De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arXiv preprint arXiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Shining light in dark places: Understanding the Tor network

D McCoy, K Bauer, D Grunwald, T Kohno… - … Symposium, PETS 2008 …, 2008 - Springer
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …

[图书][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …

Blacklistable anonymous credentials: blocking misbehaving users without TTPs

PP Tsang, MH Au, A Kapadia, SW Smith - Proceedings of the 14th ACM …, 2007 - dl.acm.org
Several credential systems have been proposed in which users can authenticate to services
anonymously. Since anonymity can give users the license to misbehave, some variants …

SoK: anonymous credentials

SA Kakvi, KM Martin, C Putman, EA Quaglia - International Conference on …, 2023 - Springer
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …

Reputation systems for anonymous networks

E Androulaki, SG Choi, SM Bellovin… - … Symposium, PETS 2008 …, 2008 - Springer
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …

Opportunistic sensing: Security challenges for the new paradigm

A Kapadia, D Kotz… - 2009 First International …, 2009 - ieeexplore.ieee.org
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …

Nymble: Blocking misbehaving users in anonymizing networks

PP Tsang, A Kapadia, C Cornelius… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Anonymizing networks such as Tor allow users to access Internet services privately by using
a series of routers to hide the client's IP address from the server. The success of such …

Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs

J Camenisch, M Drijvers, J Hajny - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based
credentials (PABCs) that is practically usable in large-scale applications, such as national …