Networks without user observability—design options
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Unconditional sender and recipient untraceability in spite of active attacks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to break the direct RSA-implementation of mixes
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Cryptographic defense against traffic analysis
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Journal of the ACM (JACM)
Anonymous Web transactions with Crowds
Communications of the ACM
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Anonymous Multicast and Reception (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Mix-Networks on Permutation Networks
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Fault tolerant anonymous channel
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Restrictive blinding of secret-key certificates
Restrictive blinding of secret-key certificates
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Hiding Data Accesses in Steganographic File System
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Anonymous communications in the Internet
Cluster Computing
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Low-latency Mix Using Split and Merge Operations
Journal of Network and Systems Management
Slotted packet counting attacks on anonymity protocols
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Proceedings of the 17th ACM conference on Computer and communications security
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
PIR-Tor: scalable anonymous communication using private information retrieval
SEC'11 Proceedings of the 20th USENIX conference on Security
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Proceedings of the 18th ACM conference on Computer and communications security
Low latency anonymity with mix rings
ISC'06 Proceedings of the 9th international conference on Information Security
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
Probability principle of a reliable approach to detect signs of DDOS flood attacks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Non-expanding transaction specific pseudonymization for IP traffic monitoring
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Model and simulation on enhanced grid security and privacy system
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Limits to anonymity when using credentials
SP'04 Proceedings of the 12th international conference on Security Protocols
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
SAS: a scalar anonymous communication system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Valet services: improving hidden servers with a personal touch
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Tor HTTP usage and information leakage
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Privacy vulnerabilities in encrypted HTTP streams
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Private communication detection: a stochastic approach
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Malice versus AN.ON: possible risks of missing replay and integrity protection
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
A ring based onion circuit for hidden services
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Understanding statistical disclosure: a least squares approach
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Throttling Tor bandwidth parasites
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Comparison of low-latency anonymous communication systems: practical usage and performance
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Review: An overview of anonymity technology usage
Computer Communications
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.01 |
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostly interested in efficient and practical Internet based protocols, most of the emphasis is placed on mix based constructions. The presentation is informal in that no complex definitions and proofs are presented, the aim being more to give a thorough introduction than to present deep new insights.