A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to achieve blocking resistance for existing systems enabling anonymous web surfing
2004
Proceedings of the 2004 ACM workshop on Privacy in the electronic society - WPES '04
We are developing a blocking resistant, practical and usable system for anonymous web surfing. ...
The proposed solution is an add-on to existing anonymity systems. First we give a classification of blocking criteria and some general countermeasures. ...
For these reasons our goal is to develop a practical, usable and blocking resistant system for anonymous web surfing. ...
doi:10.1145/1029179.1029197
dblp:conf/wpes/KopsellH04
fatcat:sf4zwgdg2bal7htwsyo2qxmy24
On the Feasibility of a Censorship Resistant Decentralized Name System
[chapter]
2014
Lecture Notes in Computer Science
We survey the existing range of ideas for the realization of such a system and discuss the challenges these systems have to overcome in practice. ...
This paper maps the design space and gives design requirements for censorship resistant name systems. ...
We thank everyone who submitted information about their browser history for our study of surfing behavior. ...
doi:10.1007/978-3-319-05302-8_2
fatcat:v63av2ukjjfarl3vl3aykqpqoe
Denial of Service: Another Example
[chapter]
2002
IFIP Advances in Information and Communication Technology
The author is grateful to anonymous reviewers of ACM NSPW'OI (New Security Paradigm Workshop) and IFIP SEC2002 for their helpful comments. ...
Dynamic DNS [14] enables different web servers with different IP addresses to share a single DNS name, and this technique is also useful for defending the blocking DoS attack. ...
The Freedom network [6] enabled a user to anonymously browse websites with a nym, and it supported encrypted anonymous communication between a browser and a web server. ...
doi:10.1007/978-0-387-35586-3_12
fatcat:ba5pdp2mufddvoiviq3yiqu6qi
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring
[chapter]
2005
Lecture Notes in Computer Science
More general problems with anonymizing networks is ongoing research, like adding blocking resistance and how to make the anonymizing traffic to look like normal Internet traffic, etc. ...
Censorship resistance may be achieved by using hidden services. ...
doi:10.1007/11599371_22
fatcat:zy4k5yr7orc5nbuwesuov5buay
Message in a bottle
2013
Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13
We believe that, to achieve resilience to blocking, anti-censorship systems must abandon the idea of having a limited number of entry points. ...
To block this system, censors are left with a needle-in-a-haystack problem: Unable to identify what bears hidden messages, they must block everything, effectively disconnecting their own network from a ...
These systems focus on hiding the user identities from the websites they are surfing to. They have a low latency, which makes web surfing possible (which miab does not). ...
doi:10.1145/2523649.2523654
dblp:conf/acsac/InvernizziKV13
fatcat:2o4kcwororgwpmdsudaq6j35hi
On the risks of serving whenever you surf
2009
Proceedings of the 8th ACM workshop on Privacy in the electronic society - WPES '09
These shortcomings lead to an attack that can expose the IP address of bridge operators visiting certain web sites over Tor. We also discuss mitigation mechanisms. ...
clients connected to a bridge interferes with traffic to and from the bridge operator. ...
Acknowledgments We thank our shepherd, Steven Murdoch, for helpful suggestions regarding the presentation of our attack; Chris Arnold and Tim Stucki for sharing the results of their open proxy survey; ...
doi:10.1145/1655188.1655193
dblp:conf/wpes/McLachlanH09
fatcat:2lopglt6svempjs3fd5mzkp6ue
Project "anonymity and unobservability in the Internet"
2000
Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP '00
It is a hard problem to achieve anonymity for real-time services in the Internet (e.g. Web access). ...
However, some of the existing concepts enable an attacker to flood the system in order to separate a certain message. 5. ...
During the last three years we developed several Mix-based and proxy-based anonymity services (for Web surfing and similar real-time services). ...
doi:10.1145/332186.332211
fatcat:cunb7jbp4bhuvhzzktuo6dpvde
The architecture of robust publishing systems
2001
ACM Transactions on Internet Technology
We also thank Ricardo Anguiano, Adam Back, Ed Felten, Ian Goldberg, Oscar Hernandez, Graydon Hoare, Benny Pinkas, Adam Shostack, Anton Stiglic, Alex Taler, and the anonymous reviewers for their helpful ...
ACKNOWLEDGMENTS We thank Usenix for supporting this work. ...
EXISTING SYSTEMS In this section we describe how existing systems achieve the stated goals. The discussion focuses mostly on Publius, as that is the system that we implemented. ...
doi:10.1145/502152.502154
fatcat:56rshw2dbjazdfar5uozarrxcy
Leveraging Internet Services to Evade Censorship
[chapter]
2016
Lecture Notes in Computer Science
To address this limitation of state-of-theart systems, we introduce Camouflage, an approach to combine multiple non-blocked communication protocols and dynamically switch among these tunnels. ...
Each protocol is only used for a limited amount of time and the Internet connection is transparently routed through instances of different censorship circumvention systems. ...
Thus, to show that a circumvention system must only be used for accessing censored web pages, and not for web surfing, we measured its performance. ...
doi:10.1007/978-3-319-45871-7_16
fatcat:apxegrxl5jgynltc5bjqih4r2e
An Analysis of Active Attacks on Anonymity Systems
2016
International Journal of Security and Its Applications
As a result, the research on anonymous communication system is gradually increasing. ...
Anonymous technology is the best way to solve the privacy protection. ...
Researchers from Dresden University of Technology analyze how to achieve blocking resistance for existing systems enabling anonymous web surfing and put forward the means of Defense in 2004 [2] . ...
doi:10.14257/ijsia.2016.10.4.11
fatcat:7jx4wlj65jghnd7tk32xjmmfca
Towards Pseudonymous e-Commerce
2004
Electronic Commerce Research
Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. ...
In this paper, we present novel components that enable secure pseudonymous e-commerce. ...
The Freedom System [Boucher et al., 4] was a commercial service provided by Zeroknowledge Systems to enable users to browse the Web anonymously. ...
doi:10.1023/b:elec.0000009283.82564.25
fatcat:og4ilt4yojeiphwevxrgbrjmw4
To accurately detect search poisoning cases, we designed a novel detection system called SURF. ...
Our evaluation on realworld search poisoning instances shows that SURF can achieve a detection rate of 99.1% at a false positive rate of 0.9%. ...
At the same time, SURF can be deployed at each single client to detect (and block) poisoned search results. ...
doi:10.1145/2046707.2046762
dblp:conf/ccs/LuPL11
fatcat:oq2dpsqxu5egflwhwfz3hzxgim
Design of Distributed Voting Systems
[article]
2017
arXiv
pre-print
We use the experiences and the building blocks of existing systems to combine them to another more secure system. ...
Our contribution to this topic is a modification of the proof-of-stake, which enables the usage of common devices, like smartphones or tablets, for the blockchain verification and inclusion of new ballots ...
Application Architecture As we have defined how to register and authenticate, we can now describe how the application could look like and which blocks from existing systems can be taken. ...
arXiv:1702.02566v1
fatcat:ztqb3nk4mjcgxaghlfkelrbtuu
Comparative Analysis of Low Latency Anonymous Communication Systems
2018
Proceedings of Telecommunication Universities
Thus, anonymity has turned into an essential and legitimate aim in numerous applications, including anonymous web surfing, location based services, and E-voting. ...
This study compares existing implementation of various low latency anonymous communication systems, more precisely, onion routing techniques, with respect to user requirements such as performance, reliability ...
While TOR expects to enable anonymous access to the Internet to ensure the clients privacy and access to blocked or confined sites, I2P secures messages inside its system and provides all members access ...
doi:10.31854/1813-324x-2018-4-3-85-97
fatcat:wwh45vct2befdks2ef64wwagnu
A Survey on Privacy Preserving in Authentication Protocol for Shared Authority Based Cloud Computing
2017
International Journal for Research in Applied Science and Engineering Technology
protocol (SecCloud) to resolve privacy and security issue for cloud storage.. ...
in information sharing among the multiple users in cloud storage. so as to avoid of these things, a system is projected during which a shared authority primarily based privacy-preserving authentication ...
In proposed scheme we add user revocation in users to enable activating and deactivating users to enhance efficiency of system and adding more feasibility. ...
doi:10.22214/ijraset.2017.3096
fatcat:jb2ujj3h2fbupfgbmejo764vgq
« Previous
Showing results 1 — 15 out of 1,765 results