Anonymity metrics have been proposed to evaluate anonymity preserving systems by estimating the amount of information displayed by these systems due to vulnerabilities. A general metric for anonymity that assess the latter systems according to the mass and quality of information learned by an attacker or a collaboration of attackers is proposed here. The proposed metric is based on subjective logic, a generalization of evidence and probability theory. As a consequence, we proved based on defined scenarios that our metric provide a better interpretation of uncertainty in the measure and it is extended to combine various sources of information using subjective logic operators. Also, we demonstrate that two factors: trust between collaborating...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
Advances in information technology, and its use in research, are increasing both the need for anonym...
In 2001, two information theoretic anonymity metrics were proposed: the "effective anonymity set siz...
A number of papers are suggested with the goal to measure the quality of anonymity of a given anonym...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Today the Chaumian Mix idea is not only an academic approach for anonymous communication, it is also...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Click on the DOI link to access the article (may not be free).There is clear demand among organizati...
Conditional anonymity, in comparison to classical strong anonymity, provides a novel perspective on ...
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain...
Abstract—A wide variety of privacy metrics have been pro-posed in the literature to evaluate the lev...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Anonymous message transmission systems are the building blocks of several high-level anonymity servi...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
Advances in information technology, and its use in research, are increasing both the need for anonym...
In 2001, two information theoretic anonymity metrics were proposed: the "effective anonymity set siz...
A number of papers are suggested with the goal to measure the quality of anonymity of a given anonym...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Today the Chaumian Mix idea is not only an academic approach for anonymous communication, it is also...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Click on the DOI link to access the article (may not be free).There is clear demand among organizati...
Conditional anonymity, in comparison to classical strong anonymity, provides a novel perspective on ...
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain...
Abstract—A wide variety of privacy metrics have been pro-posed in the literature to evaluate the lev...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Anonymous message transmission systems are the building blocks of several high-level anonymity servi...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
Advances in information technology, and its use in research, are increasing both the need for anonym...