A survey of peer-to-peer content distribution technologies

S Androutsellis-Theotokis, D Spinellis - ACM computing surveys (CSUR), 2004 - dl.acm.org
Distributed computer architectures labeled" peer-to-peer" are designed for the sharing of
computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring …

On anonymity in an electronic society: A survey of anonymous communication systems

M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …

[PDF][PDF] Website Fingerprinting at Internet Scale.

A Panchenko, F Lanze, J Pennekamp, T Engel… - NDSS, 2016 - nymity.ch
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …

An inquiry into money laundering tools in the Bitcoin ecosystem

M Möser, R Böhme, D Breuker - 2013 APWG eCrime …, 2013 - ieeexplore.ieee.org
We provide a first systematic account of opportunities and limitations of anti-money
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …

[PDF][PDF] Tor: The second-generation onion router.

R Dingledine, N Mathewson… - USENIX security …, 2004 - css.csail.mit.edu
We present Tor, a circuit-based low-latency anonymous communication service. This
second-generation Onion Routing system addresses limitations in the original design by …

Website fingerprinting in onion routing based anonymization networks

A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

Freenet: A distributed anonymous information storage and retrieval system

I Clarke, O Sandberg, B Wiley, TW Hong - … Berkeley, CA, USA, July 25–26 …, 2001 - Springer
We describe Freenet, an adaptive peer-to-peer network application that permits the
publication, replication, and retrieval of data while protecting the anonymity of both authors …

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier

D Herrmann, R Wendolsky, H Federrath - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted
tunnel that enables users to hide content and addresses of requested websites from external …

Tarzan: A peer-to-peer anonymizing network layer

MJ Freedman, R Morris - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service,
Tarzan is general-purpose and transparent to applications. Organized as a decentralized …