Sciweavers

675 search results - page 6 / 135
» Anonymous communication in overlay networks
Sort
View
97
Voted
FC
2010
Springer
188views Cryptology» more  FC 2010»
15 years 4 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
111
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
P2P
2005
IEEE
15 years 5 months ago
Toward Overlay Network Symbiosis
Simultaneous overlay networks compete for network resources and disrupt each other. If they cooperate with each other, the collective performance can be improved and they can coex...
Naoki Wakamiya, Masayuki Murata
CCS
2010
ACM
15 years 9 days ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
104
Voted
USS
2004
15 years 1 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson