An overview of anonymity technology usage

B Li, E Erdin, MH Gunes, G Bebis, T Shipley - Computer Communications, 2013‏ - Elsevier
Anonymity technologies enable Internet users to maintain a level of privacy that prevents the
collection of identifying information such as the IP address. Understanding the deployment …

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

P Mittal, A Khurshid, J Juen, M Caesar… - Proceedings of the 18th …, 2011‏ - dl.acm.org
Anonymity systems such as Tor aim to enable users to communicate in a manner that is
untraceable by adversaries that control a small number of machines. To provide efficient …

A case study on measuring statistical data in the Tor anonymity network

K Loesing, SJ Murdoch, R Dingledine - Financial Cryptography and Data …, 2010‏ - Springer
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …

An improved algorithm for Tor circuit scheduling

C Tang, I Goldberg - Proceedings of the 17th ACM conference on …, 2010‏ - dl.acm.org
Tor is a popular anonymity-preserving network, consisting of routers run by volunteers all
around the world. It protects Internet users' privacy by relaying their network traffic through a …

Tailoring onion routing to the internet of things: Security and privacy in untrusted environments

J Hiller, J Pennekamp, M Dahlmanns… - 2019 IEEE 27th …, 2019‏ - ieeexplore.ieee.org
An increasing number of IoT scenarios involve mobile, resource-constrained IoT devices
that rely on untrusted networks for Internet connectivity. In such environments, attackers can …

Building incentives into Tor

TW “Johnny” Ngan, R Dingledine… - … Conference on Financial …, 2010‏ - Springer
Distributed anonymous communication networks like Tor depend on volunteers to donate
their resources. However, the efforts of Tor volunteers have not grown as fast as the …

Improving performance and anonymity in the Tor network

A Panchenko, F Lanze, T Engel - 2012 IEEE 31st International …, 2012‏ - ieeexplore.ieee.org
Anonymous communication aims to hide the relationship between communicating parties on
the Internet. It is the technical basis for achieving privacy and overcoming censorship …

Privately waiting–a usability analysis of the tor anonymity network

B Fabian, F Goertz, S Kunz, S Müller… - Sustainable e-Business …, 2010‏ - Springer
As the Internet is increasingly absorbing information from the real world it becomes more
important to prevent unauthorized collection and abuse of personalized information. At the …

Security considerations for collaborations in an industrial IoT-based lab of labs

J Pennekamp, M Dahlmanns, L Gleim… - 2019 IEEE Global …, 2019‏ - ieeexplore.ieee.org
The productivity and sustainability advances for (smart) manufacturing resulting from
(globally) interconnected Industrial IoT devices in a lab of labs are expected to be significant …

Monitoring the I2P network

JP Timpanaro, C Isabelle, F Olivier - 2011‏ - inria.hal.science
We present the rst monitoring study aiming to characterize the usage of the I2P network, a
low-latency anonymous network based on garlic routing. We design a distributed monitoring …