De-anonymizing and countermeasures in anonymous communication networks

M Yang, J Luo, Z Ling, X Fu… - IEEE Communications …, 2015 - ieeexplore.ieee.org
To fulfill global requirements for network security and privacy, anonymous communication
systems have been extensively investigated and deployed over the world to provide …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

Designing and attacking anonymous communication systems

G Danezis - 2004 - cl.cam.ac.uk
Designing and attacking anonymous communication systems Page 1 Technical Report Number
594 Computer Laboratory UCAM-CL-TR-594 ISSN 1476-2986 Designing and attacking …

How to find hidden users: A survey of attacks on anonymity networks

E Erdin, C Zachor, MH Gunes - IEEE Communications Surveys …, 2015 - ieeexplore.ieee.org
Communication privacy has been a growing concern, particularly with the Internet becoming
a major hub of our daily interactions. Revelations of government tracking and corporate …

Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics

D Kelly, R Raines, R Baldwin… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
The desire to preserve privacy in cyberspace drives research in the area of anonymous
networks. Any entity operating in cyberspace is susceptible to debilitating cyber attacks. As …

Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Towards a taxonomy of wired and wireless anonymous networks

D Kelly, R Raines, R Baldwin, B Mullins… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
With the aim to preserve privacy over a communications network, a plethora of anonymous
protocols have been proposed along with many empirical investigations into specific …

SAS: A scalar anonymous communication system

H Xu, X Fu, Y Zhu, R Bettati, J Chen, W Zhao - International Conference on …, 2005 - Springer
Anonymity technologies have gained more and more attention for communication privacy. In
general, users obtain anonymity at a certain cost in an anonymous communication system …

A quantitative analysis of anonymous communications

Y Guan, X Fu, R Bettati, W Zhao - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
This paper quantitatively analyzes anonymous communication systems (ACS) with regard to
anonymity properties. Various ACS have been designed & implemented. However, there are …

A survey on anonymous communication systems with a focus on dining cryptographers networks

M Shirali, T Tefke, RC Staudemeyer, HC Pöhls - IEEE Access, 2023 - ieeexplore.ieee.org
Traffic analysis attacks can counteract end-to-end encryption and use leaked
communication metadata to reveal information about communicating parties. With an ever …