Abstract. In many communication scenarios it is not sufficient to pro-tect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technolo-gies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest anonymity guarantees, namely unconditional sender and recip-ient untraceability, is the Dining Cryptographer (DC) protocol proposed by Chaum in 1988. Unfortunately the strong anonymity guarantees come at the price of limited performance and scalability and multiple issues that make deployment complicated in practice. In this paper we address one of those issues, namely slot rese...
An onion routing based anonymous communication system is developed to address timing analysis attack...
with much higher rates of sending new bundles than average can degrade the delivery rate of other no...
Die vorliegende Arbeit beschäftigt sich mit einer speziellen Technik zur Wahrung von Anonymität in R...
In many communication scenarios it is not sufficient to protect only the content of the communicatio...
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by C...
The dining cryptographers protocol provides information-theoretically secure sender and recipient un...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
Untraceable communication is about hiding the identity of the sender or the recipient of a message. ...
Abstract. Meeting Scheduling is a suitable application for distributed computation, motivated by its...
Meeting scheduling is a suitable application for distributed computation motivated by its privacy re...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
Meeting scheduling is a suitable application for distributed computation motivated by its privacy re...
We devise a scalable and provably-secure protocol for fully-anonymous broadcast in large-scale netwo...
Network Information Security includes context security and the anonymous property of Network Communi...
We study the problem of counting the number of nodes in a slotted-time communication network, under ...
An onion routing based anonymous communication system is developed to address timing analysis attack...
with much higher rates of sending new bundles than average can degrade the delivery rate of other no...
Die vorliegende Arbeit beschäftigt sich mit einer speziellen Technik zur Wahrung von Anonymität in R...
In many communication scenarios it is not sufficient to protect only the content of the communicatio...
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by C...
The dining cryptographers protocol provides information-theoretically secure sender and recipient un...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
Untraceable communication is about hiding the identity of the sender or the recipient of a message. ...
Abstract. Meeting Scheduling is a suitable application for distributed computation, motivated by its...
Meeting scheduling is a suitable application for distributed computation motivated by its privacy re...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
Meeting scheduling is a suitable application for distributed computation motivated by its privacy re...
We devise a scalable and provably-secure protocol for fully-anonymous broadcast in large-scale netwo...
Network Information Security includes context security and the anonymous property of Network Communi...
We study the problem of counting the number of nodes in a slotted-time communication network, under ...
An onion routing based anonymous communication system is developed to address timing analysis attack...
with much higher rates of sending new bundles than average can degrade the delivery rate of other no...
Die vorliegende Arbeit beschäftigt sich mit einer speziellen Technik zur Wahrung von Anonymität in R...