Sciweavers

76 search results - page 4 / 16
» Tokens for Anonymous Communications in the Internet
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
IPPS
2008
IEEE
14 years 1 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
GLOBECOM
2008
IEEE
14 years 1 months ago
Queuing Performance of Long-Range Dependent Traffic Regulated by Token-Bucket Policers
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely affects network performance yielding longer queuing delays. Token-bucket policers ...
Stefano Bregni, Roberto Cioffi, Paolo Giacomazzi
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 1 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 8 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente