Networks without user observability—design options
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Unconditional sender and recipient untraceability in spite of active attacks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable mobility or how to travel incognito
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Towards a Framework for Collaborative Peer Groups
CCGRID '03 Proceedings of the 3st International Symposium on Cluster Computing and the Grid
P5: A Protocol for Scalable Anonymous Communication
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An Optimal Strategy for Anonymous Communication Protocols
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Anonymous Secure Routing in Mobile Ad-Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
IEEE Transactions on Mobile Computing
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks
SAINT '06 Proceedings of the International Symposium on Applications on Internet
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
M2: Multicasting Mixes for Efficient and Anonymous Communication
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A Survey of Location Privacy and an Approach for Solitary Users
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Bus-based Anonymous Multicast in Peer-to-Peer Overlay
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
A survey of state-of-the-art in anonymity metrics
Proceedings of the 1st ACM workshop on Network data anonymization
Uplink multiuser MIMO transceiver design with transmitting beamforming under power constraints
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Achieving K-anonymity in mobile ad hoc networks
NPSEC'05 Proceedings of the First international conference on Secure network protocols
A design of overlay anonymous multicast protocol
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Hi-index | 0.01 |
With the aim to preserve privacy over a communications network, a plethora of anonymous protocols have been proposed along with many empirical investigations into specific adversary attacks over those networks. However, no known taxonomies exist that address anonymity in the diverse set of both wired and wireless anonymous communications networks. This paper proposes such a novel cubic taxonomy which explores the three key components of anonymity property, adversary capability, and network type. This taxonomy expands the definition of anonymity and aids in the advancement of state-of-the-art technological privacy-preserving mechanisms in anonymous networks against any adversary.