Onion routing

Results: 197



#Item
61Software / Cryptographic software / Tor / Adversary model / Onion / Onion routing / Internet privacy / Horse racing / Computing

 Trust-­‐based  Anonymous  Communica4on:   Models  and  Rou4ng  Algorithms   Aaron  Johnson   U.S.  Naval  Research  Laboratory   Paul  Syverson   U.S.  Naval  Resea

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-11-02 11:33:27
62System software / Tor / Anonymizer / Node / Onion routing / Freenet / Peer-to-peer / Session / Proxy server / Internet privacy / Computing / Software

Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier1,2 and Paul Syverson3 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2006-10-20 01:26:00
63Cryptographic software / Tor / Internet / Onion routing / Blind signature / Group signature / Computing / Internet privacy / Cryptography / Software

Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 17:40:02
64Network architecture / Routing / Cryptographic software / Onion routing / Tor / Static routing / Router / Proxy server / Adversary model / Computing / Internet privacy / Internet

Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-09-03 19:34:39
65Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
66Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
67Software / Tor / Proxy server / Arm / SOCKS / Anonymity / .onion / Onion routing / Internet privacy / Internet / Computing

A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing1 , Steven J. Murdoch1,2 , and Roger Dingledine1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-09-06 13:36:18
68Network architecture / Onion routing / Tor / Transmission Control Protocol / Denial-of-service attack / Computer network / Traffic analysis / Router / Communications protocol / Computing / Internet privacy / Internet

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
69

ANDaNA: Onion Routing for NDN Steve DiBenedetto Colorado State University ANDaNA: Anonymous Named Data Networking Application NDSS ’12 Steven DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun

Add to Reading List

Source URL: www.caida.org

- Date: 2015-02-05 13:00:15
    70Internet / Internet privacy / Streaming / Teletraffic / File sharing networks / Tor / Onion routing / Throughput / Proxy server / Computing / Network performance / Network architecture

    The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

    Add to Reading List

    Source URL: freehaven.net

    Language: English - Date: 2013-05-06 18:02:17
    UPDATE