Sciweavers

1351 search results - page 44 / 271
» Trust in Anonymity Networks
Sort
View
FC
1999
Springer
160views Cryptology» more  FC 1999»
14 years 1 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
24
Voted
INFOCOM
2003
IEEE
14 years 2 months ago
Topology Inference in the Presence of Anonymous Routers
— Many topology discovery systems rely on traceroute to discover path information in public networks. However, for some routers, traceroute detects their existence but not their ...
Bin Yao, Ramesh Viswanathan, Fangzhe Chang, Dan G....
SAC
2009
ACM
14 years 3 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
MOBISYS
2003
ACM
14 years 8 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
DISCEX
2003
IEEE
14 years 2 months ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...