[图书][B] Methods for secure decentralized routing in open networks
NS Evans - 2011 - net.in.tum.de
The contribution of this thesis is the study and improvement of secure, decentralized, robust
routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) …
routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) …
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is
designed as an interoperable replacement for the relay selection and directory service of the …
designed as an interoperable replacement for the relay selection and directory service of the …
Key management for onion routing in a true peer to peer setting
P Palmieri, J Pouwelse - Advances in Information and Computer Security …, 2014 - Springer
Onion routing is a technique for anonymous and privacy preserving communication at the
base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a …
base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a …
R5n: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff - 2011 5th International Conference on …, 2011 - ieeexplore.ieee.org
This paper describes a new secure DHT routing algorithm for open, decentralized P2P
networks operating in a restricted-route environment with malicious participants. We have …
networks operating in a restricted-route environment with malicious participants. We have …
Routing in the dark: Pitch black
NS Evans, C GauthierDickey… - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks,
direct communication between nodes is limited to specific neighbors. Often these networks …
direct communication between nodes is limited to specific neighbors. Often these networks …
[PDF][PDF] Introducing accountability to onion routing
Onion routing (OR) protocols provide an overlay network for low-latency anonymous
communication [6]. Tor [1], the most widely-deployed onion routing network, serves …
communication [6]. Tor [1], the most widely-deployed onion routing network, serves …
The fifteen year struggle of decentralizing privacy-enhancing technology
Ever since the introduction of the internet, it has been void of any privacy. The majority of
internet traffic currently is and always has been unencrypted. A number of anonymous …
internet traffic currently is and always has been unencrypted. A number of anonymous …
Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability
concerns and central vulnerability points of current networks such as Tor. However, the P2P …
concerns and central vulnerability points of current networks such as Tor. However, the P2P …
Dynamic multipath onion routing in anonymous peer-to-peer overlay networks
O Landsiedel, A Pimenidis, K Wehrle… - … 2007-IEEE Global …, 2007 - ieeexplore.ieee.org
Although recent years provided many protocols for anonymous routing in overlay networks,
they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing …
they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing …
Secure routing for structured peer-to-peer overlay networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-
scale, decentralized applications, including distributed storage, group communication, and …
scale, decentralized applications, including distributed storage, group communication, and …