Tor Network Limits

dc.contributor.authorBenmeziane, Souad
dc.contributor.authorBadache, Nadjib
dc.date.accessioned2013-11-24T15:17:21Z
dc.date.available2013-11-24T15:17:21Z
dc.date.issued2010-12
dc.description.abstractTor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.fr_FR
dc.identifier.isrnCERIST-DTISI/RS--10-000000021--dzfr_FR
dc.identifier.urihttp://dl.cerist.dz/handle/CERIST/317
dc.publisherCERIST
dc.relation.ispartofRapports de recherche internes
dc.relation.ispartofseriesRapports de recherche internes
dc.relation.placeAlger
dc.subjectAnonymityfr_FR
dc.subjectTor networkfr_FR
dc.subjectPassive adversaryfr_FR
dc.subjectPrivate profilefr_FR
dc.titleTor Network Limitsfr_FR
dc.typeTechnical Report
Files
Collections