Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier

D Herrmann, R Wendolsky, H Federrath - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted
tunnel that enables users to hide content and addresses of requested websites from external …

Shining light in dark places: Understanding the Tor network

D McCoy, K Bauer, D Grunwald, T Kohno… - … Symposium, PETS 2008 …, 2008 - Springer
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012 - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

A decentralized peer-to-peer remote health monitoring system

MS Ali, M Vecchio, GD Putra, SS Kanhere, F Antonelli - Sensors, 2020 - mdpi.com
Within the Internet of Things (IoT) and blockchain research, there is a growing interest in
decentralizing health monitoring systems, to provide improved privacy to patients, without …

[PDF][PDF] A Tune-up for Tor: Improving Security and Performance in the Tor Network.

R Snader, N Borisov - ndss, 2008 - freehaven.net
The Tor anonymous communication network uses selfreported bandwidth values to select
routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this …

A case study on measuring statistical data in the Tor anonymity network

K Loesing, SJ Murdoch, R Dingledine - Financial Cryptography and Data …, 2010 - Springer
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …

[PDF][PDF] SWIRL: A Scalable Watermark to Detect Correlated Network Flows.

A Houmansadr, N Borisov - NDSS, 2011 - Citeseer
Flow watermarks are active traffic analysis techniques that help establish a causal
connection between two network flows by content-independent manipulations, eg, altering …

[PDF][PDF] Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it

R Dingledine, SJ Murdoch - Online: http://www. torproject. org/press …, 2009 - cl.cam.ac.uk
As Tor's user base has grown, the performance of the Tor network has suffered. This
document describes our current understanding of why Tor is slow, and lays out our options …

Revisiting user privacy for certificate transparency

D Kales, O Omolola, S Ramacher - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Public key infrastructure (PKI) based on certificate authorities is one of the cornerstones of
secure communication over the internet. Certificates issued as part of this PKI provide …

Improving performance and anonymity in the Tor network

A Panchenko, F Lanze, T Engel - 2012 IEEE 31st International …, 2012 - ieeexplore.ieee.org
Anonymous communication aims to hide the relationship between communicating parties on
the Internet. It is the technical basis for achieving privacy and overcoming censorship …