Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018‏ - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

[HTML][HTML] Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021‏ - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Enhancing security and privacy of Tor's ecosystem by using trusted execution environments

S Kim, J Han, J Ha, T Kim, D Han - 14th USENIX Symposium on …, 2017‏ - usenix.org
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …

A case study on measuring statistical data in the Tor anonymity network

K Loesing, SJ Murdoch, R Dingledine - Financial Cryptography and Data …, 2010‏ - Springer
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …

Sgx-tor: A secure and practical tor anonymity network with sgx enclaves

S Kim, J Han, J Ha, T Kim, D Han - IEEE/ACM Transactions on …, 2018‏ - ieeexplore.ieee.org
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012‏ - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs

A Mohaien, DF Kune, EY Vasserman… - IEEE Transactions on …, 2013‏ - ieeexplore.ieee.org
Encounter-based social networks and encounter-based systems link users who share a
location at the same time, as opposed to the traditional social network paradigm of linking …

[PDF][PDF] Measuring the Tor network from public directory information

K Loesing - Proc. HotPETS, Seattle, WA, 2009‏ - free-git.org
The Tor network is one of the largest deployed anonymity networks, with more than one
thousand servers, called relays, and probably hundreds of thousands of clients. A few facts …

[PDF][PDF] Urban sensing through social networks: The tension between participation and privacy

I Krontiris, F Freiling - … of the International Tyrrhenian Workshop on …, 2010‏ - academia.edu
In this paper we elaborate on using social networking mechanisms to create incentives that
increase active participation of users in the process of collecting data for urban sensing …

Participatory sensing: the tension between social translucence and privacy

I Krontiris, N Maisonneuve - Trustworthy Internet, 2011‏ - Springer
Participatory sensing is a new research area that emerged from the need to complement our
previous efforts in wireless sensor networks. It takes advantage of the emergence of rich …