Regroup-And-Go mixes to counter the (n-1) attack. Shi, J., Fang, B., & Shao, L. Journal of Internet Research, 16(2):213\textendash223, Emerald Group Publishing Limited, 2006. Paper doi abstract bibtex The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants.
@article {regroup2006,
title = {Regroup-And-Go mixes to counter the (n-1) attack},
journal = {Journal of Internet Research},
volume = {16},
number = {2},
year = {2006},
pages = {213{\textendash}223},
publisher = {Emerald Group Publishing Limited},
type = {Journal},
abstract = {The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants. },
keywords = {anonymity, mix, privacy},
issn = {1066-2243 },
doi = {10.1108/10662240610656528},
url = {http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article\&hdAction=lnkpdf\&contentId=1550662},
author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}
}
Downloads: 0
{"_id":"sdfFmKBvoza4doKef","bibbaseid":"shi-fang-shao-regroupandgomixestocounterthen1attack-2006","downloads":0,"creationDate":"2018-07-03T04:50:28.504Z","title":"Regroup-And-Go mixes to counter the (n-1) attack","author_short":["Shi, J.","Fang, B.","Shao, L."],"year":2006,"bibtype":"article","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"article","type":"Journal","title":"Regroup-And-Go mixes to counter the (n-1) attack","journal":"Journal of Internet Research","volume":"16","number":"2","year":"2006","pages":"213\\textendash223","publisher":"Emerald Group Publishing Limited","abstract":"The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants. ","keywords":"anonymity, mix, privacy","issn":"1066-2243 ","doi":"10.1108/10662240610656528","url":"http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article&hdAction=lnkpdf&contentId=1550662","author":[{"firstnames":["Jin-Qiao"],"propositions":[],"lastnames":["Shi"],"suffixes":[]},{"firstnames":["Bin-Xing"],"propositions":[],"lastnames":["Fang"],"suffixes":[]},{"firstnames":["Li-Jie"],"propositions":[],"lastnames":["Shao"],"suffixes":[]}],"bibtex":"@article {regroup2006,\n\ttitle = {Regroup-And-Go mixes to counter the (n-1) attack},\n\tjournal = {Journal of Internet Research},\n\tvolume = {16},\n\tnumber = {2},\n\tyear = {2006},\n\tpages = {213{\\textendash}223},\n\tpublisher = {Emerald Group Publishing Limited},\n\ttype = {Journal},\n\tabstract = {The (n-1) attack is the most powerful attack against mix which is the basic building block of many modern anonymous systems. This paper aims to present a strategy that can be implemented in mix networks to detect and counter the active attacks, especially the (n-1) attack and its variants. },\n\tkeywords = {anonymity, mix, privacy},\n\tissn = {1066-2243 },\n\tdoi = {10.1108/10662240610656528},\n\turl = {http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article\\&hdAction=lnkpdf\\&contentId=1550662},\n\tauthor = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}\n}\n","author_short":["Shi, J.","Fang, B.","Shao, L."],"key":"regroup2006","id":"regroup2006","bibbaseid":"shi-fang-shao-regroupandgomixestocounterthen1attack-2006","role":"author","urls":{"Paper":"http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article&hdAction=lnkpdf&contentId=1550662"},"keyword":["anonymity","mix","privacy"],"downloads":0},"search_terms":["regroup","mixes","counter","attack","shi","fang","shao"],"keywords":["anonymity","mix","privacy"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}