Filters








1,765 Hits in 7.3 sec

How to achieve blocking resistance for existing systems enabling anonymous web surfing

Stefan K�psell, Ulf Hillig
2004 Proceedings of the 2004 ACM workshop on Privacy in the electronic society - WPES '04  
We are developing a blocking resistant, practical and usable system for anonymous web surfing.  ...  The proposed solution is an add-on to existing anonymity systems. First we give a classification of blocking criteria and some general countermeasures.  ...  For these reasons our goal is to develop a practical, usable and blocking resistant system for anonymous web surfing.  ... 
doi:10.1145/1029179.1029197 dblp:conf/wpes/KopsellH04 fatcat:sf4zwgdg2bal7htwsyo2qxmy24

On the Feasibility of a Censorship Resistant Decentralized Name System [chapter]

Matthias Wachs, Martin Schanzenbach, Christian Grothoff
2014 Lecture Notes in Computer Science  
We survey the existing range of ideas for the realization of such a system and discuss the challenges these systems have to overcome in practice.  ...  This paper maps the design space and gives design requirements for censorship resistant name systems.  ...  We thank everyone who submitted information about their browser history for our study of surfing behavior.  ... 
doi:10.1007/978-3-319-05302-8_2 fatcat:v63av2ukjjfarl3vl3aykqpqoe

Denial of Service: Another Example [chapter]

Jianxin Jeff Yan
2002 IFIP Advances in Information and Communication Technology  
The author is grateful to anonymous reviewers of ACM NSPW'OI (New Security Paradigm Workshop) and IFIP SEC2002 for their helpful comments.  ...  Dynamic DNS [14] enables different web servers with different IP addresses to share a single DNS name, and this technique is also useful for defending the blocking DoS attack.  ...  The Freedom network [6] enabled a user to anonymously browse websites with a nym, and it supported encrypted anonymous communication between a browser and a web server.  ... 
doi:10.1007/978-0-387-35586-3_12 fatcat:ba5pdp2mufddvoiviq3yiqu6qi

Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring [chapter]

Lasse Øverlier, Tønnes Brekne, André Årnes
2005 Lecture Notes in Computer Science  
More general problems with anonymizing networks is ongoing research, like adding blocking resistance and how to make the anonymizing traffic to look like normal Internet traffic, etc.  ...  Censorship resistance may be achieved by using hidden services.  ... 
doi:10.1007/11599371_22 fatcat:zy4k5yr7orc5nbuwesuov5buay

Message in a bottle

Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
We believe that, to achieve resilience to blocking, anti-censorship systems must abandon the idea of having a limited number of entry points.  ...  To block this system, censors are left with a needle-in-a-haystack problem: Unable to identify what bears hidden messages, they must block everything, effectively disconnecting their own network from a  ...  These systems focus on hiding the user identities from the websites they are surfing to. They have a low latency, which makes web surfing possible (which miab does not).  ... 
doi:10.1145/2523649.2523654 dblp:conf/acsac/InvernizziKV13 fatcat:2o4kcwororgwpmdsudaq6j35hi

On the risks of serving whenever you surf

Jon McLachlan, Nicholas Hopper
2009 Proceedings of the 8th ACM workshop on Privacy in the electronic society - WPES '09  
These shortcomings lead to an attack that can expose the IP address of bridge operators visiting certain web sites over Tor. We also discuss mitigation mechanisms.  ...  clients connected to a bridge interferes with traffic to and from the bridge operator.  ...  Acknowledgments We thank our shepherd, Steven Murdoch, for helpful suggestions regarding the presentation of our attack; Chris Arnold and Tim Stucki for sharing the results of their open proxy survey;  ... 
doi:10.1145/1655188.1655193 dblp:conf/wpes/McLachlanH09 fatcat:2lopglt6svempjs3fd5mzkp6ue

Project "anonymity and unobservability in the Internet"

Oliver Berthold, Hannes Federrath, Marit Köhntopp
2000 Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP '00  
It is a hard problem to achieve anonymity for real-time services in the Internet (e.g. Web access).  ...  However, some of the existing concepts enable an attacker to flood the system in order to separate a certain message. 5.  ...  During the last three years we developed several Mix-based and proxy-based anonymity services (for Web surfing and similar real-time services).  ... 
doi:10.1145/332186.332211 fatcat:cunb7jbp4bhuvhzzktuo6dpvde

The architecture of robust publishing systems

Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
2001 ACM Transactions on Internet Technology  
We also thank Ricardo Anguiano, Adam Back, Ed Felten, Ian Goldberg, Oscar Hernandez, Graydon Hoare, Benny Pinkas, Adam Shostack, Anton Stiglic, Alex Taler, and the anonymous reviewers for their helpful  ...  ACKNOWLEDGMENTS We thank Usenix for supporting this work.  ...  EXISTING SYSTEMS In this section we describe how existing systems achieve the stated goals. The discussion focuses mostly on Publius, as that is the system that we implemented.  ... 
doi:10.1145/502152.502154 fatcat:56rshw2dbjazdfar5uozarrxcy

Leveraging Internet Services to Evade Censorship [chapter]

Apostolis Zarras
2016 Lecture Notes in Computer Science  
To address this limitation of state-of-theart systems, we introduce Camouflage, an approach to combine multiple non-blocked communication protocols and dynamically switch among these tunnels.  ...  Each protocol is only used for a limited amount of time and the Internet connection is transparently routed through instances of different censorship circumvention systems.  ...  Thus, to show that a circumvention system must only be used for accessing censored web pages, and not for web surfing, we measured its performance.  ... 
doi:10.1007/978-3-319-45871-7_16 fatcat:apxegrxl5jgynltc5bjqih4r2e

An Analysis of Active Attacks on Anonymity Systems

Tianbo Lu, Pan Gao, Xiaofeng Du, Yang Li
2016 International Journal of Security and Its Applications  
As a result, the research on anonymous communication system is gradually increasing.  ...  Anonymous technology is the best way to solve the privacy protection.  ...  Researchers from Dresden University of Technology analyze how to achieve blocking resistance for existing systems enabling anonymous web surfing and put forward the means of Defense in 2004 [2] .  ... 
doi:10.14257/ijsia.2016.10.4.11 fatcat:7jx4wlj65jghnd7tk32xjmmfca

Towards Pseudonymous e-Commerce

Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, David Hutchison
2004 Electronic Commerce Research  
Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers.  ...  In this paper, we present novel components that enable secure pseudonymous e-commerce.  ...  The Freedom System [Boucher et al., 4] was a commercial service provided by Zeroknowledge Systems to enable users to browse the Web anonymously.  ... 
doi:10.1023/b:elec.0000009283.82564.25 fatcat:og4ilt4yojeiphwevxrgbrjmw4

SURF

Long Lu, Roberto Perdisci, Wenke Lee
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
To accurately detect search poisoning cases, we designed a novel detection system called SURF.  ...  Our evaluation on realworld search poisoning instances shows that SURF can achieve a detection rate of 99.1% at a false positive rate of 0.9%.  ...  At the same time, SURF can be deployed at each single client to detect (and block) poisoned search results.  ... 
doi:10.1145/2046707.2046762 dblp:conf/ccs/LuPL11 fatcat:oq2dpsqxu5egflwhwfz3hzxgim

Design of Distributed Voting Systems [article]

Christian Meter
2017 arXiv   pre-print
We use the experiences and the building blocks of existing systems to combine them to another more secure system.  ...  Our contribution to this topic is a modification of the proof-of-stake, which enables the usage of common devices, like smartphones or tablets, for the blockchain verification and inclusion of new ballots  ...  Application Architecture As we have defined how to register and authenticate, we can now describe how the application could look like and which blocks from existing systems can be taken.  ... 
arXiv:1702.02566v1 fatcat:ztqb3nk4mjcgxaghlfkelrbtuu

Comparative Analysis of Low Latency Anonymous Communication Systems

I. Murtala, O.A. Tiamiyu
2018 Proceedings of Telecommunication Universities  
Thus, anonymity has turned into an essential and legitimate aim in numerous applications, including anonymous web surfing, location based services, and E-voting.  ...  This study compares existing implementation of various low latency anonymous communication systems, more precisely, onion routing techniques, with respect to user requirements such as performance, reliability  ...  While TOR expects to enable anonymous access to the Internet to ensure the clients privacy and access to blocked or confined sites, I2P secures messages inside its system and provides all members access  ... 
doi:10.31854/1813-324x-2018-4-3-85-97 fatcat:wwh45vct2befdks2ef64wwagnu

A Survey on Privacy Preserving in Authentication Protocol for Shared Authority Based Cloud Computing

Thoke Virendra Dilip
2017 International Journal for Research in Applied Science and Engineering Technology  
protocol (SecCloud) to resolve privacy and security issue for cloud storage..  ...  in information sharing among the multiple users in cloud storage. so as to avoid of these things, a system is projected during which a shared authority primarily based privacy-preserving authentication  ...  In proposed scheme we add user revocation in users to enable activating and deactivating users to enhance efficiency of system and adding more feasibility.  ... 
doi:10.22214/ijraset.2017.3096 fatcat:jb2ujj3h2fbupfgbmejo764vgq
« Previous Showing results 1 — 15 out of 1,765 results