Back to Results
First PageMeta Content
Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing


Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany
Add to Reading List

Document Date: 2012-03-20 11:08:29


Open Document

File Size: 593,92 KB

Share Result on Facebook

Country

Germany / /

Currency

pence / /

/

Facility

store C / Germany University of Waterloo / store P / Practical Onion Routing Michael Backes Ian Goldberg Saarland University / Germany Saarland University / /

IndustryTerm

authentication protocol / certificateless onion routing protocols / public-key infrastructure / stateful algorithms / agreement protocol / web-servers / onion algorithms / deployed onion algorithms / satisfactory solutions / arbitrary protocols / deployed key exchange protocol / honest onion routers / possible solution / cryptographic algorithms / anonymous message transmission protocol / anonymous web access / onion routers / anonymous web browsing / onion routing network / media coverage / connected network / security protocols / employed technology / /

Organization

University of Waterloo / MPI / Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University / Germany Saarland University / /

Person

Michael Backes Ian Goldberg / Kate Esfandiar Mohammadi / Bob / A. Such / Alice / Secrecy / /

Position

administrator / straight-forward / Forward / Private / /

ProvinceOrState

Oregon / /

Technology

1W-AKE protocol / 13 4.1 Predictably Malleable Encryption / fixed protocol / key exchange protocol / PKI / key-exchange protocol / compromised OR routers / last router / third-generation OR protocol / key agreement protocol / onion routers / description OR protocol / stateful algorithms / security protocols / private key / secret key / OR router / Tor protocol / provably secure OR protocol / public-key infrastructure / layered encryption / encryption / cryptography / Tor authentication protocol / public key / secure OR protocol / OR protocol / currently deployed key exchange protocol / anonymous message transmission protocol / Onion Algorithms / 14 4.2 Secure Onion Algorithms / deployed OR protocols / currently deployed onion algorithms / fourth protocol / OR protocols / two certificateless onion routing protocols / cryptographic algorithms / AKE protocol / honest onion routers / /

SocialTag