Sciweavers

18 search results - page 1 / 4
» Towards an Analysis of Onion Routing Security
Sort
View
DIAU
2000
Springer
13 years 9 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
13 years 8 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
USS
2004
13 years 5 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
CSFW
2012
IEEE
11 years 7 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...