Quantifying and measuring anonymity
SJ Murdoch - International Workshop on Data Privacy Management, 2013 - Springer
… anonymity offered to protect their liberty, or more. As such, it is of critical importance that not
only can we quantify the anonymity … actually offer the anonymity they promise. This paper will …
only can we quantify the anonymity … actually offer the anonymity they promise. This paper will …
Towards measuring anonymity
… This paper introduces an information theoretic model that allows to quantify the degree of
anonymity provided by schemes for anonymous connections. It considers attackers that obtain …
anonymity provided by schemes for anonymous connections. It considers attackers that obtain …
[PDF][PDF] Measuring and predicting anonymity
MR Koot - 2012 - dare.uva.nl
… Because our primary interest is data anonymity, and we seek quantification rather than …
Throughout this thesis we will develop techniques to measure and predict anonymity. In this …
Throughout this thesis we will develop techniques to measure and predict anonymity. In this …
A survey on measuring anonymity in anonymous communication systems
T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
… field, but the desire to quantify anonymity that the anonymous systems offer has been an …
It is of critical importance that not only can we quantifying the anonymity these anonymous …
It is of critical importance that not only can we quantifying the anonymity these anonymous …
A combinatorial approach to measuring anonymity
M Edman, F Sivrikaya, B Yener - 2007 IEEE Intelligence and …, 2007 - ieeexplore.ieee.org
… quantifying formally define our proposed anonymity metric.We then show the degree of
anonymity … be generalized to include probabilistic anonymous communication system. We show …
anonymity … be generalized to include probabilistic anonymous communication system. We show …
[PDF][PDF] Measuring anonymity: a few thoughts and a differentially private bound
G Danezis - … of the DIMACS Workshop on Measuring Anonymity, 2013 - Citeseer
… there is no lower bound on the security of the systems, and the job of measuring anonymity
… But this must not be extended to a deeper argument about not quantifying anonymity systems …
… But this must not be extended to a deeper argument about not quantifying anonymity systems …
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
… quantification techniques. We also comprehensively analyze existing quantification … 3)
k-Anonymity: As we discussed before, k-anonymity has been widely used to anonymize …
k-Anonymity: As we discussed before, k-anonymity has been widely used to anonymize …
Measuring topological anonymity in social networks
L Singh, J Zhan - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
… anonymity present in the network. We present a new measure, topological anonymity, that
quantifies … The measure uses a combination of known social network metrics and attempts to …
quantifies … The measure uses a combination of known social network metrics and attempts to …
On the fundamentals of anonymity metrics
C Andersson, R Lundin - IFIP International Summer School on the Future …, 2007 - Springer
… evaluation and basic measurement theory, we also define criteria for anonymity metrics and
… '' scenarios for anonymous communication and quantify the degree of anonymity in these …
… '' scenarios for anonymous communication and quantify the degree of anonymity in these …
Quantifying maximal loss of anonymity in protocols
H Chen, P Malacaria - Proceedings of the 4th International Symposium …, 2009 - dl.acm.org
… This paper introduces a methodology for quantifying maximal loss of anonymity in
anonymity protocols. The idea is straightforward but not trivial. We use the classical Lagrange …
anonymity protocols. The idea is straightforward but not trivial. We use the classical Lagrange …