Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for …
Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
MJ Freedman, R Morris - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service, Tarzan is general-purpose and transparent to applications. Organized as a decentralized …
C Diaz, S Seys, J Claessens, B Preneel - International Workshop on …, 2002 - Springer
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. It considers attackers that …
M Liberatore, BN Levine - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon classification algorithms, identifying …
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low …
L Overlier, P Syverson - 2006 IEEE Symposium on Security and …, 2006 - ieeexplore.ieee.org
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and …
V Shmatikov, MH Wang - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship between its …
A mix is a communication proxy that attempts to hide the correspondence between its incoming and outgoing messages. Timing attacks are a significant challenge for mix-based …