Date Added: Jan 2011
For many Internet applications, the ability to protect the identity of participants in distributed applications is critical. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. (The authors call this the route selection strategy.) In this paper, the authors describe how to select routes so as to maximize the ability of the anonymous communication systems to protect anonymity.