2001
DOI: 10.1007/3-540-44702-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Web MIXes: A System for Anonymous and Unobservable Internet Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
199
0
2

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 266 publications
(207 citation statements)
references
References 3 publications
0
199
0
2
Order By: Relevance
“…In contrast to Tor, JAP [6] requires that operators promise not to engage in malicious behaviour before being admitted. JAP is also a cascade system, in which traffic from all users flow over the same path.…”
Section: Threat Modelmentioning
confidence: 99%
“…In contrast to Tor, JAP [6] requires that operators promise not to engage in malicious behaviour before being admitted. JAP is also a cascade system, in which traffic from all users flow over the same path.…”
Section: Threat Modelmentioning
confidence: 99%
“…Figure 2 shows the typical architecture of an anonymity service (cf. [7,11,14]). Mixes and clients form an overlay network.…”
Section: Designing a Workload Model For Anonymity Systemsmentioning
confidence: 99%
“…Since the original proposal by David Chaum in 1981 [9] a large number of mixing schemes for various application areas has been published. Especially low-latency anonymity services like Tor [11] and JAP (JonDonym) [7] have found widespread adoption.…”
Section: Introductionmentioning
confidence: 99%
“…PAR [2] proposes a micropayment model where clients pay coins for each circuit, and relays can use these coins for service of their own or convert them into actual payments; however, its dependency on an ecash bank means it remains a theoretical design. Lastly, the AN.ON project's cascade-based network was directly funded by the German government as part of a research project [4]. Unfortunately, the funding ended in 2007, so they are exploring the community support approach (several of their nodes are now operated by other universities) and the pay-for-play approach (setting up commercial cascades that provide more reliable service).…”
Section: Incentives In Anonymous Communication Networkmentioning
confidence: 99%