登入選單
返回Google圖書搜尋
Trustworthy and Scalable Anonymous Communication
註釋First, we begin by investigating security vulnerabilites in existing P2P anonymity systems, and find fundamental limitations in their designs. Second, we propose novel protocols for P2P anonymous communication that can successfully overcome these limitations. Third, we describe a protocol for detecting malicious Sybil identities using information about social network trust relationships. Fourth, we present protection mechanisms for DHTs that also leverage social network trust relationships to defend against the Sybil attack while preserving the privacy of social contacts and providing a basis for pseudonymous communication. Finally, we describe a protocol for trustworthy and scalable anonymous communication that can directly leverage users trusted social contacts. We evaluate the effectiveness of our protocols using theoretical analysis, simulations, implementations and a Facebook application.