Onion routing

Results: 197



#Item
71Internet / Tor / Onion routing / Anonymous remailer / Proxy server / Traffic analysis / Mixminion / Anonymity / ANts P2P / Internet privacy / Computing / Software

Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Yale University 1.

Add to Reading List

Source URL: bford.info

Language: English - Date: 2015-01-03 20:19:38
72Internet / Tor / Onion routing / .onion / Traffic analysis / Transmission Control Protocol / Anonymizer / Asynchronous Transfer Mode / ANts P2P / Internet privacy / Computing / Software

USENIX Association Proceedings of the 13th USENIX Security Symposium San Diego, CA, USA August 9–13, 2004

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:11
73Computing / Public-key cryptography / Anonymous remailer / Freenet / Onion routing / Crowds / Anonymity / Ciphertext / Tor / Cryptography / Internet privacy / Software

Anonymity Tools for the Internet Brian Kim, Chris Laas, Shelly O’Gilvie, Alexander Yip {kimb, golem, shelly o, yipal}@mit.edu May 17,

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-11-24 11:22:17
74Computing / Onion routing / Tor / Bitcoin / Public-key cryptography / ANts P2P / Traffic analysis / Cryptography / Software / Internet privacy

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: www.cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00
75Computing / Onion routing / Tor / Bitcoin / Public-key cryptography / ANts P2P / Traffic analysis / Cryptography / Software / Internet privacy

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00
76Onion routing / Network architecture / Tor / Routing / Mix network / Certificateless cryptography / Internet privacy / Internet / Computing

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-19 14:07:01
77Computing / Tor / Privoxy / Onion routing / HTTP cookie / Privacy / Vidalia project / Portable Tor / Internet privacy / Software / Internet

Microsoft PowerPoint - web_browser_privacy_security_abridged.ppt

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2008-05-02 08:51:15
78Crowds / Onion routing / Cryptographic protocols / Communications protocol / Public-key cryptography / Anonymity / IP / XTR / Cryptography / Internet privacy / Commitment scheme

k -Anonymous Message Transmission Luis von Ahn Andrew Bortz Nicholas J. Hopper Computer Science Department Carnegie Mellon University {biglou,abortz,hopper}@cs.cmu.edu August 29, 2003

Add to Reading List

Source URL: abortz.net

Language: English - Date: 2010-06-18 14:05:16
79Network architecture / Tor / Onion routing / Arm / Denial-of-service attack / Relay / Measuring network throughput / Virtual circuit / Transmission Control Protocol / Internet privacy / Computing / Internet

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-12-23 14:15:36
80Data / Tor / Onion routing / Router / Communications protocol / Internet privacy / Computing / Internet

One Cell is Enough to Break Tor’s Anonymity Xinwen Fu University of Massachusetts Lowell Team members

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
UPDATE