Onion routing

Results: 197



#Item
91System software / Routing / Onion routing / Tor / ANts P2P / .onion / Freenet / Anonymizer / Software / Internet privacy / Computing

Improving efficiency and simplicity of Tor circuit establishment and hidden services Lasse Øverlier1,2 and Paul Syverson3 1 Norwegian Defence Research Establishment, P.B. 25, 2027 Kjeller, Norway

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:13:12
92System software / Tor / Anonymizer / Node / Onion routing / Freenet / Peer-to-peer / Session / Proxy server / Internet privacy / Computing / Software

Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier1,2 and Paul Syverson3 1

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:13:30
93Computing / System software / Degree of anonymity / Onion routing / Tor / Anonymity / Ciphertext indistinguishability / Adversary model / Internet privacy / Cryptographic software / Internet

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: www.infsec.cs.uni-saarland.de

Language: English - Date: 2014-10-15 11:46:33
94Computing / Anonymity / Anonymous remailer / Onion routing / Tor / Anonymous P2P / Anonymity application / Internet privacy / Cryptography / Internet

Exploiting hidden services to setup anonymous communication infrastructures 21 October 2006 Luxembourg

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2007-01-25 14:17:15
95Cryptography / Onion routing / Tor / .onion / Proxy server / Anonymizer / Anonymous remailer / Router / Mix network / Internet privacy / Internet / Computing

Onion Routing Access Con gurations Paul F. Syverson, Michael G. Reed, and David M. Goldschlag  Naval Research Laboratory

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:15:06
96Network architecture / Tor / Onion routing / Arm / Relay / Denial-of-service attack / Measuring network throughput / Virtual circuit / Transmission Control Protocol / Internet privacy / Computing / Internet

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen⇤ ⇤ Florian Tschorsch‡

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2014-02-22 20:22:50
97Network architecture / Onion routing / Tor / Proxy server / Router / ANts P2P / Traffic analysis / The Onion / Firewall / Internet privacy / Computing / Internet

Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Proxies for Anonymous Routing, 12th Annual Computer Security Applications Conference, San Diego, CA, December 9-13, 1996. Proxies for Anonymous Routing Michael

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:17:14
98Network architecture / Onion routing / Tor / .onion / Traffic analysis / Mix network / Router / Communications protocol / Routing / Internet / Internet privacy / Computing

Title: Onion Routing Authors: Michael G. Reed and Paul F. Syverson Center for High Assurance Computer Systems Naval Research Laboratory 4555 Overlook Avenue SW Washington, DC[removed]

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:15:46
99System software / Application programming interfaces / Cryptographic software / Tor / PlanetLab / Onion routing / Arm / X Window System / Plug-in / Software / Internet privacy / Computing

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation Rob Jansen∗ U.S. Naval Research Laboratory [removed] Abstract

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-02-25 22:12:29
UPDATE