`
`Page 1 of 2
`
`Introducing MorphMix: peer-to-peer based anonymous Internet usage with
`collusion detection
`
`Search within citing articles
`
`From Chaum to Tor and Beyond: A Survey of Anonymous Routing Systems
`PC Johnson, A Kapadia - 2007 - pdfs.semanticscholar.org
`The freedoms of speech and of assembly are generally considered bastions of civil liberty.
`The Internet poses a particularly prickly proposition for both those who wish to communicate
`and assemble, and those who seek to suppress such activities. On the one hand, the …
`Cited by 1 Related articles
`
`Byzantine Attacks on Anonymity Systems
`PM Tabriz - 2007 - asirap.net
`Anonymous communications systems are analyzed against a range of attacker models to
`measure the level of privacy they provide users. In this thesis, we survey prior models and
`define our own attacker, a participating Byzantine adversary, which among other malicious …
`Cited by 1 Related articles All 5 versions
`
`Towards an analysis of WonGoo performance
`D Wei, T Lu, B Fang, Y Sun, X Cheng - International Journal of …, 2007 - emerald.com
`Purpose–As a peer‐to‐peer scalable anonymous communication system, WonGoo is a
`tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the
`anonymity, but at the same time the heavier the overhead. WonGoo lengthens the anonymity …
`Cited by 1 Related articles All 2 versions
`
`GAS: overloading a file sharing network as an anonymizing system
`E Athanasopoulos, M Roussopoulos… - … Workshop on Security, 2007 - Springer
`Anonymity is considered as a valuable property as far as everyday transactions in the
`Internet are concerned. Users care about their privacy and they seek for new ways to keep
`secret as much as of their personal information from third parties. Anonymizing systems exist …
`Cited by 1 Related articles All 29 versions
`
`Evaluating the Effectiveness of Anonymity Communication Systems Against
`Malicious Insiders
`GY Liao - 2007 International Conference on Machine Learning …, 2007 - ieeexplore.ieee.org
`The traffic analysis problem is one in which the communication partners of Internet users are
`learned by unrelated parties. Few works have been devoted to evaluating the effectiveness
`of the proposed anonymity designs. This paper proposes a unique adversary model to …
`Related articles All 2 versions
`
`Byzantine attacks on anonymity systems
`N Borisov, G Danezis, P Tabriz - Digital Privacy: Theory …, 2007 - books.google.com
`In the study of anonymous systems, research into new designs for anonymity has been
`balanced by analysis of attack strategies for violating anonymity. Such strategies shed light
`on how well systems will defend users' privacy and suggest new directions for research and …
`Related articles All 7 versions
`
`Anonymity, Privacy and Hidden Services: Improving censorship-resistant
`publishing
`L Øverlier - 2007 - duo.uio.no
`The request for on-line privacy is rapidly increasing. More and more Internet users realize
`that information about their on-line activities is highly valuable information for commercial
`companies and open for potential abuse. Information about who communicates with whom …
`Related articles All 2 versions
`
`https://scholar.google.com/scholar?start=20&hl=en&as_sdt=4005&sciodt=0,6&as_ylo=200… 7/3/2020
`
`CODE200 ET AL. EXHIBIT 1035
`Page 1 of 2
`
`
`
`Rennhard: Introducing MorphMix: peer-to-peer based... - Google Scholar
`
`Page 2 of 2
`
`FlowerPot: an anonymous BitTorrent client
`JS Cohen - 2007 - dspace.mit.edu
`This thesis presents and analyzes FlowerPot, an anonymous client for the BitTorrent file-
`sharing system. FlowerPot is peer-to-peer, providing scalability and making it difficult to
`attack with techniques like denial-of-service. It provides anonymity to users by routing traffic …
`Related articles All 2 versions
`
`IP-FP6-015964
`KU Leuven - Citeseer
`In this section, we use the concept of an identity domain, which uniquely defines the context
`in which a set of user identifiers is used. The context may include validity time, location,
`application, or other parameters. A secure identity domain should provide a Sybil-free …
`Related articles All 5 versions
`
`On Combating Adverse Selection in Anonymity Networks
`J Clark - 2007 - users.encs.concordia.ca
`Anonymity networks allow users to hide their Internet Protocol (IP) address while performing
`actions online; a service that enhances internet privacy but also allows unlawful actions to
`be committed anonymously. This thesis proposes methods for combating adverse selection …
`Related articles
`
`https://scholar.google.com/scholar?start=20&hl=en&as_sdt=4005&sciodt=0,6&as_ylo=200… 7/3/2020
`
`CODE200 ET AL. EXHIBIT 1001
`Page 2 of 2
`
`