2011
DOI: 10.1109/tpds.2010.98
|View full text |Cite
|
Sign up to set email alerts
|

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems

Abstract: Although anonymizing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 35 publications
0
23
0
Order By: Relevance
“…More specifically, we tend to assume they're inquisitive about users' attributes to achieve the identities, however they'll not conspire with users or alternative authorities. This assumption is analogous to several previous researches on security issue in cloud computing (see [20], [29]- [31]), and it's conjointly cheap since these authorities are going to be audited by government offices. However, we will any relax this assumption and permit the collusion between the authorities in Section VI.…”
Section: B Threats Modelmentioning
confidence: 64%
“…More specifically, we tend to assume they're inquisitive about users' attributes to achieve the identities, however they'll not conspire with users or alternative authorities. This assumption is analogous to several previous researches on security issue in cloud computing (see [20], [29]- [31]), and it's conjointly cheap since these authorities are going to be audited by government offices. However, we will any relax this assumption and permit the collusion between the authorities in Section VI.…”
Section: B Threats Modelmentioning
confidence: 64%
“…They'll move with different info shoppers to lawlessly access what they don't seem to be allowed to. Besides, do not take into consideration the identity outpouring from the underlying network since this can be trivially prevented by using anonymized network protocols (see [32], [33]). …”
Section: B Threats Modelmentioning
confidence: 99%
“…They will interact with alternative information shoppers to lawlessly access what they're not allowed to. Besides, don't take into account the identity outpouring from the underlying network since this will be trivially prevented by employing anonymized network protocols (see [32], [33]). …”
Section: B Threts Modelmentioning
confidence: 99%