Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics

D Kelly, R Raines, R Baldwin… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
The desire to preserve privacy in cyberspace drives research in the area of anonymous
networks. Any entity operating in cyberspace is susceptible to debilitating cyber attacks. As …

Towards a taxonomy of wired and wireless anonymous networks

D Kelly, R Raines, R Baldwin, B Mullins… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
With the aim to preserve privacy over a communications network, a plethora of anonymous
protocols have been proposed along with many empirical investigations into specific …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Towards measuring resilience in anonymous communication networks

F Shirazi, C Diaz, J Wright - Proceedings of the 14th ACM Workshop on …, 2015 - dl.acm.org
Prior research on anonymous communication networks has focused, to a large extent, on
achieving, measuring, and evaluating anonymity properties. In this work we address another …

Towards Application-Aware Anonymous Routing.

M Sherr, BT Loo, M Blaze - HotSec, 2007 - usenix.org
This paper investigates the problem of designing anonymity networks that meet application-
specific performance and security constraints. We argue that existing anonymity networks …

A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

[图书][B] A taxonomy for and analysis of anonymous communications networks

DJ Kelly - 2009 - search.proquest.com
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks
intended to gather intelligence and disrupt communications rapidly replacing the threat of …

Comprehensive anonymity trilemma: User coordination is not enough

D Das, S Meiser, E Mohammadi… - Proceedings on Privacy …, 2020 - petsymposium.org
For anonymous communication networks (ACNs), Das et al. recently confirmed a long-
suspected trilemma result that ACNs cannot achieve strong anonymity, low latency …

[PDF][PDF] Challenges in deploying low-latency anonymity

R Dingledine, N Mathewson, P Syverson - NRL CHACS Report, 2005 - Citeseer
There are many unexpected or unexpectedly difficult obstacles to deploying anonymous
communications. Drawing on our experiences deploying Tor (the second-generation onion …

Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two

D Das, S Meiser, E Mohammadi… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
This work investigates the fundamental constraints of anonymous communication (AC)
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …