1998
DOI: 10.1145/290163.290168
|View full text |Cite
|
Sign up to set email alerts
|

Crowds

Abstract: In this paper we introduce a system called Crowds for protecting users' anonymity on the world-wide-web. Crowds, named for the notion of “blending into a crowd,” operates by grouping users into a large and geographically diverse group (crowd) that collectively issues requests on behalf of its members. Web servers are unable to learn the true source of a request because it is equally likely to have originated from any member of the crowd, and even collaborating crowd members cannot distinguish the originator of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

12
843
0
1

Year Published

2004
2004
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 1,349 publications
(856 citation statements)
references
References 11 publications
12
843
0
1
Order By: Relevance
“…Privacy and Nothing But The best available solution for hiding a return address is using a mix net or onion routing service like Tor [12,31,32]. Observers in the network only see the identity of the two onion routers on that link in the Tor path.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Privacy and Nothing But The best available solution for hiding a return address is using a mix net or onion routing service like Tor [12,31,32]. Observers in the network only see the identity of the two onion routers on that link in the Tor path.…”
Section: Previous Workmentioning
confidence: 99%
“…Privacy Various techniques exist for hiding network source addresses, including crowds [32], mixes [12], and onion routing [31]. Real-world implementations based on these ideas include Anonymizer 2 and Tor 3 .…”
Section: Related Workmentioning
confidence: 99%
“…Crowds Protocol. The intention of the Crowds protocol [21] is to protect the anonymity of Internet users. The protocol hides each user's communications via random routing.…”
Section: Case Studiesmentioning
confidence: 99%
“…It changes the output sequence of the input message in order to confuse the adversary. There are many applications using Mix-net at the different domain such as Web service, P2P communication and anonymous e-mail system [10], [11], [12]. We employ the Mix-net for anonymous authentication.…”
Section: Mix-net For the Anonymitymentioning
confidence: 99%