Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
An Efficient Anonymity Protocol for Grid Computing
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
IEEE Transactions on Mobile Computing
Eluding carnivores: file sharing with strong anonymity
Proceedings of the 11th workshop on ACM SIGOPS European workshop
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
Multiagent and Grid Systems
On the effectiveness of k;-anonymity against traffic analysis and surveillance
Proceedings of the 5th ACM workshop on Privacy in electronic society
Achieving privacy in mesh networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
Journal of Network and Computer Applications
Mutual anonymous overlay multicast
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Compromising Anonymity Using Packet Spinning
ISC '08 Proceedings of the 11th international conference on Information Security
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
A conceptual framework for specification, analysis, and design of anonymity services
Proceedings of the 2009 EDBT/ICDT Workshops
Survey on anonymous communications in computer networks
Computer Communications
Trustable Relays for Anonymous Communication
Transactions on Data Privacy
EC transactions use different web-based platforms
ICCS'03 Proceedings of the 2003 international conference on Computational science: PartII
GAS: overloading a file sharing network as an anonymizing system
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An anonymous communication mechanism without key infrastructure based on multi-paths network coding
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A design of overlay anonymous multicast protocol
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Resilient P2P anonymous routing by using redundancy
International Journal of High Performance Computing and Networking
Anonymity analysis of P2P anonymous communication systems
Computer Communications
Information slicing: anonymity using unreliable overlays
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
SAS: a scalar anonymous communication system
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
An efficient anonymous scheme for mutual anonymous communications
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Performance modelling of anonymity protocols
Performance Evaluation
Countering statistical disclosure with receiver-bound cover traffic
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Towards efficient traffic-analysis resistant anonymity networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Hi-index | 0.01 |
We present a protocol for anonymous communication over the Internet.Our protocol, called P 5 (Peer-to-Peer Personal Privacy Protocol)provides sender-, receiver-, and sender-receiver anonymity.P5 isdesigned to be implemented over the current Internet protocols, anddoes not require any special infrastructure support.A novel featureof P5 is that it allows individual participants to trade-off degree ofanonymity for communication efficiency, and hence can be used toscalably implement large anonymous groups.We present a descriptionof P5, an analysis of its anonymity and communication efficiency, andevaluate its performance using detailed packet-level simulations.