A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks
Traffic analysis attacks can counteract end-to-end encryption and use leaked communication metadata to reveal information about communicating parties. With an ever-increasing amount of traffic by an ever-increasing number of networked devices, communication privacy is undermined. Therefore, Anonymou...
Main Authors: | Mohsen Shirali, Tobias Tefke, Ralf C. Staudemeyer, Henrich C. Pohls |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10038585/ |
Similar Items
-
An anonymization-based privacy-preserving data collection protocol for digital health data
by: J. Andrew, et al.
Published: (2023-03-01) -
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
by: Niluka Amarasinghe, et al.
Published: (2021-03-01) -
Rank-Label Anonymization for the Privacy-Preserving Publication of a Hypergraph Structure
by: Debasis Mohapatra, et al.
Published: (2022-01-01) -
Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness
by: Rupali Gangarde, et al.
Published: (2021-11-01) -
KAB: A new k-anonymity approach based on black hole algorithm
by: Lynda Kacha, et al.
Published: (2022-07-01)