Regroup-And-Go mixes to counter the (n-1) attack. Shi, J., Fang, B., & Shao, L. Journal of Internet Research, 16(2):213\textendash223, Emerald Group Publishing Limited, 2006.
Regroup-And-Go mixes to counter the (n-1) attack [link]Paper  doi  abstract   bibtex   
The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants.
@article {regroup2006,
	title = {Regroup-And-Go mixes to counter the (n-1) attack},
	journal = {Journal of Internet Research},
	volume = {16},
	number = {2},
	year = {2006},
	pages = {213{\textendash}223},
	publisher = {Emerald Group Publishing Limited},
	type = {Journal},
	abstract = {The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants. },
	keywords = {anonymity, mix, privacy},
	issn = {1066-2243 },
	doi = {10.1108/10662240610656528},
	url = {http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article\&hdAction=lnkpdf\&contentId=1550662},
	author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}
}

Downloads: 0