We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the overlay is able to initiate communication with another peer, without knowing their real IP address—using only their identifier within the overlay. Thanks to establishing peers’ public keys as identifiers, every message is digitally signed and the usage of ECC provides an instant access to end-to-end encryption without any need for negotiation of a shared key
This paper proposes a new approach to anonymous communication called information slicing. Typically,...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexi...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or...
With the development of online communications in the past decades, new privacy concerns have emerged...
Abstract. This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and cen...
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed ...
Searching a Peer-to-Peer (P2P) network without using a central index has been widely investigated bu...
Onion routing is a technique for anonymous and privacy preserving communication at the base of popul...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To pre...
In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay...
Multicast services raise significant operational and security challenges not only when deployed on t...
Purpose – To provide mutual anonymity over traditionally un-anonymous Distributed Hash Tables (DHT) ...
This paper proposes a new approach to anonymous communication called information slicing. Typically,...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexi...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or...
With the development of online communications in the past decades, new privacy concerns have emerged...
Abstract. This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and cen...
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed ...
Searching a Peer-to-Peer (P2P) network without using a central index has been widely investigated bu...
Onion routing is a technique for anonymous and privacy preserving communication at the base of popul...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To pre...
In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay...
Multicast services raise significant operational and security challenges not only when deployed on t...
Purpose – To provide mutual anonymity over traditionally un-anonymous Distributed Hash Tables (DHT) ...
This paper proposes a new approach to anonymous communication called information slicing. Typically,...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexi...