The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Strong Entropy Concentration, Game Theory, and Algorithmic Randomness
COLT '01/EuroCOLT '01 Proceedings of the 14th Annual Conference on Computational Learning Theory and and 5th European Conference on Computational Learning Theory
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Behavior detection using confidence intervals of hidden Markov models
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Pattern recognition for command and control data systems
Pattern recognition for command and control data systems
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hi-index | 0.00 |
George Orwell's book 1984 foresaw a future where television continuously surveilled the inhabitants of Oceania. It was a terrifying world where everyone knew they were constantly watched. This paper discusses our current situation where cell phones, automobiles, and computers provide easily accessible information to interested parties. Anonymity is increasingly difficult to maintain, especially on-line. We provide a brief introduction to currently available anonymity tools, followed with a discussion of their vulnerability to traffic analysis attacks. We state known attacks in the current literature and mention the preferred anonymity metric. Our current research uses an extension of hidden Markov models to exploit these vulnerabilities.