Anonymous communication protocols are indispensable to protect users' privacy in open networks such as the Internet. Therefore they have wide application, e.g., electronic voting, and enormous research has been conducted on them. However, since it is difficult to devise general 'anonymity metrics' for practical anonymous protocols such as Crowds, few attempts have been made so far to establish such measures. Therefore, toward anonymity evaluation of practical anonymous networks, first we propose and formalize two novel anonymity metrics for practical anonymous communication networks. Next we shall discuss whether or not deterministic protocols can provide anonymity efficiently in terms of computational complexity. Unfortunately, we can show...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Advances in information technology, and its use in research, are increasing both the need for anonym...
In the paper we shall evaluate various aspects of anonymity properties afforded by practical anonymo...
In 2001, two information theoretic anonymity metrics were proposed: the "effective anonymity set siz...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Anonymous message transmission systems are the building blocks of several high-level anonymity servi...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
For many Internet applications, the ability to protect the identity of participants in a distributed...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Advances in information technology, and its use in research, are increasing both the need for anonym...
In the paper we shall evaluate various aspects of anonymity properties afforded by practical anonymo...
In 2001, two information theoretic anonymity metrics were proposed: the "effective anonymity set siz...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Anonymous message transmission systems are the building blocks of several high-level anonymity servi...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
For many Internet applications, the ability to protect the identity of participants in a distributed...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Advances in information technology, and its use in research, are increasing both the need for anonym...