Communications of the ACM
Reuse research: contributions, problems and non-problems
SSR '99 Proceedings of the 1999 symposium on Software reusability
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The disadvantages of free MIX routes and how to overcome them
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Using signal processing to analyze wireless data traffic
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Anonymous Communications for Mobile Agents
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Privacy Protection for Transactions of Digital Goods
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Personal Information Market: Toward a Secure and Efficient Trade of Privacy
Proceedings of the First International Conference on The Human Society and the Internet - Internet Related Socio-Economic Issues
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Fair On-Line Auctions without Special Trusted Parties
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Anonymous Authentication of Membership in Dynamic Groups
FC '99 Proceedings of the Third International Conference on Financial Cryptography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Limits of Anonymity in Open Environments
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Defending Anonymous Communications Against Passive Logging Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Practical Anonymity for the Masses with Mix-Networks
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A secure and private system for subscription-based remote services
ACM Transactions on Information and System Security (TISSEC)
Towards Pseudonymous e-Commerce
Electronic Commerce Research
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
ANSS '04 Proceedings of the 37th annual symposium on Simulation
The cost of becoming anonymous: on the participant payload in crowds
Information Processing Letters
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Analysis of an incentives-based secrets protection system
Proceedings of the 4th ACM workshop on Digital rights management
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Proceedings of the 11th ACM conference on Computer and communications security
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Anonymous traceable disclosure scheme using pairing over elliptic curve
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A user-centric anonymous authorisation framework in e-commerce environment
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Chinese wall security for decentralized workflow management systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Providing process origin information to aid in computer forensic investigations
Journal of Computer Security
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
IEEE Transactions on Mobile Computing
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
Information Systems Frontiers
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
FeedEx: collaborative exchange of news feeds
Proceedings of the 15th international conference on World Wide Web
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Preserving Traffic Privacy in Wireless Mesh Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Privacy-enhanced superdistribution of layered content with trusted access control
Proceedings of the ACM workshop on Digital rights management
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Deploying Low-Latency Anonymity: Design Challenges and Social Factors
IEEE Security and Privacy
Probabilistic analysis of onion routing in a black-box model
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Proceedings of the 2007 ACM workshop on Privacy in electronic society
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Towards application-aware anonymous routing
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Low-Latency Parallel Transport in Anonymous Peer-to-Peer Overlays
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Dependent link padding algorithms for low latency anonymity systems
Proceedings of the 15th ACM conference on Computer and communications security
Revisiting a combinatorial approach toward measuring anonymity
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Anonymous Resolution of DNS Queries
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
Fair anonymous rewarding based on electronic cash
Journal of Systems and Software
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Technical challenges of network anonymity
Computer Communications
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 16th ACM conference on Computer and communications security
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Trust-based anonymity framework for wireless mesh networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Survey on anonymous communications in computer networks
Computer Communications
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Anonymous secure communication in wireless mobile ad-hoc networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
An efficient and reliable anonymous solution for a self-organized P2P network
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Achieving mobility and anonymity in IP-based networks
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Improving efficiency and simplicity of Tor circuit establishment and hidden services
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Anonymity in the wild: mixes on unstructured networks
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Using SCTP to implement multihomed web servers
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Personalized blog content recommender system for mobile phone users
International Journal of Human-Computer Studies
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A privacy-preserving protocol for finding the nearest doctor in an emergency
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
The impact of unlinkability on adversarial community detection: effects and countermeasures
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Protocols for stimulating packet forwarding in wireless ad hoc networks
IEEE Wireless Communications
Anonymity analysis of P2P anonymous communication systems
Computer Communications
Measurable security through isotropic channels
Proceedings of the 15th international conference on Security protocols
Incorporating social issues of computing in a small, liberal arts college: a case study
Proceedings of the 42nd ACM technical symposium on Computer science education
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Asymptotic information leakage under one-try attacks
FOSSACS'11/ETAPS'11 Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
RAD: Recipient-anonymous data delivery based on public routing proxies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Protecting against physical resource monitoring
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Proceedings of the 27th Annual Computer Security Applications Conference
A three dimensional sender anonymity metric
International Journal of Security and Networks
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Secure anonymous communication with conditional traceability
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Spreading alerts quietly and the subgroup escape problem
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Efficient web browsing with perfect anonymity using page prefetching
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Onions based on universal re-encryption – anonymous communication immune against repetitive attack
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Provable anonymity for networks of mixes
IH'05 Proceedings of the 7th international conference on Information Hiding
Local view attack on anonymous communication
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Using sphinx to improve onion routing circuit construction
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Secure anonymous routing for MANETs using distributed dynamic random path selection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Ferris wheel: A ring based onion circuit for hidden services
Computer Communications
ANOSIP: anonymizing the SIP protocol
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Preserving query privacy in urban sensing systems
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Beyond TOR: the truenyms protocol
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Anonymity and security in mobile ad hoc networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
MNPA: a mobile network privacy architecture
Computer Communications
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
A ring based onion circuit for hidden services
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Throttling Tor bandwidth parasites
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Instant degradation of anonymity in low-latency anonymisation systems
AIMS'12 Proceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services
Privacy-preserving deletion to generalization-based anonymous database
Proceedings of the CUBE International Information Technology Conference
Understanding new anonymity networks from a user's perspective
Proceedings of the 2012 ACM conference on Computer and communications security
Probabilistic analysis of onion routing in a black-box model
ACM Transactions on Information and System Security (TISSEC)
Security and privacy issues for the network of the future
Security and Communication Networks
International Journal of Security and Networks
Comparison of low-latency anonymous communication systems: practical usage and performance
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Please slow down!: the impact on tor performance from mobility
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
On the limits of provable anonymity
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Trust-aware peer sampling: Performance and privacy tradeoffs
Theoretical Computer Science
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
Hi-index | 0.09 |
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear different to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as Web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their implementation using onion routing. This paper also describes several application proxies for onion routing, as well as configurations of onion routing networks