There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to the attack. We use this result to place an upper bound on how long existing protocols, including Crowds, Onion Routing, Hordes, Web Mixes, and DC-Net, can maintain anonymity in the face of the attacks described. This provides a basis for comparing these protocols against each other. Our results show that fully-connected DC-Net is the most resilient to these attacks, but it suffers from scalab...
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-rout...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Anonymous communications protocols have been designed to resist attacks that work in a short period ...
We consider the effect attackers who disrupt anonymous communications have on the security of tradit...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Many recent proposals for anonymous communication omit from their security analyses a consideration ...
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-rout...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Anonymous communications protocols have been designed to resist attacks that work in a short period ...
We consider the effect attackers who disrupt anonymous communications have on the security of tradit...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Many recent proposals for anonymous communication omit from their security analyses a consideration ...
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-rout...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, vi...