<--- Back to Details
First PageDocument Content
Internet privacy / Distributed data storage / Cross-platform software / File sharing networks / Freenet / Peer-to-peer / ANts P2P / Tor / Pastry / Software / Computing / System software
Date: 2004-09-17 01:06:27
Internet privacy
Distributed data storage
Cross-platform software
File sharing networks
Freenet
Peer-to-peer
ANts P2P
Tor
Pastry
Software
Computing
System software

Eluding Carnivores: File Sharing with Strong Anonymity Emin G¨un Sirer, Sharad Goel, Mark Robson, Doˇgan Engin Dept. of Computer Science, Cornell University August 1, 2004 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Download Document from Source Website

File Size: 73,04 KB

Share Document on Facebook

Similar Documents

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

DocID: 1xVYb - View Document

Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

DocID: 1xVXn - View Document

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

DocID: 1xU9I - View Document