Degree of anonymity

In anonymity networks (e.g., Tor, Crowds, Mixmaster, Tarzan, etc.), it is important to be able to measure quantitatively the guarantee that is given… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create… (More)
  • figure 1
  • table 1
  • figure 6
  • figure 7
  • table 2
Is this relevant?
2014
2014
Bitcoin is a peer-to-peer cryptocurrency that prevents double spending using a distributed public ledger (known as the blockchain… (More)
Is this relevant?
2013
2013
Tor, the most popular deployed distributed onion routing network, suffers from performance and scalability problems stemming from… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Anonymous communication aims to hide the relationship between communicating parties on the Internet. It is the technical basis… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 5
Is this relevant?
2010
2010
Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based… (More)
  • figure 1.2
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 3.2
Is this relevant?
2009
2009
Motivated by applications like sensor, peer to peer networks there has been growing interest in monitoring large scale… (More)
  • figure 1
  • figure 2
Is this relevant?
2004
2004
As grid computing scales up in size and diversity, anonymous communications are desirable, and sometimes vital, for certain… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2003
2003
Like many peer-to-peer applications, anonymous communication systems are vulnerable to freeriders, peers that use the system… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for… (More)
Is this relevant?
2002
2002
There is an increasing concern about the protection of anonymity and privacy in electronic services. Many web sites store and… (More)
Is this relevant?