The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 7th ACM conference on Computer and communications security
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Computer
Group Principals and the Formalization of Anonymity
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Limits of Anonymity in Open Environments
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A secure and private system for subscription-based remote services
ACM Transactions on Information and System Security (TISSEC)
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Reusable anonymous return channels
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Minx: a simple and efficient anonymous packet format
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Proceedings of the 11th ACM conference on Computer and communications security
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Untraceability of mobile agents
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Anonymous communications in the Internet
Cluster Computing
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Denial of service or denial of security?
Proceedings of the 14th ACM conference on Computer and communications security
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Anonymity Architecture for Mobile Agent Systems
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
An Indistinguishability-Based Characterization of Anonymous Channels
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Anonymous return route information for onion based mix-nets
Proceedings of the workshop on Applications of private and anonymous communications
C-Mix: A Lightweight Anonymous Routing Approach
Information Hiding
Hiding Data Sources in P2P Networks
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
Technical challenges of network anonymity
Computer Communications
A new cell counter based attack against tor
Proceedings of the 16th ACM conference on Computer and communications security
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A Parallelism-Based Approach to Network Anonymization
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Survey on anonymous communications in computer networks
Computer Communications
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Private location-based information retrieval through user collaboration
Computer Communications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Towards a theory of anonymous networking
INFOCOM'10 Proceedings of the 29th conference on Information communications
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Anonymous networking amidst active adversaries
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Networking with secrecy constraints
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Pool-based anonymous communication framework for high-performance computing
The Journal of Supercomputing
Trust-based anonymous communication: adversary models and routing algorithms
Proceedings of the 18th ACM conference on Computer and communications security
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Proceedings of the 18th ACM conference on Computer and communications security
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the 27th Annual Computer Security Applications Conference
Breaking four mix-related schemes based on universal re-encryption
ISC'06 Proceedings of the 9th international conference on Information Security
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
The hitting set attack on anonymity protocols
IH'04 Proceedings of the 6th international conference on Information Hiding
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Anonymous communication with on-line and off-line onion encoding
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Cryptographically protected prefixes for location privacy in IPv6
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Synchronous batching: from cascades to free routes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
SAS: a scalar anonymous communication system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Onions based on universal re-encryption – anonymous communication immune against repetitive attack
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Provable anonymity for networks of mixes
IH'05 Proceedings of the 7th international conference on Information Hiding
Local view attack on anonymous communication
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Work-focused analysis and design
Cognition, Technology and Work - Special Issue on Human-automation Coagency
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Fingerprinting attack on the tor anonymity system
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
MNPA: a mobile network privacy architecture
Computer Communications
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Performance modelling of anonymity protocols
Performance Evaluation
Protocol-level attacks against Tor
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards efficient traffic-analysis resistant anonymity networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |
An increasing number of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identification of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved.This paper discusses the goals and desired properties of anonymous email in general and introduces the design and salient features of Babel anonymous remailer. Babel allows email users to converse electronically while remaining anonymous with respect to each other and to other -- even hostile -- parties. A range of attacks and corresponding countermeasures is considered. An attempt is made to formalize and quantify certain dimensions of anonymity and untraceable communication.