Sciweavers

76 search results - page 8 / 16
» Tokens for Anonymous Communications in the Internet
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
HICSS
2002
IEEE
114views Biometrics» more  HICSS 2002»
14 years 12 days ago
The Effects of Culture in Anonymous Negotiations: Experiment in Four Countries
Internet technologies are increasingly used in various forms of communication, including negotiations. This paper explores the cultural implications in anonymous inter- and intra-...
Gregory E. Kersten, Sabine T. Köszegi, Rudolf...
IMC
2006
ACM
14 years 1 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 8 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz