In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Qiyan WangPrateek MittalNikita BorisovPublished in: CCS (2010)
Keyphrases
- communication systems
- digital signature scheme
- information processing systems
- computer systems
- structured peer to peer
- underwater acoustic
- blind equalization
- communication technologies
- security protocols
- chosen plaintext
- multiple access
- security mechanisms
- countermeasures
- watermarking scheme
- peer to peer
- databases
- standard model
- signature scheme
- insider attacks
- secure routing
- trusted platform module
- wireless sensor networks
- machine learning
- data mining