Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Does additional information always reduce anonymity?
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Revisiting a combinatorial approach toward measuring anonymity
Proceedings of the 7th ACM workshop on Privacy in the electronic society
A Framework for the Analysis of Mix-Based Steganographic File Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
The bayesian traffic analysis of mix networks
Proceedings of the 16th ACM conference on Computer and communications security
Attacking unlinkability: the importance of context
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Pool-based anonymous communication framework for high-performance computing
The Journal of Supercomputing
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On blending attacks for mixes with memory
IH'05 Proceedings of the 7th international conference on Information Hiding
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Hi-index | 0.00 |
In this paper we study the anonymity provided by generalized mixes that insert dummy traffic. Mixes are an essential component to offer anonymous email services. We indicate how to compute the recipient and sender anonymity and we point out some problems that may arise from the intuitive extension of the metric to take into account dummies. Two possible ways of inserting dummy traffic are discussed and compared. An active attack scenario is considered, and the anonymity provided by mixes under the attack is analyzed.