Technical privacy metrics: a systematic survey
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
Performance and security improvements for tor: A survey
M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …
Shadow: Running Tor in a box for accurate and efficient experimentation
Tor is a large and popular overlay network providing both anonymity to its users and a
platform for anonymous communication research. New design proposals and attacks on the …
platform for anonymous communication research. New design proposals and attacks on the …
ANDaNA: Anonymous named data networking application
Content-centric networking--also known as information-centric networking (ICN)--shifts
emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes …
emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes …
{PIR-Tor}: Scalable anonymous communication using private information retrieval
Existing anonymous communication systems like Tor do not scale well as they require all
users to maintain up-todate information about all available Tor relays in the system. Current …
users to maintain up-todate information about all available Tor relays in the system. Current …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Characterisation and quantification of user privacy: key challenges, regulations, and future directions
The protection of user privacy in the digital age has become an important concern with the
increase in data-driven technologies. These technologies generate large amounts of user …
increase in data-driven technologies. These technologies generate large amounts of user …
[PDF][PDF] SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
A Houmansadr, N Borisov - NDSS, 2011 - Citeseer
Flow watermarks are active traffic analysis techniques that help establish a causal
connection between two network flows by content-independent manipulations, eg, altering …
connection between two network flows by content-independent manipulations, eg, altering …
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the
privacy of hundreds of thousands of people every day. To ensure a high level of security …
privacy of hundreds of thousands of people every day. To ensure a high level of security …
[PDF][PDF] Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it
R Dingledine, SJ Murdoch - Online: http://www. torproject. org/press …, 2009 - cl.cam.ac.uk
As Tor's user base has grown, the performance of the Tor network has suffered. This
document describes our current understanding of why Tor is slow, and lays out our options …
document describes our current understanding of why Tor is slow, and lays out our options …