A survey on routing in anonymous communication protocols
F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …
communication platform that billions of users rely on for their daily activities. While this …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
Safebook: A privacy-preserving online social network leveraging on real-life trust
Online social network applications severely suffer from various security and privacy
exposures. This article suggests a new approach to tackle these security and privacy …
exposures. This article suggests a new approach to tackle these security and privacy …
Addressing privacy requirements in system design: the PriS method
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …
they use in their every day activities for professional or recreational reasons. Trusting …
Practical traffic analysis: Extending and resisting statistical disclosure
N Mathewson, R Dingledine - International Workshop on Privacy …, 2004 - Springer
We extend earlier research on mounting and resisting passive long-term end-to-end traffic
analysis attacks against anonymous message systems, by describing how an eavesdropper …
analysis attacks against anonymous message systems, by describing how an eavesdropper …
Privacy preserving social networking through decentralization
The recent surge in popularity of on-line social network applications raises serious concerns
about the security and privacy of their users. Beyond usual vulnerabilities that threaten any …
about the security and privacy of their users. Beyond usual vulnerabilities that threaten any …
Location diversity in anonymity networks
N Feamster, R Dingledine - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
Anonymity networks have long relied on diversity of node location for protection against
attacks---typically an adversary who can observe a larger fraction of the network can launch …
attacks---typically an adversary who can observe a larger fraction of the network can launch …
Enhancing web privacy and anonymity in the digital era
S Gritzalis - Information Management & Computer Security, 2004 - emerald.com
This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing
security mechanisms, tools, applications and services, with respect to their architecture …
security mechanisms, tools, applications and services, with respect to their architecture …
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
M Bauer - Proceedings of the 2003 ACM Workshop on Privacy in …, 2003 - dl.acm.org
This paper presents new methods enabling anonymous communication on the Internet. We
describe a new protocol that allows us to create an anonymous overlay network by …
describe a new protocol that allows us to create an anonymous overlay network by …