Panel discussion mix cascades vs p2p is one concept superior
This presentation is the property of its rightful owner.
Sponsored Links
1 / 5

Panel discussion: Mix Cascades vs. P2P: Is one concept superior? PowerPoint PPT Presentation


  • 46 Views
  • Uploaded on
  • Presentation posted in: General

Panel discussion: Mix Cascades vs. P2P: Is one concept superior?. PET 2004 May 27 2004. Cascade topology. Free route topology. Classification. Extended classification Flexibility of Routing. System defined. User’s choice. Anonymity set size Mix Network Traffic analysis

Download Presentation

Panel discussion: Mix Cascades vs. P2P: Is one concept superior?

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Panel discussion mix cascades vs p2p is one concept superior

Panel discussion:Mix Cascades vs. P2P:Is one concept superior?

PET 2004

May 27 2004


Cascade topology

Cascade topology

Free route topology


Classification

Classification


Extended classification flexibility of routing

Extended classificationFlexibility of Routing

System defined

User’s choice


Panel discussion mix cascades vs p2p is one concept superior

  • Anonymity set size

    • Mix

    • Network

  • Traffic analysis

  • Robustness / Availability / Exit policies

  • Incentives to cooperate

    • deployed by volonteers or by professionals?

    • Number of users

  • Performance

    • Low-latency / High-latency systems

  • Cost / Resources needed

  • Scalability

    • Increase number of users

    • Increase number of mixes / cascades

  • Flexibility / User’s choice

  • Attacks

    • Denial of Service attacks / n-1 attack

    • Corrupted nodes (trust)

    • Intersection attacks …

  • Unconditional / Conditional anonymity

  • Restricted Route Networks


  • Login