Tor Drevvatne

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tor-powered Decentralized DNS for Tor Onion Services

Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in t...

متن کامل

TOR - Didactic Pluggable Transport

Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their citizens/users to selected data sources has lead to the implementation of new communication protocols. TOR is such a protocol, in which the path between the original source and destination is rand...

متن کامل

Throttling Tor Bandwidth Parasites

Tor’s network congestion and performance problems stem from a small percentage of users that consume a large fraction of available network capacity. These users continuously drain relays of excess bandwidth, creating new network bottlenecks and exacerbating the effects of existing ones. This may currently be a performance issue due to unfair resource consumption, but it also shows that the netw...

متن کامل

Another Tor is possible

The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting ...

متن کامل

Linking Tor Circuits

Tor is a popular anonymity network, which hides both the content of traffic as well as the identities of the communicating users. We propose a novel attack that reduces the effects of existing safeguards and significantly degrades the anonymity provided by Tor. We show that an adversary is able to successfully link different circuits belonging to the same user by only controlling the middle nod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tidsskrift for Den norske legeforening

سال: 2020

ISSN: 0029-2001

DOI: 10.4045/tidsskr.20.0042