On the Internet, link-resistant communication is only possible through the use of anonymous communication systems. Since the late 1990's many anonymous communication systems have been designed and deployed for use on the Internet. However, the performance of these systems is very low. In particular for the Tor network, the current state of the art anonymity system, latency of communications is not only high but also highly variable. In this thesis we argue that current anonymity systems, as implemented, unnecessarily sacrifice performance for anonymity. By implementing subtle changes to the system architecture, it is possible to achieve anonymous communication in addition to good performance. We demonstrate, via implementation and measureme...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of us...
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of us...
User anonymity faces increasing threats from private companies, network service providers, and gover...
peer reviewedThe most popular system for providing practical low-latency anonymity on the Internet i...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
User anonymity faces increasing threats from private companies, network service providers, and gover...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of us...
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of us...
User anonymity faces increasing threats from private companies, network service providers, and gover...
peer reviewedThe most popular system for providing practical low-latency anonymity on the Internet i...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
User anonymity faces increasing threats from private companies, network service providers, and gover...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...