STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Unconditional sender and recipient untraceability in spite of active attacks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Detection of disrupters in the DC protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Cryptographic defense against traffic analysis
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Millimix: Mixing in Small Batches
Millimix: Mixing in Small Batches
Efficient multiparty computations secure against an adaptive adversary
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Using Replication and Partitioning to Build Secure Distributed Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Anonymous communications in the Internet
Cluster Computing
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Deploying Low-Latency Anonymity: Design Challenges and Social Factors
IEEE Security and Privacy
How much anonymity does network latency leak?
Proceedings of the 14th ACM conference on Computer and communications security
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
Financial Cryptography and Data Security
Compromising Anonymity Using Packet Spinning
ISC '08 Proceedings of the 11th international conference on Information Security
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
C-Mix: A Lightweight Anonymous Routing Approach
Information Hiding
Multi-flow attacks against network flow watermarking schemes
SS'08 Proceedings of the 17th conference on Security symposium
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Improving stream correlation attacks on anonymous networks
Proceedings of the 2009 ACM symposium on Applied Computing
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Simulating low-latency anonymous networks
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
How much anonymity does network latency leak?
ACM Transactions on Information and System Security (TISSEC)
Survey on anonymous communications in computer networks
Computer Communications
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Dummy traffic against long term intersection attacks
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Large scale simulation of Tor: modelling a global passive adversary
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Low-latency Mix Using Split and Merge Operations
Journal of Network and Systems Management
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Slotted packet counting attacks on anonymity protocols
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Proceedings of the 17th ACM conference on Computer and communications security
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Preventing active timing attacks in low-latency anonymous communication
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Traffic analysis against low-latency anonymity networks using available bandwidth estimation
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Chipping away at censorship firewalls with user-generated content
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Proceedings of the 18th ACM conference on Computer and communications security
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Proceedings of the 27th Annual Computer Security Applications Conference
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
SAS: a scalar anonymous communication system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Fingerprinting attack on the tor anonymity system
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Malice versus AN.ON: possible risks of missing replay and integrity protection
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Beyond TOR: the truenyms protocol
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
A ring based onion circuit for hidden services
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Throttling Tor bandwidth parasites
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Instant degradation of anonymity in low-latency anonymisation systems
AIMS'12 Proceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services
Proceedings of the 2012 ACM conference on Computer and communications security
Understanding new anonymity networks from a user's perspective
Proceedings of the 2012 ACM conference on Computer and communications security
Towards statistically strong source anonymity for sensor networks
ACM Transactions on Sensor Networks (TOSN)
A novel sequential watermark detection model for efficient traceback of secret network attack flows
Journal of Network and Computer Applications
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |
We discuss problems and trade-offs with systems providing anonymity for web browsing (or more generally any communication system that requires low latency interaction). We focus on two main systems: the Freedom network [12] and PipeNet [8]. Although Freedom is efficient and reasonably secure against denial of service attacks, it is vulnerable to some generic traffic analysis attacks, which we describe. On the other hand, we look at PipeNet, a simple theoretical model which protects against the traffic analysis attacks we point out, but is vulnerable to denial of services attacks and has efficiency problems. In light of these observations, we discuss the trade-offs that one faces when trying to construct an efficient low latency communication system that protects users anonymity.