DocumentCode
2196204
Title
Tor Network Limits
Author
Benmeziane, Souad ; Badache, Nadjib ; Bensimessaoud, Sihem
Author_Institution
Center of Res. in Sci. & Tech. Inf. (CERIST), Algiers, Algeria
Volume
1
fYear
2011
fDate
14-15 May 2011
Firstpage
200
Lastpage
205
Abstract
Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.
Keywords
Internet; computer network security; data privacy; Internet; Tor network limits; censorship resistance; public anonymity communication service; volunteer run relay network; Computer architecture; Cryptography; Internet; Knowledge based systems; Microprocessors; Relays; Servers; Tor network; anonymity; passive adversary; private profile;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location
Guilin
Print_ISBN
978-1-61284-347-6
Type
conf
DOI
10.1109/NCIS.2011.48
Filename
5948717
Link To Document