Slotted Packet Counting Attacks on Anonymity Protocols.
Volker FusenigEugen StaabUli SorgerThomas EngelPublished in: AISC (2009)
Keyphrases
- security protocols
- stepping stones
- security properties
- data publishing
- cryptographic protocols
- trusted third party
- security flaws
- packet loss
- countermeasures
- packet delivery
- anonymous communication
- normal traffic
- traffic analysis
- security mechanisms
- watermarking scheme
- medium access
- authentication protocol
- privacy preservation
- location privacy
- information loss
- application layer
- network layer
- privacy protection
- network devices
- ad hoc networks
- computer networks
- privacy preserving