Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Using caching for browsing anonymity
ACM SIGecom Exchanges
Protecting Agent from Attack in Grid ComputingIII
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
Technical challenges of network anonymity
Computer Communications
Survey on anonymous communications in computer networks
Computer Communications
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Slotted packet counting attacks on anonymity protocols
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Empirical tests of anonymous voice over IP
Journal of Network and Computer Applications
Privacy and liveliness for reputation systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Hidden VoIP calling records from networking intermediaries
Principles, Systems and Applications of IP Telecommunications
Traffic analysis attacks on Skype VoIP calls
Computer Communications
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
RAD: Recipient-anonymous data delivery based on public routing proxies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-preserving DNS: analysis of broadcast, range queries and mix-based protection methods
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Anonymity attacks on mix systems: a formal analysis
IH'11 Proceedings of the 13th international conference on Information hiding
Website fingerprinting in onion routing based anonymization networks
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Proceedings of the 18th ACM conference on Computer and communications security
Rendezvous tunnel for anonymous publishing: clean slate and tor based designs
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the 27th Annual Computer Security Applications Conference
"Super nodes" in Tor: existence and security implication
Proceedings of the 27th Annual Computer Security Applications Conference
Low latency anonymity with mix rings
ISC'06 Proceedings of the 9th international conference on Information Security
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Low latency anonymous communication: how long are users willing to wait?
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Quantum anonymous transmissions
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
The hitting set attack on anonymity protocols
IH'04 Proceedings of the 6th international conference on Information Hiding
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
FLASCHE – a mechanism providing anonymity for mobile users
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Cryptographically protected prefixes for location privacy in IPv6
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Synchronous batching: from cascades to free routes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Cryptographic protocol analysis of AN.ON
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Valet services: improving hidden servers with a personal touch
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Blending different latency traffic with alpha-mixing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Protecting agent from attack in grid computingII
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Peer-to-Peer VoIP communications using anonymisation overlay networks
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Malice versus AN.ON: possible risks of missing replay and integrity protection
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
Understanding new anonymity networks from a user's perspective
Proceedings of the 2012 ACM conference on Computer and communications security
Performance modelling of anonymity protocols
Performance Evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving content availability in the i2p anonymous file-sharing environment
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
How (not) to build a transport layer for anonymity overlays
ACM SIGMETRICS Performance Evaluation Review
Towards efficient traffic-analysis resistant anonymity networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Review: An overview of anonymity technology usage
Computer Communications
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as well as flooding attacks. The core technologies include an adaptive, anonymous, time/volume-sliced channel mechanism and a ticket-based authentication mechanism. The system also provides an interface to inform anonymous users about their level of anonymity and unobservability.