Abusing privacy infrastructures: case study of Tor.
In the last two decades, advances in privacy-enhancing technologies, including cryptographic mechanisms, standardized security protocols, and infrastructures, have significantly improved the privacy of users. Tor, a byproduct of those primitives, emerged as a practical solution to protecting the pri...
Published: |
|
---|---|
Online Access: | http://hdl.handle.net/2047/D20283799 |
Similar Items
-
Privacy Preserving Detection of Path Bias Attacks in Tor
by: Watson Lauren, et al.
Published: (2020-10-01) -
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor
by: Dahlberg Rasmus, et al.
Published: (2021-04-01) -
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym
by: Harborth David, et al.
Published: (2020-04-01) -
Nymbler: Privacy-enhanced Protection from Abuses of Anonymity
by: Henry, Ryan
Published: (2011) -
Nymbler: Privacy-enhanced Protection from Abuses of Anonymity
by: Henry, Ryan
Published: (2011)