On anonymity in an electronic society: A survey of anonymous communication systems
M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …
communication on the Internet, both from the academic community and the general public …
A survey on routing in anonymous communication protocols
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …
communication platform that billions of users rely on for their daily activities. While this …
Unobservable communication over fully untrusted infrastructure
Kee** communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
[Књига][B] Disappearing cryptography: information hiding: steganography and watermarking
P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …
steganographic techniques. The application of said techniques facilitates message …
[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …
they contain electronic components, keyboards eventually emit electromagnetic waves …
[PDF][PDF] A Practical Congestion Attack on Tor Using Long Paths.
Abstract In 2005, Murdoch and Danezis demonstrated the first practical congestion attack
against a deployed anonymity network. They could identify which relays were on a target Tor …
against a deployed anonymity network. They could identify which relays were on a target Tor …
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the
security of traditional high-and low-latency anonymous communication systems, as well as …
security of traditional high-and low-latency anonymous communication systems, as well as …
{PIR-Tor}: Scalable anonymous communication using private information retrieval
Existing anonymous communication systems like Tor do not scale well as they require all
users to maintain up-todate information about all available Tor relays in the system. Current …
users to maintain up-todate information about all available Tor relays in the system. Current …
[PDF][PDF] A Tune-up for Tor: Improving Security and Performance in the Tor Network.
R Snader, N Borisov - ndss, 2008 - freehaven.net
The Tor anonymous communication network uses selfreported bandwidth values to select
routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this …
routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this …
Cachet: a decentralized architecture for privacy preserving social networking with caching
Online social networks (OSNs) such as Facebook and Google+ have transformed the way
our society communicates. However, this success has come at the cost of user privacy; in …
our society communicates. However, this success has come at the cost of user privacy; in …