2004
DOI: 10.1007/978-3-540-30114-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Disclosure or Intersection Attacks on Anonymity Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
101
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 111 publications
(102 citation statements)
references
References 11 publications
1
101
0
Order By: Relevance
“…7 We simulate a population of N users users with f contacts each, to whom they send messages with equal probability (i.e., p j,i = 1/f if i is friends with j, zero otherwise). In order to easily study the influence of the system parameters on the success of the attack, in our simulations we further fix the senders that send messages to each receiver to be f j = f .…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…7 We simulate a population of N users users with f contacts each, to whom they send messages with equal probability (i.e., p j,i = 1/f if i is friends with j, zero otherwise). In order to easily study the influence of the system parameters on the success of the attack, in our simulations we further fix the senders that send messages to each receiver to be f j = f .…”
Section: Methodsmentioning
confidence: 99%
“…The attack estimates user profiles by solving a Least Squares problem, ensuring that the mean squared error between the real and estimated profiles is minimized. We empirically show that our attack indeed minimizes the mean squared error with respect to heuristic disclosure attack variants [3,7,21], although it performs slightly worse than the Bayesian approach [8] in the scenarios considered in this paper.…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations