Abstract. The literature contains a variety of different mixes, some of which have been used in deployed anonymity systems. We explore their anonymity and message delay properties, and show how to mount active attacks against them by altering the traffic between the mixes. We show that if certain mixes are used, such attacks cannot destroy the anonymity of a particular message completely. We work out the cost of these attacks in terms of the number of messages the attacker must insert into the network and the time he must spend. We discuss advantages and disadvantages of these mixes and the settings in which their use is appropriate. Finally, we look at dummy traffic and SG mixes as other promising ways of protecting against the attacks, po...
We introduce mix rings, a novel peer-to-peer mixnet architecture for anonymity that yields low-laten...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and dat...
Various anonymizing services and networks rapidly grow both in numbers and variance. This thesis is ...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. Currently fielded anonymous communication systems either introduce too much delay and thus...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
There are different methods to build an anonymity service using MIXes. A substantial decision for d...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The provision of content confidentiality via message encryption is by no means sufficient when facin...
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable,...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Various MIX-based systems offering anonymity for near real-time traffic have been operational. Howev...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
We introduce mix rings, a novel peer-to-peer mixnet architecture for anonymity that yields low-laten...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and dat...
Various anonymizing services and networks rapidly grow both in numbers and variance. This thesis is ...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. Currently fielded anonymous communication systems either introduce too much delay and thus...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
There are different methods to build an anonymity service using MIXes. A substantial decision for d...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The provision of content confidentiality via message encryption is by no means sufficient when facin...
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable,...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Various MIX-based systems offering anonymity for near real-time traffic have been operational. Howev...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
We introduce mix rings, a novel peer-to-peer mixnet architecture for anonymity that yields low-laten...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and dat...
Various anonymizing services and networks rapidly grow both in numbers and variance. This thesis is ...