A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

Safebook: A privacy-preserving online social network leveraging on real-life trust

LA Cutillo, R Molva, T Strufe - IEEE Communications Magazine, 2009 - ieeexplore.ieee.org
Online social network applications severely suffer from various security and privacy
exposures. This article suggests a new approach to tackle these security and privacy …

Addressing privacy requirements in system design: the PriS method

C Kalloniatis, E Kavakli, S Gritzalis - Requirements Engineering, 2008 - Springer
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …

Practical traffic analysis: Extending and resisting statistical disclosure

N Mathewson, R Dingledine - International Workshop on Privacy …, 2004 - Springer
We extend earlier research on mounting and resisting passive long-term end-to-end traffic
analysis attacks against anonymous message systems, by describing how an eavesdropper …

[PDF][PDF] A survey of anonymous communication channels

G Danezis, C Diaz - 2008 - Citeseer
We present an overview of the field of anonymous communications, from its establishment in
1981 from David Chaum to today. Key systems are presented categorized according to their …

Privacy preserving social networking through decentralization

LA Cutillo, R Molva, T Strufe - 2009 Sixth International …, 2009 - ieeexplore.ieee.org
The recent surge in popularity of on-line social network applications raises serious concerns
about the security and privacy of their users. Beyond usual vulnerabilities that threaten any …

Location diversity in anonymity networks

N Feamster, R Dingledine - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
Anonymity networks have long relied on diversity of node location for protection against
attacks---typically an adversary who can observe a larger fraction of the network can launch …

Enhancing web privacy and anonymity in the digital era

S Gritzalis - Information Management & Computer Security, 2004 - emerald.com
This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing
security mechanisms, tools, applications and services, with respect to their architecture …

New covert channels in HTTP: adding unwitting Web browsers to anonymity sets

M Bauer - Proceedings of the 2003 ACM Workshop on Privacy in …, 2003 - dl.acm.org
This paper presents new methods enabling anonymous communication on the Internet. We
describe a new protocol that allows us to create an anonymous overlay network by …