Sciweavers

25 search results - page 1 / 5
» A Tune-up for Tor: Improving Security and Performance in the...
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
FC
2010
Springer
188views Cryptology» more  FC 2010»
13 years 9 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 2 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
CCS
2010
ACM
13 years 5 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
PET
2007
Springer
13 years 11 months ago
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective
Neither of the two anonymisation services Tor and AN.ON clearly outperforms the other one. AN.ON’s user-perceived QoS is generally more consistent over time than Tor’s. While A...
Rolf Wendolsky, Dominik Herrmann, Hannes Federrath