Every modern online application relies on the network layer to transfer information, which exposes the metadata associated with digital communication. These distinctive characteristics encapsulate equally meaningful information as the content of the communication itself and allow eavesdroppers to uniquely identify users and their activities. Hence, by exposing the IP addresses and by analyzing patterns of the network traffic, a malicious entity can deanonymize most online communications. While content confidentiality has made significant progress over the years, existing solutions for anonymous communication which protect the network metadata still have severe limitations, including centralization, limited security, poor scalability, and hi...
Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hop...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
The provision of content confidentiality via message encryption is by no means sufficient when facin...
We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-...
Contrary to popular belief, using the Internet is not anonymous at all. Since the Internet is a pack...
The communication layer leaks important private information even in the presence of encryption, whic...
We introduce mix rings, a novel peer-to-peer mixnet architecture for anonymity that yields low-laten...
Various MIX-based systems offering anonymity for near real-time traffic have been operational. Howev...
User anonymity faces increasing threats from private companies, network service providers, and gover...
This thesis presents an overview of different solutions for anonymous networks. Theory behind connec...
Designing mix-networks for low-latency applications that offer acceptable performance and provide go...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and dat...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy...
Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hop...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
The provision of content confidentiality via message encryption is by no means sufficient when facin...
We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-...
Contrary to popular belief, using the Internet is not anonymous at all. Since the Internet is a pack...
The communication layer leaks important private information even in the presence of encryption, whic...
We introduce mix rings, a novel peer-to-peer mixnet architecture for anonymity that yields low-laten...
Various MIX-based systems offering anonymity for near real-time traffic have been operational. Howev...
User anonymity faces increasing threats from private companies, network service providers, and gover...
This thesis presents an overview of different solutions for anonymous networks. Theory behind connec...
Designing mix-networks for low-latency applications that offer acceptable performance and provide go...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and dat...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy...
Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hop...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
The provision of content confidentiality via message encryption is by no means sufficient when facin...