Onion routing

Results: 197



#Item
11Dark web / Secure communication / Internet privacy / File sharing / Cross-platform software / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Peer-to-peer / Crowds

How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
12Internet privacy / Dark web / Cryptographic software / Secure communication / Crypto-anarchism / Onion routing / Tor / I2P / Overlay network / Degree of anonymity / Mixminion / Routing

On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-29 10:24:01
13

Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Nicholas Jones, Matvey Arye, Jacopo Cesareo, and Michael J. Freedman Princeton University Abstract Internet censorship and surveillance have made

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2011-07-13 13:44:20
    14Internet privacy / Dark web / Secure communication / Internet security / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Privacy / HTTPS / Internet censorship circumvention

    PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English
    15Dark web / Internet security / Secure communication / Tor / Email / Guard / Internet Relay Chat / Proxy server

    Proceedings on Privacy Enhancing TechnologiesJamie Hayes and George Danezis Guard Sets for Onion Routing Abstract: “Entry” guards protect the Tor onion routing system from variants of the “predecessor” att

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2015-05-15 18:39:35
    16

    Basic Course on Onion Routing Paul Syverson U.S. Naval Research Laboratory SAC Summer School Mount Allison University Aug 10, 2015

    Add to Reading List

    Source URL: mta.ca

    Language: English - Date: 2015-08-17 20:03:52
      17Computing / Edsger W. Dijkstra / Computer architecture / Mathematics / Telecommunications / Network architecture / Routing / Mesh networking / Overlay network / Shortest path problem / Onion routing / Crowds

      Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao Computer Science Department, University of California at Santa Barbara {krishnap, alessandra,

      Add to Reading List

      Source URL: www.cs.ucsb.edu

      Language: English - Date: 2009-02-10 01:19:21
      18Computing / Internet / Cryptography / Internet privacy / Onion routing / Routing / Tor / Universal composability / Anonymity / Proxy server / IP / Posterior probability

      A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

      Add to Reading List

      Source URL: ohmygodel.com

      Language: English - Date: 2012-07-09 20:58:21
      19Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

      Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2014-10-08 09:38:20
      20File sharing networks / File sharing / Onion routing / Routing / Tor / Peer-to-peer / Gnutella / Anonymous P2P / Freenet

      Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara {krishnap, alessandra, ravenben}@cs.ucsb.edu Abstract—Protecting user pr

      Add to Reading List

      Source URL: www.cs.ucsb.edu

      Language: English - Date: 2008-09-05 20:22:44
      UPDATE