A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Network traffic tracking systems: folly in the large?
Proceedings of the 2000 workshop on New security paradigms
The architecture of robust publishing systems
ACM Transactions on Internet Technology (TOIT)
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
On Privacy Issues of Internet Access Services via Proxy Servers
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
The right place at the right time
Communications of the ACM - ACM at sixty: a look back in time
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Support for resilient Peer-to-Peer gaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Private location-based information retrieval through user collaboration
Computer Communications
Improving efficiency and simplicity of Tor circuit establishment and hidden services
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
An attack and repair of secure web transaction protocol for anonymous mobile agents
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the 27th Annual Computer Security Applications Conference
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Feature: Onion Routers: a Dangerous Response to Traffic Analysis?
Network Security
Feature: The Future of Computer and Network Forensics
Network Security
When to Review Security - Timing is Everything...
Network Security
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
Theoretical Computer Science
Hi-index | 0.00 |
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This paper describes a flexible communications infrastructure, called onion routing, which is resistant to traffic analysis. Onion routing lies just beneath the application layer, and is designed to interface with a wide variety of unmodified Internet services by means of proxies. Onion routing has been implemented on a Sun Solaris 2.4; in addition, proxies for World Wide Web browsing (HTTP), remote logins (RLOGIN), e-mail (SMTP) and file transfers (FTP) have been implemented. Onion routing provides application-independent, real-time and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis. Applications making use of onion routing's anonymous connections may (and usually should) identify their users over the anonymous connection. User anonymity may be layered on top of the anonymous connections by removing identifying information from the data stream. Our goal is anonymous connections, not anonymous communication. The use of a packet-switched public network should not automatically reveal who is talking to whom; this is the traffic analysis that onion routing complicates.