2015
DOI: 10.14257/ijsia.2015.9.1.30
|View full text |Cite
|
Sign up to set email alerts
|

Towards Attacks and Defenses of Anonymous Communication Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 64 publications
0
4
0
Order By: Relevance
“…In comparison with conventional IT FIGURE 1. The organizations experienced security breaches or attacks in the UK [9]- [11], [14] Several surveys on IoT security vulnerabilities and challenges have been published between the years of 2012 to 2020 [8], [15], [24], [25], [16]- [23], [26]. However, these surveys have not taken into consideration current attack categories such as multidimensional attacks and other security challenges with IoT in terms of their attributes and diversities.…”
Section: A Dynamic Global Network Infrastructure With Self-configurinmentioning
confidence: 99%
See 1 more Smart Citation
“…In comparison with conventional IT FIGURE 1. The organizations experienced security breaches or attacks in the UK [9]- [11], [14] Several surveys on IoT security vulnerabilities and challenges have been published between the years of 2012 to 2020 [8], [15], [24], [25], [16]- [23], [26]. However, these surveys have not taken into consideration current attack categories such as multidimensional attacks and other security challenges with IoT in terms of their attributes and diversities.…”
Section: A Dynamic Global Network Infrastructure With Self-configurinmentioning
confidence: 99%
“… Intersection: This attack is also known as a composition attack. It targets the system's privacy by gaining secondary information from the system [25], [112]. The attackers gather such information from third party sources or public records [113].…”
Section: ) Application Layer Attacksmentioning
confidence: 99%
“…The set of voters in each polling station corresponds to the set of senders, while the set of parties contesting in an election corresponds to the set of receivers. There are various known attacks on mixes [1,10,14,15,22] and we refer the interested reader to a recent survey [18].…”
Section: Attacks On Mixesmentioning
confidence: 99%
“…The authors have investigated the literature on the Haven Project Free site, which is related to the anonymous communication attack technology, as shown in Figure 1-1 [1] .…”
Section: Introductionmentioning
confidence: 99%