Onion routing

Results: 197



#Item
41Internet / Tor / Onion routing / Traffic analysis / Anonymous remailer / Proxy server / Crowds / Anonymizer / Transmission Control Protocol / Internet privacy / Computing / Software

Tor: The Second-Generation Onion RouterDRAFT) Roger Dingledine The Free Haven Project Nick Mathewson

Add to Reading List

Source URL: people.torproject.org

Language: English - Date: 2012-11-14 18:21:42
42Network architecture / Onion routing / Tor / Crowds / Communications protocol / Proxy server / Router / Internet privacy / Computing / Internet

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:13:22
43Network architecture / Tor / Transmission Control Protocol / Relay / Transport layer / SOCKS / Onion routing / Secure communication / Asynchronous Transfer Mode / Internet privacy / Computing / Internet

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
44Multivariate statistics / Probability theory

More Anonymous Onion Routing Through Trust Aaron Johnson Computer Science Department Yale University New Haven, CTUSA

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2011-09-21 12:21:53
45Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
46Cryptographic software / Onion routing / Tor / Universal composability / Traffic analysis / Public-key cryptography / Crowds / Cryptography / Internet privacy / Routing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Aniket Kate Esfandiar Mohammadi Saarland University and MPI-SWS University of Waterloo

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:48:07
47Network performance / Network architecture / Streaming / File sharing networks / Tor / Onion routing / Throughput / Quality of service / Proxy server / Computing / Internet / Internet privacy

The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-04-26 00:01:43
48Relay / Internet / Tor / Onion routing / Anonymity / Reputation / Internet privacy / Electrical engineering / Electromagnetism

Analyzing an Adaptive Reputation Metric for Anonymity Systems Anupam Das Nikita Borisov

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-04-09 16:42:43
49Internet / Tor / Onion routing / Traffic analysis / Relay / Proxy server / Computer insecurity / Freenet / I2P / Software / Internet privacy / Computing

Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-03-07 16:53:15
50Network architecture / Tor / Onion routing / Arm / Relay / Denial-of-service attack / Measuring network throughput / Virtual circuit / Transmission Control Protocol / Internet privacy / Computing / Internet

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen∗ ∗ Florian Tschorsch‡

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2013-12-09 22:05:56
UPDATE