Evaluation of the anonymous I2P network's design choices against performance and security

JP Timpanaro, T Cholez, I Chrisment… - … Systems Security and …, 2015 - ieeexplore.ieee.org
Anonymous communications are growing extremely fast because more and more Internet
users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their …

AnoA: A framework for analyzing anonymous communication protocols

M Backes, A Kate, P Manoharan… - 2013 IEEE 26th …, 2013 - ieeexplore.ieee.org
Protecting individuals' privacy in online communications has become a challenge of
paramount importance. To this end, anonymous communication (AC) protocols such as the …

Compulsion resistant anonymous communications

G Danezis, J Clulow - International Workshop on Information Hiding, 2005 - Springer
We study the effect compulsion attacks, through which an adversary can request a
decryption or key from an honest node, have on the security of mix based anonymous …

Rac: A freerider-resilient, scalable, anonymous communication protocol

SB Mokhtar, G Berthou, A Diarra… - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Enabling anonymous communication over the Internet is crucial. The first protocols that have
been devised for anonymous communication are subject to freeriding. Recent protocols …

A TOR-based anonymous communication approach to secure smart home appliances

NP Hoang, D Pishva - 2015 17th International Conference on …, 2015 - ieeexplore.ieee.org
Digital information has become a social infrastructure and with the expansion of the Internet,
network infrastructure has become an indispensable part of social life and industrial activity …

A secure and anonymous communicate scheme over the internet of things

Q Sun, K Lin, C Si, Y Xu, S Li, P Gope - ACM Transactions on Sensor …, 2022 - dl.acm.org
Anonymous exchange of data has a strong demand in many scenarios. With the
development of IoT and wireless networks, plenty of smart devices are interconnected …

Preventing active timing attacks in low-latency anonymous communication

J Feigenbaum, A Johnson, P Syverson - … 2010, Berlin, Germany, July 21-23 …, 2010 - Springer
Low-latency anonymous communication protocols in general, and the popular onion-routing
protocol in particular, are broken against simple timing attacks. While there have been few …

[PDF][PDF] Secure and anonymous communication in the cloud

R Laurikainen - Aalto University School of Science and Technology …, 2010 - cse.hut.fi
Many communication systems provide confidentiality, integrity and availability to
communicating parties, yet few can also provide anonymous communication in a way that …

On the complexity of anonymous communication through public networks

M Ando, A Lysyanskaya, E Upfal - arXiv preprint arXiv:1902.06306, 2019 - arxiv.org
Onion routing is the most widely used approach to anonymous communication online. The
idea is that Alice wraps her message to Bob in layers of encryption to form an" onion," and …

A New k-Anonymous Message Transmission Protocol

G Yao, D Feng - … Applications: 5th International Workshop, WISA 2004 …, 2005 - Springer
Public and private communication networks have a growing importance for our daily life. The
globally networked society places great demand on the dissemination and sharing of person …