A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
[chapter]
2001
Lecture Notes in Computer Science
We discuss problems and trade-offs with systems providing anonymity for web browsing (or more generally any communication system that requires low latency interaction). We focus on two main systems: the Freedom network [12] and PipeNet [8] . Although Freedom is efficient and reasonably secure against denial of service attacks, it is vulnerable to some generic traffic analysis attacks, which we describe. On the other hand, we look at PipeNet, a simple theoretical model which protects against the
doi:10.1007/3-540-45496-9_18
fatcat:abj476orfzaizoazg4mmrapwb4