• DocumentCode
    2196204
  • Title

    Tor Network Limits

  • Author

    Benmeziane, Souad ; Badache, Nadjib ; Bensimessaoud, Sihem

  • Author_Institution
    Center of Res. in Sci. & Tech. Inf. (CERIST), Algiers, Algeria
  • Volume
    1
  • fYear
    2011
  • fDate
    14-15 May 2011
  • Firstpage
    200
  • Lastpage
    205
  • Abstract
    Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.
  • Keywords
    Internet; computer network security; data privacy; Internet; Tor network limits; censorship resistance; public anonymity communication service; volunteer run relay network; Computer architecture; Cryptography; Internet; Knowledge based systems; Microprocessors; Relays; Servers; Tor network; anonymity; passive adversary; private profile;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Computing and Information Security (NCIS), 2011 International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    978-1-61284-347-6
  • Type

    conf

  • DOI
    10.1109/NCIS.2011.48
  • Filename
    5948717