A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

Low-cost traffic analysis of Tor

SJ Murdoch, G Danezis - … on Security and Privacy (S&P'05), 2005 - ieeexplore.ieee.org
Tor is the second generation onion router supporting the anonymous transport of TCP
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …

[PDF][PDF] A survey of solutions to the sybil attack

BN Levine, C Shields, NB Margolin - University of Massachusetts …, 2006 - git.gnunet.org
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …

On the optimal placement of mix zones

J Freudiger, R Shokri, JP Hubaux - International Symposium on Privacy …, 2009 - Springer
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …

A survey on mix networks and their secure applications

K Sampigethaya, R Poovendran - Proceedings of the IEEE, 2007 - ieeexplore.ieee.org
Anonymity is a subdiscipline of information hiding, required in a number of applications,
such as in electronic voting. For network communications, anonymity can be provided by a …

[PDF][PDF] The nym network

C Diaz, H Halpin, A Kiayias - 2021 - lirias.kuleuven.be
The Nym network (" Nym") is a decentralized and incentivized infrastructure to provision
privacy to a broad range of message-based applications and services. The core component …

Distributed ONS and its Impact on Privacy

B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …

Privacy-enhancing technologies

S Fischer-Hbner, S Berthold - Computer and information security …, 2017 - Elsevier
In our modern information age, recent technical developments and trends, such as mobile
and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly …

Impact of network topology on anonymity and overhead in low-latency anonymity networks

C Diaz, SJ Murdoch, C Troncoso - International Symposium on Privacy …, 2010 - Springer
Low-latency anonymous communication networks require padding to resist timing analysis
attacks, and dependent link padding has been proven to prevent these attacks with minimal …

Performance comparison of low-latency anonymisation services from a user perspective

R Wendolsky, D Herrmann, H Federrath - Privacy Enhancing Technologies …, 2007 - Springer
Neither of the two anonymisation services Tor and AN. ON clearly outperforms the other one.
AN. ON's user-perceived QoS is generally more consistent over time than Tor's. While AN …