Anonymous connections and onion routing

@article{Syverson1997AnonymousCA,
  title={Anonymous connections and onion routing},
  author={P. Syverson and D. Goldschlag and M. Reed},
  journal={Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)},
  year={1997},
  pages={44-54}
}
Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream. Onion routing has been implemented on Sun Solaris 2.X with proxies for Web browsing, remote logins and e-mail. This paper's contribution is a detailed specification of the implemented… Expand
857 Citations

Figures and Topics from this paper

Attacks on Anonymous Systems
  • PDF
Anonymous connections and onion routing
  • 980
  • PDF
Onion routing access configurations
  • 85
  • PDF
Onion Routing for Anonymous and Private Internet Connections
  • 507
  • PDF
Onion routing
  • 629
  • PDF
Private Web Browsing
  • 36
  • PDF
Resisting Traffic Analysis on Unclassified Networks
  • PDF
Privacy and Security on Anonymous Routing Protocols in MANET
  • E. Kumari, A. Kannammal
  • Computer Science
  • 2009 Second International Conference on Computer and Electrical Engineering
  • 2009
  • 12
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Anonymous connections and onion routing
  • 980
  • PDF
Proxies for anonymous routing
  • 110
  • PDF
Hiding Routing Information
  • 546
  • PDF
Protocols Using Anonymous Connections: Mobile Applications
  • 46
  • PDF
Variable and scalable security: protection of location information in mobile IP
  • 63
Anonymous Communication and Anonymous Cash
  • 64
  • PDF
Anonymous Atomic Transactions
  • 61
  • PDF
How to Make Personalized Web Browising Simple, Secure, and Anonymous
  • 185
  • PDF
Mixing E-mail with Babel
  • Ceki Gülcü, G. Tsudik
  • Computer Science
  • Proceedings of Internet Society Symposium on Network and Distributed Systems Security
  • 1996
  • 350
  • Highly Influential
  • PDF
Untraceable electronic mail, return addresses, and digital pseudonyms
  • 3,081
  • PDF
...
1
2
3
...