De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arxiv preprint arxiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Shining light in dark places: Understanding the Tor network

D McCoy, K Bauer, D Grunwald, T Kohno… - … Symposium, PETS 2008 …, 2008 - Springer
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …

[KNIHA][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …

Blacklistable anonymous credentials: blocking misbehaving users without TTPs

PP Tsang, MH Au, A Kapadia, SW Smith - Proceedings of the 14th ACM …, 2007 - dl.acm.org
Several credential systems have been proposed in which users can authenticate to services
anonymously. Since anonymity can give users the license to misbehave, some variants …

Sok: anonymous credentials

SA Kakvi, KM Martin, C Putman, EA Quaglia - International Conference on …, 2023 - Springer
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …

Reputation systems for anonymous networks

E Androulaki, SG Choi, SM Bellovin… - … Symposium, PETS 2008 …, 2008 - Springer
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an
anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P …

Opportunistic sensing: Security challenges for the new paradigm

A Kapadia, D Kotz… - 2009 First International …, 2009 - ieeexplore.ieee.org
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …

Derecho: privacy pools with proof-carrying disclosures

J Beal, B Fisch - Proceedings of the 2024 on ACM SIGSAC Conference …, 2024 - dl.acm.org
A privacy pool enables clients to deposit units of a cryptocurrency into a shared pool where
ownership of deposited currency is tracked via a system of cryptographically hidden records …

Nymble: Blocking misbehaving users in anonymizing networks

PP Tsang, A Kapadia, C Cornelius… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Anonymizing networks such as Tor allow users to access Internet services privately by using
a series of routers to hide the client's IP address from the server. The success of such …