2006
DOI: 10.1109/jproc.2006.889687
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Mix Networks and Their Secure Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(42 citation statements)
references
References 59 publications
0
41
0
1
Order By: Relevance
“…The underlying HPSN [10] provides a mix network [13] or onion network [14], which provides for anonymity of the submitter as well as secure communication. Such approaches utilize a chain of proxy servers, which can provide anonymity for both parties, though in this case it is only required for the mobile device user.…”
Section: Effect Capturementioning
confidence: 99%
“…The underlying HPSN [10] provides a mix network [13] or onion network [14], which provides for anonymity of the submitter as well as secure communication. Such approaches utilize a chain of proxy servers, which can provide anonymity for both parties, though in this case it is only required for the mobile device user.…”
Section: Effect Capturementioning
confidence: 99%
“…Several studies in the mixnet literature have investigated this well-known tradeoff between anonymity and latency [35].…”
Section: B Limitations Of the Group Conceptmentioning
confidence: 99%
“…The time that a vehicle remains in the nonoverheard region while broadcasting safety messages, varies from [(RSU sep − 2r 0 )/s max , (RSU sep − 2r 0 )/s min ], where s min , s max are the minimum and maximum vehicle speeds, respectively. If the RSU sep = 1 km, 2 km, the silent period range is [10,20] secs, [35,70] secs, respectively, for a freeway. As a result, an increase in RSU sep , increases the time period of being not overheard, resulting in enhancement of anonymity as shown in Fig.…”
Section: G Comparison Of Silent Period With Rsu Separationmentioning
confidence: 99%
“…Radvin in [10] introduces another protocol in same method. In [5], [11], [14], [15], are another protocols that are base on blind signature. In [1], [2], [6], [9], we are introduced protocol who are base on anonymous Channel, homomorphic encryption and mix nets.…”
Section: Related Workmentioning
confidence: 99%