- 1 Bleichenbacher,, D., Gabber, E., Gibbons, P., Matias, Y., and Mayer, A. On secure and pseudonymous client-relationships with multiple servers. In Proceedings for the Third USENIX Electronic Commerce Workshop (Boston, Sept. 1998) 99-108. Google ScholarDigital Library
- 2 Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb. 1981), 84-88. Google ScholarDigital Library
- 3 Goldschlag, D., Reed, M., and Syverson, P. Hiding routing information. Information Hiding. R. Anderson, (Ed). LNCS, 1996. Springer-Verlag. Google ScholarDigital Library
- 4 Goldberg, I. and Wagner, D. TAZ servers and the Rewebber network: Enabling anonymous publishing on the World Wide Web. First Mon-day3, 4 (April 1998).Google Scholar
- 5 Reed, M., Syverson, P., and Goldschlag, D. Anonymous connections and Onion Routing. IEEE J. Selected Areas in Commun. 16, 4 (May 1998), 482-494. Google ScholarDigital Library
- 6 Syverson, P., Reed, M., and Goldschlag, D. Private Web browsing. J. Comput. Sec. 5, 3 (1997) 237-248. Google ScholarDigital Library
Index Terms
- Onion routing
Recommendations
Anonymous connections and onion routing
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near ...
Certificateless onion routing
CCS '09: Proceedings of the 16th ACM conference on Computer and communications securityOnion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and TOR, a real-life implementation, provides an onion ...
On Evaluating Anonymity of Onion Routing
Selected Areas in CryptographyAbstractAnonymous communication networks (ACNs) aim to thwart an adversary, who controls or observes chunks of the communication network, from determining the respective identities of two communicating parties. We focus on low-latency ACNs such as Tor, ...
Comments