Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems

@inproceedings{Back2001TrafficAA,
  title={Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  author={Adam Back and Ulf M{\"o}ller and Anton Stiglic},
  booktitle={Information Hiding},
  year={2001}
}
Wediscussproblemsandtrade-ofs with systemsproviding anonymity for webbrowsing(or moregenerallyany communicationsystemthatrequireslow latency interaction).We focuson two main systems:theFreedomnetwork [12] andPipeNet[8]. AlthoughFreedomis efficientandreasonablysecureagainstdenial of serviceattacks,it is vulnerableto somegenerictraffic analysisattacks, which we describe.On theotherhand,we look at PipeNet,a simpletheoretical modelwhich protectsagainstthetraffic analysisattackswe point out,but is… CONTINUE READING
Highly Cited
This paper has 322 citations. REVIEW CITATIONS

1 Figure or Table

Topic

Statistics

02040'03'05'07'09'11'13'15'17
Citations per Year

323 Citations

Semantic Scholar estimates that this publication has 323 citations based on the available data.

See our FAQ for additional information.