The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Privacy protection and anonymity services for the World Wide Web
Future Generation Computer Systems - Special issue on security on the Web
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung
Proceedings of the First International Workshop on Information Hiding
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
An Optimal Strategy for Anonymous Communication Protocols
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.01 |
Anonymising services have evolved from simple proxies to complex systems. Numerous techniques have been developed to thwart and confuse attackers, thereby improving the degree of anonymity. These techniques are often presented as additional advantages of specific anonymising services. Comparisons of anonymity services exist, however, there is a need for a more structured approach towards the understanding of the various techniques employed by these services.This paper takes a meta-level look at connection anonymity, how it has evolved and how and why certain design choices are made. A conceptual framework describing what we consider to be important connection anonymity factors will be proposed. We consider design factors, fundamental connection anonymity functions and objectives. The framework aims to provide for a more structured and formal view of current anonymising strategies and techniques. It should thereby set the stage for further advances in connection anonymity.