Results 1 to 10 of about 7,184 (199)
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems. [PDF]
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which
Changji Wang, Dongyuan Shi, Xilei Xu
doaj +2 more sources
Anonymous Connections and Onion Routing [PDF]
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used.
David M. Goldschlag +2 more
exaly +4 more sources
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj +1 more source
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [PDF]
In order to ensure the location privacy of mobile nodes when using location-based services,a mobile privacy protection scheme for location based service(LBS)based on random onion routing is proposed.This scheme integrates random onion routing and hybrid ...
WANG Lei, LI Xiao-yu
doaj +1 more source
QSOR: Quantum-safe Onion Routing
In this work, we propose a study on the use of post-quantum cryptographic primitives for the Tor network in order to make it safe in a quantum world. With this aim, the underlying keying material has first been analysed. We observe that breaking the security of the algorithms/protocols that use long- and medium-term keys (usually RSA keys) have the ...
Tujner, Zsolt +3 more
openaire +4 more sources
Privacy-Aware and Secure Decentralized Air Quality Monitoring
Indoor Air Quality monitoring is a major asset to improving quality of life and building management. Today, the evolution of embedded technologies allows the implementation of such monitoring on the edge of the network.
Michael Mrissa +8 more
doaj +1 more source
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industries ...
Nilesh Kumar Jadav +6 more
doaj +1 more source
Onion routing (OR) protocols are a crucial tool for providing anonymous internet communication. An OR protocol enables a user to anonymously send requests to a server. A fundamental problem of OR protocols is how to deal with replies: ideally, we would want the server to be able to send a reply back to the anonymous user without knowing or disclosing ...
Kuhn, Christiane +3 more
openaire +4 more sources
Scalable onion routing with torsk [PDF]
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of the popular Tor anonymity network, that decreases the bandwidth cost of relay selection and maintenance from quadratic to quasilinear while introducing no new attacks on the ...
Jon McLachlan +3 more
openaire +1 more source
Comparative study of anonymous network Tor and I2P
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj +3 more sources

