-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. (1981) ‘Untraceable electronic mail, return addresses, and digital pseudonyms’, Communications of the ACM, Vol. 4, No. 2, pp.84–88.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum, D. (1988) ‘The dining cryptographers problem: unconditional sender and recipient untraceability’, Journal of Cryptology, Vol. 1, No. 1 pp.65–75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
0037810717
-
Mixminion: design of a type iii anonymous remailer protocol
-
Danezis, G., Dingledine, R. and Mathewson, N. (2003) ‘Mixminion: design of a type iii anonymous remailer protocol’, Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp.2–15.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
6
-
-
85084161366
-
Tor: the second-generation onion router
-
Dingledine, R., Mathewson, N. and Syverson, P. (2004) ‘Tor: the second-generation onion router’, Proceedings of the 13th USENIX Security Symposium, pp.303–320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
7
-
-
24344471201
-
-
FBI (2003) ‘Carnivore diagnostic tool’, Available at: http://www.fbi.gov/hq/lab/camivore/carnivore2.htm.
-
(2003)
Carnivore diagnostic tool
-
-
FBI1
-
8
-
-
0038349207
-
Tarzan: a peer-to- peer anonymizing network layer
-
Washington, DC
-
Freedman, M.J. and Morris, R. (2002) ‘Tarzan: a peer-to- peer anonymizing network layer’, Proceedings of the Ninth ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, pp.193–206.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
13
-
-
84899012896
-
Distribution of mutual information
-
T.G. Dietterich, S. Becker, and Z. Ghahramani, (Eds) Cambridge, MA: MIT Press
-
Hutter, M. (2002) ‘Distribution of mutual information’, in T.G. Dietterich, S. Becker, and Z. Ghahramani, (Eds). Advances in Neural Information Processing Systems 14, Cambridge, MA: MIT Press, pp.399–406.
-
(2002)
Advances in Neural Information Processing Systems 14
, pp. 399-406
-
-
Hutter, M.1
-
14
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
Kargupta, H., Datta, S., Wang, Q. and Sivakumar, K. (2005) ‘Random-data perturbation techniques and privacy-preserving data mining’, Knowledge Infosys System, Vol. 7, No. 4, pp.387–414.
-
(2005)
Knowledge Infosys System
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
15
-
-
84890010554
-
Stop- and-Go MlXes: providing probabilistic anonymity in an open system
-
Springer-Verlag, LNCS 1525
-
Kesdogan, D., Egner, J. and Büschkes, R. (1998) ‘Stop- and-Go MlXes: providing probabilistic anonymity in an open system’, Proceedings of Information Hiding Workshop (IH 1998), Springer-Verlag, LNCS 1525, pp.83–98.
-
(1998)
Proceedings of Information Hiding Workshop (IH 1998)
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Büschkes, R.3
-
16
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
A. Juels, (Eds) Springer-Verlag, LNCS 3110
-
Levine, B.N., Reiter, M.K., Wang, C. and Wright, M.K. (2004) ‘Timing attacks in low-latency mix-based systems’, in A. Juels, (Eds). Proceedings of Financial Cryptography (FC ’04), Springer-Verlag, LNCS 3110, pp.251–265.
-
(2004)
Proceedings of Financial Cryptography (FC ’04)
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
20
-
-
0029323403
-
Wide-area traffic: The failure of poisson modeling
-
Paxson, V. and Floyd, S. (1995) ‘Wide-area traffic: The failure of poisson modeling’, IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp.226–244.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
21
-
-
0002054934
-
Crowds: anonymity for web transactions
-
Reiter, M. and Rubin, A. (1998) ‘Crowds: anonymity for web transactions’, ACM Transactions on Information and System Security, Vol. 1, No. 1, pp.66–92.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
22
-
-
35248841429
-
Fromatrickle to a flood: active attacks on several mix types
-
F. Petitcolas, (Eds) Springer-Verlag, LNCS 2578
-
Serjantov, A., Dingledine, R. and Syverson, P. (2002) ‘Fromatrickle to a flood: active attacks on several mix types’, in F. Petitcolas, (Eds). Proceedings of Information Hiding Workshop (IH2002), Springer-Verlag, LNCS 2578, pp.36–52.
-
(2002)
Proceedings of Information Hiding Workshop (IH2002)
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
24
-
-
0036088867
-
P5: a protocol for scalable anonymous communication
-
Sherwood, R., Bhattacharjee, B. and Srinivasan, A. (2002) ‘P5: a protocol for scalable anonymous communication’, Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp.58–70.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 58-70
-
-
Sherwood, R.1
Bhattacharjee, B.2
Srinivasan, A.3
-
26
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Berkeley, CA
-
Sun, Q., Simon, D.R., Wang, Y-M., Russell, W., Padmanabhan, V.N. and Qiu, L. (2002) ‘Statistical identification of encrypted web browsing traffic’, Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, CA: pp.19–30.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
27
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, CA
-
Syverson, P.F., Goldschlag, D.M. and Reed, M.G. (1997) ‘Anonymous connections and onion routing’, IEEE Symposium on Security and Privacy, Oakland, CA: pp.44–54.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
28
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
of LNCS
-
Zhu, Y., Fu, X., Graham, B., Bettati, R. and Zhao, W. (2004) ‘On flow correlation attacks and countermeasures in mix networks’, Proceedings of Privacy Enhancing Technologies workshop (PET2004), Vol. 3424 of LNCS, pp.207–225.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop (PET2004)
, vol.3424
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
29
-
-
84952959881
-
-
Although Crowds may not use the classical Chaum’s mix, for simplicity, we still use the name of ‘mix’ to refer to a single anonymity network hop, and our theory can be applied to all the rerouting-based anonymity networks
-
Although Crowds may not use the classical Chaum’s mix, for simplicity, we still use the name of ‘mix’ to refer to a single anonymity network hop, and our theory can be applied to all the rerouting-based anonymity networks.
-
-
-
-
30
-
-
84952953882
-
-
We use an operational definition for ‘low-latency’. We call a communication system low-latency in this context when it does not unduly disrupt TCP connections under normal load conditions. Using this definition, TOR is clearly low-latency
-
We use an operational definition for ‘low-latency’. We call a communication system low-latency in this context when it does not unduly disrupt TCP connections under normal load conditions. Using this definition, TOR is clearly low-latency.
-
-
-
-
31
-
-
84952960602
-
-
Such a flow can be either a TCP connection or a segment of UDP packets that are part of a VOIP connection, or any other sequence of packets that represent a communication session. In the experiments described later, we are using the traffic from a FTP session as the flow
-
Such a flow can be either a TCP connection or a segment of UDP packets that are part of a VOIP connection, or any other sequence of packets that represent a communication session. In the experiments described later, we are using the traffic from a FTP session as the flow.
-
-
-
-
32
-
-
84952968258
-
-
We tacitly assume that incoming flows are unrelated and thus statistically independent from each other
-
We tacitly assume that incoming flows are unrelated and thus statistically independent from each other.
-
-
-
-
33
-
-
84952960427
-
-
In the following we will need to distinguish the frequency of an event as sampled from the collected data from the underlying distribution of the same event. We use the notation p for the frequency and p for the underlying distribution. Similarly, we use I to denote the estimated mutual information based on the sampled time series f and l. We denote the actual mutual information based on the underlying distributions as I
-
In the following we will need to distinguish the frequency of an event as sampled from the collected data from the underlying distribution of the same event. We use the notation p for the frequency and p for the underlying distribution. Similarly, we use I to denote the estimated mutual information based on the sampled time series f and l. We denote the actual mutual information based on the underlying distributions as I.
-
-
-
-
34
-
-
84952955416
-
-
The reason for the expansion at the points of the underlying distribution is that the original mutual information is based on the underlying distribution
-
The reason for the expansion at the points of the underlying distribution is that the original mutual information is based on the underlying distribution.
-
-
-
-
35
-
-
84952963052
-
-
In the simplified case where there are only two possible outcomes of (a, b), the distribution will be binomial distribution. For the case where there are more than two outcomes, the distribution will be multinomial
-
In the simplified case where there are only two possible outcomes of (a, b), the distribution will be binomial distribution. For the case where there are more than two outcomes, the distribution will be multinomial.
-
-
-
-
36
-
-
85086683316
-
-
f,lM→R1 (a, b). The subscript is removed for the sake of brevity
-
f,lM→R1 (a, b). The subscript is removed for the sake of brevity.
-
-
-
|