Results 161 to 170 of about 7,184 (199)
Some of the next articles are maybe not open access.
HECTor: Homomorphic Encryption Enabled Onion Routing
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019Despite increasing popularity of anonymous communications, current anonymity networks are still vulnerable to traffic analysis attacks. We propose Homomorphic EnCrypTion enabled Onion Routing (HECTor) to defeat existing traffic analysis attacks. Instead of mixing traffic at the packet level as current anonymity networks, HECTor mixes traffic at the bit
Saikrishna Gumudavally +3 more
openaire +1 more source
SGor: Trust graph based onion routing
Computer Networks, 2013The use of trust for onion routing has been proved effective in thwarting malicious onion routers. However, even state-of-the-art trust-based onion routing protocols still suffer from two key limitations in protecting anonymity. First, these protocols have no means to verify the correctness of the trust they rely on.
Peng Zhou +3 more
openaire +1 more source
More Anonymous Onion Routing Through Trust
2009 22nd IEEE Computer Security Foundations Symposium, 2009We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design path-selection strategies that minimize the probability that the adversary can successfully control the entrance to and exit from the network.
Aaron Johnson, Paul Syverson
openaire +1 more source
A certificateless approach to onion routing
International Journal of Information Security, 2016Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and The onion routing network (Tor), a real-life implementation, provides an onion routing service to thousands of users over the Internet.
CATALANO, Dario +2 more
openaire +2 more sources
Onion routing circuit construction via latency graphs
Computers & Security, 2013The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for The onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through a series of anonymising proxy ...
Sergio Castillo-Pérez +1 more
openaire +1 more source
Network Security Implementation by Onion Routing
2009 International Conference on Information and Multimedia Technology, 2009Communication is the god given gift that enables intellectual and cultural exchange and builds up our competence in social behavior. The internet has taken communication to unimaginable attitudes. But many questions arise when we think of security. Is Internet communication private?
openaire +1 more source
Securing Onion Routing Against Correlation Attacks
2018In this paper, we present a network model based on traditional onion routing model but engineered to make correlation attacks much more difficult. The design of the network makes traditional packet counting and volume attacks less feasible. We assume a passive attacker working with partial knowledge of the network traffic trying to use various ...
Saba Khanum +4 more
openaire +1 more source
Towards an Analysis of Onion Routing Security
2001This paper presents a security analysis of Onion Routing, an application independent infrastructure for traffic-analysis-resistant and anonymous Internet connections. It also includes an overview of the current system design, definitions of security goals and new adversary models.
Paul Syverson +3 more
openaire +1 more source
Onion routing for resistance to traffic analysis
Proceedings DARPA Information Survivability Conference and Exposition, 2004Onion routing is a general purpose infrastructure for private communication over a widely shared network such as the Internet or the SIPRNET. It provides anonymous connections that are resistant to both eavesdropping and traffic analysis. The connections are bidirectional, near real-time, and can be used for both connection-based and connectionless ...
openaire +1 more source

