نتایج جستجو برای: anonymity

تعداد نتایج: 5605  

2016
Michael Backes Sebastian Meiser Marcin Slowik

In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that compromise Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First, we provide an algorithmic approach for computing the anonymity impact of such structural attacks against Tor. The algorithm is parametric in t...

1998
John Donne Joos Vandewalle Geert Deconinck Joris Claessens Andrei Serjantov Len Sassaman George Danezis Roger Dingledine Andreas Pfitzmann Paul Syverson Ben Laurie Joss Wright Danny De Cock Klaus Kursawe Svetla Nikova Jasper Scholten Elvira Wouters

This thesis presents information theoretic anonymity metrics and various analysis of anonymous communication nodes. Our contributions are a step towards the understanding of anonymity properties and the development of robust anonymous communications. Anonymous communications are an essential building block for privacy-enhanced applications, as the data available at the communication layer may l...

Journal: :Journal of Financial Markets 2014

Journal: :Maastricht Journal of European and Comparative Law 2019

Journal: :ACM Transactions on Economics and Computation 2016

2017
Tom Chothia Simona Orzan Jun Pang Mohammad Torabi Dashti

We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given proto...

1998
Dogan Kesdogan Jan Egner Roland Büschkes

Currently known basic anonymity techniques depend on identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a general lack of information (e.g. on the Internet), an adversary can participate several times in a communication relationship and observe the honest users. In this paper we focus on the problem of providing anonymity without id...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید