The paper presents a design and discusses configuration aspects of an overlay transport protocol based on an idea of the peer-to-peer direct and anonymous distribution overlay (P2PRIV). We estimate a secure configuration of the protocol and examine a correlation between the P2PRIV’s anonymous path lengths and latency. An increase of the path lengths speaks strongly in favor of the parallel solution’s anonymity, as in classical cascade networks. In the paper we evaluate the new protocol in a scope of a trade-off between anonymity and traffic performance and show that the presented solution allows effectively increasing anonymity with relatively low impact on anonymous transport latency
To anonymous internet traffic, many popular protocols route traffic through a network of nodes in or...
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potentia...
User anonymity faces increasing threats from private companies, network service providers, and gover...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribu...
Recently, there have been several research efforts to design a transport layer that meets the securi...
In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay...
Today\u27s Internet routing protocols, while arguably robust and efficient, are not designed to supp...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
This paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-preserving co...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
To anonymous internet traffic, many popular protocols route traffic through a network of nodes in or...
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potentia...
User anonymity faces increasing threats from private companies, network service providers, and gover...
The paper presents a design and discusses configuration aspects of an overlay transport protocol bas...
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribu...
Recently, there have been several research efforts to design a transport layer that meets the securi...
In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay...
Today\u27s Internet routing protocols, while arguably robust and efficient, are not designed to supp...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
This paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-preserving co...
AbstractThis paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-prese...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
To anonymous internet traffic, many popular protocols route traffic through a network of nodes in or...
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potentia...
User anonymity faces increasing threats from private companies, network service providers, and gover...