-
1
-
-
3042699909
-
Measuring anonymity: The disclosure attack
-
Dakshi Agrawal and Dogan Kesdogan. Measuring anonymity: The disclosure attack. IEEE Security and Privacy, 1(6):27-34, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 27-34
-
-
Agrawal, D.1
Kesdogan, D.2
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
3
-
-
34547490882
-
Structuring anonymity metrics
-
New York, NY, USA, ACM
-
Sebastian Claußand Stefan Schiffner. Structuring anonymity metrics. In DIM '06: Proceedings of the second ACM workshop on Digital identity management, pages 55-62, New York, NY, USA, 2006. ACM.
-
(2006)
DIM '06: Proceedings of the second ACM workshop on Digital identity management
, pp. 55-62
-
-
Claußand, S.1
Schiffner, S.2
-
4
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
and, editors, Athens, May, IFIP TC11, Kluwer
-
George Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Gritzalis, Vimercati, Samarati, and Katsikas, editors, Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
Danezis, G.1
-
5
-
-
74049089534
-
-
A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research, January
-
George Danezis and Claudia Diaz. A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research, January 2008.
-
(2008)
-
-
Danezis, G.1
Diaz, C.2
-
6
-
-
77952355622
-
Two-sided statistical disclosure attack
-
Nikita Borisov and Philippe Golle, editors, Ottawa, Canada, June, Springer
-
George Danezis, Claudia Diaz, and Carmela Troncoso. Two-sided statistical disclosure attack. In Nikita Borisov and Philippe Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
-
9
-
-
35048895319
-
Statistical disclosure or intersection attacks on anonymity systems
-
Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
-
George Danezis and Andrei Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
-
(2004)
LNCS
-
-
Danezis, G.1
Serjantov, A.2
-
10
-
-
74049145915
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
Nikita Borisov and Ian Goldberg, editors, Leuven, Belgium, July, Springer
-
George Danezis and Paul Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 133-150, Leuven, Belgium, July 2008. Springer.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 133-150
-
-
Danezis, G.1
Syverson, P.2
-
11
-
-
74049131872
-
The application of bayesian inference to traffic analysis
-
Technical report, Micorsoft Research, August
-
George Danezis and Carmela Troncoso. The application of bayesian inference to traffic analysis. Technical report, Micorsoft Research, August 2008.
-
(2008)
-
-
Danezis, G.1
Troncoso, C.2
-
12
-
-
38049141694
-
Measuring anonymity with relative entropy
-
Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, of, Springer
-
Yuxin Deng, Jun Pang, and Peng Wu. Measuring anonymity with relative entropy. In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, pages 65-79. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4691
, pp. 65-79
-
-
Deng, Y.1
Pang, J.2
Wu, P.3
-
14
-
-
35048831821
-
Reasoning about the anonymity provided by pool mixes that generate dummy traffic
-
Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
-
Claudia Diaz and Bart Preneel. Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
-
(2004)
LNCS
-
-
Diaz, C.1
Preneel, B.2
-
15
-
-
84957800033
-
Towards measuring anonymity
-
Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002, Springer-Verlag, April
-
Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
16
-
-
50249117750
-
On the impact of social network profiling on anonymity
-
Nikita Borisov and Ian Goldberg, editors, Leuven, Belgium, July, Springer
-
Claudia Diaz, Carmela Troncoso, and Andrei Serjantov. On the impact of social network profiling on anonymity. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 44-62, Leuven, Belgium, July 2008. Springer.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 44-62
-
-
Diaz, C.1
Troncoso, C.2
Serjantov, A.3
-
18
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
M. Edman, F. Sivrikaya, and B. Yener. A combinatorial approach to measuring anonymity. Intelligence and Security Informatics, 2007 IEEE, pages 356-363, 2007.
-
(2007)
Intelligence and Security Informatics, 2007 IEEE
, pp. 356-363
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
19
-
-
84885885532
-
Revisiting a combinatorial approach toward measuring anonymity
-
Marianne Winslett, editor, Alexandria,VA,USA, ACM
-
Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid Verbauwhede. Revisiting a combinatorial approach toward measuring anonymity. In Marianne Winslett, editor, Workshop on Privacy in the Electronic Society 2008, page 5, Alexandria,VA,USA, 2008. ACM.
-
(2008)
Workshop on Privacy in the Electronic Society
, pp. 5
-
-
Gierlichs, B.1
Troncoso, C.2
Diaz, C.3
Preneel, B.4
Verbauwhede, I.5
-
20
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
April
-
W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1):97-109, April 1970.
-
(1970)
Biometrika
, vol.57
, Issue.1
, pp. 97-109
-
-
Hastings, W.K.1
-
22
-
-
35248900308
-
Limits of anonymity in open environments
-
Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop IH 2002, Springer-Verlag, October
-
Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
-
(2002)
LNCS
, vol.2578
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
23
-
-
35048865346
-
The hitting set attack on anonymity protocols
-
Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
-
Dogan Kesdogan and Lexi Pimenidis. The hitting set attack on anonymity protocols. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
-
(2004)
LNCS
-
-
Kesdogan, D.1
Pimenidis, L.2
-
25
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
Proceedings of Privacy Enhancing Technologies workshop PET 2004, of, May
-
Nick Mathewson and Roger Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, pages 17-34, May 2004.
-
(2004)
LNCS
, vol.3424
, pp. 17-34
-
-
Mathewson, N.1
Dingledine, R.2
-
26
-
-
38149130456
-
Sampled traffic analysis by internet-exchange-level adversaries
-
Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, of, Springer
-
Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
29
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002, Springer-Verlag, April
-
Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
30
-
-
84904317338
-
On the anonymity of timed pool mixes
-
Athens, Greece, May, Kluwer
-
Andrei Serjantov and Richard E. Newman. On the anonymity of timed pool mixes. In Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems, pages 427-434, Athens, Greece, May 2003. Kluwer.
-
(2003)
Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems
, pp. 427-434
-
-
Serjantov, A.1
Newman, R.E.2
-
31
-
-
84937565289
-
Towards an Analysis of Onion Routing Security
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
32
-
-
24344501784
-
Measuring anonymity in a non-adaptive, real-time system
-
Gergely Tóth and Zoltán Hornák. Measuring anonymity in a non-adaptive, real-time system. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of Springer-Verlag, LNCS, pages 226-241, 2004.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of Springer-Verlag, LNCS
, pp. 226-241
-
-
Tóth, G.1
Hornák, Z.2
-
33
-
-
50249128196
-
-
Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede. Perfect matching disclosure attacks. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), 5134 of Lecture Notes in Computer Science, pages 2-23, Leuven,BE, 2008. Springer-Verlag.
-
Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede. Perfect matching disclosure attacks. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), volume 5134 of Lecture Notes in Computer Science, pages 2-23, Leuven,BE, 2008. Springer-Verlag.
-
-
-
|