Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
An Architecture for an Anonymity Network
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Analysis of an Anonymity Network for Web Browsing
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Practical Anonymity for the Masses with Mix-Networks
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Proceedings of the 11th ACM conference on Computer and communications security
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Design principles for low latency anonymous network systems secure against timing attacks
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
How much anonymity does network latency leak?
Proceedings of the 14th ACM conference on Computer and communications security
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive trust-based anonymous network
International Journal of Security and Networks
Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines
The Information Society
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
Financial Cryptography and Data Security
On the Design Dilemma in Dining Cryptographer Networks
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Compromising Anonymity Using Packet Spinning
ISC '08 Proceedings of the 11th international conference on Information Security
Low-Latency Parallel Transport in Anonymous Peer-to-Peer Overlays
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
A Kademlia-Based Node Lookup System for Anonymization Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
NISAN: network information service for anonymization networks
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the 16th ACM conference on Computer and communications security
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Scalable onion routing with torsk
Proceedings of the 16th ACM conference on Computer and communications security
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
How much anonymity does network latency leak?
ACM Transactions on Information and System Security (TISSEC)
GAS: overloading a file sharing network as an anonymizing system
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Attacking unlinkability: the importance of context
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Towards a theory of anonymous networking
INFOCOM'10 Proceedings of the 29th conference on Information communications
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Providing mobile users' anonymity in hybrid networks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Resilient P2P anonymous routing by using redundancy
International Journal of High Performance Computing and Networking
Scalable anonymous communication with provable security
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Anonymity analysis of P2P anonymous communication systems
Computer Communications
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Information slicing: anonymity using unreliable overlays
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Traffic analysis attacks on Skype VoIP calls
Computer Communications
Covert communications despite traffic data retention
Security'08 Proceedings of the 16th International conference on Security protocols
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
PIR-Tor: scalable anonymous communication using private information retrieval
SEC'11 Proceedings of the 20th USENIX conference on Security
Proceedings of the 27th Annual Computer Security Applications Conference
A privacy-aware service protocol for ubiquitous computing environments
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A random walk based anonymous peer-to-peer protocol design
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Some remarks on universal re-encryption and a novel practical anonymous tunnel
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Compulsion resistant anonymous communications
IH'05 Proceedings of the 7th international conference on Information Hiding
Cryptographic protocol analysis of AN.ON
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
Fingerprinting attack on the tor anonymity system
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A ring based onion circuit for hidden services
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Website detection using remote traffic analysis
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Effectiveness and detection of denial-of-service attacks in tor
ACM Transactions on Information and System Security (TISSEC)
Performance modelling of anonymity protocols
Performance Evaluation
Comparison of low-latency anonymous communication systems: practical usage and performance
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Providing Users’ Anonymity in Mobile Hybrid Networks
ACM Transactions on Internet Technology (TOIT)
Towards efficient traffic-analysis resistant anonymity networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
The design and implementation of the A3 application-aware anonymity platform
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Traditional mix-based systems are composed of a small set of static, well known, and highly reliable mixes. To resist traffic analysis attacks at a mix, cover traffic must be used, which results in significant bandwidth overhead. End-to-end traffic analysis attacks are even more difficult to counter because there are only a few entry-and exit-points in the system. Static mix networks also suffer from scalability problems and in several countries, institutions operating a mix could be targeted by legal attacks. In this paper, we introduce MorphMix, a system for peer-to-peer based anonymous Internet usage. Each MorphMix node is a mix and anyone can easily join the system. We believe that MorphMix overcomes or reduces several drawbacks of static mix networks. In particular, we argue that our approach offers good protection from traffic analysis attacks without employing cover traffic. But MorphMix also introduces new challenges. One is that an adversary can easily operate several malicious nodes in the system and try to break the anonymity of legitimate users by getting full control over their anonymous paths. To counter this attack, we have developed a collusion detection mechanism, which allows to identify compromised paths with high probability before they are being used.