[PDF][PDF] Nymble: Blocking Misbehaving Client in Anonymizing Networks
M Marina, L Gnanaprasanambikai - scitepress.org
… accountability to any publicly known anonymizing network. Servers can block undesirable …
current customers. Internet websites can selectively block users of anonymizing networks with …
current customers. Internet websites can selectively block users of anonymizing networks with …
[PDF][PDF] Blacklist based Anonymus User Blocking in IP Networks
S Franco, CP Kumar - academia.edu
… misbehave they are blocked by the web server. Therefore to block the misbehaving user and
to give honest user anonymity… in blocking the misbehaving user preversing their anonymity. …
to give honest user anonymity… in blocking the misbehaving user preversing their anonymity. …
[PDF][PDF] Identity Based Secure Distributed Data Storage Scheme using Nymble Server
N Raj - academia.edu
… detects this misbehavior in … the nymble ticket of the misbehaving user and obtains the
corresponding seed tc, tc from the NM. The server is then able to link future connections by the user …
corresponding seed tc, tc from the NM. The server is then able to link future connections by the user …
Addressing anonymous abuses: Measuring the effects of technical mechanisms on reported user behaviors
W Ahmad, I Liccardi - Proceedings of the 2020 CHI Conference on …, 2020 - dl.acm.org
… users of anonymous networks. Specifically, we sought to understand whether users would
alter their usage of anonymous networks … scheme (eg revocable anonymity or access limiting …
alter their usage of anonymous networks … scheme (eg revocable anonymity or access limiting …
Blacklisting based anonymous authentication scheme for sharing economy
C Özbay, A Levi - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
… the user. In this paper, we improve user anonymity in conditionally anonymous schemes
using … First, we define whitelisting property for blacklistable anonymous credentials and give a …
using … First, we define whitelisting property for blacklistable anonymous credentials and give a …
On unlinkability and denial of service attacks resilience of whistleblower platforms
… inferred from the submitted documents, side channel information inferred from the network
(eg, IP addresses). The latter can be mitigated through anonymizing network services, eg, Tor. …
(eg, IP addresses). The latter can be mitigated through anonymizing network services, eg, Tor. …
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
… In particular, we make use of the fact that Wikipedia’s mechanism of blocking Tor users has
been imperfect to identify and extract 11,363 edits made by Tor users to English Wikipedia …
been imperfect to identify and extract 11,363 edits made by Tor users to English Wikipedia …
[PDF][PDF] A Survey On Blocking Hacking Users In Cloud Network Using Ticket Based Security Manager
MM Riyaj, MR Miri - academia.edu
… provision of backward linkability and subjective blacklisting are facilitated, because the user‘s
past connections remain unlinkable inspite of the future blocking of the misbehaving user. …
past connections remain unlinkable inspite of the future blocking of the misbehaving user. …
[PDF][PDF] Implementation of Content based Filtering of Undesirable Messages & Blocking Mechanism for OSN users
MKA Nazirkar, SA Nagtilak - academia.edu
… blocking of misbehaving user the count for total no. of friends of that misbehaving user are
… according to that it is checked, how many friends have temporary blocked the same user. …
… according to that it is checked, how many friends have temporary blocked the same user. …
Privacy-Preserving Accountability in Online Messaging
N Tyagi - 2023 - search.proquest.com
Technologies that enable confidential communication and anonymous authentication are
important for providing privacy for users of internet services. Unfortunately, encryption and …
important for providing privacy for users of internet services. Unfortunately, encryption and …