Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been …
Traffic analysis attacks can counteract end-to-end encryption and use leaked communication metadata to reveal information about communicating parties. With an ever …
A Melloni, M Stam, Ø Ytrehus - IMA International Conference on …, 2023 - Springer
An anonymous communication network (ACN) is designed to protect the identities of two parties communicating through it, even if an adversary controls or observes parts of the …
R Zou, X Lyu, J Ma, B Zhang… - IEEE/ACM Transactions on …, 2023 - ieeexplore.ieee.org
The increasing awareness of privacy preservation has led to a strong focus on mix networks (mixnets) protecting anonymity. As an efficient mixnet, cMix greatly reduces the latency, but …
F Jiang, Y Xia, W Yao, T Lu… - 2022 IEEE 46th Annual …, 2022 - ieeexplore.ieee.org
In order to better evaluate the anonymity of the Tor network, this paper evaluates the degree of the Tor network anonymity by calculating the probability of routing links being hijacked …