The architectures of deployed anonymity systems such as that of the Tor network suffer from the problems of (a) limited scalability, (b) reliance on a few central points of trust, and (c) trust issues due to Sybil attack. In this thesis, we investigate the design of novel approaches to anonymous communication that are scalable, decentralized, and Sybil-resilient. First, we begin by investigating security vulnerabilites in existing P2P anonymity systems, and find fundamental limitations in their designs. Second, we propose novel protocols for P2P anonymous communication that can successfully overcome these limitations. Third, we describe a protocol for detecting malicious Sybil identities using information about social network trust relati...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Today\u27s Internet is not designed to protect the privacy of its users against network surveillance...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit ...
Abstract—Anonymity networks hide user identities with the help of relayed anonymity routers. However...
Anonymity is a security property of paramount importance, as we move steadily towards a wired, onlin...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Today\u27s Internet is not designed to protect the privacy of its users against network surveillance...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit ...
Abstract—Anonymity networks hide user identities with the help of relayed anonymity routers. However...
Anonymity is a security property of paramount importance, as we move steadily towards a wired, onlin...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Today\u27s Internet is not designed to protect the privacy of its users against network surveillance...