De-anonymisation attacks on tor: A survey
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Shining light in dark places: Understanding the Tor network
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …
anonymity service. We present observations and analysis obtained by participating in the …
[图书][B] Disappearing cryptography: information hiding: steganography and watermarking
P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …
steganographic techniques. The application of said techniques facilitates message …
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
Several credential systems have been proposed in which users can authenticate to services
anonymously. Since anonymity can give users the license to misbehave, some variants …
anonymously. Since anonymity can give users the license to misbehave, some variants …
SoK: anonymous credentials
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …
maintaining privacy and have been the subject of study for many years. The interest in …
Reputation systems for anonymous networks
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …
Opportunistic sensing: Security challenges for the new paradigm
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
Nymble: Blocking misbehaving users in anonymizing networks
PP Tsang, A Kapadia, C Cornelius… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Anonymizing networks such as Tor allow users to access Internet services privately by using
a series of routers to hide the client's IP address from the server. The success of such …
a series of routers to hide the client's IP address from the server. The success of such …
Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs
We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based
credentials (PABCs) that is practically usable in large-scale applications, such as national …
credentials (PABCs) that is practically usable in large-scale applications, such as national …