Untraceable communication is about hiding the identity of the sender or the recipient of a message. Currently most systems used in practice (e.g., TOR) rely on the principle that a message is routed via several relays to obfuscate its path through the network. However, as this increases the end-to-end latency it is not ideal for applications like Voice-over-IP (VoIP) communication, where participants will notice annoying delays if the data does not arrive fast enough. We propose an approach based on the paradigm of Dining Cryptographer networks (DC-nets) that can be used to realize untraceable communication within small groups. The main features of our approach are low latency and resilience to packet-loss and fault packets sent by maliciou...
Voice over IP is quickly becoming the industry standard voice communication service. While using an ...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
ABSTRACT Voice communication carried out using the Internet Protocol (IP) for the transaction is kno...
Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perfo...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
Effectively anonymizing Voice-over-IP (VoIP) calls requires a scalable anonymity network that is res...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
Emerging connected devices lead to ubiquitous communication in which anonymity and efficiency gain a...
While confidentiality of telephone conversation contents has recently received considerable attentio...
Many-to-many communication is a central component of widespread technologies like social networks an...
Many-to-many communication is a central component of widespread technologies like social networks an...
Technologies that use the Internet network to deliver voice communications have the potential to red...
Technologies that use the Internet network to deliver voice communications have the potential to red...
In the last decade, security in Voice over IP raises on importance. This article focuseson shared de...
Voice over IP is quickly becoming the industry standard voice communication service. While using an ...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
ABSTRACT Voice communication carried out using the Internet Protocol (IP) for the transaction is kno...
Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perfo...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
Effectively anonymizing Voice-over-IP (VoIP) calls requires a scalable anonymity network that is res...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
Emerging connected devices lead to ubiquitous communication in which anonymity and efficiency gain a...
While confidentiality of telephone conversation contents has recently received considerable attentio...
Many-to-many communication is a central component of widespread technologies like social networks an...
Many-to-many communication is a central component of widespread technologies like social networks an...
Technologies that use the Internet network to deliver voice communications have the potential to red...
Technologies that use the Internet network to deliver voice communications have the potential to red...
In the last decade, security in Voice over IP raises on importance. This article focuseson shared de...
Voice over IP is quickly becoming the industry standard voice communication service. While using an ...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
ABSTRACT Voice communication carried out using the Internet Protocol (IP) for the transaction is kno...