Packet momentum for identification of anonymity networks

K Shahbar, AN Zincir-Heywood - Journal of Cyber …, 2017 - journals.riverpublishers.com
Multilayer-encryption anonymity networks provide privacy which has become a significant
concern on today's Internet due to many attacks and privacy breaches. The anonymity and …

Analysis of multi-path onion routing-based anonymization networks

W De la Cadena, D Kaiser, A Mitseva… - Data and Applications …, 2019 - Springer
Anonymization networks (eg, Tor) help in protecting the privacy of Internet users. However,
the benefit of privacy protection comes at the cost of severe performance loss. This …

匿名通信与暗网综合治理.

兰浩良, 李馥娟, 王群, 印杰, 徐杰… - Journal of Frontiers …, 2022 - search.ebscohost.com
匿名通信所具有的节点发现难, 服务定位难, 通信关系确认难以及用户监控难等特点使得架构在
其之上的暗网中充斥着各种匿名滥用的违法犯罪活动. 为此, 学术界围绕匿名通信与暗网开展了 …

A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems

RA Haraty, B Zantout - Computers in Human Behavior, 2015 - Elsevier
The paper introduces a new collaborative technique for assuring data integrity while
avoiding traffic analysis and other types of similar attacks (eg, man-in-the-middle, data …

Context-aware IPv6 address hopping

M Marx, M Schwarz, M Blochberger, F Wille… - … Conference, ICICS 2019 …, 2020 - Springer
Different web browsers have developed approaches to better isolate the activities of users
on different websites. However, those only work on the application-level and using the user's …

[PDF][PDF] New challenges in digital forensics: online storage and anonymous communication

M Mulazzani - 2014, 2014 - publications.sba-research.org
This thesis is based on seven publications related to the area of digital forensics which were
published at conferences or in journals by ACM, IEEE, USENIX and IFIP. Digital forensics as …

[PDF][PDF] Online-Privatheitskompetenz und Möglichkeiten der technischen Umsetzung mit dem Anonymisierungsnetzwerk Tor

A Lux, F Platzer - Selbstbestimmung, Privatheit und Datenschutz …, 2022 - library.oapen.org
Ziel der vorliegenden Arbeit ist die Erstellung einer Anonymitätsmatrix. Der Fokus liegt
hierbei insbesondere in der Verbindung der technischen und psychologischen …

Analysis of multilayer-encryption anonymity networks

K Shahbar - 2017 - dalspace.library.dal.ca
The main goal of multilayer-encryption anonymity networks is to provide a certain level of
privacy to their users. At the same time, such networks could be misused to perform harmful …

Weighted factors for evaluating anonymity

K Shahbar, AN Zincir-Heywood - … , FPS 2017, Nancy, France, October 23 …, 2018 - Springer
Many systems provide anonymity for their users, and most of these systems work on the
separation between the users' identity and the final destination. The level of anonymity these …

Measuring anonymity using network coordinate systems

T Ries, R State, T Engel - 2011 11th International Symposium …, 2011 - ieeexplore.ieee.org
Popularity and awareness of anonymisation systems increased tremendously over the past
years, however only a very few systems made it from research to production. These systems …