STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Proceedings of the 12th ACM conference on Computer and communications security
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Understanding when location-hiding using overlay networks is feasible
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
Protecting Agent from Attack in Grid ComputingIII
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
Bridging and Fingerprinting: Epistemic Attacks on Route Selection
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
A Kademlia-Based Node Lookup System for Anonymization Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Understanding when location-hiding using overlay networks is feasible
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Survey on anonymous communications in computer networks
Computer Communications
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Nested encryption library for automated IPSec-based anonymous circuits establishment
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Protecting agent from attack in grid computingII
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Hi-index | 0.00 |
We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable.Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.