Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Performance and security improvements for tor: A survey

M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …

Shadow: Running Tor in a box for accurate and efficient experimentation

R Jansen, NJ Hopper - 2011 - conservancy.umn.edu
Tor is a large and popular overlay network providing both anonymity to its users and a
platform for anonymous communication research. New design proposals and attacks on the …

ANDaNA: Anonymous named data networking application

S DiBenedetto, P Gasti, G Tsudik, E Uzun - arxiv preprint arxiv:1112.2205, 2011 - arxiv.org
Content-centric networking--also known as information-centric networking (ICN)--shifts
emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes …

{PIR-Tor}: Scalable anonymous communication using private information retrieval

P Mittal, F Olumofin, C Troncoso, N Borisov… - 20th USENIX security …, 2011 - usenix.org
Existing anonymous communication systems like Tor do not scale well as they require all
users to maintain up-todate information about all available Tor relays in the system. Current …

Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arxiv preprint arxiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Characterisation and quantification of user privacy: key challenges, regulations, and future directions

R Arshad, MR Asghar - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
The protection of user privacy in the digital age has become an important concern with the
increase in data-driven technologies. These technologies generate large amounts of user …

[PDF][PDF] SWIRL: A Scalable Watermark to Detect Correlated Network Flows.

A Houmansadr, N Borisov - NDSS, 2011 - Citeseer
Flow watermarks are active traffic analysis techniques that help establish a causal
connection between two network flows by content-independent manipulations, eg, altering …

Changing of the guards: A framework for understanding and improving entry guard selection in Tor

T Elahi, K Bauer, M AlSabah, R Dingledine… - Proceedings of the …, 2012 - dl.acm.org
Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the
privacy of hundreds of thousands of people every day. To ensure a high level of security …

[PDF][PDF] Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it

R Dingledine, SJ Murdoch - Online: http://www. torproject. org/press …, 2009 - cl.cam.ac.uk
As Tor's user base has grown, the performance of the Tor network has suffered. This
document describes our current understanding of why Tor is slow, and lays out our options …