The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Practical loss-resilient codes
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
The effects of asymmetry on TCP performance
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
A quantitative comparison of graph-based models for Internet topology
IEEE/ACM Transactions on Networking (TON)
The MASC/BGMP architecture for inter-domain multicast routing
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Organizing multicast receivers deterministically by packet-loss correlation
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Multicasting on the Internet and Its Applications
Multicasting on the Internet and Its Applications
Computer Networks
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
IEEE Transactions on Multimedia
The evolution of multicast: from the MBone to interdomain multicast to Internet2 deployment
IEEE Network: The Magazine of Global Internetworking
Deployment issues for the IP multicast service and architecture
IEEE Network: The Magazine of Global Internetworking
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
The cost of becoming anonymous: on the participant payload in crowds
Information Processing Letters
Analysis of an incentives-based secrets protection system
Proceedings of the 4th ACM workshop on Digital rights management
Providing process origin information to aid in computer forensic investigations
Journal of Computer Security
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Passive-Logging Attacks Against Anonymous Communications Systems
ACM Transactions on Information and System Security (TISSEC)
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Towards application-aware anonymous routing
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Efficient and Anonymous Online Data Collection
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
Collusion-resistant anonymous data collection method
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Information Sciences: an International Journal
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Survey on anonymous communications in computer networks
Computer Communications
Anonymous secure communication in wireless mobile ad-hoc networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Measurable security through isotropic channels
Proceedings of the 15th international conference on Security protocols
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Security in p2p networks: survey and research directions
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
ANOSIP: anonymizing the SIP protocol
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Onion Routing: Fun with onion routing
Network Security
Security and privacy issues for the network of the future
Security and Communication Networks
Hi-index | 0.00 |
With widespread acceptance of the Internet as a public medium for communication and information retrieval, there has been rising concern that the personal privacy of users can be eroded by cooperating network entities. A technical solution to maintaining privacy is to provide anonymity. We present a protocol for initiator anonymity called Hordes, which uses forwarding mechanisms similar to those used in previous protocols for sending data, but is the first protocol to make use of multicast routing to anonymously receive data. We show this results in shorter transmission latencies and requires less work of the protocol participants, in terms of the messages processed. We also present a comparison of the security and anonymity of Hordes with previous protocols, using the first quantitative definition of anonymity and unlinkability. Our analysis shows that Hordes provides anonymity in a degree similar to that of Crowds and Onion Routing, but also that Hordes has numerous performance advantages.