Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, that takes into account these various. We model the effectiveness of single mixes or of mix networks in terms of information leakage, and we measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown
Anonymization plays a key role in enabling the public release of network datasets, and yet there are...
In electronic communications today, multiple diverse connected devices are used, and messages and da...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
The goal of most research on anonymity, including all currently used systems for anonymity, is to ac...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Imagine a set of communication partners wants to keep their communication links secret. Consider the...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
Anonymization plays a key role in enabling the public release of network datasets, and yet there are...
In electronic communications today, multiple diverse connected devices are used, and messages and da...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
The goal of most research on anonymity, including all currently used systems for anonymity, is to ac...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Imagine a set of communication partners wants to keep their communication links secret. Consider the...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
Anonymization plays a key role in enabling the public release of network datasets, and yet there are...
In electronic communications today, multiple diverse connected devices are used, and messages and da...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...