throbber
Rennhard: Introducing MorphMix: peer-to-peer based... - Google Scholar
`
`Page 1 of 2
`
`Introducing MorphMix: peer-to-peer based anonymous Internet usage with
`collusion detection
`
`Search within citing articles
`
`From Chaum to Tor and Beyond: A Survey of Anonymous Routing Systems
`PC Johnson, A Kapadia - 2007 - pdfs.semanticscholar.org
`The freedoms of speech and of assembly are generally considered bastions of civil liberty.
`The Internet poses a particularly prickly proposition for both those who wish to communicate
`and assemble, and those who seek to suppress such activities. On the one hand, the …
`Cited by 1 Related articles
`
`Byzantine Attacks on Anonymity Systems
`PM Tabriz - 2007 - asirap.net
`Anonymous communications systems are analyzed against a range of attacker models to
`measure the level of privacy they provide users. In this thesis, we survey prior models and
`define our own attacker, a participating Byzantine adversary, which among other malicious …
`Cited by 1 Related articles All 5 versions
`
`Towards an analysis of WonGoo performance
`D Wei, T Lu, B Fang, Y Sun, X Cheng - International Journal of …, 2007 - emerald.com
`Purpose–As a peer‐to‐peer scalable anonymous communication system, WonGoo is a
`tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the
`anonymity, but at the same time the heavier the overhead. WonGoo lengthens the anonymity …
`Cited by 1 Related articles All 2 versions
`
`GAS: overloading a file sharing network as an anonymizing system
`E Athanasopoulos, M Roussopoulos… - … Workshop on Security, 2007 - Springer
`Anonymity is considered as a valuable property as far as everyday transactions in the
`Internet are concerned. Users care about their privacy and they seek for new ways to keep
`secret as much as of their personal information from third parties. Anonymizing systems exist …
`Cited by 1 Related articles All 29 versions
`
`Evaluating the Effectiveness of Anonymity Communication Systems Against
`Malicious Insiders
`GY Liao - 2007 International Conference on Machine Learning …, 2007 - ieeexplore.ieee.org
`The traffic analysis problem is one in which the communication partners of Internet users are
`learned by unrelated parties. Few works have been devoted to evaluating the effectiveness
`of the proposed anonymity designs. This paper proposes a unique adversary model to …
`Related articles All 2 versions
`
`Byzantine attacks on anonymity systems
`N Borisov, G Danezis, P Tabriz - Digital Privacy: Theory …, 2007 - books.google.com
`In the study of anonymous systems, research into new designs for anonymity has been
`balanced by analysis of attack strategies for violating anonymity. Such strategies shed light
`on how well systems will defend users' privacy and suggest new directions for research and …
`Related articles All 7 versions
`
`Anonymity, Privacy and Hidden Services: Improving censorship-resistant
`publishing
`L Øverlier - 2007 - duo.uio.no
`The request for on-line privacy is rapidly increasing. More and more Internet users realize
`that information about their on-line activities is highly valuable information for commercial
`companies and open for potential abuse. Information about who communicates with whom …
`Related articles All 2 versions
`
`https://scholar.google.com/scholar?start=20&hl=en&as_sdt=4005&sciodt=0,6&as_ylo=200… 7/3/2020
`
`CODE200 ET AL. EXHIBIT 1035
`Page 1 of 2
`
`

`

`Rennhard: Introducing MorphMix: peer-to-peer based... - Google Scholar
`
`Page 2 of 2
`
`FlowerPot: an anonymous BitTorrent client
`JS Cohen - 2007 - dspace.mit.edu
`This thesis presents and analyzes FlowerPot, an anonymous client for the BitTorrent file-
`sharing system. FlowerPot is peer-to-peer, providing scalability and making it difficult to
`attack with techniques like denial-of-service. It provides anonymity to users by routing traffic …
`Related articles All 2 versions
`
`IP-FP6-015964
`KU Leuven - Citeseer
`In this section, we use the concept of an identity domain, which uniquely defines the context
`in which a set of user identifiers is used. The context may include validity time, location,
`application, or other parameters. A secure identity domain should provide a Sybil-free …
`Related articles All 5 versions
`
`On Combating Adverse Selection in Anonymity Networks
`J Clark - 2007 - users.encs.concordia.ca
`Anonymity networks allow users to hide their Internet Protocol (IP) address while performing
`actions online; a service that enhances internet privacy but also allows unlawful actions to
`be committed anonymously. This thesis proposes methods for combating adverse selection …
`Related articles
`
`https://scholar.google.com/scholar?start=20&hl=en&as_sdt=4005&sciodt=0,6&as_ylo=200… 7/3/2020
`
`CODE200 ET AL. EXHIBIT 1001
`Page 2 of 2
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket