Abstract. Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challenging, as anonymity services can be slow and unpredictable. In this paper, we propose a method for extending onion-routing style anonymity protocols for supporting anonymous VoIP (aVoIP) traffic with reasonable performance. We report the results of extensive experimentation across 210 globally placed PlanetLab proxies which shows that paths for reasonable aVoIP quality would need to be selected carefully. Our design includes an algorithm for the measurement and selection of paths for reasonable aVoIP performance and an analysis of the potential for attack...
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communicati...
Abstract — Peer-to-Peer VoIP (voice over IP) networks, exem-plified by Skype [4], are becoming incre...
The rapid growth of Internet applications has made communication anonymity an increasingly important...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
Onion Routing provides anonymous connections that are strongly resistant to both eavesdropping and t...
Abstract—Onion routing is an infrastructure for private com-munication over a public network. It pro...
Part 4: Security Protocol PracticesInternational audienceAnonymization networks (e.g., Tor) help in ...
Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and t...
User anonymity faces increasing threats from private companies, network service providers, and gover...
While more and more users turn to IP-based communication technologies, privacy and anonymity remain ...
In this paper we present a technical description of onion routing, an anonymizing protocol that prot...
User anonymity faces increasing threats from private companies, network service providers, and gover...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Onion Routing is an infrastructure for private com-munication over a public network. It provides ano...
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communicati...
Abstract — Peer-to-Peer VoIP (voice over IP) networks, exem-plified by Skype [4], are becoming incre...
The rapid growth of Internet applications has made communication anonymity an increasingly important...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
Onion Routing provides anonymous connections that are strongly resistant to both eavesdropping and t...
Abstract—Onion routing is an infrastructure for private com-munication over a public network. It pro...
Part 4: Security Protocol PracticesInternational audienceAnonymization networks (e.g., Tor) help in ...
Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and t...
User anonymity faces increasing threats from private companies, network service providers, and gover...
While more and more users turn to IP-based communication technologies, privacy and anonymity remain ...
In this paper we present a technical description of onion routing, an anonymizing protocol that prot...
User anonymity faces increasing threats from private companies, network service providers, and gover...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Onion Routing is an infrastructure for private com-munication over a public network. It provides ano...
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communicati...
Abstract — Peer-to-Peer VoIP (voice over IP) networks, exem-plified by Skype [4], are becoming incre...
The rapid growth of Internet applications has made communication anonymity an increasingly important...