Imagine a set of communication partners wants to keep their communication links secret. Consider the case where untrustworthy parties are able to observe every communication, which implies not only that they can detect the content of the communication, but also who is communicating and who is listening. Using this information, the untrustworthy parties try to link communicating parties. This, in a nutshell, is the problem of anonymous and unlinkable communication in computer networks. By use of encryption techniques the content of messages can be kept private. However, the communication links can still be detected. Since the addresses of sending and receiving parties are contained in the header of every message sent over the network, an unt...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
The goal of most research on anonymity, including all currently used systems for anonymity, is to ac...
With the advent of peer to peer networks, anonymity is grasped as a desired property of any well des...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
peer reviewedIn this paper we present a protocol for unlinkable communication, i.e. where an attacke...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
This work contributes to the field of unlinkability. Unlinkability describes a situation where attac...
Measures for anonymity in systems must be on one hand simple and concise, and on the other hand refl...
The goal of most research on anonymity, including all cur-rently used systems for anonymity, is to a...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
The goal of most research on anonymity, including all currently used systems for anonymity, is to ac...
With the advent of peer to peer networks, anonymity is grasped as a desired property of any well des...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
peer reviewedIn this paper we present a protocol for unlinkable communication, i.e. where an attacke...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
This work contributes to the field of unlinkability. Unlinkability describes a situation where attac...
Measures for anonymity in systems must be on one hand simple and concise, and on the other hand refl...
The goal of most research on anonymity, including all cur-rently used systems for anonymity, is to a...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...