JavaScript is disabled for your browser. Some features of this site may not work without it.
On the Effectiveness of k-Anonymity Against Traffic Analysis and Surveillance
Hopper, Nicholas; Vasserman, Eugene Y.
The goal of most research on anonymity, including all currently used systems for anonymity, is to achieve anonymity through unlinkability: an adversary should not be able to determine the correspondence between the input and output messages of the system. An alternative anonymity goal is unobservability: an adversary should not be able to determine who sends and who receives messages. We study the effect of k-anonymity, a weak form of unobservability, on two types of attacks against systems that provide only unlinkability.
Keywords: Statistical disclosure; Mass surveillance; k-anonymity
Conference:Fifth ACM Workshop on Privacy in the Electronic Society, held in association with the 13th ACM Computer and Communications Security Conference, October 30, 2006, in Alexandria, VA CCS 2006 Starting Page:9, Ending Page:18
Rights:This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
Except where otherwise noted, the use of this item is bound by the following: This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).