搜索结果: 1-11 共查到“军队指挥学 Tor”相关记录11条 . 查询时间(0.109 秒)
Statistical Analysis and Anonymity of TOR's Path Selection
onion routing cryptography cyber security
2019/6/3
Tor is a network based on the onion routing infrastructure and provides many advantages, including tracking avoidance, research, wider access and, unfortunately, illegal activities. To achieve this, t...
In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-...
Untagging Tor: A Formal Treatment of Onion Encryption
Anonymity Onion Routing Secure Channels
2018/3/7
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of o...
Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their...
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Tor Tor path selection Provable privacy
2016/1/8
In this paper we present MATOR: a framework for rigorously assessing the degree of anonymity in the
Tor network. The framework explicitly addresses how user anonymity is impacted by real-life charact...
Another Tor is possible
Tor cryptography privacy
2016/1/6
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity
and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, whil...
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Tor Proof of Work Crypto-currency
2016/1/5
In this paper we propose a new micropayments scheme which
can be used to reward Tor relay operators. Tor clients do not pay Tor
relays with electronic cash directly but submit proof of work shares w...
This new protocol is based on the idea of introducing a revocable anonymity in Tor, which was
presented in our recent paper entitled "Another Tor is possible". Compared to that previous paper, this
...
Performance and Security Improvements for Tor: A Survey
Privacy-enhancing technologies anonymity networks performance
2016/1/3
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a
daily basis using a growing number of volunteer-run routers. Since its deployment in 2003,...
A quantum-safe circuit-extension handshake for Tor
tor lattice-based cryptography quantum-safe cryptography
2015/12/31
We propose a method for integrating NTRUEncrypt into the ntor key exchange protocol
as a means of achieving a quantum-safe variant of forward secrecy. The proposal is a minimal change
to ntor, essen...
The aim of this paper is to present an attack upon the protocol of Diaz et al. [4], which goal is to
introduce a fair anonymity in the Tor network. This attack allows an attacker to impersonate Tor u...