Onion routing

Results: 197



#Item
31Internet privacy / Routing / Computer networking / Traceroute / Tor / Border Gateway Protocol / Hop / Proxy server / Onion routing / Computing / Internet / Network architecture

Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2015-05-23 12:03:44
32Tor / Onion routing / Arm / Proxy server / Bandwidth / Guard / Denial-of-service attack / Internet Relay Chat / Internet privacy / Computing / Internet

Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor Tariq Elahi† , Kevin Bauer† , Mashael AlSabah† , Roger Dingledine‡ , Ian Goldberg† † †

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-31 07:34:36
33Crowds / Communications protocol / Onion routing / Anonymity / Computing / Cryptographic protocols / Data / Internet privacy / Information

Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2014-08-17 14:48:08
34Computing / Onion routing / Tor / Universal composability / Proxy server / Routing / Cisco IOS / Degree of anonymity / Internet privacy / Cryptography / Internet

A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-07-09 20:58:21
35Cryptography / Tor / Twitter / Onion routing / Internet privacy / Internet / Computing

Gina Stalica Data Driven Societies Final Paper #Tor: Visualizing the Anonymous Web

Add to Reading List

Source URL: research.bowdoin.edu

Language: English - Date: 2014-08-26 07:36:06
36Information / Internet privacy / Crowds / IP / Public-key cryptography / Communications protocol / Onion routing / Anonymity / Alice and Bob / Cryptography / Cryptographic protocols / Data

Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2014-08-17 14:47:48
37Computing / Internet / Teletraffic / Network congestion / Onion routing / Routing / Tor / Transmission Control Protocol / Network performance / Internet privacy / Network architecture

Congestion-aware Path Selection for Tor⋆ Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg Cheriton School of Computer Science University of Waterloo {t55wang,k4bauer,ciforero,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-12-30 18:18:27
38Computing / Tor / Ontology / Arm / Onion routing / Computer security / Internet privacy / Internet / Information

Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2014-06-23 18:15:44
39Internet / Internet privacy / Streaming / Teletraffic / File sharing networks / Tor / Onion routing / Throughput / Proxy server / Computing / Network performance / Network architecture

The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-05-03 09:23:34
40Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2010-12-30 09:39:44
UPDATE