Back to Results
First PageMeta Content
Relay / Internet / Tor / Onion routing / Anonymity / Reputation / Internet privacy / Electrical engineering / Electromagnetism


Analyzing an Adaptive Reputation Metric for Anonymity Systems Anupam Das Nikita Borisov
Add to Reading List

Document Date: 2014-04-09 16:42:43


Open Document

File Size: 329,08 KB

Share Result on Facebook

City

Raleigh / TABRIZ / AMVAR / /

Company

Computer-Communication Networks / P2P Networks / Efficient Recommender Systems / Mobile Ad Hoc Networks / M C C OY / Tor / Low-Latency Mix Systems / /

Country

United States / /

Currency

USD / /

/

Event

Business Partnership / /

Facility

Computer Engineering University of Illinois / Anonymity Systems Anupam Das Nikita Borisov Matthew Caesar University of Illinois / Computer Science University of Illinois / /

IndustryTerm

individual router / closed loop systems / distributed reputation systems / communication systems / anonymous communications / selfish/malicious routers / anonymity systems / client-side accounting mechanism / conventional bandwidth-proportional path construction protocol / protocols routers / online mail / reputation systems / relays/routers / detection algorithm / computing / wireless adhoc networks / anonymity network / Web-based recommender systems / on building distributed reputation systems / /

OperatingSystem

DoS / /

Organization

National Science Foundation / pp. / Electronic Society / USENIX Association / University of Illinois / K. Dutch government / IEEE Computer Society / Urbana-Champaign Department of Electrical / Urbana-Champaign Department / /

Person

Mike Perry / David M. Nicol / Tor Relay / M ISRA / V / Entry Exit / Anupam Das Nikita Borisov Matthew / /

Position

hb / guard / compromised guard / https /

ProgrammingLanguage

FP / L / /

ProvinceOrState

South Dakota / /

Technology

Privacy Enhancing Technologies / onion encryption / individual router / pdf / encryption / selfish/malicious routers / protocols routers / Cryptography / TCP/IP protocols / Eigentrust Algorithm / flow control / Second-generation Onion Router / filtering protocol / ISP / http / simulation / participating relays/routers / detection algorithm / conventional bandwidth-proportional path construction protocol / /

URL

www.eff.org/deeplinks/2012/10/dutchgovernment-proposes-cyberattacks-against-everyone / http /

SocialTag