Publication Details
Computational Social Networks - Security and Privacy
security, anonymity, behavioural patterns, social networks
This chapter is dealing with anonymous communication. We want to extend the
knowledge of security limits of anonymity systems with information based on
real-world traffic data. We perform a set of analyses targeting the behavioural
patterns of users and their impact on such systems. The first part of the
analyses are focused on the properties of email communication relevant to the
designers of anonymous systems. The two parameters we are interested in are
inter-arrival times, the number of messages sent by an individual user. The
importance of our analyses' results for the design and implementation of
anonymity systems is discussed. The second part of the analyses are focused on
social networks. Information about user profiling, properties of identiable
social networks and their development in time are presented in the context of the
security of anonymous systems.
@inbook{BUT96946,
author="Kamil {Malinka} and Petr {Hanáček}",
title="Computational Social Networks - Security and Privacy",
booktitle="Computational Social Networks - Security and Privacy",
year="2012",
publisher="Springer London",
address="London",
pages="311--340",
doi="10.1007/978-1-4471-4051-1",
isbn="978-1-4471-4050-4",
url="http://www.springer.com/computer/communication+networks/book/978-1-4471-4050-4"
}