generating Realistic TCP Workloads
The workload of a network is usually a heterogeneous aggregate of services and applications, driven by a large number of users. This complexity makes it challenging to evaluate th...
Félix Hernández-Campos, F. Donelson ...