Back to Results
First PageMeta Content
Internet / Tor / Peer-to-peer / Onion routing / Proxy server / Private information retrieval / Client–server model / Relay / Internet privacy / Cryptography / Computing


PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval ∗ Prateek Mittal1 Femi Olumofin2
Add to Reading List

Document Date: 2011-06-08 08:12:28


Open Document

File Size: 597,87 KB

Share Result on Facebook

Company

PIR / Intel / /

/

Event

FDA Phase / /

Facility

University of Illinois / University of Waterloo / University Ave W Waterloo / For building / /

IndustryTerm

anonymous communication systems / Internet routers / potential solution / privacy enhancing technology / limited database server / selection algorithm / database server / directory server / query protocol / relay selection algorithm / few onion routers / trivial solution / path selection algorithm / selection algorithms / law enforcement / anonymity network / secure peer-to-peer systems / /

OperatingSystem

Linux / Ubuntu / /

Organization

University of Waterloo / PIR-Tor Protocol Details Database / University of Illinois / /

Person

Tor Size / /

/

Position

guard / single compromised guard / threat model / model in Tor / entry guard / Private Information Retrieval / /

Product

Section / /

ProvinceOrState

Manitoba / /

Technology

selection algorithm / existing CPIR protocols / Internet routers / peer-to-peer / Linux / P2P / Tor protocol / Tor algorithm / peer-to-peer system / few onion routers / privacy enhancing technology / PIR-Tor relay selection algorithm / load balancing / 5.3 Client query protocol / CPIR protocol / selection algorithms / relay selection algorithm / lattice-based CPIR protocol / client/server / path selection algorithm / /

URL

http /

SocialTag