Abstract. Statistical disclosure is a well-studied technique that an at-tacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on nding the receivers to whom a given targeted user sends. In this paper, we investigate the eectiveness of sta-tistical disclosure in nding all of a users ' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observa-tions of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to nd a set of the targeted user's most likely contacts. We study the perfor...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
Disclosure limitation methods transform statistical databases to protect confidentiality, a practica...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
In network communications, mixes provide protection against observers hiding the appearance of messa...
The statistical disclosure attack (SDA) is an eective method for compromising the anonymity of users...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Click on the DOI link to access the article (may not be free).There is clear demand among organizati...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
Disclosure limitation methods transform statistical databases to protect confidentiality, a practica...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
In network communications, mixes provide protection against observers hiding the appearance of messa...
The statistical disclosure attack (SDA) is an eective method for compromising the anonymity of users...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Click on the DOI link to access the article (may not be free).There is clear demand among organizati...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
Disclosure limitation methods transform statistical databases to protect confidentiality, a practica...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...