Sciweavers

675 search results - page 6 / 135
» Anonymous communication in overlay networks
Sort
View
125
Voted
FC
2010
Springer
188views Cryptology» more  FC 2010»
15 years 5 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
INFOCOM
2010
IEEE
15 years 10 days ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
P2P
2005
IEEE
15 years 7 months ago
Toward Overlay Network Symbiosis
Simultaneous overlay networks compete for network resources and disrupt each other. If they cooperate with each other, the collective performance can be improved and they can coex...
Naoki Wakamiya, Masayuki Murata
135
Voted
CCS
2010
ACM
15 years 2 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
128
Voted
USS
2004
15 years 3 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson