Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monito...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
The request for on-line privacy is rapidly increasing. More and more Internet users realize that inf...
In recent years, the content-based publish/subscribe [12], [22] has become a popular paradigm to dec...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Abstract. A user is only anonymous within a set of other users. Hence, the core functionality of an ...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
The request for on-line privacy is rapidly increasing. More and more Internet users realize that inf...
In recent years, the content-based publish/subscribe [12], [22] has become a popular paradigm to dec...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Abstract. A user is only anonymous within a set of other users. Hence, the core functionality of an ...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...