I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
R Dingledine, N Mathewson… - USENIX security …, 2004 - css.csail.mit.edu
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by …
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the …
Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard to trace to their …
M Liberatore, BN Levine - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon classification algorithms, identifying …
L Overlier, P Syverson - 2006 IEEE Symposium on Security and …, 2006 - ieeexplore.ieee.org
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and …
A mix is a communication proxy that attempts to hide the correspondence between its incoming and outgoing messages. Timing attacks are a significant challenge for mix-based …
GD Bissias, M Liberatore, D Jensen… - … Workshop, PET 2005 …, 2006 - Springer
Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HTTP streams that is …
Low-latency anonymity systems such as Tor, AN. ON, Crowds, and Anonymizer. com aim to provide anonymous connections that are both untraceable by “local” adversaries who …