By Topic

Evaluation of anonymity providing techniques using queuing theory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
1 Author(s)
D. Kesdogan ; IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA

In our work we use queuing theory both for security (ie, anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today's deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their performance characteristics on the Internet

Published in:

Local Computer Networks, 2001. Proceedings. LCN 2001. 26th Annual IEEE Conference on

Date of Conference: