Back to Results
First PageMeta Content
Internet / Tor / Crowds / Degree of anonymity / Onion routing / Traffic analysis / Denial-of-service attack / Routing / ANts P2P / Internet privacy / Computing / Software


Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems Adam Back, Ulf M¨oller, and Anton Stiglic
Add to Reading List

Document Date: 2003-11-23 22:37:27


Open Document

File Size: 54,12 KB

Share Result on Facebook

Company

Anton Stiglic Zero-Knowledge Systems Inc. / /

/

Event

FDA Phase / /

Holiday

Assumption / /

IndustryTerm

Hardware systems / Internet Proxies / large scale networks / real-time mixes4 / distributed trust security systems / asynchronous network / web proxy / Internet infrastructure / web browsers / web browsing / communications links / Internet bandwidth / digital telephony / binary style search / alternate protocols / anonymity systems / actual communications / email protocols / software systems / Web requests / Internet traffic / web servers / negotiation algorithm / regular Internet / mix-net based systems / well understood protocols / web surfing / route creation protocol / multi-party computation protocol / intermediate router / web server / Internet users / synchronous network / /

OperatingSystem

DoS / /

Person

Wei Dai / Adam Shostack / Andreas Pfitzmann / Bill Heelan / Alice / Bob Figure / /

Position

forward IP packets / /

Product

This solution / /

Technology

multi-party computation protocol / resulting protocols / secret key / scheduling algorithm / IP protocol / so-called Onion Routers / public key encryption / encryption / email protocols / intermediate router / cryptography / reasonably well understood protocols / public key / key negotiation algorithm / route creation protocol / Network Address Translation / HTTP / ISP / web server / /

SocialTag