Anonymity in p2p systems

P Manzanares-Lopez, JP Muñoz-Gea… - Handbook of Peer-to …, 2010 - Springer
In the last years, the use of peer-to-peer (P2P) applications to share and exchange
knowledge among people around the world has experienced an exponential growth …

Survey on anonymity in unstructured peer-to-peer systems

RY Xiao - Journal of computer science and technology, 2008 - Springer
Abstract Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms
of transfer efficiency, many systems try to mask the identities of their users for privacy …

Muon: Epidemic based mutual anonymity in unstructured p2p networks

N Bansod, A Malgi, BK Choi, J Mayo - Computer Networks, 2008 - Elsevier
A mutual anonymity system enables communication between a client and a service provider
without revealing their identities. In general, the anonymity guarantees made by the protocol …

[图书][B] Anonymity in structured peer-to-peer networks

N Borisov, J Waddle - 2005 - people.eecs.berkeley.edu
Existing peer-to-peer systems that aim to provide anonymity to its users are based on
networks with unstructured or loosely-structured routing algorithms. Structured routing offers …

[PDF][PDF] Bruit bait: Peer To Peer systems

P Devika, RS Ponmaga - International Journal of Computational …, 2012 - Citeseer
Anonymizing Peer-to-Peer (P2P) systems often incurs extra costs in terms of transfer
efficiency; many systems try to mask the identities of their users for privacy considerations …

Anonymity analysis of P2P anonymous communication systems

J Zhang, H Duan, W Liu, J Wu - Computer Communications, 2011 - Elsevier
Compared with traditional static Client/Server architecture, the P2P architecture is more
suitable for anonymous communication systems because it is more flexible and can keep …

A disconnection-aware mechanism to provide anonymity in two-level p2p systems

JP Muñoz-Gea, J Malgosa-Sanahuja… - … Conference on Software …, 2007 - Springer
In this paper, a disconnection-aware mechanism to provide anonymity in two-level P2P
systems is proposed. As usual, anonymity is obtained by means of connecting the source …

Formal notions of anonymity for peer-to-peer networks

J Kong - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise,
potential privacy attacks (eg, network address traceback) may deter a storage source from …

Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots

CC Chang, CY Lin, KC Lin - Journal of network and computer applications, 2007 - Elsevier
In this paper, we present two types of protocols that can achieve mutual anonymity in peer-to-
peer (P2P) network environments, which means the identities of the service, requesters and …

On the PET workshop panel “Mix cascades versus peer-to-peer: Is one concept superior?”

R Böhme, G Danezis, C Diaz, S Köpsell… - … Workshop, PET 2004 …, 2005 - Springer
Editors' note. Following the panel discussion on Mix Cascades versus P2P at PET 2004, we
invited the original panel proposers to write a summary of the discussion for the …