The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Resource discovery in distributed networks
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Observed structure of addresses in IP traffic
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Practical Anonymity for the Masses with Mix-Networks
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Security model for a multi-agent marketplace
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
Dependability in Peer-to-Peer Systems
IEEE Internet Computing
Information Leak in the Chord Lookup Protocol
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Strong pseudonymous communication for peer-to-peer reputation systems
Proceedings of the 2005 ACM symposium on Applied computing
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
Using caching for browsing anonymity
ACM SIGecom Exchanges
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Eluding carnivores: file sharing with strong anonymity
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Achieving privacy in mesh networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Salsa: a structured approach to large-scale anonymity
Proceedings of the 13th ACM conference on Computer and communications security
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Mutual anonymous overlay multicast
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mayday: distributed filtering for internet services
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Design principles for low latency anonymous network systems secure against timing attacks
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Deploying Low-Latency Anonymity: Design Challenges and Social Factors
IEEE Security and Privacy
Probabilistic analysis of onion routing in a black-box model
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
Privacy-preserving indexing of documents on the network
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Passive-Logging Attacks Against Anonymous Communications Systems
ACM Transactions on Information and System Security (TISSEC)
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Attribute-based access to distributed data over P2P networks
International Journal of Computational Science and Engineering
Adaptive trust-based anonymous network
International Journal of Security and Networks
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Towards application-aware anonymous routing
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
ACM Transactions on Computer Systems (TOCS)
Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines
The Information Society
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Studying Timing Analysis on the Internet with SubRosa
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Bridging and Fingerprinting: Epistemic Attacks on Route Selection
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
Financial Cryptography and Data Security
Compromising Anonymity Using Packet Spinning
ISC '08 Proceedings of the 11th international conference on Information Security
Low-Latency Parallel Transport in Anonymous Peer-to-Peer Overlays
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Proceedings of the 1st Workshop on Social Network Systems
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Dependent link padding algorithms for low latency anonymity systems
Proceedings of the 15th ACM conference on Computer and communications security
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
P2P Networking and Applications
P2P Networking and Applications
Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols
Trustworthy Global Computing
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
Hiding Data Sources in P2P Networks
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
A Kademlia-Based Node Lookup System for Anonymization Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Anonymous opinion exchange over untrusted social networks
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Privacy-preserving indexing of documents on the network
The VLDB Journal — The International Journal on Very Large Data Bases
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
NISAN: network information service for anonymization networks
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the 16th ACM conference on Computer and communications security
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Scalable onion routing with torsk
Proceedings of the 16th ACM conference on Computer and communications security
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Survey on anonymous communications in computer networks
Computer Communications
Optimal configurations for peer-to-peer user-private information retrieval
Computers & Mathematics with Applications
Private location-based information retrieval through user collaboration
Computer Communications
Trustable Relays for Anonymous Communication
Transactions on Data Privacy
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Achieving mobility and anonymity in IP-based networks
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
GAS: overloading a file sharing network as an anonymizing system
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
An anonymous communication mechanism without key infrastructure based on multi-paths network coding
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IPsec-based anonymous networking: a working implementation
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
Evading stepping-stone detection under the cloak of streaming media with SNEAK
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
A potential HTTP-based application-level attack against Tor
Future Generation Computer Systems
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A design of overlay anonymous multicast protocol
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Resilient P2P anonymous routing by using redundancy
International Journal of High Performance Computing and Networking
Chipping away at censorship firewalls with user-generated content
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Anonymity analysis of P2P anonymous communication systems
Computer Communications
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Information slicing: anonymity using unreliable overlays
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Nested encryption library for automated IPSec-based anonymous circuits establishment
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Traffic analysis attacks on Skype VoIP calls
Computer Communications
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
On preserving privacy in content-oriented networks
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
Covert communications despite traffic data retention
Security'08 Proceedings of the 16th International conference on Security protocols
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Economic incentives for protecting digital rights online
Electronic Commerce Research and Applications
Multiagent Communication Security in Adversarial Settings
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
Minimising anonymity loss in anonymity networks under DoS attacks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the 27th Annual Computer Security Applications Conference
Low latency anonymity with mix rings
ISC'06 Proceedings of the 9th international conference on Information Security
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
Towards an analysis of source-rewriting anonymous systems in a lossy environment
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Security in p2p networks: survey and research directions
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A peer-to-peer mechanism for resource location and allocation over the grid
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Cryptographically protected prefixes for location privacy in IPv6
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Attribute-Based access to distributed data over p2p networks
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
SAS: a scalar anonymous communication system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Is that you? Authentication in a network without identities
International Journal of Security and Networks
Compulsion resistant anonymous communications
IH'05 Proceedings of the 7th international conference on Information Hiding
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Cryptographic protocol analysis of AN.ON
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Using sphinx to improve onion routing circuit construction
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
Fingerprinting attack on the tor anonymity system
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
A game-theoretic analysis of cooperation in anonymity networks
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
A ring based onion circuit for hidden services
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Probabilistic analysis of onion routing in a black-box model
ACM Transactions on Information and System Security (TISSEC)
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Performance modelling of anonymity protocols
Performance Evaluation
Comparison of low-latency anonymous communication systems: practical usage and performance
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Maygh: building a CDN from client web browsers
Proceedings of the 8th ACM European Conference on Computer Systems
Towards efficient traffic-analysis resistant anonymity networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Review: An overview of anonymity technology usage
Computer Communications
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
The design and implementation of the A3 application-aware anonymity platform
Computer Networks: The International Journal of Computer and Telecommunications Networking
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service, Tarzan is general-purpose and transparent to applications. Organized as a decentralized peer-to-peer overlay, Tarzan is fault-tolerant, highly scalable, and easy to manage.Tarzan achieves its anonymity with layered encryption and multi-hop routing, much like a Chaumian mix. A message initiator chooses a path of peers pseudo-randomly through a restricted topology in a way that adversaries cannot easily influence. Cover traffic prevents a global observer from using traffic analysis to identify an initiator. Protocols toward unbiased peer-selection offer new directions for distributing trust among untrusted entities.Tarzan provides anonymity to either clients or servers, without requiring that both participate. In both cases, Tarzan uses a network address translator (NAT) to bridge between Tarzan hosts and oblivious Internet hosts.Measurements show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.