Part of the Lecture Notes in Computer Science book series (LNCS, volume 6841)
Tor and Circumvention: Lessons Learned
(Abstract to Go with Invited Talk)
Tor is a free-software anonymizing overlay network that helps people around the world use the Internet in safety. Tor’s 2500 volunteer relays carry almost 10Gb/s of traffic for several hundred thousand users each day.
KeywordsLesson Learn Correlation Attack Anonymous Communication Deep Packet Inspection 13th USENIX
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
- 1.Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. Technical Report 2006-1, The Tor Project (November 2006)Google Scholar
- 2.Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. 13th USENIX Security Symposium (August 2004)Google Scholar
- 3.Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 203–215. Springer, Heidelberg (2010)CrossRefGoogle Scholar
© International Association for Cryptologic Research 2011