Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arXiv preprint arXiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

The anonymity of the dark web: A survey

J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …

[图书][B] Weaving the dark web: Legitimacy on Freenet, Tor, and I2P

RW Gehl - 2018 - books.google.com
An exploration of the Dark Web—websites accessible only with special routing software—
that examines the history of three anonymizing networks, Freenet, Tor, and I2P. The term …

An empirical study of the i2p anonymity network and its censorship resistance

NP Hoang, P Kintis, M Antonakakis… - Proceedings of the …, 2018 - dl.acm.org
Tor and I2P are well-known anonymity networks used by many individuals to protect their
online privacy and anonymity. Tor's centralized directory services facilitate the …

On the design of communication and transaction anonymity in blockchain-based transactive microgrids

J Bergquist, A Laszka, M Sturm, A Dubey - Proceedings of the 1st …, 2017 - dl.acm.org
Transactive microgrids are emerging as a transformative solution for the problems faced by
distribution system operators due to an increase in the use of distributed energy resources …

[PDF][PDF] The nym network

C Diaz, H Halpin, A Kiayias - The Next Generation of Privacy …, 2021 - cryptocompare.com
The Nym network (" Nym") is a decentralized and incentivized infrastructure to provision
privacy to a broad range of message-based applications and services. The core component …

Practical attacks against the I2P network

C Egger, J Schlumberger, C Kruegel… - Research in Attacks …, 2013 - Springer
Anonymity networks, such as Tor or I2P, were built to allow users to access network
resources without revealing their identity. Newer designs, like I2P, run in a completely …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012 - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

[PDF][PDF] A Density-based Clustering Method for K-anonymity Privacy Protection.

J Liu, S Yin, H Li, L Teng - J. Inf. Hiding Multim. Signal Process., 2017 - bit.nkust.edu.tw
In order to prevent sensitive information leakage in the cloud storage, we propose a density-
based clustering method for K-anonymity privacy protection. We also analyze the effect of …