@inproceedings{5a78316220614e3294c46a6c9d6b7084,
title = "A survey of anonymous peer-to-peer file-sharing",
abstract = "This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe.",
author = "T. Chothia and K. Chatzikokolakis",
year = "2005",
doi = "10.1007/11596042\_77",
language = "English",
isbn = "3-540-30803-2",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "744--755",
editor = "T. Enokido and L. Yan and B. Xiao and D. Kim and Y.S. Dai and L.T. Yang",
booktitle = "Embedded and ubiquitous computing - EUC 2005 workshops : EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005 : proceedings)",
address = "Germany",
}