Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Proceedings of the First International Workshop on Information Hiding
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hi-index | 0.00 |
While the internet has been seen by many as an opportunity to spread information and opinions, censorship and access monitoring have been seen to be gradually increasing in a number of nations. From the great firewall of China to attempts at online interception such as the FBI's Carnivore system, it has seemed that freedom of information on the internet is under threat. In recent years, one particular mechanism has been gaining in popularity both for those escaping censorship and those who resent continual monitoring and a presumption of guilt. This mechanism is onion routing, particularly as used in Tor, a proxy and router-based tool computer users can use on their desktops to achieve uncontrolled, anonymous connectivity to the outside world.