Tor Network Limits
dc.contributor.author | Benmeziane, Souad | |
dc.contributor.author | Badache, Nadjib | |
dc.date.accessioned | 2013-11-24T15:17:21Z | |
dc.date.available | 2013-11-24T15:17:21Z | |
dc.date.issued | 2010-12 | |
dc.description.abstract | Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity. | fr_FR |
dc.identifier.isrn | CERIST-DTISI/RS--10-000000021--dz | fr_FR |
dc.identifier.uri | http://dl.cerist.dz/handle/CERIST/317 | |
dc.publisher | CERIST | |
dc.relation.ispartof | Rapports de recherche internes | |
dc.relation.ispartofseries | Rapports de recherche internes | |
dc.relation.place | Alger | |
dc.subject | Anonymity | fr_FR |
dc.subject | Tor network | fr_FR |
dc.subject | Passive adversary | fr_FR |
dc.subject | Private profile | fr_FR |
dc.title | Tor Network Limits | fr_FR |
dc.type | Technical Report |