Proceedings of the workshop on Applications of private and anonymous communications

During the last few decades we have seen a tremendous number of activities (and publications) regarding anonymous communication systems, how to make them better, various attacks, defenses etc. Even though the implicit assumption of any anonymity work is to have it applied in a real world, few of tho...

Descripción completa

Detalles Bibliográficos
Otros Autores: Aad, Tiziana, editor (editor), Zugenmaier, Alf, editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York, NY : Association for Computing Machinery 2008.
Colección:ACM international conference proceedings series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009714493406719
Descripción
Sumario:During the last few decades we have seen a tremendous number of activities (and publications) regarding anonymous communication systems, how to make them better, various attacks, defenses etc. Even though the implicit assumption of any anonymity work is to have it applied in a real world, few of those activities focus on actual practical systems, and the questions remain if we are doing research on the right thing? how far we are from dealing with the real issues? and are the goals that we try to achieve with these systems those that we are optimizing for? This workshop solicits papers concerned with what happens on top of and around the anonymizing layer, with a view of how this affects the anonymity system. That is in some ways the user's, operator's, ISP's, etc. view of and experience with anonymity systems and how anonymity systems need to be improved.
Descripción Física:1 online resource (32 pages)