With the development of online communications in the past decades, new privacy concerns have emerged. A lot of research effort have been focusing on concealing relationships in Internet communications. However, most works do not prevent particular network actors from learning the original sender or the intended receiver of a communication. While this level of privacy is satisfactory for the common citizen, it is insufficient in contexts where individuals can be convicted for the mere sending of documents to a third party. This is the case for so-called whistle-blowers, who take personal risks to alert the public of anti-democratic or illegal actions performed by large organisations. In this thesis, we consider a stronger notion of anonymity...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
L’avènement de l’ère digitale a changé la façon dont les individus communiquent à travers le monde, ...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
User anonymity faces increasing threats from private companies, network service providers, and gover...
User anonymity faces increasing threats from private companies, network service providers, and gover...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
L’avènement de l’ère digitale a changé la façon dont les individus communiquent à travers le monde, ...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
User anonymity faces increasing threats from private companies, network service providers, and gover...
User anonymity faces increasing threats from private companies, network service providers, and gover...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...