Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018‏ - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

[HTML][HTML] Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021‏ - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Organ trafficking on the dark web—The data security and privacy concern in healthcare systems

R Rawat, B Garg, V Mahor, S Telang… - … of Healthcare Things …, 2022‏ - Wiley Online Library
On the dark web (DW), criminal's are technologically knowledgeable so security agencies
must keep up to speed with all data sources in endeavors to find criminals and identify their …

A case study on measuring statistical data in the Tor anonymity network

K Loesing, SJ Murdoch, R Dingledine - Financial Cryptography and Data …, 2010‏ - Springer
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …

Critical traffic analysis on the tor network

F Platzer, M Schäfer, M Steinebach - Proceedings of the 15th …, 2020‏ - dl.acm.org
Tor is a widely-used anonymity network with more than two million daily users. A special
feature of Tor is the hidden service architecture. Hidden services are a popular method for …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012‏ - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

Waiting for anonymity: Understanding delays in the Tor overlay

P Dhungel, M Steiner, I Rimac, V Hilt… - 2010 IEEE Tenth …, 2010‏ - ieeexplore.ieee.org
Although Tor is the most widely used overlay for providing anonymity services, its users
often experience very high delays. Because much of Tor usage is for Web applications …

Performance measurements of Tor hidden services in low-bandwidth access networks

J Lenhard, K Loesing, G Wirtz - International Conference on Applied …, 2009‏ - Springer
Being able to access and provide Internet services anonymously is an important mechanism
to ensure freedom of speech in vast parts of the world. Offering location-hidden services on …

Large-scale evaluation of malicious tor hidden service directory discovery

C Wang, Z Ling, W Wu, Q Chen… - IEEE INFOCOM 2022 …, 2022‏ - ieeexplore.ieee.org
Tor is the largest anonymous communication system, providing anonymous communication
services to approximately 2.8 million users and 170,000 hidden services per day. The Tor …

Out-of-band discovery and evaluation for tor hidden services

K Li, P Liu, Q Tan, J Shi, Y Gao, X Wang - Proceedings of the 31st Annual …, 2016‏ - dl.acm.org
Tor is one of the most well-known anonymity networks that provides anonymity to service
providers such as hidden web services. Recently size and content of Tor hidden services …