Slicing the Onion: Anonymous Routing Without PKI
Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private key pairs with the public keys known to everyone. In practice, however, ke...
Main Authors: | Katti, Sachin, Katabi, Dina, Puchala, Katarzyna |
---|---|
Other Authors: | Networks and Mobile Systems |
Language: | en_US |
Published: |
2005
|
Online Access: | http://hdl.handle.net/1721.1/30564 |
Similar Items
-
Information Slicing: Anonymity Using Unreliable Overlays
by: Katti, Sachin, et al.
Published: (2007) -
Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR)
by: Rady, Mina
Published: (2022) -
Trading Structure for Randomness in Wireless Opportunistic Routing
by: Chachulski, Szymon, et al.
Published: (2007) -
MORE: A Network Coding Approach to Opportunistic Routing
by: Chachulski, Szymon, et al.
Published: (2006) -
MIXIT: The Network Meets the Wireless Channel
by: Katti, Sachin, et al.
Published: (2007)