Improving anonymity using social links

@article{Puttaswamy2008ImprovingAU,
  title={Improving anonymity using social links},
  author={K. Puttaswamy and Alessandra Sala and B. Y. Zhao},
  journal={2008 4th Workshop on Secure Network Protocols},
  year={2008},
  pages={15-20}
}
Protecting user privacy in network communication is vital in todaypsilas open networking environment. Current anonymous routing protocols provide anonymity by forwarding traffic through a static path of randomly selected relay nodes. In practice, however, malicious relays can perform passive logging attacks to compromise the anonymity of a flow. This degradation is accelerated when nodes fail, forcing source node to reconstruct a path, and in doing so, leaking more information to passive… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS
9 Citations
25 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 25 references

A nearoptimal social network defense against sybil attacks

  • YU H., P. GIBBONS, M. KAMINSKY, F. XIAO
  • In Proc. of IEEE Symposium on Security and…
  • 2008
1 Excerpt

Limewire building social network

  • D. WILSON
  • ZeroPaid News,
  • 2008
2 Excerpts

Similar Papers

Loading similar papers…