Learn More
Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to(More)
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it. However, providing location privacy and client anonymity also makes Tor hidden services an attractive platform for every kind of imagin-able(More)
—Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard to trace to their origin it can also provide receiver privacy for Internet services through a feature called " hidden services ". In this paper we expose flaws both in the design and implementation of(More)
—Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research shows that this level(More)
In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved(More)
—Initially, IEEE 802.11 standard was not designed for multihop networks, but its market success gave it a powerful incentive, and nowadays IEEE 802.11 Working Group is preparing various amendments and looking for new application scenarios to ensure future success in the market. In this paper, we analyze the performance of an IEEE 802.11s mesh network and(More)
Tor is a widely used anonymity network providing low-latency communication capabilities. Around 400,000 users per day use Tor to route TCP traffic through a sequence of relays; three hops are selected from a pool of currently almost 3000 volunteer-operated Tor relays to comprise a route through the network for a limited time. In comparison to single-hop(More)
In wireless mesh networks, when a packet is relayed by a station, it can get into collision with another packet of the same flow. This effect is called intra-flow interference. In this paper we propose an analytical model to study the problem of intra-flow interference. Taking into account collisions caused by both neighbor stations and hidden stations , we(More)
  • 1