dc.contributor.author | Lu, Huabo | |
dc.contributor.author | Bagai, Rajiv | |
dc.date.accessioned | 2019-02-15T19:42:20Z | |
dc.date.available | 2019-02-15T19:42:20Z | |
dc.date.issued | 2018-05-29 | |
dc.identifier.citation | Lu H., Bagai R. (2018) Cache Enhanced Anonymity Systems Against Probabilistic Attacks. In: Gaj P., Sawicki M., Suchacka G., Kwiecień A. (eds) Computer Networks. CN 2018. Communications in Computer and Information Science, vol 860. Springer, Cham | en_US |
dc.identifier.isbn | 978-3-319-92459-5 | |
dc.identifier.issn | 1865-0929 | |
dc.identifier.other | WOS:000455679200026 | |
dc.identifier.uri | https://doi.org/10.1007/978-3-319-92459-5_26 | |
dc.identifier.uri | http://hdl.handle.net/10057/15816 | |
dc.description | Click on the DOI link to access the article (may not be free). | en_US |
dc.description.abstract | The technique of data caching is being increasingly recognized for its ability to increase the amount of anonymity provided by an anonymous communication network, and is expected to be widely adopted in the next generation of these systems. We present a method to measure the degree of anonymity remaining in a cache enhanced anonymity system after a probabilistic attack has been carried out on it. Our method determines the probability distribution induced by the attack on all possible communication patterns of being the true one, from which a system-wide anonymity metric is developed. The scope of our metric, in terms of the attacks it is applicable to, is far wider than that of existing methods. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Springer, Cham | en_US |
dc.relation.ispartofseries | Computer Networks. CN 2018. Communications in Computer and Information Science;v.860 | |
dc.subject | Online anonymity | en_US |
dc.subject | Data caching | en_US |
dc.subject | Probabilistic attacks | en_US |
dc.subject | Measuring anonymity | en_US |
dc.subject | Shannon entropy | en_US |
dc.subject | Combinatorial matrix theory | en_US |
dc.title | Cache enhanced anonymity systems against probabilistic attacks | en_US |
dc.type | Conference paper | en_US |
dc.rights.holder | © Springer International Publishing AG, part of Springer Nature 2018 | en_US |