On anonymity in an electronic society: A survey of anonymous communication systems

M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …

A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

Unobservable communication over fully untrusted infrastructure

S Angel, S Setty - 12th USENIX Symposium on Operating Systems …, 2016 - usenix.org
Kee** communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …

[Књига][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …

[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.

M Vuagnoux, S Pasini - USENIX security symposium, 2009 - usenix.org
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …

[PDF][PDF] A Practical Congestion Attack on Tor Using Long Paths.

NS Evans, R Dingledine, C Grothoff - USENIX Security Symposium, 2009 - usenix.org
Abstract In 2005, Murdoch and Danezis demonstrated the first practical congestion attack
against a deployed anonymity network. They could identify which relays were on a target Tor …

Denial of service or denial of security?

N Borisov, G Danezis, P Mittal, P Tabriz - … of the 14th ACM conference on …, 2007 - dl.acm.org
We consider the effect attackers who disrupt anonymous communications have on the
security of traditional high-and low-latency anonymous communication systems, as well as …

{PIR-Tor}: Scalable anonymous communication using private information retrieval

P Mittal, F Olumofin, C Troncoso, N Borisov… - 20th USENIX security …, 2011 - usenix.org
Existing anonymous communication systems like Tor do not scale well as they require all
users to maintain up-todate information about all available Tor relays in the system. Current …

[PDF][PDF] A Tune-up for Tor: Improving Security and Performance in the Tor Network.

R Snader, N Borisov - ndss, 2008 - freehaven.net
The Tor anonymous communication network uses selfreported bandwidth values to select
routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this …

Cachet: a decentralized architecture for privacy preserving social networking with caching

S Nilizadeh, S Jahid, P Mittal, N Borisov… - Proceedings of the 8th …, 2012 - dl.acm.org
Online social networks (OSNs) such as Facebook and Google+ have transformed the way
our society communicates. However, this success has come at the cost of user privacy; in …