Back to Results
First PageMeta Content
Internet privacy / Computer networking / Routing protocols / Network performance / Onion routing / Routing / Tor / Router / Proxy server / Computing / Network architecture / Internet


Preventing Active Timing Attacks in Low-Latency Anonymous Communication [Extended Abstract] Joan Feigenbaum1? , Aaron Johnson2?? , and Paul Syverson3? ? ? 1
Add to Reading List

Document Date: 2011-09-21 12:21:32


Open Document

File Size: 232,21 KB

Share Result on Facebook

Company

P. Some / Naval Research Laboratory / /

/

Facility

The University of Texas / /

IndustryTerm

probabilistic processing delay dproc / Low-latency anonymous communication protocols / synchronization protocol / cascade routers / anonymity protocol / guard routers / users select routers / guard router / host network / redundant router / exit router / earliest low-latency systems / low-latency anonymity protocols / exit routers / low-latency systems / onion-routing protocol / Internet applications / low-latency protocol / final router / few proposed solutions / onion processing / return router / Low-latency protocols / connection protocol / adversarial routers / intermediate routers / onion routers / communication protocols / volunteer network / anonymity network / ith router / adjacent router / Internet communications / /

OperatingSystem

DoS / /

Organization

University of Texas at Austin / National Science Foundation / Yale University / /

Position

guard / forward / /

ProvinceOrState

Texas / /

Technology

intermediate routers / ith router / Low-latency protocols / adjacent router / two routers / exit router / onion routers / non-adversarial routers / onion-routing protocol / redundant router / private key / low-latency protocol / Low-latency anonymous communication protocols / one last router / 1500 routers / connection protocol / encryption / exit routers / just two routers / public key / just one router / final router / users select routers / anonymity protocol / cascade routers / return router / low-latency anonymity protocols / guard router / one exit router / using router / synchronization protocol / guard routers / adversarial routers / one guard router / 1 Introduction Anonymous communication protocols / proposed protocol / /

SocialTag