2004
DOI: 10.1007/978-3-540-30108-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Comparison Between Two Practical Mix Designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Other works have considered the timing characteristics of Tor and other anonymity networks in the context of timing attacks on anonymity (Danezis, 2004;Diaz et al, 2004;Shmatikov and Wang, 2006;Murdoch and Watson, 2008).…”
Section: Related Workmentioning
confidence: 99%
“…Other works have considered the timing characteristics of Tor and other anonymity networks in the context of timing attacks on anonymity (Danezis, 2004;Diaz et al, 2004;Shmatikov and Wang, 2006;Murdoch and Watson, 2008).…”
Section: Related Workmentioning
confidence: 99%
“…The social class is inextricably involved with the model and abstract classes in the measurement framework of all three domains. In political science, there is a somewhat pervasive antagonism toward rationalizing power (Diaz et al 2004).…”
Section: Foundations In Systems Integrationmentioning
confidence: 99%
“…Continuous mixes were also implemented (with some modifications) with the name 'Reliable' as part of the Mixmaster network, where they interoperated with the Mixmaster pool mixes. Several vulnerabilities of the deployed 'Reliable' were pointed out by Diaz et al, who also showed that they did not guarantee any minimum level of anonymity in practice given low traffic levels [25].…”
Section: High-latency Acssmentioning
confidence: 99%