Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Probabilistic Analysis of Anonymity
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
P5: A Protocol for Scalable Anonymous Communication
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
A Distributed Approach to Solving Overlay Mismatching Problem
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
ANSS '04 Proceedings of the 37th annual symposium on Simulation
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Location Awareness in Unstructured Peer-to-Peer Systems
IEEE Transactions on Parallel and Distributed Systems
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
On Flow Marking Attacks in Wireless Anonymous Communication Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Anonymity vs. Information Leakage in Anonymity Systems
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment
IEEE Transactions on Computers
Dynamic Layer Management in Superpeer Architectures
IEEE Transactions on Parallel and Distributed Systems
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Dubious feedback: fair or not?
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems
IEEE Transactions on Parallel and Distributed Systems
Improving Query Response Delivery Quality in Peer-to-Peer Systems
IEEE Transactions on Parallel and Distributed Systems
Salsa: a structured approach to large-scale anonymity
Proceedings of the 13th ACM conference on Computer and communications security
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Building a Scalable Bipartite P2P Overlay Network
IEEE Transactions on Parallel and Distributed Systems
Scalable Live Streaming Service Based on Interoverlay Optimization
IEEE Transactions on Parallel and Distributed Systems
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
A Payment-Based Incentive and Service Differentiation Scheme for Peer-to-Peer Streaming Broadcast
IEEE Transactions on Parallel and Distributed Systems
Incentive-Based Scheduling for Market-Like Computational Grids
IEEE Transactions on Parallel and Distributed Systems
Mutual Anonymity for Mobile P2P Systems
IEEE Transactions on Parallel and Distributed Systems
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
IEEE Transactions on Parallel and Distributed Systems
Dummy traffic against long term intersection attacks
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
IEEE Transactions on Parallel and Distributed Systems
Efficient range queries in spatial databases over Peer-to-Peer Networks
International Journal of Internet Protocol Technology
Anonymity analysis of P2P anonymous communication systems
Computer Communications
Introducing mobile devices into Grid systems: a survey
International Journal of Web and Grid Services
Hi-index | 0.00 |
Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches, we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor reliability. We also discuss the open problems in this field and propose several future research directions.