Abstract—We present several protocols to achieve mutual communication anonymity between an information requester and a provider in a P2P information-sharing environment, such that neither the requester nor the provider can identify each other, and no other peers can identify the two communicating parties with certainty. Most existing solutions achieve mutual anonymity in pure P2P systems without any trusted central controls. Compared with two such representative ones, our protocols improve efficiency in two different ways. First, utilizing trusted third parties and aiming at both reliability and low-cost, we propose a group of mutual anonymity protocols. We show that with some limited central support, our protocols can accomplish the goals ...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
In an environment where privacy is an increasing concern to users that communicate through a public ...
In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexi...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sha...
International audiencePeer-To-Peer networks have become increasingly common as a means of transferri...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa...
Abstract — A mutually anonymous service hides the identity of a client from the service provider and...
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communi...
A mutual anonymity system enables communication between a client and a service provider without reve...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Nowadays information systems are being shifted to distributed architectures to obtain the benefits l...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
In an environment where privacy is an increasing concern to users that communicate through a public ...
In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexi...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sha...
International audiencePeer-To-Peer networks have become increasingly common as a means of transferri...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa...
Abstract — A mutually anonymous service hides the identity of a client from the service provider and...
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communi...
A mutual anonymity system enables communication between a client and a service provider without reve...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Nowadays information systems are being shifted to distributed architectures to obtain the benefits l...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
In an environment where privacy is an increasing concern to users that communicate through a public ...