Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)
DOI: 10.1109/secpri.2003.1199323
|View full text |Cite
|
Sign up to set email alerts
|

Mixminion: design of a type III anonymous remailer protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
367
0
1

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 421 publications
(369 citation statements)
references
References 17 publications
1
367
0
1
Order By: Relevance
“…It changes the output sequence of the input message in order to confuse the adversary. There are many applications using Mix-net at the different domain such as Web service, P2P communication and anonymous e-mail system [10], [11], [12]. We employ the Mix-net for anonymous authentication.…”
Section: Mix-net For the Anonymitymentioning
confidence: 99%
“…It changes the output sequence of the input message in order to confuse the adversary. There are many applications using Mix-net at the different domain such as Web service, P2P communication and anonymous e-mail system [10], [11], [12]. We employ the Mix-net for anonymous authentication.…”
Section: Mix-net For the Anonymitymentioning
confidence: 99%
“…One of his conclusions is that traffic padding is essential to achieve communication anonymity. Danezis et al [5] give a list of attacks to anonymity systems. Most of those attacks are only briefly discussed and lack systematic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In both cases, the observation point of the adversary is located right in front of the receiver gateway and thus maximally far from the sender. Figure 5 (a) is a setup for experiments over our local campus network 5 . That is, the ping traffic goes through our local campus network before it reaches the sender's gateway.…”
Section: Experiments Over Campus and Wide Area Networkmentioning
confidence: 99%
“…High-latency designs like Mixmaster [34] and Mixminion [11] can take hours to deliver messages, but because messages mix with each other they can withstand quite powerful attackers. These designs are not suitable for web surfing, which would be untenable with long latencies.…”
Section: Introductionmentioning
confidence: 99%