First page Back Continue Last page Graphics
Summary
Described approach and model for examining total system anonymity
Presented description of anonymity network building blocks and how to represent them
Gave metric for costs of producing anonymity
Described strategies and tradeoffs for maximizing system anonymity while minimizing cost