DocumentCode :
2196204
Title :
Tor Network Limits
Author :
Benmeziane, Souad ; Badache, Nadjib ; Bensimessaoud, Sihem
Author_Institution :
Center of Res. in Sci. & Tech. Inf. (CERIST), Algiers, Algeria
Volume :
1
fYear :
2011
fDate :
14-15 May 2011
Firstpage :
200
Lastpage :
205
Abstract :
Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.
Keywords :
Internet; computer network security; data privacy; Internet; Tor network limits; censorship resistance; public anonymity communication service; volunteer run relay network; Computer architecture; Cryptography; Internet; Knowledge based systems; Microprocessors; Relays; Servers; Tor network; anonymity; passive adversary; private profile;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-61284-347-6
Type :
conf
DOI :
10.1109/NCIS.2011.48
Filename :
5948717
Link To Document :
بازگشت