Traffic Analysis Attacks in Anonymity Networks Relationship Anonymity-Overhead Trade-off
暂无分享,去创建一个
[1] Gunnar Karlsson,et al. On the Trade-Off between Relationship Anonymity and Communication Overhead in Anonymity Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[2] Carmela Troncoso,et al. The Wisdom of Crowds: Attacks and Optimal Constructions , 2009, ESORICS.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Joan Feigenbaum,et al. Probabilistic analysis of onion routing in a black-box model , 2007, WPES '07.
[5] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[6] Carmela Troncoso,et al. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks , 2010, Privacy Enhancing Technologies.
[7] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Vitaly Shmatikov,et al. Measuring relationship anonymity in mix networks , 2006, WPES '06.
[9] Carmela Troncoso,et al. The bayesian traffic analysis of mix networks , 2009, CCS.
[10] Sushil Jajodia,et al. Providing Mobile Users' Anonymity in Hybrid Networks , 2010, ESORICS.
[11] Carmela Troncoso,et al. Perfect Matching Disclosure Attacks , 2008, Privacy Enhancing Technologies.
[12] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[13] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[14] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[15] Carmela Troncoso,et al. Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications , 2009, Privacy Enhancing Technologies.
[16] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.