Onion routing

Results: 197



#Item
21Computing / Internet / Tor / Internet Standards / Internet protocols / Spamming / Cyberwarfare / Botnet / Command and control / .onion / .tor / Onion routing

Challenges in protecting Tor hidden services from botnet abuse Nicholas Hopper? University of Minnesota, Minneapolis, MN USA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-04-29 14:13:49
22

Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran Nicholas Hopper

Add to Reading List

Source URL: syssec.kaist.ac.kr

Language: English - Date: 2012-09-03 21:42:58
    23Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

    Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:49:00
    24Computing / Internet / Network architecture / Dark web / Internet Standards / Internet security / Secure communication / Tor / Routing / Proxy server / Low latency / Onion routing

    An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-12-16 11:56:26
    25Cryptography / Onion routing / Chosen-ciphertext attack / Public-key cryptography / Transmission Control Protocol / Mix network / RSA / Encryption / Mixminion

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2008-05-30 10:39:07
    26

    Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-08-11 22:18:05
      27Internet / Tor / Onion routing / Network topology / Routing / ANts P2P / Telecommunications network / Communications protocol / Internet privacy / Computing / Software

      Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:33
      28

      Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract] † Joan Feigenbaum

      Add to Reading List

      Source URL: www.cs.yale.edu

      - Date: 2007-09-02 19:43:46
        29

        A Formal Treatment of Onion Routing Jan Camenisch Anna Lysyanskaya IBM Research

        Add to Reading List

        Source URL: cs.brown.edu

        - Date: 2006-09-12 19:40:25
          30

          A Formal Treatment of Onion Routing Jan Camenisch and Anna Lysyanskaya 1 2

          Add to Reading List

          Source URL: cs.brown.edu

          Language: English - Date: 2006-09-12 19:40:36
            UPDATE