Shedding light on the dark corners of the internet: A survey of tor research
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
Congestion-aware path selection for Tor
Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the
nodes as a central feature of its path selection algorithm. The current load on nodes is not …
nodes as a central feature of its path selection algorithm. The current load on nodes is not …
DefenestraTor: Throwing out windows in Tor
Tor is one of the most widely used privacy enhancing technologies for achieving online
anonymity and resisting censorship. While conventional wisdom dictates that the level of …
anonymity and resisting censorship. While conventional wisdom dictates that the level of …
VoIP network covert channels to enhance privacy and information sharing
J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
Practical witness-key-agreement for blockchain-based dark pools financial trading
CN Ngo, F Massacci, F Kerschbaum… - … Cryptography and Data …, 2021 - Springer
We introduce a new cryptographic scheme, Witness Key Agreement (WKA), that allows a
party to securely agree on a secret key with a counter party holding publicly committed …
party to securely agree on a secret key with a counter party holding publicly committed …
Application of deep recurrent neural networks for prediction of user behavior in tor networks
T Ishitaki, R Obukata, T Oda… - 2017 31st international …, 2017 - ieeexplore.ieee.org
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a
useful tool for malicious users. With Tor, the users are able to compromise the non …
useful tool for malicious users. With Tor, the users are able to compromise the non …
Navigator: Finding faster paths to anonymity
R Annessi, M Schmiedecker - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
The Tor network is currently by far the most popular system for providing anonymity on the
Internet. Even though both latency and throughput have been significantly improved in …
Internet. Even though both latency and throughput have been significantly improved in …
Improving performance and anonymity in the Tor network
Anonymous communication aims to hide the relationship between communicating parties on
the Internet. It is the technical basis for achieving privacy and overcoming censorship …
the Internet. It is the technical basis for achieving privacy and overcoming censorship …
Mind the gap: Towards a {Backpressure-Based} transport protocol for the tor network
F Tschorsch, B Scheuermann - 13th USENIX Symposium on Networked …, 2016 - usenix.org
Tor has become the prime example for anonymous communication systems. With increasing
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …
Donar: Anonymous {VoIP} over Tor
We present DONAR, a system enabling anonymous VoIP with good quality-of-experience
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …