Results 1 to 10 of about 7,184 (199)

AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems. [PDF]

open access: yesPLoS ONE, 2015
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which
Changji Wang, Dongyuan Shi, Xilei Xu
doaj   +2 more sources

Anonymous Connections and Onion Routing [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 1998
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used.
David M. Goldschlag   +2 more
exaly   +4 more sources

A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2022
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj   +1 more source

LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [PDF]

open access: yesJisuanji kexue, 2022
In order to ensure the location privacy of mobile nodes when using location-based services,a mobile privacy protection scheme for location based service(LBS)based on random onion routing is proposed.This scheme integrates random onion routing and hybrid ...
WANG Lei, LI Xiao-yu
doaj   +1 more source

QSOR: Quantum-safe Onion Routing

open access: yesProceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
In this work, we propose a study on the use of post-quantum cryptographic primitives for the Tor network in order to make it safe in a quantum world. With this aim, the underlying keying material has first been analysed. We observe that breaking the security of the algorithms/protocols that use long- and medium-term keys (usually RSA keys) have the ...
Tujner, Zsolt   +3 more
openaire   +4 more sources

Privacy-Aware and Secure Decentralized Air Quality Monitoring

open access: yesApplied Sciences, 2022
Indoor Air Quality monitoring is a major asset to improving quality of life and building management. Today, the evolution of embedded technologies allows the implementation of such monitoring on the edge of the network.
Michael Mrissa   +8 more
doaj   +1 more source

GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G

open access: yesDigital Communications and Networks, 2023
The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industries ...
Nilesh Kumar Jadav   +6 more
doaj   +1 more source

Onion Routing with Replies

open access: yes, 2021
Onion routing (OR) protocols are a crucial tool for providing anonymous internet communication. An OR protocol enables a user to anonymously send requests to a server. A fundamental problem of OR protocols is how to deal with replies: ideally, we would want the server to be able to send a reply back to the anonymous user without knowing or disclosing ...
Kuhn, Christiane   +3 more
openaire   +4 more sources

Scalable onion routing with torsk [PDF]

open access: yesProceedings of the 16th ACM conference on Computer and communications security, 2009
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of the popular Tor anonymity network, that decreases the bandwidth cost of relay selection and maintenance from quadratic to quasilinear while introducing no new attacks on the ...
Jon McLachlan   +3 more
openaire   +1 more source

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj   +3 more sources

Home - About - Disclaimer - Privacy