Denial-of-service attacks are a significant threat to mission critical communication infrastructures, e.g., to industrial control systems. They are relatively easy to perpetrate, as an attacker that has access to communication links or equipment could observe the source and destination addresses for every message, and can identify and discard the messages exchanged between particular communication participants. Mix networks and anonymity networks could render these attacks more difficult by providing anonymous communication via relaying. Nevertheless, relaying introduces overhead and increases the end-to-end message delivery delay, which in practice must often be low. Hence, an important question is how to optimize anonymity for limited ove...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract—Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node dive...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
On the Internet, link-resistant communication is only possible through the use of anonymous communic...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract—Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node dive...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
On the Internet, link-resistant communication is only possible through the use of anonymous communic...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract—Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node dive...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...