- An overview of anonymity and anonymous communication
- NLUUG voorjaarsconferentie 2008: Security (Ede, the Netherlands)
- Book/source title
- Proceedings NLUUG voorjaarsconferentie 2008: Security
- Pages (from-to)
- Ede: NLUUG
- Document type
- Conference contribution
- Faculty of Science (FNWI)
- Informatics Institute (IVI)
Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of anonymity. We use Tor as a case study to illustrate the security goals of anonymous communication, and outline the threats to which Tor is known to be exposed. To demonstrate anonymity quantification, we apply an information theoretic metric to the example Tor scenario.
If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library, or send a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.