Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/882493.884368guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Anonymous Connections and Onion Routing

Published: 04 May 1997 Publication History

Abstract

Onion Routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream. Onion routing has been implemented on Sun Solaris 2.X with proxies for Web browsing, remote logins, and e-mail. This paper's contribution is a detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results.

Cited By

View all
  • (2022)The decoupling principleProceedings of the 21st ACM Workshop on Hot Topics in Networks10.1145/3563766.3564112(213-220)Online publication date: 14-Nov-2022
  • (2018)An Empirical Study of the I2P Anonymity Network and its Censorship ResistanceProceedings of the Internet Measurement Conference 201810.1145/3278532.3278565(379-392)Online publication date: 31-Oct-2018
  • (2017)StadiumProceedings of the 26th Symposium on Operating Systems Principles10.1145/3132747.3132783(423-440)Online publication date: 14-Oct-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
May 1997

Publisher

IEEE Computer Society

United States

Publication History

Published: 04 May 1997

Author Tags

  1. Internet
  2. anonymity
  3. communications
  4. privacy
  5. security
  6. traffic analysis

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)The decoupling principleProceedings of the 21st ACM Workshop on Hot Topics in Networks10.1145/3563766.3564112(213-220)Online publication date: 14-Nov-2022
  • (2018)An Empirical Study of the I2P Anonymity Network and its Censorship ResistanceProceedings of the Internet Measurement Conference 201810.1145/3278532.3278565(379-392)Online publication date: 31-Oct-2018
  • (2017)StadiumProceedings of the 26th Symposium on Operating Systems Principles10.1145/3132747.3132783(423-440)Online publication date: 14-Oct-2017
  • (2017)rPIRInternational Journal of Information Security10.1007/s10207-016-0347-816:6(603-625)Online publication date: 1-Nov-2017
  • (2016)Unobservable communication over fully untrusted infrastructureProceedings of the 12th USENIX conference on Operating Systems Design and Implementation10.5555/3026877.3026920(551-569)Online publication date: 2-Nov-2016
  • (2016)Network-Hiding Communication and Applications to Multi-party ProtocolsProceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981510.1007/978-3-662-53008-5_12(335-365)Online publication date: 14-Aug-2016
  • (2015)VuvuzelaProceedings of the 25th Symposium on Operating Systems Principles10.1145/2815400.2815417(137-152)Online publication date: 4-Oct-2015
  • (2015)Analyzing anonymity attacks through noisy channelsInformation and Computation10.1016/j.ic.2015.08.003244:C(76-112)Online publication date: 1-Oct-2015
  • (2012)Modular Reasoning about Differential Privacy in a Probabilistic Process CalculusRevised Selected Papers of the 7th International Symposium on Trustworthy Global Computing - Volume 819110.1007/978-3-642-41157-1_13(198-212)Online publication date: 7-Sep-2012
  • (2012)On the centrality of off-line e-cash to concrete partial information gamesProceedings of the 8th international conference on Security and Cryptography for Networks10.1007/978-3-642-32928-9_15(264-280)Online publication date: 5-Sep-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media