[图书][B] Methods for secure decentralized routing in open networks

NS Evans - 2011 - net.in.tum.de
The contribution of this thesis is the study and improvement of secure, decentralized, robust
routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) …

Scalable onion routing with torsk

J McLachlan, A Tran, N Hopper, Y Kim - … of the 16th ACM conference on …, 2009 - dl.acm.org
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is
designed as an interoperable replacement for the relay selection and directory service of the …

Key management for onion routing in a true peer to peer setting

P Palmieri, J Pouwelse - Advances in Information and Computer Security …, 2014 - Springer
Onion routing is a technique for anonymous and privacy preserving communication at the
base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a …

R5n: Randomized recursive routing for restricted-route networks

NS Evans, C Grothoff - 2011 5th International Conference on …, 2011 - ieeexplore.ieee.org
This paper describes a new secure DHT routing algorithm for open, decentralized P2P
networks operating in a restricted-route environment with malicious participants. We have …

Routing in the dark: Pitch black

NS Evans, C GauthierDickey… - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks,
direct communication between nodes is limited to specific neighbors. Often these networks …

[PDF][PDF] Introducing accountability to onion routing

M Backes, J Clark, P Druschel, A Kate… - … Region Security and …, 2013 - grsrd.uni.lu
Onion routing (OR) protocols provide an overlay network for low-latency anonymous
communication [6]. Tor [1], the most widely-deployed onion routing network, serves …

The fifteen year struggle of decentralizing privacy-enhancing technology

R Jagerman, W Sabee, L Versluis, M de Vos… - arXiv preprint arXiv …, 2014 - arxiv.org
Ever since the introduction of the internet, it has been void of any privacy. The majority of
internet traffic currently is and always has been unencrypted. A number of anonymous …

Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies

P Mittal, N Borisov - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability
concerns and central vulnerability points of current networks such as Tor. However, the P2P …

Dynamic multipath onion routing in anonymous peer-to-peer overlay networks

O Landsiedel, A Pimenidis, K Wehrle… - … 2007-IEEE Global …, 2007 - ieeexplore.ieee.org
Although recent years provided many protocols for anonymous routing in overlay networks,
they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing …

Secure routing for structured peer-to-peer overlay networks

M Castro, P Druschel, A Ganesh, A Rowstron… - ACM SIGOPS …, 2002 - dl.acm.org
Structured peer-to-peer overlay networks provide a substrate for the construction of large-
scale, decentralized applications, including distributed storage, group communication, and …