Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especially when considering the threat of political repression and censorship. P2P-based publish-subscribe is a well suited paradigm for OSN scenarios as users can publish and follow topics of interest. How- ever, anonymity in P2P-based publish-subscribe (pub-sub) has been hardly analyzed so far. Research on add-on anonymization systems such as Tor mostly focuses on large scale traffic analysis rather than malicious insiders. Therefore, we analyze colluding insider attackers in more detail that operate on the basis of timing information. For that, we model a generic anonymous pub-sub system, present an attacker model, and discuss timing attacks. We...
Publish-subscribe is a scheme for distributing information based on interests. While security mechan...
Indiana University-Purdue University Indianapolis (IUPUI)Following the trend of online data sharing ...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
With the Peer-to-peer (P2P) paradigm, each user shares some of his resources (e.g., storage and band...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
The introduction of online social networks (OSN) has transformed the way people connect and interact...
The introduction of online social networks (OSN) has transformed the way people connect and interact...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
In an environment where privacy is an increasing concern to users that communicate through a public ...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
Publish-subscribe is a scheme for distributing information based on interests. While security mechan...
Indiana University-Purdue University Indianapolis (IUPUI)Following the trend of online data sharing ...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
With the Peer-to-peer (P2P) paradigm, each user shares some of his resources (e.g., storage and band...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
The introduction of online social networks (OSN) has transformed the way people connect and interact...
The introduction of online social networks (OSN) has transformed the way people connect and interact...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
In an environment where privacy is an increasing concern to users that communicate through a public ...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
Publish-subscribe is a scheme for distributing information based on interests. While security mechan...
Indiana University-Purdue University Indianapolis (IUPUI)Following the trend of online data sharing ...
Abstract—Ever since the introduction of the internet, it has been void of any privacy. The majority ...